diff --git a/-NFQT4oBgHgl3EQfKDVk/content/2301.13258v1.pdf b/-NFQT4oBgHgl3EQfKDVk/content/2301.13258v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..c192d8b9c4ce5485b0c00feef89423d504bf7f40 --- /dev/null +++ b/-NFQT4oBgHgl3EQfKDVk/content/2301.13258v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ac38d1b693ff07e0099c0ee0be518faf5aa5f098a851e11e8104993b297b5e34 +size 11128650 diff --git a/-NFQT4oBgHgl3EQfKDVk/vector_store/index.faiss b/-NFQT4oBgHgl3EQfKDVk/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..9e2c29b11815e7f5a017c4cd31ed74a2f313da4b --- /dev/null +++ b/-NFQT4oBgHgl3EQfKDVk/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b574fc534b7aa29d57f963611f6a98e2135fd8bd63a60faa4f46b2a7d90be18f +size 10485805 diff --git a/-tAzT4oBgHgl3EQfSvv8/content/tmp_files/2301.01239v1.pdf.txt b/-tAzT4oBgHgl3EQfSvv8/content/tmp_files/2301.01239v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..97fb58ca827e560662aab3f041e0d6752042e2d9 --- /dev/null +++ b/-tAzT4oBgHgl3EQfSvv8/content/tmp_files/2301.01239v1.pdf.txt @@ -0,0 +1,758 @@ +S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +1 +Preprint accepted in WCEAM 2022 Seville +Use of survival analysis and simulation to +improve maintenance planning of high +voltage instrument transformers in the +Dutch transmission system +Swasti R. Khuntia1, Fatma Zghal1, Ranjan Bhuyan1, Erik Schenkel1, Paul +Duvivier2, Olivier Blancke2, Witold Krasny2 +Abstract This paper describes the use of survival analysis and simulation to model +the lifetime of high voltage instrument transformers in the Dutch transmission sys- +tem. To represent asset aging, the non-parametric Kaplan-Meier method is used to +enable the fitting of Weibull distribution. Such an approach is implemented on three +different voltage levels, namely 110kV, 150kV, and 220/380kV. Real failure and +inspection data is used to achieve a realistic failure model of the instrument trans- +formers. Failure and maintenance data occurring between 1989 and 2021 have been +used for this study. In spite of missing and low-quality data, a rich failure database +could still be prepared. This study also offers insights into factors (i.e., voltage level, +in-service age) influencing the remaining life from both graphical survival function +and parametric Weibull distribution analysis. Based on the derived statistics, future +possible maintenance planning scenarios are simulated under a complex system +modelling framework in a digital twin enabled platform. Eventually, the scenarios +are evaluated in terms of replacement costs (CAPEX), inspection hours, and una- +vailability hours. +1 Introduction +TenneT, as European transmission system operator, is facing power supply reli- +ability challenges that originate in a globally aging infrastructure and increasing +complexity of business operations in the context of energy transition. While power +transformers, due to the criticality of their function on the grid have been the focus +of many studies, concerns have been raised recently on the lack of focus on long- +term asset management of Instrument Transformers (ITs). ITs play an important + +1 S.R. Khuntia (), F. Zghal, R. Bhuyan, E. Schenkel +Asset Management Onshore, TenneT TSO B.V., Arnhem, The Netherlands +e-mail: firstname.lastname@tennet.eu +2 P. Duvivier, O. Blancke, W. Krasny +Cosmo Tech, Lyon, France +email: firstname.lastname@cosmotech.com + +S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +2 +Preprint accepted in WCEAM 2022 Seville +role in the metering of electrical quantities and protection of other system compo- +nents. Due to their importance, any unplanned unavailability due to failures can +cause considerable outage costs to utilities. Consequently, it is crucial to properly +characterize the aging of ITs using statistical approaches that will enable to predict +the evolution of the IT population failure over the next years. In addition, it will +yield valuable perspectives in terms of optimizing maintenance and replacement +policies accordingly. The reliability analysis of ITs is very much dependent on the +defined maintenance strategies which will provide a reliable and safe power supply. +By definition, asset management involves strategies to explore, identify, plan, in- +vest, utilize, maintain, replace, and dispose of assets while maximizing their value +and performance under some prescribed financial constraint (Khuntia et al., 2016). +Since ITs play such an important role, it is expected that statistical failure analysis +will give a better insight on actual maintenance planning performance to the asset +management team at TenneT. Technically, in the reliability analysis of IT, it is in- +teresting to identify the independence or dependence of the specific covariates that +indicate the operation of the IT. +For any kind of data-driven methodology and, in particular, asset reliability char- +acterization, a robust database is needed, both in terms of volumetry and quality +(Balzer and Neumann, 2011). However, it can be argued that there should be a pref- +erence for robust data and that there are techniques that could be used to cope with +data discrepancies. In our case, the historical failure data play an important role in +understanding the behavior of ITs. Literature study reveals that explosion is one of +the highest reported failure modes. Impact of explosion not only relates to direct +cost of IT replacement but also chances of replacement of neighboring equipment +damaged in the explosion. CIGRE reports are one of the primary sources for pub- +licly available failure databases of ITs. Three series of CIGRE reports are available +online. The first report was published in 1990 which covered failures of ITs (voltage +>72.5kV) in about 15 countries. The survey covered 136033 transformers in the +period from 1970 to 1986 (CIGRE, 1990). The second report published results for +131207 ITs (voltage > 60kV) in the period from 1985 to 1995 in the year 2009 +(CIGRE, 2009). The third results of a wider international survey was published in +2012. It collected population and failure data for ITs of voltage > 60kV and ex- +cluded AIS ring current transformers that were in service during the years 2004 to +2007 inclusive (CIGRE, 2012). Some other failure investigations were reported +(Poljak et al., 2010; Raetze et al., 2012; Tee et al., 2021), where authors focus on +reduction of IT explosion and better condition monitoring of ITs. Nonetheless, the +truth is that failure is probabilistic in nature, and it needs investigations on the rela- +tionship with asset data and failure cause. The use of semi-parametric Cox model +was reported in (Tee et al., 2021). The authors elaborated the factors influencing the +probability of failures through analysis on the lifetime data from both graphical sur- +vival function plots and semi-parametric Cox model. +With the use of Simulation Digital Twin technology from Cosmo Tech, TenneT +analyzed various maintenance strategies. The Digital Twin has been calibrated + +S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +3 +Preprint accepted in WCEAM 2022 Seville +based on the historical failure data that it recorded with statistical technique relying +on survival analysis. Literature study shows that survival analysis was used for +power transformer reliability studies of around 2000 nos. in the Canadian and +around 6000 nos. in the Australian utility (Picher et al., 2014; Martin et al., 2018). +Ref. (Picher et al., 2014) described the data of Canadian utility Hydro-Quebec +where they adopted a good match using the Kaplan-Meier and Weibull distribution. +Finally, the method concluded that Weibull distribution is a better fit and the results +looked promising. Similarly, ref. (Martin et al., 2018) followed a similar strategy +for Australian data. The authors deduced the choice of Kaplan-Meier or Weibull +distribution based on the different voltage classes. In practice, Weibull distribution +fitted to empirical failure data are commonly used to calculate life expectancy. +However, the challenge in applying such a distribution to electrical assets is that +often the root cause of failure is not related to the normal aging of the asset, but +rather external factors. The aim of this paper is three-fold: (1) use of real failure data +to model a time-varying failure rate based on Weibull parameters obtained from +Kaplan-Meier survival analysis, (2) investigate extrapolation methods to maximize +value of existing inspection results across IT population, and (3) use digital twin +enabled simulation to tune the required resources necessary to realize TenneT’s +strategy for considered substation equipment maintenance and renewals. +2 Data and Methodology +2.1 +Description of Data +As of the date of writing this paper, TenneT owns and maintains a large fleet of +ITs in the Dutch high voltage AC network (i.e., 110, 150, 220 and 380kV) as shown +in Figure 1(a). It is of interest to see the age profile of the existing population, in +terms of years since manufacture because reliability is often related to age. How- +ever, lifetime data can be complicated as some ITs often extend over several dec- +ades. At TenneT, the expected design life of an IT is 45 years. This age is affected +and reduced, sometimes substantially, depending on the design or utilization of the +IT, i.e. its loading or the environment to which it is exposed. In some cases, a good +maintenance scheme can even increase the replacement age. Although there is no +prescribed replacement age, it is the responsibility of the asset management depart- +ment to formulate the maintenance policies based on failure history. For this study, +failure data was obtained from various sources, starting from failure records, reports +to talking to experts. Fortunately, TenneT did not record a high number of major +failures since the 1989. A major failure is defined as a sudden explosive event that +has caused an immediate emergency system outage or trip. Figure 1(b) lists the fail- +ure events with respect to manufacturer (coded for confidentiality) and IT age. +The failure list was not adequate to come up with a statistical model. In addition, +maintenance reports (or work orders) and expert knowledge was used to populate +the list and gain utmost information. A work order is a document that provides all + +S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +4 +Preprint accepted in WCEAM 2022 Seville +the information about a maintenance task and outlines a process for completing that +task. In case of IT, corrective work orders are used (the others being periodic +maintenance and inspection work orders). Discussion with experts led us to use the +work orders when an IT was out of service for any kind of maintenance. Figure 1(c) +shows the total recorded failures for the IT population. In the recent years, one ob- +servation worth noticing is that the number of failures has increased significantly. + +(a) + +(b) + +10000 +SLI +8000 +Number of +6000 +4000 +2000 +0 +110 +150 +220 +380 +Voltage level (kV)5 +Number of ITs +4 +m +2 +1 +0 +990 +7 +68 +1 +3 +6 +80 +9 +0 +00 +05 +600 +2 +6 +7 +7 +7 +8 +9 +9 +9 +9 +9 +9 +9 +6 +9 +6 +0 +0 +0 +0 +0 +0 +1 +1 +1 +1 +1 +L +1 +1 +L +2 +2 +2 +2 +2 +2 +Year of constructionS.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +5 +Preprint accepted in WCEAM 2022 Seville + +(c) +Figure 1 (a) Voltage-based IT population, and (b) Actual failure list until July 2021, +(c) Populated failure from work order and expert opinion until July 2021 +2.2 +Survival Analysis and Failure Rate Modelling +Survival analysis is a statistical technique used to estimate the lifespan of a par- +ticular population under study. It is an analysis of time-to-event data (Wang et al., +2019). One of the widely used survival analysis technique is the Kaplan-Meier +(KM) estimate (Bland and Altman, 1998). The KM estimator uses lifetime data to +perform survival analysis. Although it is widely used in medical research to gauge +the part of patients living for a specific measure of time after treatment, it has been +used in the power systems sector to model the survival of electric assets (Martin et +al., 2018). The use of KM estimate is supported by two reasons: one is that it does +not assume that the data fits a statistical distribution, and second is that it allows the +inclusion of censored data (when an IT had not failed by mid-2021). +For a population, the survival function 𝑆̂(𝑡) is defined as: +𝑆̂(𝑡) = ∏ (1 − 𝑑𝑖 +𝑛𝑖 +) +𝑖:𝑡𝑖<𝑡 + +where, 𝑡𝑖is the time at least one event happened, 𝑑𝑖 is the number of events that +happened at time 𝑡𝑖 and 𝑛𝑖 is the number of individuals known to have survived up +to time 𝑡𝑖 (Davidson-Pilon, 2019). In our study, the estimates are calculated for three +different voltage levels and 𝑛𝑗 considers observations that occurred between the +oldest IT age and mid-2021. An important aspect in survival analysis is considering +the censored data. Censoring occurs when the value of an observation is only known + +1000 +SI +800 +Number of +009 +400 +200 +YearofconstructionS.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +6 +Preprint accepted in WCEAM 2022 Seville +to some extent. Censored data is often encountered when analysing practical life +data, especially in case of electrical power systems where most of the installed +equipment is still in-service, and most of the time the exact age of equipment at the +moment of failure is unknown (CIGRE, 2017). In this study, a large amount of data +falls under the right censored data (suspended data) category. A dataset is termed as +right censored or suspended when it is composed of components that did not fail. +The term right censored indicates that the event is located to the right of the dataset, +which implies that certain components are still operating. In our dataset, we had to +deal with right censoring and no left truncation since the year of construction was +known to us. Ignoring truncation causes bias in model’s estimation. + + + +1.0 +Weibull +Kaplan-Meier +0.8 +0.6 +0.4 +0.2 +0.0 +0 +20 +40 +60 +80 +100 +timeline1.0 +Weibull +Kaplan-Meier +0.8 +0.6 +0.4 +0.2 +0.0 +0 +20 +40 +60 +80 +100 +timelineS.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +7 +Preprint accepted in WCEAM 2022 Seville + +Figure 2 Kaplan-Meier estimate of all different voltage levels. +The IT dataset was split into three different families, each one with its own deg- +radation law, based on their voltage level as is shown in Figure 2. A useful statistic +in this analysis is calculating the median survival time, which defines the point in +time where on average 50% of the population should have failed. For 110kV, the +median survival time is 61 years. However, the median survival time for 150, 220 +and 380kV is infinity because there have been an insufficient number of failures to +determine it. In such cases, the two best options are: +1. use another quantile (e.g. 0.75) to compare the groups; +2. approximate the survival curve by means of a parametric fit and derive the me- +dian survival time using the model. +The second option is chosen in our study since all the three voltages can be mod- +elled using the parametric fit assuming that failure times have a Weibull distribu- +tion. In other words, Weibull distribution is used to parameterize the KM estimate. +The Weibull distribution is a widely used method to analyse the statistical features +of failure (Rinne, 2008). The probability 𝑓(𝑡) and cumulative density function 𝐹(𝑡) +are defined as: 𝑓(𝑡) = 𝛽 +𝑡𝛽−1 +𝜂𝛽 𝑒 +−(𝑡 +𝜂) +𝛽 +𝑎𝑛𝑑 𝐹(𝑡) = 1 − 𝑒 +−(𝑡 +𝜂) +𝛽 +; where, 𝑡 is the time, +𝛽 is the shape and 𝜂 is the scale parameter. Table 1 shows the different parameters +calculated for our study from the corresponding survival function. +Table 1 Statistics and Weibull parameters. +Voltage (kV) +No. of ITs +No. of +censored +β +η +median +110 +3168 +255 +6.67 +63.79 +61 +150 +10058 +298 +6.42 +74.20 +infinity +220 and 380 +2982 +25 +5.65 +77.05 +infinity + +1.0 +0.8 +0.6 +0.4 +0.2 +Weibull +Kaplan-Meier +0.0 +0] +20 +40 +60 +80 +100 +timelineS.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +8 +Preprint accepted in WCEAM 2022 Seville +3 Modelling in Cosmo Tech Asset and Simulations +Founded in 2010, Cosmo Tech is a technology company pioneer in the modeling +of complex systems (https://cosmotech.com/). Relying on its industry-validated +modeling and simulation software platform, Cosmo Tech has developed a solution +called Cosmo Tech Asset, henceforth called CTA. CTA allows to build digital twins +of asset portfolios with their full complexity such as network dependencies, opera- +tive strategies, or dynamical resources allocations. +3.1 +Cosmo Tech Asset Platform +The different steps involved in the CTA platform are: +1. Experiment the CTA platform’s pre-built health assessment methods and com- +pare the results with internal initiatives. For health assessment, the asset health +index is a key simulation variable, and it is described in the next sub-section. +2. Demonstrate the calibration of reliability law (using Weibull distribution) for +simulations against up-to-date condition of ITs, but also historical IT related +data, such as field observation or inspection data and measurement inputs. +3. Investigate the functional possibilities that would allow to leverage existing in- +spection results across ITs using extrapolation methods when applicable, there- +fore maximize inspection result value. +4. Finally, based on the achieved health assessment technique, use the simulation +platform to tune the required resources necessary to realize TenneT’s strategy +for considered IT maintenance and replacements. +3.2 +TenneT Asset Health Index +For health assessment, the TenneT asset health index (AHI) is considered and is +shown in Table 1(a) (TenneT, 2021). The AHI is based on asset age and failure +probability, and it is used to drive short-term maintenance and long-term replace- +ment strategies. It provides a consistent way to compare the overall asset health of +TenneT's assets. +The evaluation of the AHI is based on two metrics: +1. probability of failure of IT in the coming years for AHI score of 1 to 6, and +2. age of IT for AHI score of 7 to 10. +In addition to AHI, the study of IT uses reliability law over which failures are +drawn during the simulations. The reliability law corresponds to the KM survival +function and the Weibull estimates that are described in section 2. These laws have +a cumulative distribution function which represent the probability for a failure to +occur before a certain age. And the probability of failure over the next year can be +evaluated using the following formula: + +S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +9 +Preprint accepted in WCEAM 2022 Seville +𝑃(𝑋 < 𝑡 + 3 | 𝑋 > 𝑡) = 1 − 𝑃(𝑋 > 𝑡 + 3 | 𝑋 > 𝑡) + = 1 − +𝑃(𝑋>𝑡+3 ∩ 𝑋>𝑡) +𝑃(𝑋 > 𝑡) += 1 − +𝑃(𝑋 > 𝑡+3) +𝑃(𝑋 > 𝑡) + = 1 − +1 − 𝑃(𝑋 < 𝑡+3) +1 − 𝑃(𝑋 < 𝑡) = 1 − +1 − 𝐹(𝑡+3) +1 − 𝐹(𝑡) +where, +● +𝐹is the cumulative distribution function of the reliability law +● +𝑋 is a random variable representing the occurrence of a failure. + +Table 1 (a)TenneT Asset Health Index (AHI) definition, (b) Classification of Resources (FTE: +Full Time Employment). + +(a) + +(b) +3.3 +Simulation +The reliability law was used to evaluate the different scenarios for an efficient +maintenance planning. A simulation period of 100 years is chosen for this study +since it is assumed that the most recent IT replacements will be in operation until +the end of this century. Time-based scenario is the current maintenance planning at +TenneT. It is compared against a condition-based scenario. Both the scenarios are +explained in detail in Table 2. The resources are listed in Table 1(b). +Table 2 Different Scenarios under Study. + +Condition-based +Time-based +Replacement +220/380kV +45 years +45 years +110/150kV +AHI score red or +purple +45 years +Inspections on bay +every 3,6,12 months +220/380kV +No inspections +No inspections +110/150kV +Time-based start- +ing at 25 years +Time-based start- +ing at 25 years +In principle, both scenarios are very similar in the sense that the same simulation +model dataset is used. The difference lies in the trigger for the replacement activities +of the 110/150kV assets. In fact, in time-based scenario, which represents the cur- +rent way of working, the trigger is based on the real age of the asset. As soon as the + +AHI Score +Colour +Definition +Purple +Within 3 years, 80% of chance that the asset is ir- +reparably damaged +2 +Purple +Within 3 years, 50% of chance that the asset is ir- +reparably damaged +3 +Purple +Within 3 years, 20% of chance that the asset is ir- +reparably damaged +4 +Red +Within 7 years, 80% of chance that the asset is ir +reparably damaged +5 +Red +Within 7 years, 50% of chance that the asset is ir- +reparably damaged +6 +Red +Within 7 years, 20% of chance that the asset is ir- +Orange +reparably damaged +7 +Older than 75% of the average age +8 +Orange +Between 60% and 75% of the average age +9 +Older than 5 years old and less than 60% of the av- +_10 +Green. +Younger than 5 years old +erage ageActivity name +Dura- +Required +Material +Workforce +Total +tion (h) +FTE +(?) 1503 +() 1503 +(?) 1503 +Inspection +0.5 +I +0 +every 3 years +41.624 +41.624 +Inspection +1.33 +2 +49.81 +180.18 +229.99 +every 6 years +Replacement +IT 110kV +40 +10 +8211 +35000 +43211 +Replacement +40 +10 +IT 150kV +10044 +35000 +45044 +Replacement +IT 220kV +40 +10 +15000 +35000 +50000 +Replacement +IT 380kV +40 +10 +15000 +35000 +50000S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +10 +Preprint accepted in WCEAM 2022 Seville +asset reaches 45 years of age, replacement is triggered, and action is performed as +resources are unlimited. On the other hand, in the condition-based scenario, the trig- +ger is based on the apparent age of the asset. The apparent age is an attribute of +every asset that reflects its degradation rate and it can be different from the real age +of the asset. If the apparent age is higher than the real age, the asset degrades faster +than normal. If the apparent age is lower than the real age, the asset degrades slower +than normal. When the apparent age of the asset reaches 50 or 54, it means that the +asset is reaching AHI score of respectively 6 or 3 that is red or purple (see Table +1(a)), and the replacement action is triggered. + +Figure 3 Unconstrained Scenarios Simulation. + +Figure 4 40 FTE constrained Scenarios Simulation. + +ooFTE-Time-BasedReplacement +coFTE-Condition-BasedReplacement +40K +1.49M +TOTEX +0.1M +1.36M +20K +TOTEX +TOTEX +0.0M +OK +2050 +2100 +2050 +2100 +HR Used (FTE) +500 +100 +44.87 +40.63 +Av HR +Av HR +Used +Used +0 +2050 +2100 +2050 +210040FTE-Time-BasedReplacement +40FTE - Condition-Based Replacemen +() ) +TOTEX +10K +1.20M +10K +1.21M +5K +TOTEX +TOTEX +OK +OK +2050 +2100 +2050 +2100 +HR Used (FTE) +40 +40 +36.28 +20 +36.19 +20 +AvHR +Av HR +Used +Used +0 +2050 +2100 +2050 +2100S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +11 +Preprint accepted in WCEAM 2022 Seville + +Figure 5 60 FTE constrained Scenarios Simulation. +From the figures, two conclusions can be made: (1) replacement activities are +the major cost driver in the TOTEX (Total Expenses), and (2) Human resources +(HR) costs are the major cost driver in the replacement costs. Simulation results +show that in case HR availability is restricted, there is no significant difference be- +tween the time-based and condition-based replacement strategies. In fact, switching +to a condition-based strategy might not be beneficial in that case since it comes with +change and investments for little to no reward. If HR availability is guaranteed for +the foreseeable future, then it is highly beneficial to switch from a time-based re- +placement strategy to a condition-based strategy as this would contribute to flatten- +ing the curve. Also, this would represent a lot of work at the beginning to prepare +the necessary processes and investments for the new strategy but would lead to sig- +nificant gains on the long term. +4 Conclusion +Maintenance planning of high voltage ITs using real data from the Dutch trans- +mission system operator was illustrated in this study. The study aimed at under- +standing how digital twin enabled technology along with failure data can help Ten- +neT to make better future maintenance strategies. The strategies aimed at easing +financial decisions related to replacements (in terms of flattening the replacement +curve) and unavailability of ITs in the network. Working on real data uncovered +several challenges including missing data (both quantity and quality) and outliers. +The non-parametric Kaplan-Meier survival analysis helped in parameter estimation +of Weibull distribution. TenneT data could be translated to the data format to be +used in the digital twin CTA tool, meaning that our data could be easily adapted to +other software platforms. It is worth to mention that in this study, both data owner- +ship as well as data confidence did not hinder the progress. Data confidence was +built upon although multiple data sources had to be aligned together. TenneT part- +nered with Cosmo Tech to build the data ownership philosophy for successful dig- +ital twin implementation for maintenance planning. + +60FTE-Time-BasedReplacement +6oFTE-Condition-BasedReplacement +20K +TOTEX (C) +1.44M +10K +1.34M +10K +TOTEX +TOTEX +OK +OK +2050 +2100 +2050 +2100 +HR Used (FTE) +50 +50 +43.35 +40.09 +Av HR +AvHR +Used +Used +2050 +2100 +2050 +2100S.R.Khuntia - Use of survival analysis and simulation to improve maintenance planning of high +voltage instrument transformers in the Dutch transmission system +12 +Preprint accepted in WCEAM 2022 Seville +References +Balzer, G. and Neumann, C., 2011. Asset simulation and life cycle assessment +for gas insulated substation. +CIGRE, Germany Bland, J.M. and Altman, D.G., 1998. Survival probabilities +(the Kaplan-Meier method). Bmj, 317(7172), pp.1572-1580. +CIGRÉ WG 23.07: The paper-oil insulated measurement transformer, CIGRÉ +Technical Brochure no. 57, 1990. +CIGRÉ SC A3: State of the art of instrument transformers, CIGRÉ Technical +Brochure no. 394, 2009. +CIGRE Final Report of the 2004 – 2007 International Enquiry on Reliability of +High Voltage Equipment Part 4 - Instrument Transformers. Working Group A3.06, +2012. +CIGRE. Guidelines for the Use of Statistics and Statistical Tools on Life Data, +Working Group D1.39, 2017. +Davidson-Pilon, C., 2019. lifelines: survival analysis in Python. Journal of Open +Source Software, 4(40), p.1317. +Khuntia, S.R., Rueda, J.L., Bouwman, S. and van der Meijden, M.A., 2016. A +literature survey on asset management in electrical power [transmission and distri- +bution] system. International Transactions on Electrical Energy Systems, 26(10), +pp.2123-2133. +Martin, D., Marks, J., Saha, T.K., Krause, O. and Mahmoudi, N., 2018. Investi- +gation into modeling Australian power transformer failure and retirement statis- +tics. IEEE Transactions on Power Delivery, 33(4), pp.2011-2019. +Picher, P., Boudreau, J.F., Manga, A., Rajotte, C., Tardif, C., Bizier, G., Di +Gaetano, N., Garon, D., Girard, B., Hamel, J.F. and Proulx, S., 2014. Use of health +index and reliability data for transformer condition assessment and fleet rank- +ing. A2-101, CIGRE. +Poljak, M. and Bojanić, B., 2010. Method for the reduction of in‐service instru- +ment transformer explosions. European transactions on electrical power, 20(7), +pp.927-937. +Raetzke, S., Koch, M. and Anglhuber, M., 2012, September. Modern insulation +condition assessment for instrument transformers. In 2012 IEEE International Con- +ference on Condition Monitoring and Diagnosis (pp. 52-55). IEEE. +Rinne, H., 2008. The Weibull distribution: a handbook. Chapman and Hall/CRC. +Tee, S., Liu, Q., Wang, Z., Hafid, F. and Tournet, P., 2021. Failure investigation +and asset management of combined measuring instrument transformers. High Volt- +age, 6(1), pp.61-70. +Wang, P., Li, Y. and Reddy, C.K., 2019. Machine learning for survival analysis: +A survey. ACM Computing Surveys (CSUR), 51(6), pp.1-36. + diff --git a/-tAzT4oBgHgl3EQfSvv8/content/tmp_files/load_file.txt b/-tAzT4oBgHgl3EQfSvv8/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..06d12a76b08e0a292b5fdfde6033ffeee3e95c52 --- /dev/null +++ b/-tAzT4oBgHgl3EQfSvv8/content/tmp_files/load_file.txt @@ -0,0 +1,382 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf,len=381 +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 1 Preprint accepted in WCEAM 2022 Seville Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system Swasti R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Khuntia1, Fatma Zghal1, Ranjan Bhuyan1, Erik Schenkel1, Paul Duvivier2, Olivier Blancke2, Witold Krasny2 Abstract This paper describes the use of survival analysis and simulation to model the lifetime of high voltage instrument transformers in the Dutch transmission sys- tem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' To represent asset aging, the non-parametric Kaplan-Meier method is used to enable the fitting of Weibull distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Such an approach is implemented on three different voltage levels, namely 110kV, 150kV, and 220/380kV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Real failure and inspection data is used to achieve a realistic failure model of the instrument trans- formers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Failure and maintenance data occurring between 1989 and 2021 have been used for this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In spite of missing and low-quality data, a rich failure database could still be prepared.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' This study also offers insights into factors (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', voltage level, in-service age) influencing the remaining life from both graphical survival function and parametric Weibull distribution analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Based on the derived statistics, future possible maintenance planning scenarios are simulated under a complex system modelling framework in a digital twin enabled platform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Eventually, the scenarios are evaluated in terms of replacement costs (CAPEX), inspection hours, and una- vailability hours.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 1 Introduction TenneT, as European transmission system operator, is facing power supply reli- ability challenges that originate in a globally aging infrastructure and increasing complexity of business operations in the context of energy transition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' While power transformers, due to the criticality of their function on the grid have been the focus of many studies, concerns have been raised recently on the lack of focus on long- term asset management of Instrument Transformers (ITs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' ITs play an important 1 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Khuntia (\uf02a), F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Zghal, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Bhuyan, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Schenkel Asset Management Onshore, TenneT TSO B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Arnhem, The Netherlands e-mail: firstname.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='lastname@tennet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='eu 2 P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Duvivier, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Blancke, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Krasny Cosmo Tech, Lyon, France email: firstname.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='lastname@cosmotech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='com S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 2 Preprint accepted in WCEAM 2022 Seville role in the metering of electrical quantities and protection of other system compo- nents.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Due to their importance, any unplanned unavailability due to failures can cause considerable outage costs to utilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Consequently, it is crucial to properly characterize the aging of ITs using statistical approaches that will enable to predict the evolution of the IT population failure over the next years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In addition, it will yield valuable perspectives in terms of optimizing maintenance and replacement policies accordingly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The reliability analysis of ITs is very much dependent on the defined maintenance strategies which will provide a reliable and safe power supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' By definition, asset management involves strategies to explore, identify, plan, in- vest, utilize, maintain, replace, and dispose of assets while maximizing their value and performance under some prescribed financial constraint (Khuntia et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Since ITs play such an important role, it is expected that statistical failure analysis will give a better insight on actual maintenance planning performance to the asset management team at TenneT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Technically, in the reliability analysis of IT, it is in- teresting to identify the independence or dependence of the specific covariates that indicate the operation of the IT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' For any kind of data-driven methodology and, in particular, asset reliability char- acterization, a robust database is needed, both in terms of volumetry and quality (Balzer and Neumann, 2011).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' However, it can be argued that there should be a pref- erence for robust data and that there are techniques that could be used to cope with data discrepancies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In our case, the historical failure data play an important role in understanding the behavior of ITs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Literature study reveals that explosion is one of the highest reported failure modes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Impact of explosion not only relates to direct cost of IT replacement but also chances of replacement of neighboring equipment damaged in the explosion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CIGRE reports are one of the primary sources for pub- licly available failure databases of ITs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Three series of CIGRE reports are available online.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The first report was published in 1990 which covered failures of ITs (voltage >72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='5kV) in about 15 countries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The survey covered 136033 transformers in the period from 1970 to 1986 (CIGRE, 1990).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The second report published results for 131207 ITs (voltage > 60kV) in the period from 1985 to 1995 in the year 2009 (CIGRE, 2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The third results of a wider international survey was published in 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' It collected population and failure data for ITs of voltage > 60kV and ex- cluded AIS ring current transformers that were in service during the years 2004 to 2007 inclusive (CIGRE, 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Some other failure investigations were reported (Poljak et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2010;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Raetze et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2012;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Tee et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2021), where authors focus on reduction of IT explosion and better condition monitoring of ITs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Nonetheless, the truth is that failure is probabilistic in nature, and it needs investigations on the rela- tionship with asset data and failure cause.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The use of semi-parametric Cox model was reported in (Tee et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The authors elaborated the factors influencing the probability of failures through analysis on the lifetime data from both graphical sur- vival function plots and semi-parametric Cox model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' With the use of Simulation Digital Twin technology from Cosmo Tech, TenneT analyzed various maintenance strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The Digital Twin has been calibrated S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 3 Preprint accepted in WCEAM 2022 Seville based on the historical failure data that it recorded with statistical technique relying on survival analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Literature study shows that survival analysis was used for power transformer reliability studies of around 2000 nos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' in the Canadian and around 6000 nos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' in the Australian utility (Picher et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2014;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Martin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' (Picher et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2014) described the data of Canadian utility Hydro-Quebec where they adopted a good match using the Kaplan-Meier and Weibull distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Finally, the method concluded that Weibull distribution is a better fit and the results looked promising.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Similarly, ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' (Martin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2018) followed a similar strategy for Australian data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The authors deduced the choice of Kaplan-Meier or Weibull distribution based on the different voltage classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In practice, Weibull distribution fitted to empirical failure data are commonly used to calculate life expectancy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' However, the challenge in applying such a distribution to electrical assets is that often the root cause of failure is not related to the normal aging of the asset, but rather external factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The aim of this paper is three-fold: (1) use of real failure data to model a time-varying failure rate based on Weibull parameters obtained from Kaplan-Meier survival analysis, (2) investigate extrapolation methods to maximize value of existing inspection results across IT population, and (3) use digital twin enabled simulation to tune the required resources necessary to realize TenneT’s strategy for considered substation equipment maintenance and renewals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 2 Data and Methodology 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='1 Description of Data As of the date of writing this paper, TenneT owns and maintains a large fleet of ITs in the Dutch high voltage AC network (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 110, 150, 220 and 380kV) as shown in Figure 1(a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' It is of interest to see the age profile of the existing population, in terms of years since manufacture because reliability is often related to age.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' How- ever, lifetime data can be complicated as some ITs often extend over several dec- ades.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' At TenneT, the expected design life of an IT is 45 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' This age is affected and reduced, sometimes substantially, depending on the design or utilization of the IT, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' its loading or the environment to which it is exposed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In some cases, a good maintenance scheme can even increase the replacement age.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Although there is no prescribed replacement age, it is the responsibility of the asset management depart- ment to formulate the maintenance policies based on failure history.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' For this study, failure data was obtained from various sources, starting from failure records, reports to talking to experts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Fortunately, TenneT did not record a high number of major failures since the 1989.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A major failure is defined as a sudden explosive event that has caused an immediate emergency system outage or trip.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Figure 1(b) lists the fail- ure events with respect to manufacturer (coded for confidentiality) and IT age.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The failure list was not adequate to come up with a statistical model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In addition, maintenance reports (or work orders) and expert knowledge was used to populate the list and gain utmost information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A work order is a document that provides all S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 4 Preprint accepted in WCEAM 2022 Seville the information about a maintenance task and outlines a process for completing that task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In case of IT, corrective work orders are used (the others being periodic maintenance and inspection work orders).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Discussion with experts led us to use the work orders when an IT was out of service for any kind of maintenance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Figure 1(c) shows the total recorded failures for the IT population.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In the recent years, one ob- servation worth noticing is that the number of failures has increased significantly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' (a) (b) 10000 SLI 8000 Number of 6000 4000 2000 0 110 150 220 380 Voltage level (kV)5 Number of ITs 4 m 2 1 0 990 7 68 1 3 6 80 9 0 00 05 600 2 6 7 7 7 8 9 9 9 9 9 9 9 6 9 6 0 0 0 0 0 0 1 1 1 1 1 L 1 1 L 2 2 2 2 2 2 Year of constructionS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 5 Preprint accepted in WCEAM 2022 Seville (c) Figure 1 (a) Voltage-based IT population, and (b) Actual failure list until July 2021, (c) Populated failure from work order and expert opinion until July 2021 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2 Survival Analysis and Failure Rate Modelling Survival analysis is a statistical technique used to estimate the lifespan of a par- ticular population under study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' It is an analysis of time-to-event data (Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' One of the widely used survival analysis technique is the Kaplan-Meier (KM) estimate (Bland and Altman, 1998).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The KM estimator uses lifetime data to perform survival analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Although it is widely used in medical research to gauge the part of patients living for a specific measure of time after treatment, it has been used in the power systems sector to model the survival of electric assets (Martin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The use of KM estimate is supported by two reasons: one is that it does not assume that the data fits a statistical distribution, and second is that it allows the inclusion of censored data (when an IT had not failed by mid-2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' For a population, the survival function 𝑆̂(𝑡) is defined as: 𝑆̂(𝑡) = ∏ (1 − 𝑑𝑖 𝑛𝑖 ) 𝑖:𝑡𝑖<𝑡 where, 𝑡𝑖is the time at least one event happened, 𝑑𝑖 is the number of events that happened at time 𝑡𝑖 and 𝑛𝑖 is the number of individuals known to have survived up to time 𝑡𝑖 (Davidson-Pilon, 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In our study, the estimates are calculated for three different voltage levels and 𝑛𝑗 considers observations that occurred between the oldest IT age and mid-2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' An important aspect in survival analysis is considering the censored data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Censoring occurs when the value of an observation is only known 1000 SI 800 Number of 009 400 200 YearofconstructionS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 6 Preprint accepted in WCEAM 2022 Seville to some extent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Censored data is often encountered when analysing practical life data, especially in case of electrical power systems where most of the installed equipment is still in-service, and most of the time the exact age of equipment at the moment of failure is unknown (CIGRE, 2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In this study, a large amount of data falls under the right censored data (suspended data) category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A dataset is termed as right censored or suspended when it is composed of components that did not fail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The term right censored indicates that the event is located to the right of the dataset, which implies that certain components are still operating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In our dataset, we had to deal with right censoring and no left truncation since the year of construction was known to us.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Ignoring truncation causes bias in model’s estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0 Weibull Kaplan-Meier 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0 0 20 40 60 80 100 timeline1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0 Weibull Kaplan-Meier 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0 0 20 40 60 80 100 timelineS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 7 Preprint accepted in WCEAM 2022 Seville Figure 2 Kaplan-Meier estimate of all different voltage levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The IT dataset was split into three different families, each one with its own deg- radation law, based on their voltage level as is shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A useful statistic in this analysis is calculating the median survival time, which defines the point in time where on average 50% of the population should have failed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' For 110kV, the median survival time is 61 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' However, the median survival time for 150, 220 and 380kV is infinity because there have been an insufficient number of failures to determine it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In such cases, the two best options are: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' use another quantile (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='75) to compare the groups;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' approximate the survival curve by means of a parametric fit and derive the me- dian survival time using the model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The second option is chosen in our study since all the three voltages can be mod- elled using the parametric fit assuming that failure times have a Weibull distribu- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In other words, Weibull distribution is used to parameterize the KM estimate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The Weibull distribution is a widely used method to analyse the statistical features of failure (Rinne, 2008).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The probability 𝑓(𝑡) and cumulative density function 𝐹(𝑡) are defined as: 𝑓(𝑡) = 𝛽 𝑡𝛽−1 𝜂𝛽 𝑒 −(𝑡 𝜂) 𝛽 𝑎𝑛𝑑 𝐹(𝑡) = 1 − 𝑒 −(𝑡 𝜂) 𝛽 ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' where, 𝑡 is the time, 𝛽 is the shape and 𝜂 is the scale parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Table 1 shows the different parameters calculated for our study from the corresponding survival function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Table 1 Statistics and Weibull parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Voltage (kV) No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' of ITs No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' of censored β η median 110 3168 255 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='67 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='79 61 150 10058 298 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='42 74.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='20 infinity 220 and 380 2982 25 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='65 77.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='05 infinity 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2 Weibull Kaplan-Meier 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0 0] 20 40 60 80 100 timelineS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 8 Preprint accepted in WCEAM 2022 Seville 3 Modelling in Cosmo Tech Asset and Simulations Founded in 2010, Cosmo Tech is a technology company pioneer in the modeling of complex systems (https://cosmotech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='com/).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Relying on its industry-validated modeling and simulation software platform, Cosmo Tech has developed a solution called Cosmo Tech Asset, henceforth called CTA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CTA allows to build digital twins of asset portfolios with their full complexity such as network dependencies, opera- tive strategies, or dynamical resources allocations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='1 Cosmo Tech Asset Platform The different steps involved in the CTA platform are: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Experiment the CTA platform’s pre-built health assessment methods and com- pare the results with internal initiatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' For health assessment, the asset health index is a key simulation variable, and it is described in the next sub-section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Demonstrate the calibration of reliability law (using Weibull distribution) for simulations against up-to-date condition of ITs, but also historical IT related data, such as field observation or inspection data and measurement inputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Investigate the functional possibilities that would allow to leverage existing in- spection results across ITs using extrapolation methods when applicable, there- fore maximize inspection result value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Finally, based on the achieved health assessment technique, use the simulation platform to tune the required resources necessary to realize TenneT’s strategy for considered IT maintenance and replacements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2 TenneT Asset Health Index For health assessment, the TenneT asset health index (AHI) is considered and is shown in Table 1(a) (TenneT, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The AHI is based on asset age and failure probability, and it is used to drive short-term maintenance and long-term replace- ment strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=" It provides a consistent way to compare the overall asset health of TenneT's assets." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The evaluation of the AHI is based on two metrics: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' probability of failure of IT in the coming years for AHI score of 1 to 6, and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' age of IT for AHI score of 7 to 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In addition to AHI, the study of IT uses reliability law over which failures are drawn during the simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The reliability law corresponds to the KM survival function and the Weibull estimates that are described in section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' These laws have a cumulative distribution function which represent the probability for a failure to occur before a certain age.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' And the probability of failure over the next year can be evaluated using the following formula: S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 9 Preprint accepted in WCEAM 2022 Seville 𝑃(𝑋 < 𝑡 + 3 | 𝑋 > 𝑡) = 1 − 𝑃(𝑋 > 𝑡 + 3 | 𝑋 > 𝑡) = 1 − 𝑃(𝑋>𝑡+3 ∩ 𝑋>𝑡) 𝑃(𝑋 > 𝑡) = 1 − 𝑃(𝑋 > 𝑡+3) 𝑃(𝑋 > 𝑡) = 1 − 1 − 𝑃(𝑋 < 𝑡+3) 1 − 𝑃(𝑋 < 𝑡) = 1 − 1 − 𝐹(𝑡+3) 1 − 𝐹(𝑡) where,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 𝐹is the cumulative distribution function of the reliability law 𝑋 is a random variable representing the occurrence of a failure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Table 1 (a)TenneT Asset Health Index (AHI) definition, (b) Classification of Resources (FTE: Full Time Employment).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' (a) (b) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='3 Simulation The reliability law was used to evaluate the different scenarios for an efficient maintenance planning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A simulation period of 100 years is chosen for this study since it is assumed that the most recent IT replacements will be in operation until the end of this century.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Time-based scenario is the current maintenance planning at TenneT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' It is compared against a condition-based scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Both the scenarios are explained in detail in Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The resources are listed in Table 1(b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Table 2 Different Scenarios under Study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Condition-based Time-based Replacement 220/380kV 45 years 45 years 110/150kV AHI score red or purple 45 years Inspections on bay every 3,6,12 months 220/380kV No inspections No inspections 110/150kV Time-based start- ing at 25 years Time-based start- ing at 25 years In principle, both scenarios are very similar in the sense that the same simulation model dataset is used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The difference lies in the trigger for the replacement activities of the 110/150kV assets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In fact, in time-based scenario, which represents the cur- rent way of working, the trigger is based on the real age of the asset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' As soon as the AHI Score Colour Definition Purple Within 3 years,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 80% of chance that the asset is ir- reparably damaged 2 Purple Within 3 years,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 50% of chance that the asset is ir- reparably damaged 3 Purple Within 3 years,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 20% of chance that the asset is ir- reparably damaged 4 Red Within 7 years,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 80% of chance that the asset is ir reparably damaged 5 Red Within 7 years,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 50% of chance that the asset is ir- reparably damaged 6 Red Within 7 years,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 20% of chance that the asset is ir- Orange reparably damaged 7 Older than 75% of the average age 8 Orange Between 60% and 75% of the average age 9 Older than 5 years old and less than 60% of the av- _10 Green.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Younger than 5 years old erage ageActivity name Dura- Required Material Workforce Total tion (h) FTE (?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=') 1503 () 1503 (?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=') 1503 Inspection 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='5 I 0 every 3 years 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='624 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='624 Inspection 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='33 2 49.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='81 180.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='18 229.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='99 every 6 years Replacement IT 110kV 40 10 8211 35000 43211 Replacement 40 10 IT 150kV 10044 35000 45044 Replacement IT 220kV 40 10 15000 35000 50000 Replacement IT 380kV 40 10 15000 35000 50000S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 10 Preprint accepted in WCEAM 2022 Seville asset reaches 45 years of age, replacement is triggered, and action is performed as resources are unlimited.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' On the other hand, in the condition-based scenario, the trig- ger is based on the apparent age of the asset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The apparent age is an attribute of every asset that reflects its degradation rate and it can be different from the real age of the asset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' If the apparent age is higher than the real age, the asset degrades faster than normal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' If the apparent age is lower than the real age, the asset degrades slower than normal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' When the apparent age of the asset reaches 50 or 54, it means that the asset is reaching AHI score of respectively 6 or 3 that is red or purple (see Table 1(a)), and the replacement action is triggered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Figure 3 Unconstrained Scenarios Simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Figure 4 40 FTE constrained Scenarios Simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' ooFTE-Time-BasedReplacement coFTE-Condition-BasedReplacement 40K 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='49M TOTEX 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='1M 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='36M 20K TOTEX TOTEX 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='0M OK 2050 2100 2050 2100 HR Used (FTE) 500 100 44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='87 40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='63 Av HR Av HR Used Used 0 2050 2100 2050 210040FTE-Time-BasedReplacement 40FTE - Condition-Based Replacemen () ) TOTEX 10K 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='20M 10K 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='21M 5K TOTEX TOTEX OK OK 2050 2100 2050 2100 HR Used (FTE) 40 40 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='28 20 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='19 20 AvHR Av HR Used Used 0 2050 2100 2050 2100S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 11 Preprint accepted in WCEAM 2022 Seville Figure 5 60 FTE constrained Scenarios Simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' From the figures, two conclusions can be made: (1) replacement activities are the major cost driver in the TOTEX (Total Expenses), and (2) Human resources (HR) costs are the major cost driver in the replacement costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Simulation results show that in case HR availability is restricted, there is no significant difference be- tween the time-based and condition-based replacement strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In fact, switching to a condition-based strategy might not be beneficial in that case since it comes with change and investments for little to no reward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' If HR availability is guaranteed for the foreseeable future, then it is highly beneficial to switch from a time-based re- placement strategy to a condition-based strategy as this would contribute to flatten- ing the curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Also, this would represent a lot of work at the beginning to prepare the necessary processes and investments for the new strategy but would lead to sig- nificant gains on the long term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 4 Conclusion Maintenance planning of high voltage ITs using real data from the Dutch trans- mission system operator was illustrated in this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The study aimed at under- standing how digital twin enabled technology along with failure data can help Ten- neT to make better future maintenance strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The strategies aimed at easing financial decisions related to replacements (in terms of flattening the replacement curve) and unavailability of ITs in the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Working on real data uncovered several challenges including missing data (both quantity and quality) and outliers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The non-parametric Kaplan-Meier survival analysis helped in parameter estimation of Weibull distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' TenneT data could be translated to the data format to be used in the digital twin CTA tool, meaning that our data could be easily adapted to other software platforms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' It is worth to mention that in this study, both data owner- ship as well as data confidence did not hinder the progress.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Data confidence was built upon although multiple data sources had to be aligned together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' TenneT part- nered with Cosmo Tech to build the data ownership philosophy for successful dig- ital twin implementation for maintenance planning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 60FTE-Time-BasedReplacement 6oFTE-Condition-BasedReplacement 20K TOTEX (C) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='44M 10K 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='34M 10K TOTEX TOTEX OK OK 2050 2100 2050 2100 HR Used (FTE) 50 50 43.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='35 40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='09 Av HR AvHR Used Used 2050 2100 2050 2100S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='Khuntia - Use of survival analysis and simulation to improve maintenance planning of high voltage instrument transformers in the Dutch transmission system 12 Preprint accepted in WCEAM 2022 Seville References Balzer, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Neumann, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Asset simulation and life cycle assessment for gas insulated substation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CIGRE, Germany Bland, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Altman, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Survival probabilities (the Kaplan-Meier method).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Bmj, 317(7172), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='1572-1580.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CIGRÉ WG 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='07: The paper-oil insulated measurement transformer, CIGRÉ Technical Brochure no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 57, 1990.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CIGRÉ SC A3: State of the art of instrument transformers, CIGRÉ Technical Brochure no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 394, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CIGRE Final Report of the 2004 – 2007 International Enquiry on Reliability of High Voltage Equipment Part 4 - Instrument Transformers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Working Group A3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='06, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' CIGRE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Guidelines for the Use of Statistics and Statistical Tools on Life Data, Working Group D1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='39, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Davidson-Pilon, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' lifelines: survival analysis in Python.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Journal of Open Source Software, 4(40), p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='1317.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Khuntia, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Rueda, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Bouwman, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and van der Meijden, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A literature survey on asset management in electrical power [transmission and distri- bution] system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' International Transactions on Electrical Energy Systems, 26(10), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2123-2133.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Martin, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Marks, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Saha, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Krause, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Mahmoudi, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Investi- gation into modeling Australian power transformer failure and retirement statis- tics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' IEEE Transactions on Power Delivery, 33(4), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='2011-2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Picher, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Boudreau, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Manga, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Rajotte, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Tardif, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Bizier, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Di Gaetano, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Garon, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Girard, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Hamel, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Proulx, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Use of health index and reliability data for transformer condition assessment and fleet rank- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' A2-101, CIGRE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Poljak, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Bojanić, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Method for the reduction of in‐service instru- ment transformer explosions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' European transactions on electrical power, 20(7), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='927-937.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Raetzke, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Koch, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Anglhuber, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2012, September.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Modern insulation condition assessment for instrument transformers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' In 2012 IEEE International Con- ference on Condition Monitoring and Diagnosis (pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' 52-55).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Rinne, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' The Weibull distribution: a handbook.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Chapman and Hall/CRC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Tee, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Liu, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Wang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Hafid, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Tournet, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Failure investigation and asset management of combined measuring instrument transformers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' High Volt- age, 6(1), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='61-70.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Wang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', Li, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' and Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=', 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' Machine learning for survival analysis: A survey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content=' ACM Computing Surveys (CSUR), 51(6), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} +page_content='1-36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf'} diff --git a/.gitattributes b/.gitattributes index 898bc511eec1d3cb435315b7673ab2736149f7d1..9458a6d25e47c5863097a3220f6939033019748e 100644 --- a/.gitattributes +++ b/.gitattributes @@ -5483,3 +5483,37 @@ fNFST4oBgHgl3EQfGjh7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex vdFJT4oBgHgl3EQffCyN/content/2301.11555v1.pdf filter=lfs diff=lfs merge=lfs -text 69E1T4oBgHgl3EQfnASE/content/2301.03304v1.pdf filter=lfs diff=lfs merge=lfs -text PNFPT4oBgHgl3EQfnjVw/content/2301.13130v1.pdf filter=lfs diff=lfs merge=lfs -text +L9E4T4oBgHgl3EQfKAwg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +4NFKT4oBgHgl3EQf9C5Z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +k9FRT4oBgHgl3EQfYTew/content/2301.13549v1.pdf filter=lfs diff=lfs merge=lfs -text +VNAzT4oBgHgl3EQfX_zt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +X9AzT4oBgHgl3EQf1_4_/content/2301.01807v1.pdf filter=lfs diff=lfs merge=lfs -text +h9E1T4oBgHgl3EQfMwOA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +KNE3T4oBgHgl3EQfvQuV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +4NFKT4oBgHgl3EQf9C5Z/content/2301.11952v1.pdf filter=lfs diff=lfs merge=lfs -text +tNAyT4oBgHgl3EQfmvgr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +ANFQT4oBgHgl3EQf8jdP/content/2301.13447v1.pdf filter=lfs diff=lfs merge=lfs -text +_9FLT4oBgHgl3EQfwi-I/content/2301.12164v1.pdf filter=lfs diff=lfs merge=lfs -text +-NFQT4oBgHgl3EQfKDVk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +89FLT4oBgHgl3EQfBi6R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +jtAzT4oBgHgl3EQfpf1N/content/2301.01613v1.pdf filter=lfs diff=lfs merge=lfs -text +J9FLT4oBgHgl3EQfKi8f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +5tE1T4oBgHgl3EQfBAK1/content/2301.02847v1.pdf filter=lfs diff=lfs merge=lfs -text +V9E0T4oBgHgl3EQf3AJU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +X9AzT4oBgHgl3EQf1_4_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +ydFST4oBgHgl3EQfTTiJ/content/2301.13769v1.pdf filter=lfs diff=lfs merge=lfs -text +INAzT4oBgHgl3EQfHvu0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +PNFPT4oBgHgl3EQfnjVw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +AtE2T4oBgHgl3EQf8QmS/content/2301.04217v1.pdf filter=lfs diff=lfs merge=lfs -text +RNA0T4oBgHgl3EQfDv8H/content/2301.02006v1.pdf filter=lfs diff=lfs merge=lfs -text +W9AyT4oBgHgl3EQfWPem/content/2301.00160v1.pdf filter=lfs diff=lfs merge=lfs -text +-NFQT4oBgHgl3EQfKDVk/content/2301.13258v1.pdf filter=lfs diff=lfs merge=lfs -text +atFIT4oBgHgl3EQflys0/content/2301.11306v1.pdf filter=lfs diff=lfs merge=lfs -text +z9AzT4oBgHgl3EQfC_rr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +ANFQT4oBgHgl3EQf8jdP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +BtE1T4oBgHgl3EQfpgUG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +8NFLT4oBgHgl3EQfsy_c/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +jtAzT4oBgHgl3EQfpf1N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +RNA0T4oBgHgl3EQfDv8H/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +k9FRT4oBgHgl3EQfYTew/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +LdFRT4oBgHgl3EQf1zij/content/2301.13658v1.pdf filter=lfs diff=lfs merge=lfs -text diff --git a/1tE1T4oBgHgl3EQflQSM/vector_store/index.pkl b/1tE1T4oBgHgl3EQflQSM/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..2a09f98bae3947f82ea57e18c7e0aa0e17767d5a --- /dev/null +++ b/1tE1T4oBgHgl3EQflQSM/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:aa722dbea8c39827f618cb5bb42fbe05c5b98b2b25bec6ef11d56dd7201bd13c +size 242455 diff --git a/29AzT4oBgHgl3EQfDvqc/content/tmp_files/2301.00982v1.pdf.txt b/29AzT4oBgHgl3EQfDvqc/content/tmp_files/2301.00982v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..19f0bb145ec6aa38886f6fe36a33ddefd5460b45 --- /dev/null +++ b/29AzT4oBgHgl3EQfDvqc/content/tmp_files/2301.00982v1.pdf.txt @@ -0,0 +1,1521 @@ +Analogical Inference Enhanced Knowledge Graph Embedding +Zhen Yao1*, Wen Zhang1*, Mingyang Chen2, Yufeng Huang1, Yi Yang4, Huajun Chen2,3,5† +1School of Software Technology, Zhejiang University +2College of Computer Science and Technology, Zhejiang University +3Donghai Laboratory, Zhoushan 316021, China +4Huawei Technologies Co., Ltd +5Alibaba-Zhejiang University Joint Institute of Frontier Technologies +{yz0204, zhang.wen, mingyangchen, huangyufeng, huajunsir}@zju.edu.cn +yangyi193@huawei.com, +Abstract +Knowledge graph embedding (KGE), which maps entities +and relations in a knowledge graph into continuous vector +spaces, has achieved great success in predicting missing links +in knowledge graphs. However, knowledge graphs often con- +tain incomplete triples that are difficult to inductively infer +by KGEs. To address this challenge, we resort to analogi- +cal inference and propose a novel and general self-supervised +framework AnKGE to enhance KGE models with analog- +ical inference capability. We propose an analogical object +retriever that retrieves appropriate analogical objects from +entity-level, relation-level, and triple-level. And in AnKGE, +we train an analogy function for each level of analogical in- +ference with the original element embedding from a well- +trained KGE model as input, which outputs the analogical +object embedding. In order to combine inductive inference +capability from the original KGE model and analogical in- +ference capability enhanced by AnKGE, we interpolate the +analogy score with the base model score and introduce the +adaptive weights in the score function for prediction. Through +extensive experiments on FB15k-237 and WN18RR datasets, +we show that AnKGE achieves competitive results on link +prediction task and well performs analogical inference. +1 +Introduction +Knowledge graphs (KGs) storing a large number of triples +in the form of (head entity, relation, tail entity), (h, r, t) +for short, are popular data structures for representing fac- +tual knowledge. Many knowledge graph projects such as +Freebase (Bollacker et al. 2008), WordNet (Miller 1994), +YAGO (Suchanek, Kasneci, and Weikum 2007) and DB- +pedia (Lehmann et al. 2015) are significant foundations to +support artificial intelligence applications. They have been +successfully used in downstream applications such as word +sense disambiguation (Bevilacqua and Navigli 2020), ques- +tion answering (Yasunaga et al. 2021), and information +extraction (Hu et al. 2021), gaining widespread attention. +However, most KGs are incomplete, so predicting the miss- +ing links between entities is a fundamental problem for KGs +*These authors contributed equally. +†Corresponding Author. +Copyright © 2023, Association for the Advancement of Artificial +Intelligence (www.aaai.org). All rights reserved. +called link prediction. One of the common approaches to +this problem is knowledge graph embedding (KGE) meth- +ods, which make prediction through a predefined triple score +function with learnt entity and relation embeddings as input. +Many KGE models have been proposed like TransE (Bordes +et al. 2013), DistMult (Yang et al. 2015), RotatE (Sun et al. +2019) and HAKE (Zhang et al. 2020). These methods have +gained great success in knowledge graph completion task. +For most KGE methods, the parametric learning paradigm +can be viewed as memorization regarding training data as +a book and predicting missing links as the close-book test +(Chen et al. 2022), which belongs to inductive inference. +However, the large knowledge graphs often contain incom- +plete triples that are difficult to be inductively inferred by +applying memorization paradigm. Nevertheless, the problem +may be well solved by using analogical inference method. +That is because analogical inference is a referential method, +which retrieves similar solutions to solve new problems, +similar to an open-book examination. For example, it seems +that most people could not remember even learn about what +company Ron Wayne founded. However, if they know that +Ron Wayne and Steve Jobs are the co-founders, i.e., Steve +Jobs and Ron Wayne are analogical objects in this context, +and it is well known that Steve Jobs founded Apple Inc.; +thus they could analogically infer that Ron Wayne founded +Apple Inc. . +In order to enhance KGEs with analogical inference ca- +pability, there are three problems should be solved: 1) How +to define the analogical objects of elements given a task? 2) +How to enable the model to map elements to analogical ob- +jects? 3) How to combine the original inductive inference +capability and enhanced analogical inference capability? +We propose AnKGE, a novel and general self-supervised +framework, which solves these problems very well and en- +hances well-trained KGEs with analogical inference capa- +bility. For problem 1, we think that an analogical object can +solve the given task well, and inspired by the nearest neigh- +bor language model (Khandelwal et al. 2020), we propose an +analogical retriever covering objects of three levels, includ- +ing entity, relation, and triple level. Specifically, we consider +the score function of KGEs as the assessment of the quality +of triples and regrade the replacement triples with the high- +est scoring as the appropriate analogical objects. For prob- +arXiv:2301.00982v1 [cs.AI] 3 Jan 2023 + +lem 2, we trained a projecting function using analogical ob- +jects as supervision signals. This function projects original +objects onto appropriate analogical objects. For problem 3, +we interpolate the analogy score with the base model score +to combine the original inductive inference capability and +enhanced analogical inference capability. Moreover, we in- +troduce the adaptive weight to adjust analogical inference in +knowledge graph completion task. +Finally, through link prediction experiments on FB15k- +237 and WN18RR datasets, we demonstrate the AnKGE is +significantly compatible and outperforms the other baseline +models. To the best of our knowledge, AnKGE is the first +framework to enhance KGEs with analogical inference abil- +ity. +In summary, our contributions in this work include: +• We explore the knowledge graph completion task from +the analogical inference view. We propose an effective +retrieval method covering three levels to obtain the ap- +propriate analogy objects. +• We propose a novelty analogical inference enhanced +framework called AnKGE, which could project original +objects onto appropriate objects for analogical inference. +To our knowledge, the AnKGE is the first framework of +knowledge graph embedding to enhance analogical infer- +ence ability. +• We conduct experimental evaluations to demonstrate +the proposed AnKGE is significantly compatible and +achieves competitive performance on FB15k-237 and +WN18RR datasets, promising practical applications. +2 +Related Work +Knowledge graph embedding +According to previous +work (Zhang et al. 2022), the KGE methods can be di- +vided into two categories based on the scoring function and +whether a global graph structure is utilized. The first cat- +egory is the Conventional KGEs (C-KGEs), which apply a +geometric assumption in vector space for true triples and use +single triple as input for triple scoring. Conventional KGEs +use the score function to measure the plausibility of triple. +TransE (Bordes et al. 2013) is a representative conventional +KGE method whose score function is ∥h + r − t∥2. What +is more, there are many variants to improve the performance +of TransE, such as RotatE (Sun et al. 2019), DistMult (Yang +et al. 2015) and HAKE (Zhang et al. 2020). The other cate- +gory is the GNN-based methods, which use representations +of entities and relations aggregated from their neighbors in +the graph instead of embedding them for triple scoring to +capture the graph patterns explicitly. R-GCN (Schlichtkrull +et al. 2018) is the first GNN framework to model relational +data. It introduces relation-specific transformations when +neighbor aggregating. SE-GNN (Li et al. 2022) models three +levels semantic evidence into knowledge embedding. Note +that SE-GNN introducing three levels from the semantic ev- +idence view differs from our three levels analogical objects. +Enhanced KGE framework +Recently, some work has +proposed some frameworks and strategies to improve the +performance of KGE models, which are called enhanced +KGE, such as CAKE (Niu et al. 2022), PUDA(Tang +et al. 2022) and REP (Wang et al. 2022). CAKE is a +commonsense-aware knowledge embedding framework to +extract commonsense from factual triples with entity con- +cepts automatically, which generates commonsense aug- +ments to facilitate high-quality negative sampling. PUDA +is a data augmentation strategy to address the false nega- +tive and data sparsity issue. REP is a post-processing tech- +nique to adapt pre-trained KG embeddings with graph con- +text. Our method is designed to enhance a well-trained KGE +model with analogical inference capability belonging to the +enhanced KGE framework. +Analogical inference +In classic artificial intelligence, ana- +logical inference was an active research topic. However, the +early computational model of analogy-making study (Gen- +tner 1983; Turney 2008) mainly focuses on structure map- +ping theory and its implementation in the structure map- +ping engine. Recently, some researchers proposed k-Nearest +Neighbor language model(kNN-LM) (Khandelwal et al. +2020), which can directly query training examples at test +time, also can be considered the analogy inference model +in the neural language process topic. While effective, these +models often require retrieval from a large datastore at test +time, significantly increasing the inference overhead. In the +field of knowledge graph, the study of analogical inference +to solve knowledge graph incomplete problem is missing. +ANALOGY (Liu, Wu, and Yang 2017) is the first method for +modeling analogical structures in multi-relational embed- +ding, but the performance is not good. Differ in our method +uses the nearest neighbor method to perform explicit anal- +ogy, ANALOGY uses the commutativity constraint of the +normal matrix to model analogical relations implicitly. +3 +Analogical Object Retriever +Before introducing our method, in this section, we firstly in- +troduce the background of knowledge graph and analogical +inference, and then we propose the analogical object retriev- +ers that retrieve appropriate analogical objects from entity- +level, relation-level, and triple-level. The retrieved analog- +ical objects will be used as supervision signals with our +method. +Background +A knowledge graph is denoted as G += +(E, R, F), where E represents the set of entities, R repre- +sents the set of relations, and F = {(h, r, t)} ⊆ E × R × E +represents the set of triple facts. +Analogical inference, which has been long researched in +artificial intelligence, maps the target problem to a known +source problem that could effectively utilize known knowl- +edge (Hall 1989). Applying analogical inference into link +prediction task (h, r, ?) in knowledge graphs, instead of di- +rectly predicting the tail entity t, we could make predic- +tion through similar triples that we know, i.e. triples in train +dataset. We consider similar triples are composed by ana- +logical objects of (h, r, t). Specifically, we assume that the +analogy objects may come from three levels: the analogy +of head entity h part resulting similar triple (h′, r, t)(entity- +level), the analogy of relation r part resulting similar triple + +(h, r′, t) (relation-level) and the analogy of combination pair +(h, r) part t resulting similar triple (h′, r′, t) (triple-level). +Thus, we propose three retrievers to obtain different +level’s analogical objects. +Entity-Level Retriever +The retriever is designed based on +the score function fkge(h, r, t) predefined in a well-trained +KGE model, where triples with higher scores are assumed +with higher probability to be true. Inspired by the near- +est neighbor language model (Khandelwal et al. 2020), we +replace all possible objects of the triple and regrade the +replacement triples with highest scoring as the appropri- +ate analogical objects. Given a triple (h, r, t), entity-level +retriever retrieves similar true triples (h′, r, t) for entity- +level analogical inference. For example, we could get the +answer of (Sergey Brin, found, ?) is Google through +(Larry Page, found, Google) if we know Sergey Brin and +Larry Page are co-founders. +Specifically, in entity-level retriever, we first replace h +with all entities resulting |E| replacement triples, and then +regard triples with highest scores measured by the KGE as +similar triples. And we name the head entity in similar triples +as analogical objects from entity-level retriever. Thus ana- +logical object set could be represented as +Ehrt +Ne = {hi | Top( {fkge(hi, r, t) | hi ∈ E} )Ne}, +(1) +where Top(·)k denotes the k elements with top k values +among all inputs, fkge(·, ·, ·) is the predefined score function +in KGE model, and hrt denotes a specific triple (h, r, t) as +input. If not otherwise specified, we omit hrt and use ENe in- +stead of Ehrt +Ne for simplicity. Compared to retrieving similar +triples directly from the train dataset, retrieving according to +scores from KGEs could help overcome the incompleteness +of KGs. +Relation-Level Retriever +Given (h, r, t), relation-level +retriever retrieves (h, r′, t) for relation-level analogical in- +ference, since there are relations with similar contexts in +KGs. For example, the founder of a company is usually +the board member. Thus the relation-level analogy object +of found is board member. Similar to the entity-level re- +triever, the analogical object set of (h, r, t) from relation- +level retriever is as follow : +RNr = {ri | Top( {fkge(h, ri, t) | ri ∈ R} )Nr}. +(2) +Triple-Level Retriever +Given (h, r, t), triple-level re- +triever retrieves (h′, r′, t) for triple-level analogical infer- +ence, which is the combination of entity-level and relation- +level retriever. For instance, Sergey Brin is the founder of +Google and Sundar Pichai is the CEO of Google. Therefore, +the triple-level analogical objects of (SergeyBrin, found) +is (SundarPichai, CEO). Actually, the number of all can- +didate (h′, r′) pairs is in millions in most knowledge graphs. +In order to reduce the cost of retrieving candidate pairs and +inspired by the principle of locality, we often select m en- +tities and n relations with high triple scores separately, and +then pair them with each other. Thus the set of analogical +objects, namely (h′, r′) pairs, from triple-level retriever is +TNt = {(hi, ri) | +Top( {fkge(hi, ri, t) | hi ∈ Em, ri ∈ Rn})Nt}. +(3) +4 +Methodology +In this section, we present a novel KGE enhanced frame- +work called Analogy Enhanced Knowledge Graph Embed- +ding (AnKGE), which could model the three levels of ana- +logical inference as introduced in Section 3. Next, we first +introduce the definition of analogy function (Section 4.1) +and how to train it by using analogical objects (Section 4.2 +and Section 4.3). Finally, we introduce how to combine the +original inductive inference capability and enhanced ana- +logical inference capability in knowledge graph completion +task. (Section 4.4) +4.1 +Analogy Function +Given a well-trained KGE model M = {E, R, fkge, Θ}, +where E, R and fkge are entity embedding table, relation +embedding table, and score function of the M, and Θ is the +set of other parameters, AnKGE enhances M with capa- +bility of analogical inference through a projecting function +called analogy function f. We train an analogy function for +each level of analogical inference with the original element +embedding from E or R in M as input and output the ana- +logical object embedding to conduct link prediction. +Specifically, analogy function for relation-level analogical +inference frel maps an original embedding of a relation r +in (h, r, t) to the analogical embedding through a relation +projecting vector vR +r ∈ Rdr that +frel(r) = ra = vR +r ◦ r, +(4) +where dr is the relation hidden dimension, ◦ is the element- +wise product. +Similarly, the analogy function for entity-level analogical +inference fent maps an original embedding of an entity h +in (h, r, t) to the analogical embedding. Considering that an +entity generally tends to be associated with multiple rela- +tions, we define fent as: +fent(h, r) = ha = vE +h ◦ h + λMtrans × vR +r ◦ r, +(5) +where vE +h ∈ Rde is the entity projecting vector and de is +the entity hidden dimension. Mtrans ∈ Rde×dr denotes the +transformation matrix that enable to make relation r into +consideration. λ is a weight hyper-parameter. +Analogy function for triple-level analogical inference ftrp +outputs the analogical embedding of entity and relation pairs +through combining embedding of entity-level and relation- +level according to KGEs as follows: +ftrp(h, r) = za = gkge (ha, ra) , +(6) +gkge(·, ·) is the function in KGEs that maps a head entity em- +bedding to the tail entity embedding according to the given +relation embedding. gkge(·, ·) and fkge(·, ·, ·) of representa- +tive KGE models are provided in Appendix A. +4.2 +Analogy Objects Aggregator +In order to enhance the framework’s robustness for analog- +ical inference, we make the analogical objects retrieved fol- +lowing Section 3 as the supervision signals for analogy func- +tions. Specifically, we make the analogy embedding as intro- +duced in Section 4.1 to approach the weighted average of the +analogical objects from KGE model M. + +Entity Level +Relation Level +Triple Level +Entity Analogy +Embedding +Relation Analogy +Embedding +Triple Analogy +Embedding +Analogy Function +Entity Loss +close +Relation Loss +close +Triple Loss +close + +Training Stage + +Testing Stage +Analogical Retriever +Link Prediction +Analogy Score +Base Model Score +Score Function: + +Entity Embedding: + +Relation Embedding: + + +Base KGE Model +Figure 1: This is the AnKGE structure diagram with TransE as the base model. For simplicity, we set the numbers of three levels +analogical object are 1. The upper half of figure shows the module of base model. The predefined score function is applied to +learnt embedding to get the well-trained model. The lower half of figure shows the module of AnKGE. First, AnKGE retrieves +the analogy objects for training the analogy function. The solid line arrow indicates the AnKGE training process. Then, AnKGE +remakes the prediction ranking by interpolating analogy score. The dashed line arrow indicates the AnKGE testing process. +The aggregated embeddings of entity-level and relation- +level, h+ and r+ respectively, are calculated as follows +h+ = +� +hi∈ENe +hi S(fkge(hi, r, t)), +(7) +r+ = +� +ri∈RNr +ri S(fkge(h, ri, t)), +(8) +where S(·) is the softmax function that converts a vector of +K real numbers into a probability distribution of K possible +outcomes, which is formulated as S (ci) = eci/�K +k=1 eck. +Triple-level aggregated embedding z+ is obtained by the +firstly aggregating entity and relation embedding separately +and then calculating combination embedding, which can be +formulated as: +z+ =gkge +� +z+ +e , z+ +r +� +, +z+ +e = +� +(hi,ri)∈TNt +hi S(fkge(hi, ri, t)), +z+ +r = +� +(hi,ri)∈TNt +ri S(fkge(hi, ri, t)). +(9) +4.3 +Loss Function +The training goal of the analogy function is to reduce the dis- +tance between the analogy embedding and aggregated em- +bedding obtained following Section 4.1 and 4.2 respectively. +In addition, considering that fkge performs priori on the +truth value of triples, we take the analogy triple score as an- +other supervision signal. Therefore, given a pair of analogy +embedding Xa and aggregated embedding X + of a triple +embeddings (h, r, t), the loss function is +L(X,(h, r, t)) = +logσ +� +γ +��Xa − X +�� +2 − fkge(h, r, t) +� +, +(10) +where γ is a hyper-parameter of the loss function, σ is the +sigmoid function. ∥·∥2 is the euclidean norm. +However, the three levels of analogical inference are not +equally important for different triples. We add weight pa- +rameters for each loss of three levels and the final training +objective is1: +min Loss = +� +(h,r,t)∈F +� +βEL(h, (ha, r, t)) ++βR L(r, (h, ra, t)) ++βT L(z, (ha, ra, t)) +� +. +(11) +As a result, considering the different contributions of three +level, we introduce βE, βR and βT to adjust gradient de- +scent. The three levels loss function distribution is positively +correlated with the score of the analogy triple. Due to page +limitation, we put the calculation details in Appendix B. +4.4 +Link Prediction +For a test triple (h, r, t) in test set Fte, we follow the kNN- +LM (Khandelwal et al. 2020) and interpolate the analogy +1During the gradient update, the parameters of the original +model are frozen. + +FB15k-237 +WN18RR +MRR +Hit@1 +Hit@3 +Hit@10 +MRR +Hit@1 +Hit@3 +Hit@10 +Conventional KGE +TransE (Bordes et al. 2013) +0.317 +0.223 +0.352 +0.504 +0.224 +0.022 +0.390 +0.520 +ANALOGY (Liu, Wu, and Yang 2017) +0.256 +0.165 +0.290 +0.436 +0.405 +0.363 +0.429 +0.474 +RotatE (Sun et al. 2019) +0.336 +0.244 +0.370 +0.524 +0.473 +0.428 +0.491 +0.564 +HAKE (Zhang et al. 2020) +0.349 +0.252 +0.385 +0.545 +0.496 +0.452 +0.513 +0.580 +Rot-Pro (Song, Luo, and Huang 2021) +0.344 +0.246 +0.383 +0.540 +0.457 +0.397 +0.482 +0.577 +PairRE (Chao et al. 2021) +0.348 +0.254 +0.384 +0.539 +0.455 +0.413 +0.469 +0.539 +DualE (Cao et al. 2021) +0.365 +0.268 +0.400 +0.559 +0.492 +0.444 +0.513 +0.584 +GNN-based KGE +R-GCN (Schlichtkrull et al. 2018) +0.249 +0.151 +0.264 +0.417 +- +- +- +- +A2N (Bansal et al. 2019) +0.317 +0.232 +0.348 +0.486 +0.450 +0.420 +0.460 +0.510 +CompGCN (Vashishth et al. 2020) +0.355 +0.264 +0.390 +0.535 +0.479 +0.443 +0.494 +0.546 +SE-GNN (Li et al. 2022) +0.365 +0.271 +0.399 +0.549 +0.484 +0.446 +0.509 +0.572 +Enhanced KGE +CAKE (Niu et al. 2022) +0.321 +0.226 +0.355 +0.515 +- +- +- +- +PUDA (Tang et al. 2022) +0.369 +0.268 +0.408 +0.578 +0.481 +0.436 +0.498 +0.582 +REP (Wang et al. 2022) +0.354 +0.262 +0.388 +0.540 +0.488 +0.439 +0.505 +0.588 +AnKGE-HAKE(ours) +0.385 +0.288 +0.428 +0.572 +0.500 +0.454 +0.515 +0.587 +Table 1: Link Prediction results on FB15k-237 and WN18RR. The best results are bold and second best results are underline. +score with base model score to get the final score function: +Score(h, r, t) = fkge (h, r, t) + λEfkge (ha, r, t) + +λRfkge (h, ra, t) + λT fkge (ha, ra, t) (12) +where λ is the adaptive weight parameter, which is dynam- +ically adjusts analogy weight according to training triples. +λE is proportional to the number of triples with the same +(r, t) in the training set. λR is proportional to the number of +triples with the same (h, t) in the training set. λT is propor- +tional to the number of triples with the same tail entity in the +training set. The formula for adaptive weight parameter is2: +λE = min (| {(hi, r, t) ∈ F} |/Ne, 1) × αE, +λR = min (| {(h, ri, t) ∈ F} |/Nr, 1) × αR, +λT = min (| {(hi, ri, t) ∈ F} |/Nt, 1) × αT , +(13) +where αE, αR, αT +are basic weight hyper-parameters. +Adaptive weight utilizes the train dataset to determine +whether test triples are suitable for different levels of ana- +logical inference. When all levels of analogical inference are +not suitable, this score function degenerates to the base KGE +model. In fact, AnKGE remakes the rank of hard-predicted +triples in the base model by analogical inference to improve +the prediction performance. +5 +Experiments +In this section, we present and analyze the experimental re- +sults.3 We first introduce the experimental settings in de- +tail. Then we show the effectiveness and compatibility of the +2When link prediction, we add reverse relations to expand the +dataset and predict tail entity only, which is equivalent to the effect +of predicting both head and tail entities. Each prediction will use all +entities to replace tail entity. Thus, there is no risk of label leakage. +3Our code is available at https://github.com/zjukg/AnKGE +AnKGE with multiple base KGE models. Besides, we fur- +ther analyze the effect of three levels analogical inference by +ablation study. Finally, we conduct case study presenting a +new view for the explanations of knowledge graph inference +by analogical inference. +5.1 +Experiments Setup +Dataset +We conduct experiments on link prediction task +on two well-known benchmarks: WN18RR and FB15k-237. +WN18RR and FB15k-237 are subsets of WN18 and FB15k, +respectively. Some previous work (Dettmers et al. 2018) has +indicated the test leakage flaw in WN18 and FB15k, which +means test triples appear in train dataset with inverse rela- +tions. WN18RR and FB15k-237 removing inverse relations +are the modified version. Therefore, we use WN18RR and +FB15k-237 as the experiment datasets. The statistic details +of these datasets are summarized in Appendix C. +Evaluation protocol +We evaluate the KGE framework +performance by four frequent evaluation metrics: the recip- +rocal mean of correct entity ranks in the whole entity set +(MRR) and percentage of test triples with correct entities +ranked in top 1/3/10 (Hit@1, Hit@3, Hit@10). For a test +task (h, r, ?) → t, we replace all entities to create corrupted +triples. Following the filter setting protocol, we exclude the +other true triples appearing in train, valid and test datasets. +Finally, we sort the filter corrupted triples according to the +triple scores. +Implementation details +We train AnKGE framework +based on four representative KGE models : TransE (Bor- +des et al. 2013), RotatE (Sun et al. 2019), HAKE (Zhang +et al. 2020) and PairRE (Chao et al. 2021). We use the grid +search to select the hyper-parameters of our framework. We +search the number of analogy objects of three levels Ne, + +FB15k-237 +WN18RR +MRR +Hit@1 +Hit@3 +Hit@10 +MRR +Hit@1 +Hit@3 +Hit@10 +TransE +0.317 +0.223 +0.352 +0.504 +0.224 +0.022 +0.390 +0.520 +AnKGE-TransE +0.340 +0.245 +0.379 +0.523 +0.232 +0.031 +0.402 +0.526 +RotatE +0.336 +0.244 +0.370 +0.524 +0.473 +0.428 +0.491 +0.564 +AnKGE-RotatE +0.366 +0.273 +0.405 +0.546 +0.480 +0.431 +0.499 +0.578 +HAKE +0.349 +0.252 +0.385 +0.545 +0.496 +0.452 +0.513 +0.580 +AnKGE-HAKE +0.385 +0.288 +0.428 +0.572 +0.500 +0.454 +0.515 +0.587 +PairRE +0.348 +0.254 +0.384 +0.539 +0.455 +0.413 +0.469 +0.539 +AnKGE-PairRE +0.376 +0.281 +0.417 +0.558 +0.462 +0.415 +0.480 +0.556 +Table 2: AnKGE upon different model on FB15k-237 and WN18RR. The better results are bold. +1 +3 +5 +10 +50 +100 +HAKE Ranking +100 +50 +10 +5 +3 +1 +AnKGE Ranking +0 +0 +0 +3 +366 +1727 +2 +9 +19 +332 +5824 +593 +5 +48 +292 +2189 +817 +29 +22 +283 +1448 +546 +186 +3 +352 +3816 +882 +456 +214 +18 +9953 +1250 +257 +143 +158 +15 +0 +200 +400 +600 +800 +1000 +Figure 2: Comparison of the ranking between AnKGE and +base model on the FB15k-237. +Nr and Nt ∈ {1, 3, 5, 10, 20}, the basic weight of three +levels αE, αR and αT ∈ {0.01, 0.05, 0.1, 0.2, 0.3}, learn +rate α ∈ {1e−3, 1e−4, 1e−5}. The loss function weight +γ in Equation (10) is set to 10, the transformation matrix +weight λ in Equation (5) is set to 1 and 0 in FB15k-237 and +WN18RR respectively. Before training AnKGE, we retrieve +analogical objects of three levels in train dataset for once. +In both training and inference processes, AnKGE is ex- +tended based on the scoring function of the original model. +Thus, AnKGE has the same model complexity as the origi- +nal model. +5.2 +Link Prediction Results +Main results +We use HAKE (Zhang et al. 2020) as the +base model for AnKGE to compare with other baselines. +Baselines are selected from three categories Conventional +KGE models including TransE (Bordes et al. 2013), ANAL- +OGY (Liu, Wu, and Yang 2017), RotatE (Sun et al. 2019), +HAKE, Rot-Pro (Song, Luo, and Huang 2021), PairRE +(Chao et al. 2021), and DualE (Cao et al. 2021), GNN- +based KGE models including R-GCN (Schlichtkrull et al. +2018), A2N (Bansal et al. 2019), CompGCN (Vashishth +et al. 2020), and SE-GNN (Li et al. 2022), and Enhanced +KGE framework including CAKE (Niu et al. 2022), PUDA +Models +FB15k-237 +WN18RR +MRR +Hit@1 +MRR +Hit@1 +AnKGE +0.385 +0.288 +0.500 +0.454 +w/o entity-level +0.384 +0.288 +0.497 +0.451 +w/o relation-level +0.349 +0.253 +0.500 +0.455 +w/o triple-level +0.384 +0.287 +0.499 +0.453 +w/o all +0.349 +0.252 +0.496 +0.452 +Table 3: Ablation study of three analogy level, where w/o +means removing the corresponding level in AnKGE. +(Tang et al. 2022), and REP (Wang et al. 2022). +The Table 1 summarizes experiment results on FB15k- +237 and WN18RR. The result of ANALOGY is from code4. +The result of TransE, RotatE, HAKE and PairRE are from +our trained model. The base model and AnKGE frame- +work training details are provided in Appendix D. The +other results are from the published paper. We can see that +AnKGE enhances the analogical inference ability of the +base model HAKE through analogical inference and outper- +forms the baseline models on most evaluation metrics except +the Hit@10 metric where results of AnKGE slightly lower +than PUDA and REP and achieve the second best. Overall, +AnKGE remakes the rank of hard-predicted triples in HAKE +by analogical inference, achieving the best results on both +datasets. +Compatibility results +The AnKGE is a framework to en- +hance the analogical inference ability of KGE models, which +retrieves analogical objects through fkge predefined in KGE +models. Theoretically, our framework is applicable to most +KGE models defining a score function for triples. We chose +four C-KGE models: TransE, RotatE, HAKE, PairRE as +base model to validate compatibility. As Table 2 shows, +AnKGE achieves a significant improvement over the base +model on all metrics. The MRR metric improves by about +3% on the FB15k-237. The result demonstrates that AnKGE +is compatible with a wide range of KGE models. Moreover, +AnKGE based on HAKE achieves a more significant im- +provement on FB15k-237 dataset. HAKE makes the entities +4https://github.com/thunlp/OpenKE + +Incomplete triple +Analogy object +AnKGE +Original +Rank +Rank +Entity +(diencephalon, has part, ?) → hypothalamus +brain +5 +25 +(rest, derivationally related form, ?) → breath +drowse +6 +38 +(roof, hypernym, ?) → protective covering +cap +39 +20 +Relation +(felidae, member meronym, ?) → panthera +has part +5 +17 +(monodontidae, member meronym, ?) → delphinapterus +hypernym Reverse +1 +64 +(literary composition, hypernym, ?) → writing +has part +88 +18 +Triple +(ticino, instance hypernym, ?) → swiss canton +(switzerland, has part) +8 +54 +(south korea, has part, ?) → inchon +(port, instance hypernym Reverse) +1 +31 +(elementary geometry, hypernym, ?) → geometry +(construct, synset domain topic of) +39 +12 +Table 4: Analogical inference case Study. The better ranks are blod. +hierarchical by using the depth of the entity to model differ- +ent levels of the hierarchy, which is more helpful for analog- +ical inference. +Compared with WN18RR, the improvement of the model +on FB15k-237 is more significant, which we speculate is +because FB15k-237 has richer relational patterns. So it has +more improvement in the process of relation-level analogi- +cal inference. In addition, AnKGE is designed to predict the +hard-predicted triples. The overall accuracy of FB15k-237 +is lower than WN18RR. Consequently, the boosting effect +of the model is reflected more obviously. +5.3 +Model Analysis +Ranking study +In order to analyze the improvement ef- +fect of AnKGE, we compare the ranking results in FB15k- +237 of the AnKGE-HAKE and original HAKE in Figure 2. +The horizontal coordinate represents the ranking range of +the HAKE model, and the vertical coordinate represents the +ranking range of AnKGE. We found that ranking changes +are less apparent when the ranking is more significant than +100, so we selected the triples ranking within 100 and di- +vided them into six ranking ranges for analysis. The diag- +onal line represents the unchanged ranking, the lower right +of the diagonal line represents the AnKGE ranking as better +than the HAKE ranking, and the upper left represents worse. +We find some triples with worse rankings, but the number is +much smaller than those with better rankings. In addition, +the change in ranking is not so evident as the base model +ranking increases; the better the base model ranking is, the +more possible that AnKGE could improve the rankings. +Ablation Study +We conduct ablation experiments for the +analogical inference part of AnkGE. Table 3 shows the re- +sults of the ablation study for the AnKGE-HAKE on two +datasets. We can see that the removal of any part makes the +model less effective, except the relation-level on WN18RR +dataset. Since there are only 11 relations in WN18RR, it +is hard to retrieve suitable relation-level analogical objects. +We explain this in more detail in case study. In addition, the +WN18RR consists of a lexicon containing contextual words +that naturally provide entity-level analogical objects, which +makes the model more effective for entity-level analogical +inference. The result of FB15k-237 is the opposite. It may be +because it has rich relationship patterns, making the relation- +level analogical inference more effective. +Case Study +Analogical inference can generate explana- +tions for predicted triples, which are valuable for real-life +applications. Our method also provides an analogy view for +the explanations of knowledge graph inference. As the Table +4 shows, we provide an intuitive demonstration about ana- +logical inference. For each level, we select multiple example +cases from WN18RR test set, and list their corresponding +analogical objects and prediction results based on RotatE. +For entity-level, the idea is to retrieve hypernym or hyponym +as the analogy object. For example, the diencephalon is lo- +cated in the core of the brain. The fact that hypothalamus is +part of brain improves the reliability of the people‘s trust on +predicted result. However, if hyponym entity becomes the +analogy object, it will generate bad explanations and results. +For instance, although cap can be regraded as a special type +of roof, it is not the protective covering. Thus the misleading +explanation that (cap, hypernym, protective covering) +downgrades the trustworthiness of the predicting result, +which ranks the correct answer at 39. For relation-level, +AnKGE tends to retrieve the conceptually similar rela- +tions, such as the ( member meronym) and ( has part). +Nevertheless, there are only 11 relations on WN18RR, +which makes the AnKGE sometimes retrieve the inappro- +priate analogy relations. For example, ( hypernym) and +( has part) are the relations of opposite concepts, which +leads to bad explanation and worse ranking. For triple-level, +AnKGE typically focuses on the (h, r) pair structure. As +proof, ticino is a canton of Switzerland means that triple +(switzerland, has part, swiss canton) is good explana- +tion. However, sometimes the (h, r) pair structure varies too +much leading the misclassification. +6 +Conclusion +In this paper, we resort to analogical inference to study the +knowledge graph completion task. We propose an analogical +object retriever that retrieves appropriate analogical objects +from entity-level, relation-level, and triple-level. Then, we +design a novel and general self-supervised framework to en- +hance well-trained KGEs with analogical inference capabil- +ity called AnKGE. Our method achieves competitive results +on knowledge graph completion task and performs enhanced +analogical inference ability. Some future directions include +exploring more analogy patterns and a more general frame- +work to adapt to the GNN-based KGE. + +7 +Acknowledgments +This work is funded by NSFCU19B2027/91846204. +References +Bansal, T.; Juan, D.; Ravi, S.; and McCallum, A. 2019. A2N: +Attending to Neighbors for Knowledge Graph Inference. In +ACL (1), 4387–4392. Association for Computational Lin- +guistics. +Bevilacqua, M.; and Navigli, R. 2020. Breaking Through +the 80% Glass Ceiling: Raising the State of the Art in Word +Sense Disambiguation by Incorporating Knowledge Graph +Information. In ACL, 2854–2864. Association for Compu- +tational Linguistics. +Bollacker, K. D.; Evans, C.; Paritosh, P. K.; Sturge, T.; and +Taylor, J. 2008. Freebase: a collaboratively created graph +database for structuring human knowledge. +In SIGMOD +Conference, 1247–1250. ACM. +Bordes, A.; Usunier, N.; Garc´ıa-Dur´an, A.; Weston, J.; and +Yakhnenko, O. 2013. Translating Embeddings for Modeling +Multi-relational Data. In NIPS, 2787–2795. +Cao, Z.; Xu, Q.; Yang, Z.; Cao, X.; and Huang, Q. 2021. +Dual Quaternion Knowledge Graph Embeddings. In AAAI, +6894–6902. AAAI Press. +Chao, L.; He, J.; Wang, T.; and Chu, W. 2021. +PairRE: +Knowledge Graph Embeddings via Paired Relation Vectors. +In ACL/IJCNLP (1), 4360–4369. Association for Computa- +tional Linguistics. +Chen, X.; Li, L.; Zhang, N.; Tan, C.; Huang, F.; Si, L.; and +Chen, H. 2022. Relation Extraction as Open-book Exami- +nation: Retrieval-enhanced Prompt Tuning. In SIGIR, 2443– +2448. ACM. +Dettmers, T.; Minervini, P.; Stenetorp, P.; and Riedel, S. +2018. Convolutional 2D Knowledge Graph Embeddings. In +AAAI, 1811–1818. AAAI Press. +Gentner, D. 1983. Structure-Mapping: A Theoretical Frame- +work for Analogy. Cogn. Sci., 7(2): 155–170. +Hall, R. P. 1989. Computational Approaches to Analogical +Reasoning: A Comparative Analysis. Artif. Intell., 39(1): +39–120. +Hu, Z.; Cao, Y.; Huang, L.; and Chua, T. 2021. How Knowl- +edge Graph and Attention Help? A Qualitative Analysis into +Bag-level Relation Extraction. In ACL/IJCNLP (1), 4662– +4671. Association for Computational Linguistics. +Khandelwal, U.; Levy, O.; Jurafsky, D.; Zettlemoyer, L.; +and Lewis, M. 2020. +Generalization through Memoriza- +tion: Nearest Neighbor Language Models. In ICLR. Open- +Review.net. +Lehmann, J.; Isele, R.; Jakob, M.; Jentzsch, A.; Kontokostas, +D.; Mendes, P. N.; Hellmann, S.; Morsey, M.; van Kleef, P.; +Auer, S.; and Bizer, C. 2015. DBpedia - A large-scale, multi- +lingual knowledge base extracted from Wikipedia. Semantic +Web, 6(2): 167–195. +Li, R.; Cao, Y.; Zhu, Q.; Bi, G.; Fang, F.; Liu, Y.; and Li, Q. +2022. How Does Knowledge Graph Embedding Extrapolate +to Unseen Data: A Semantic Evidence View. In AAAI, 5781– +5791. AAAI Press. +Liu, H.; Wu, Y.; and Yang, Y. 2017. +Analogical Infer- +ence for Multi-relational Embeddings. In ICML, volume 70 +of Proceedings of Machine Learning Research, 2168–2178. +PMLR. +Miller, G. A. 1994. WORDNET: A Lexical Database for +English. In HLT. Morgan Kaufmann. +Niu, G.; Li, B.; Zhang, Y.; and Pu, S. 2022. +CAKE: A +Scalable Commonsense-Aware Framework For Multi-View +Knowledge Graph Completion. In ACL (1), 2867–2877. As- +sociation for Computational Linguistics. +Schlichtkrull, M. S.; Kipf, T. N.; Bloem, P.; van den Berg, +R.; Titov, I.; and Welling, M. 2018. Modeling Relational +Data with Graph Convolutional Networks. In ESWC, vol- +ume 10843 of Lecture Notes in Computer Science, 593–607. +Springer. +Song, T.; Luo, J.; and Huang, L. 2021. Rot-Pro: Modeling +Transitivity by Projection in Knowledge Graph Embedding. +In NeurIPS, 24695–24706. +Suchanek, F. M.; Kasneci, G.; and Weikum, G. 2007. Yago: +a core of semantic knowledge. In WWW, 697–706. ACM. +Sun, Z.; Deng, Z.; Nie, J.; and Tang, J. 2019. RotatE: Knowl- +edge Graph Embedding by Relational Rotation in Complex +Space. In ICLR (Poster). OpenReview.net. +Tang, Z.; Pei, S.; Zhang, Z.; Zhu, Y.; Zhuang, F.; Hoehn- +dorf, R.; and Zhang, X. 2022. Positive-Unlabeled Learning +with Adversarial Data Augmentation for Knowledge Graph +Completion. In IJCAI, 2248–2254. ijcai.org. +Turney, P. D. 2008. The Latent Relation Mapping Engine: +Algorithm and Experiments. J. Artif. Intell. Res., 33: 615– +655. +Vashishth, S.; Sanyal, S.; Nitin, V.; and Talukdar, P. P. 2020. +Composition-based Multi-Relational Graph Convolutional +Networks. In ICLR. OpenReview.net. +Wang, H.; Dai, S.; Su, W.; Zhong, H.; Fang, Z.; Huang, Z.; +Feng, S.; Chen, Z.; Sun, Y.; and Yu, D. 2022. Simple and Ef- +fective Relation-based Embedding Propagation for Knowl- +edge Representation Learning. +In IJCAI, 2755–2761. ij- +cai.org. +Yang, B.; Yih, W.; He, X.; Gao, J.; and Deng, L. 2015. Em- +bedding Entities and Relations for Learning and Inference +in Knowledge Bases. In ICLR (Poster). +Yasunaga, M.; Ren, H.; Bosselut, A.; Liang, P.; and +Leskovec, J. 2021. +QA-GNN: Reasoning with Language +Models and Knowledge Graphs for Question Answering. In +NAACL-HLT, 535–546. Association for Computational Lin- +guistics. +Zhang, W.; Chen, X.; Yao, Z.; Chen, M.; Zhu, Y.; Yu, H.; +Huang, Y.; Xu, Y.; Zhang, N.; Xu, Z.; Yuan, Z.; Xiong, F.; +and Chen, H. 2022. NeuralKG: An Open Source Library for +Diverse Representation Learning of Knowledge Graphs. In +SIGIR, 3323–3328. ACM. +Zhang, Z.; Cai, J.; Zhang, Y.; and Wang, J. 2020. Learning +Hierarchy-Aware Knowledge Graph Embeddings for Link +Prediction. In AAAI, 3065–3072. AAAI Press. + +Dataset +|E| +|R| +Train +Valid +Test +FB15k-237 +14,541 +237 +272,115 +17,535 +20,466 +WN18RR +40,493 +11 +86,835 +3,034 +3,134 +Table 5: Statistics of datasets. Train, Valid, and Test denote +the size of train set, validation set, and test set, respectively. +A +KGE Models +We can divide knowledge graph embedding models into +two categories: conventional knowledge graph embedding +models and GNN-based models. Theoretically, the AnKGE +framework applies to most conventional KGE models defin- +ing a score function for triples. In order to demonstrate +the effectiveness and compatibility of AnKGE. We chose +four representative conventional knowledge graph embed- +ding models: TransE (Bordes et al. 2013), RotatE (Sun et al. +2019), HAKE (Zhang et al. 2020) and PairRE (Chao et al. +2021) as base models for AnKGE. Table 6 exhibits the +gkge(·, ·) and fkge(·, ·, ·) defined in these knowledge graph +embedding models. We will introduce the four KGE models, +respectively. +TransE +is the first knowledge graph embedding model +proposing a geometric interpretation of the latent space. The +TransE model is inspired by Word2vec vectors, requiring the +sum of head embedding and relation embedding close to the +tail embedding. It makes TransE successfully capture the re- +lations between words through translations. However, due +to the limit of translation, TransE cannot correctly handle +N-to-one, one-to-N, and symmetric relations. +RotatE +requires the embedding of (h, r, t) belong to Ck, +and considers the relation embedding as rotation vector in +a complex latent space. Specifically, the complex compo- +nent conveys the rotation along that axis, whereas the real +component always equals 1. RotatE has been demonstrated +that rotation allows modeling correctly numerous relational +patterns, such as symmetry, anti-symmetry and inversion. +However, RotatE cannot model the relation with hierarchy +pattern. +HAKE +is a hierarchy-aware knowledge graph embedding +model that uses the depth of entity to model different levels +of the hierarchy. HAKE distinguishes the entities into two +categories: the entities at different levels of the hierarchy and +the entities at the same level of the hierarchy, to model the +semantic hierarchies. Experiments demonstrate that HAKE +can effectively model the semantic hierarchies in knowledge +graphs. +PairRE +is a method capable of simultaneously encoding +complex relations and multiple relation patterns. The model +uses paired relation representations to adjust the margin in +loss function to fit different complex relations. PairRE cap- +tures the semantic connection among relation vectors which +have been demonstrated to encode three important relation +patterns, symmetry/anti-symmetry, inversion and composi- +tion. +B +Loss Weight +Considering the different contributions of the three levels, +we introduce βE, βR and βT to adjust gradient descent. Sim- +ilarity to the softmax function, firstly, we replace the original +element embedding with three level aggregated embeddings +respectively, then calculate the exponential sum of analogy +triple scores and original triple score, which is formulated +as: +T =efkge(h+,r,t) + efkge(h,r+,t) ++ efkge(z+ +e ,z+ +r ,t) + efkge(h,r,t). +(14) +The weights of loss function in Equation (11) are the rate of +T : +βE = efkge(h+,r,t)/T , +βR = efkge(h,r+,t)/T , +βT = efkge(z+ +e ,z+ +e ,t)/T . +(15) +The highest analogy triple score means mapping original el- +ement embedding to aggregate embedding is necessary. If +the original triple score is the highest, the triple should not +analogy with other objects. +C +Datasets +We evaluate the AnKGE framework on two widely-used +datasets: WN18RR and FB15k-237. FB15k-237 is from the +Freebase knowledge graph project, whose design is inspired +by broadly used information communities such as The Se- +mantic Web and Wikipedia. FB15k-237 contains informa- +tion including locations, media, geographical and people. +WN18RR is from the WordNet knowledge graph project, +a dataset that characterizes associations between English +words.WN18RR contains information including symmetric, +asymmetric and compositional relations. Statistics of these +datasets are shown in Table 5. +D +Implementation Details +Firstly, we train four KGE models: TransE, RotatE, HAKE +and PairRE, as base models. In the training stage, we ap- +ply a widely used negative sampling loss function with self- +adversarial training: +L = log σ(γm − fkge(h, r, t)) ++ +n +� +i=1 +p(h′ +i, r, t′ +i) log σ(fkge(h′ +i, r, t′ +i) − γm), +where γm is a fixed margin, σ is the sigmoid function, +(h′ +i, r, t′ +i) is the ith corrupting negative triple for (h, r, t) and +n is the number of negative triples. Moreover, p(h′ +j, r, t′ +j) is +the self-adversarial weight for this negative triple. The cal- +culation of the weight is: +p(h′ +j, r, t′ +j) = +exp αtempfkge(h′ +j, r, t′ +j) +� +i exp αtempfkge(h′ +i, r, t′ +i) +which is the probability distribution of negative sampling +triples, where αtemp is the adversarial temperature of sam- +pling. When training and testing, we add reverse relations to + +Model M +fkge(h, r, t) +gkge(h, r) +Parameters +TransE +−∥h + r − t∥1 +h + r +h, r, t ∈ Rk +RotatE +−∥h ◦ r − t∥2 +h ◦ r +h, r, t ∈ Ck, |ri| = 1 +HAKE +−∥hm ◦ rm − tm∥2− +Cat[∥hm ◦ rm∥2, +hm, tm ∈ Rk,rm ∈ Rk ++, +λ∥ sin((hp + rp − tp)/2)∥1 +λ∥ sin((hp + rp)/2)∥1] +hp, rp, tp ∈ [0, 2π)k, λ ∈ Rk +PairRE +−∥h ◦ rH − t ◦ rT ∥1 +h ◦ rH +h, r, t ∈ Rk +Table 6: The details of knowledge graph embedding models, where ∥ · ∥1 denotes the absolute-value norm, Cat [·] denotes the +concatenate vector function. +Dataset +Model +Emebdding +Margin +Adversarial +Negative +Batch Size +Inverse Relation +Dimension +Temperature +Samples +FB15k-237 +TransE +500 +9.0 +1.0 +256 +1024 +True +RotatE +500 +9.0 +1.0 +256 +1024 +True +HAKE +1000 +9.0 +1.0 +512 +1024 +True +PairRE +1500 +6.0 +1.0 +256 +1024 +True +WN18RR +TransE +500 +6.0 +1.0 +256 +2048 +True +RotatE +500 +6.0 +0.5 +1024 +512 +True +HAKE +500 +6.0 +0.5 +1024 +512 +True +PairRE +500 +6.0 +0.5 +1024 +512 +True +Dataset +Model +Entity +Relation +Triple +Entity +Relation +Triple +Cand. Ne +Cand. Nr +Cand. Nt +lambda αE +lambda αR +lambda αT +FB15k-237 +AnKGE-TransE +1 +1 +3 +0.01 +0.2 +0.02 +AnKGE-RotatE +1 +1 +5 +0.01 +0.2 +0.05 +AnKGE-HAKE +1 +1 +5 +0.05 +0.3 +0.1 +AnKGE-PairRE +1 +1 +3 +0.01 +0.3 +0.05 +WN18RR +AnKGE-TransE +1 +1 +20 +0.01 +0.3 +0.3 +AnKGE-RotatE +1 +1 +3 +0.1 +0.05 +0.1 +AnKGE-HAKE +1 +1 +3 +0.1 +0.05 +0.1 +AnKGE-PairRE +1 +1 +3 +0.1 +0.05 +0.2 +Table 7: The hyper-parameter settings of base model and AnKGE over different datasets. +expand the dataset. Specifically, for a triple (h, r, t), we add +a new reverse triple (t, r−1, h) in dataset. r−1 represents the +reverse relation of r. In the link prediction task, the model +only predicts tail entity, which is equivalent to the effect of +predicting both head and tail entities. +Then, we use AnKGE to enhance the well-trained KGEs +with analogical inference capability. We show that AnKGE +achieves competitive results on knowledge graph comple- +tion task and performs enhanced analogical inference abil- +ity. The loss function weight γ in Equation (10) is set to 10, +the transformation matrix weight λ in Equation (5) is set to 1 +and 0 in FB15k-237 and WN18RR respectively. We use the +grid search to select other hyper-parameters, including: en- +tity candidates Ne, relation candidates Nr triple candidates +Nt, entity lambda αE, relation lambda αR and triple lambda +αT . Other experimental settings are the same. The experi- +ment of AnKGE-TransE on WN18RR is the only exception. +We use fixed weight parameter instead of adaptive weight +parameter and cosine similarity instead of euclidean norm. +In addition, since there is no negative sampling, the mem- +ory footprint and time cost are lower than the base model, +which is generally acceptable. +We implement all the models with PyTorch, and run ex- +periments on NVIDIA RTX3090 GPUs with 24GB RAM +and Intel(R) Xeon(R) Silver 4210R CPU @ 2.40GHz with +40 cores. The hyper-parameter settings of base model and +AnKGE are shown in Table 7 + diff --git a/29AzT4oBgHgl3EQfDvqc/content/tmp_files/load_file.txt b/29AzT4oBgHgl3EQfDvqc/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..844b83ee3b2b28a88a492eeba2595c6ad49b9548 --- /dev/null +++ b/29AzT4oBgHgl3EQfDvqc/content/tmp_files/load_file.txt @@ -0,0 +1,1026 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf,len=1025 +page_content='Analogical Inference Enhanced Knowledge Graph Embedding Zhen Yao1*, Wen Zhang1*, Mingyang Chen2, Yufeng Huang1, Yi Yang4, Huajun Chen2,3,5† 1School of Software Technology, Zhejiang University 2College of Computer Science and Technology, Zhejiang University 3Donghai Laboratory, Zhoushan 316021, China 4Huawei Technologies Co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=', Ltd 5Alibaba-Zhejiang University Joint Institute of Frontier Technologies {yz0204, zhang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='wen, mingyangchen, huangyufeng, huajunsir}@zju.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='cn yangyi193@huawei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='com, Abstract Knowledge graph embedding (KGE), which maps entities and relations in a knowledge graph into continuous vector spaces, has achieved great success in predicting missing links in knowledge graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, knowledge graphs often con- tain incomplete triples that are difficult to inductively infer by KGEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' To address this challenge, we resort to analogi- cal inference and propose a novel and general self-supervised framework AnKGE to enhance KGE models with analog- ical inference capability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We propose an analogical object retriever that retrieves appropriate analogical objects from entity-level, relation-level, and triple-level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' And in AnKGE, we train an analogy function for each level of analogical in- ference with the original element embedding from a well- trained KGE model as input, which outputs the analogical object embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In order to combine inductive inference capability from the original KGE model and analogical in- ference capability enhanced by AnKGE, we interpolate the analogy score with the base model score and introduce the adaptive weights in the score function for prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Through extensive experiments on FB15k-237 and WN18RR datasets, we show that AnKGE achieves competitive results on link prediction task and well performs analogical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 1 Introduction Knowledge graphs (KGs) storing a large number of triples in the form of (head entity, relation, tail entity), (h, r, t) for short, are popular data structures for representing fac- tual knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Many knowledge graph projects such as Freebase (Bollacker et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2008), WordNet (Miller 1994), YAGO (Suchanek, Kasneci, and Weikum 2007) and DB- pedia (Lehmann et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2015) are significant foundations to support artificial intelligence applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' They have been successfully used in downstream applications such as word sense disambiguation (Bevilacqua and Navigli 2020), ques- tion answering (Yasunaga et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021), and information extraction (Hu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021), gaining widespread attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, most KGs are incomplete, so predicting the miss- ing links between entities is a fundamental problem for KGs These authors contributed equally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' †Corresponding Author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='aaai.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='org).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' All rights reserved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' called link prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' One of the common approaches to this problem is knowledge graph embedding (KGE) meth- ods, which make prediction through a predefined triple score function with learnt entity and relation embeddings as input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Many KGE models have been proposed like TransE (Bordes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013), DistMult (Yang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2015), RotatE (Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019) and HAKE (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' These methods have gained great success in knowledge graph completion task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For most KGE methods, the parametric learning paradigm can be viewed as memorization regarding training data as a book and predicting missing links as the close-book test (Chen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022), which belongs to inductive inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, the large knowledge graphs often contain incom- plete triples that are difficult to be inductively inferred by applying memorization paradigm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nevertheless, the problem may be well solved by using analogical inference method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' That is because analogical inference is a referential method, which retrieves similar solutions to solve new problems, similar to an open-book examination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For example, it seems that most people could not remember even learn about what company Ron Wayne founded.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, if they know that Ron Wayne and Steve Jobs are the co-founders, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=', Steve Jobs and Ron Wayne are analogical objects in this context, and it is well known that Steve Jobs founded Apple Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' thus they could analogically infer that Ron Wayne founded Apple Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In order to enhance KGEs with analogical inference ca- pability, there are three problems should be solved: 1) How to define the analogical objects of elements given a task?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2) How to enable the model to map elements to analogical ob- jects?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 3) How to combine the original inductive inference capability and enhanced analogical inference capability?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We propose AnKGE, a novel and general self-supervised framework, which solves these problems very well and en- hances well-trained KGEs with analogical inference capa- bility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For problem 1, we think that an analogical object can solve the given task well, and inspired by the nearest neigh- bor language model (Khandelwal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020), we propose an analogical retriever covering objects of three levels, includ- ing entity, relation, and triple level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, we consider the score function of KGEs as the assessment of the quality of triples and regrade the replacement triples with the high- est scoring as the appropriate analogical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For prob- arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='00982v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='AI] 3 Jan 2023 lem 2, we trained a projecting function using analogical ob- jects as supervision signals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' This function projects original objects onto appropriate analogical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For problem 3, we interpolate the analogy score with the base model score to combine the original inductive inference capability and enhanced analogical inference capability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Moreover, we in- troduce the adaptive weight to adjust analogical inference in knowledge graph completion task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Finally, through link prediction experiments on FB15k- 237 and WN18RR datasets, we demonstrate the AnKGE is significantly compatible and outperforms the other baseline models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' To the best of our knowledge, AnKGE is the first framework to enhance KGEs with analogical inference abil- ity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In summary, our contributions in this work include: We explore the knowledge graph completion task from the analogical inference view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We propose an effective retrieval method covering three levels to obtain the ap- propriate analogy objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We propose a novelty analogical inference enhanced framework called AnKGE, which could project original objects onto appropriate objects for analogical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' To our knowledge, the AnKGE is the first framework of knowledge graph embedding to enhance analogical infer- ence ability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We conduct experimental evaluations to demonstrate the proposed AnKGE is significantly compatible and achieves competitive performance on FB15k-237 and WN18RR datasets, promising practical applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2 Related Work Knowledge graph embedding According to previous work (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022), the KGE methods can be di- vided into two categories based on the scoring function and whether a global graph structure is utilized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The first cat- egory is the Conventional KGEs (C-KGEs), which apply a geometric assumption in vector space for true triples and use single triple as input for triple scoring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Conventional KGEs use the score function to measure the plausibility of triple.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' TransE (Bordes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013) is a representative conventional KGE method whose score function is ∥h + r − t∥2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' What is more, there are many variants to improve the performance of TransE, such as RotatE (Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019), DistMult (Yang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2015) and HAKE (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The other cate- gory is the GNN-based methods, which use representations of entities and relations aggregated from their neighbors in the graph instead of embedding them for triple scoring to capture the graph patterns explicitly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' R-GCN (Schlichtkrull et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2018) is the first GNN framework to model relational data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' It introduces relation-specific transformations when neighbor aggregating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' SE-GNN (Li et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022) models three levels semantic evidence into knowledge embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Note that SE-GNN introducing three levels from the semantic ev- idence view differs from our three levels analogical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Enhanced KGE framework Recently, some work has proposed some frameworks and strategies to improve the performance of KGE models, which are called enhanced KGE, such as CAKE (Niu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022), PUDA(Tang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022) and REP (Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' CAKE is a commonsense-aware knowledge embedding framework to extract commonsense from factual triples with entity con- cepts automatically, which generates commonsense aug- ments to facilitate high-quality negative sampling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' PUDA is a data augmentation strategy to address the false nega- tive and data sparsity issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' REP is a post-processing tech- nique to adapt pre-trained KG embeddings with graph con- text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Our method is designed to enhance a well-trained KGE model with analogical inference capability belonging to the enhanced KGE framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Analogical inference In classic artificial intelligence, ana- logical inference was an active research topic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, the early computational model of analogy-making study (Gen- tner 1983;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Turney 2008) mainly focuses on structure map- ping theory and its implementation in the structure map- ping engine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Recently, some researchers proposed k-Nearest Neighbor language model(kNN-LM) (Khandelwal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020), which can directly query training examples at test time, also can be considered the analogy inference model in the neural language process topic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' While effective, these models often require retrieval from a large datastore at test time, significantly increasing the inference overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In the field of knowledge graph, the study of analogical inference to solve knowledge graph incomplete problem is missing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ANALOGY (Liu, Wu, and Yang 2017) is the first method for modeling analogical structures in multi-relational embed- ding, but the performance is not good.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Differ in our method uses the nearest neighbor method to perform explicit anal- ogy, ANALOGY uses the commutativity constraint of the normal matrix to model analogical relations implicitly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 3 Analogical Object Retriever Before introducing our method, in this section, we firstly in- troduce the background of knowledge graph and analogical inference, and then we propose the analogical object retriev- ers that retrieve appropriate analogical objects from entity- level, relation-level, and triple-level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The retrieved analog- ical objects will be used as supervision signals with our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Background A knowledge graph is denoted as G = (E, R, F), where E represents the set of entities, R repre- sents the set of relations, and F = {(h, r, t)} ⊆ E × R × E represents the set of triple facts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Analogical inference, which has been long researched in artificial intelligence, maps the target problem to a known source problem that could effectively utilize known knowl- edge (Hall 1989).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Applying analogical inference into link prediction task (h, r, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') in knowledge graphs, instead of di- rectly predicting the tail entity t, we could make predic- tion through similar triples that we know, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' triples in train dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We consider similar triples are composed by ana- logical objects of (h, r, t).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, we assume that the analogy objects may come from three levels: the analogy of head entity h part resulting similar triple (h′, r, t)(entity- level), the analogy of relation r part resulting similar triple (h, r′, t) (relation-level) and the analogy of combination pair (h, r) part t resulting similar triple (h′, r′, t) (triple-level).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus, we propose three retrievers to obtain different level’s analogical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Entity-Level Retriever The retriever is designed based on the score function fkge(h, r, t) predefined in a well-trained KGE model, where triples with higher scores are assumed with higher probability to be true.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Inspired by the near- est neighbor language model (Khandelwal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020), we replace all possible objects of the triple and regrade the replacement triples with highest scoring as the appropri- ate analogical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Given a triple (h, r, t), entity-level retriever retrieves similar true triples (h′, r, t) for entity- level analogical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For example, we could get the answer of (Sergey Brin, found, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') is Google through (Larry Page, found, Google) if we know Sergey Brin and Larry Page are co-founders.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, in entity-level retriever, we first replace h with all entities resulting |E| replacement triples, and then regard triples with highest scores measured by the KGE as similar triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' And we name the head entity in similar triples as analogical objects from entity-level retriever.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus ana- logical object set could be represented as Ehrt Ne = {hi | Top( {fkge(hi, r, t) | hi ∈ E} )Ne}, (1) where Top(·)k denotes the k elements with top k values among all inputs, fkge(·, ·, ·) is the predefined score function in KGE model, and hrt denotes a specific triple (h, r, t) as input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' If not otherwise specified, we omit hrt and use ENe in- stead of Ehrt Ne for simplicity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Compared to retrieving similar triples directly from the train dataset, retrieving according to scores from KGEs could help overcome the incompleteness of KGs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Relation-Level Retriever Given (h, r, t), relation-level retriever retrieves (h, r′, t) for relation-level analogical in- ference, since there are relations with similar contexts in KGs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For example, the founder of a company is usually the board member.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus the relation-level analogy object of found is board member.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Similar to the entity-level re- triever, the analogical object set of (h, r, t) from relation- level retriever is as follow : RNr = {ri | Top( {fkge(h, ri, t) | ri ∈ R} )Nr}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (2) Triple-Level Retriever Given (h, r, t), triple-level re- triever retrieves (h′, r′, t) for triple-level analogical infer- ence, which is the combination of entity-level and relation- level retriever.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For instance, Sergey Brin is the founder of Google and Sundar Pichai is the CEO of Google.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Therefore, the triple-level analogical objects of (SergeyBrin, found) is (SundarPichai, CEO).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Actually, the number of all can- didate (h′, r′) pairs is in millions in most knowledge graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In order to reduce the cost of retrieving candidate pairs and inspired by the principle of locality, we often select m en- tities and n relations with high triple scores separately, and then pair them with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus the set of analogical objects, namely (h′, r′) pairs, from triple-level retriever is TNt = {(hi, ri) | Top( {fkge(hi, ri, t) | hi ∈ Em, ri ∈ Rn})Nt}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (3) 4 Methodology In this section, we present a novel KGE enhanced frame- work called Analogy Enhanced Knowledge Graph Embed- ding (AnKGE), which could model the three levels of ana- logical inference as introduced in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Next, we first introduce the definition of analogy function (Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1) and how to train it by using analogical objects (Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 and Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Finally, we introduce how to combine the original inductive inference capability and enhanced ana- logical inference capability in knowledge graph completion task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='4) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 Analogy Function Given a well-trained KGE model M = {E, R, fkge, Θ}, where E, R and fkge are entity embedding table, relation embedding table, and score function of the M, and Θ is the set of other parameters, AnKGE enhances M with capa- bility of analogical inference through a projecting function called analogy function f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We train an analogy function for each level of analogical inference with the original element embedding from E or R in M as input and output the ana- logical object embedding to conduct link prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, analogy function for relation-level analogical inference frel maps an original embedding of a relation r in (h, r, t) to the analogical embedding through a relation projecting vector vR r ∈ Rdr that frel(r) = ra = vR r ◦ r, (4) where dr is the relation hidden dimension, ◦ is the element- wise product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Similarly, the analogy function for entity-level analogical inference fent maps an original embedding of an entity h in (h, r, t) to the analogical embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Considering that an entity generally tends to be associated with multiple rela- tions, we define fent as: fent(h, r) = ha = vE h ◦ h + λMtrans × vR r ◦ r, (5) where vE h ∈ Rde is the entity projecting vector and de is the entity hidden dimension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Mtrans ∈ Rde×dr denotes the transformation matrix that enable to make relation r into consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' λ is a weight hyper-parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Analogy function for triple-level analogical inference ftrp outputs the analogical embedding of entity and relation pairs through combining embedding of entity-level and relation- level according to KGEs as follows: ftrp(h, r) = za = gkge (ha, ra) , (6) gkge(·, ·) is the function in KGEs that maps a head entity em- bedding to the tail entity embedding according to the given relation embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' gkge(·, ·) and fkge(·, ·, ·) of representa- tive KGE models are provided in Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 Analogy Objects Aggregator In order to enhance the framework’s robustness for analog- ical inference, we make the analogical objects retrieved fol- lowing Section 3 as the supervision signals for analogy func- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, we make the analogy embedding as intro- duced in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 to approach the weighted average of the analogical objects from KGE model M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Entity Level Relation Level Triple Level Entity Analogy Embedding Relation Analogy Embedding Triple Analogy Embedding Analogy Function Entity Loss close Relation Loss close Triple Loss close Training Stage Testing Stage Analogical Retriever Link Prediction Analogy Score Base Model Score Score Function: Entity Embedding: Relation Embedding: Base KGE Model Figure 1: This is the AnKGE structure diagram with TransE as the base model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For simplicity, we set the numbers of three levels analogical object are 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The upper half of figure shows the module of base model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The predefined score function is applied to learnt embedding to get the well-trained model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The lower half of figure shows the module of AnKGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' First, AnKGE retrieves the analogy objects for training the analogy function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The solid line arrow indicates the AnKGE training process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Then, AnKGE remakes the prediction ranking by interpolating analogy score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The dashed line arrow indicates the AnKGE testing process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The aggregated embeddings of entity-level and relation- level, h+ and r+ respectively, are calculated as follows h+ = � hi∈ENe hi S(fkge(hi, r, t)), (7) r+ = � ri∈RNr ri S(fkge(h, ri, t)), (8) where S(·) is the softmax function that converts a vector of K real numbers into a probability distribution of K possible outcomes, which is formulated as S (ci) = eci/�K k=1 eck.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Triple-level aggregated embedding z+ is obtained by the firstly aggregating entity and relation embedding separately and then calculating combination embedding, which can be formulated as: z+ =gkge � z+ e , z+ r � , z+ e = � (hi,ri)∈TNt hi S(fkge(hi, ri, t)), z+ r = � (hi,ri)∈TNt ri S(fkge(hi, ri, t)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (9) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 Loss Function The training goal of the analogy function is to reduce the dis- tance between the analogy embedding and aggregated em- bedding obtained following Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In addition, considering that fkge performs priori on the truth value of triples, we take the analogy triple score as an- other supervision signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Therefore, given a pair of analogy embedding Xa and aggregated embedding X + of a triple embeddings (h, r, t), the loss function is L(X,(h, r, t)) = logσ � γ ��Xa − X +�� 2 − fkge(h, r, t) � , (10) where γ is a hyper-parameter of the loss function, σ is the sigmoid function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ∥·∥2 is the euclidean norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, the three levels of analogical inference are not equally important for different triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We add weight pa- rameters for each loss of three levels and the final training objective is1: min Loss = � (h,r,t)∈F � βEL(h, (ha, r, t)) +βR L(r, (h, ra, t)) +βT L(z, (ha, ra, t)) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (11) As a result, considering the different contributions of three level, we introduce βE, βR and βT to adjust gradient de- scent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The three levels loss function distribution is positively correlated with the score of the analogy triple.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Due to page limitation, we put the calculation details in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='4 Link Prediction For a test triple (h, r, t) in test set Fte, we follow the kNN- LM (Khandelwal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020) and interpolate the analogy 1During the gradient update, the parameters of the original model are frozen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' FB15k-237 WN18RR MRR Hit@1 Hit@3 Hit@10 MRR Hit@1 Hit@3 Hit@10 Conventional KGE TransE (Bordes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='317 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='223 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='352 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='504 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='224 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='022 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='390 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='520 ANALOGY (Liu, Wu, and Yang 2017) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='256 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='165 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='290 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='436 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='405 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='363 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='429 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='474 RotatE (Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='336 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='244 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='370 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='524 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='473 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='428 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='491 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='564 HAKE (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='349 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='252 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='385 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='545 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='496 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='452 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='513 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='580 Rot-Pro (Song, Luo, and Huang 2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='344 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='246 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='383 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='540 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='457 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='397 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='482 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='577 PairRE (Chao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='348 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='254 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='384 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='539 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='455 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='413 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='469 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='539 DualE (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='365 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='268 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='400 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='559 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='492 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='444 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='513 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='584 GNN-based KGE R-GCN (Schlichtkrull et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2018) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='249 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='151 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='264 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='417 A2N (Bansal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='317 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='232 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='348 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='486 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='450 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='420 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='460 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='510 CompGCN (Vashishth et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='355 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='264 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='390 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='535 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='479 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='443 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='494 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='546 SE-GNN (Li et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='365 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='271 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='399 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='549 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='484 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='446 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='509 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='572 Enhanced KGE CAKE (Niu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='321 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='226 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='355 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='515 PUDA (Tang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='369 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='268 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='408 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='578 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='481 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='436 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='498 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='582 REP (Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='354 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='262 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='388 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='540 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='488 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='439 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='505 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='588 AnKGE-HAKE(ours) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='385 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='288 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='428 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='572 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='500 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='454 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='515 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='587 Table 1: Link Prediction results on FB15k-237 and WN18RR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The best results are bold and second best results are underline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' score with base model score to get the final score function: Score(h, r, t) = fkge (h, r, t) + λEfkge (ha, r, t) + λRfkge (h, ra, t) + λT fkge (ha, ra, t) (12) where λ is the adaptive weight parameter, which is dynam- ically adjusts analogy weight according to training triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' λE is proportional to the number of triples with the same (r, t) in the training set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' λR is proportional to the number of triples with the same (h, t) in the training set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' λT is propor- tional to the number of triples with the same tail entity in the training set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The formula for adaptive weight parameter is2: λE = min (| {(hi, r, t) ∈ F} |/Ne, 1) × αE, λR = min (| {(h, ri, t) ∈ F} |/Nr, 1) × αR, λT = min (| {(hi, ri, t) ∈ F} |/Nt, 1) × αT , (13) where αE, αR, αT are basic weight hyper-parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Adaptive weight utilizes the train dataset to determine whether test triples are suitable for different levels of ana- logical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' When all levels of analogical inference are not suitable, this score function degenerates to the base KGE model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In fact, AnKGE remakes the rank of hard-predicted triples in the base model by analogical inference to improve the prediction performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 5 Experiments In this section, we present and analyze the experimental re- sults.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 We first introduce the experimental settings in de- tail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Then we show the effectiveness and compatibility of the 2When link prediction, we add reverse relations to expand the dataset and predict tail entity only, which is equivalent to the effect of predicting both head and tail entities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Each prediction will use all entities to replace tail entity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus, there is no risk of label leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 3Our code is available at https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='com/zjukg/AnKGE AnKGE with multiple base KGE models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Besides, we fur- ther analyze the effect of three levels analogical inference by ablation study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Finally, we conduct case study presenting a new view for the explanations of knowledge graph inference by analogical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 Experiments Setup Dataset We conduct experiments on link prediction task on two well-known benchmarks: WN18RR and FB15k-237.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' WN18RR and FB15k-237 are subsets of WN18 and FB15k, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Some previous work (Dettmers et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2018) has indicated the test leakage flaw in WN18 and FB15k, which means test triples appear in train dataset with inverse rela- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' WN18RR and FB15k-237 removing inverse relations are the modified version.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Therefore, we use WN18RR and FB15k-237 as the experiment datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The statistic details of these datasets are summarized in Appendix C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Evaluation protocol We evaluate the KGE framework performance by four frequent evaluation metrics: the recip- rocal mean of correct entity ranks in the whole entity set (MRR) and percentage of test triples with correct entities ranked in top 1/3/10 (Hit@1, Hit@3, Hit@10).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For a test task (h, r, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → t, we replace all entities to create corrupted triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Following the filter setting protocol, we exclude the other true triples appearing in train, valid and test datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Finally, we sort the filter corrupted triples according to the triple scores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Implementation details We train AnKGE framework based on four representative KGE models : TransE (Bor- des et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013), RotatE (Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019), HAKE (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020) and PairRE (Chao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We use the grid search to select the hyper-parameters of our framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We search the number of analogy objects of three levels Ne, FB15k-237 WN18RR MRR Hit@1 Hit@3 Hit@10 MRR Hit@1 Hit@3 Hit@10 TransE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='317 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='223 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='352 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='504 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='224 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='022 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='390 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='520 AnKGE-TransE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='340 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='245 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='379 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='523 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='232 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='031 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='402 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='526 RotatE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='336 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='244 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='370 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='524 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='473 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='428 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='491 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='564 AnKGE-RotatE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='366 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='273 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='405 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='546 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='480 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='431 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='499 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='578 HAKE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='349 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='252 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='385 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='545 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='496 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='452 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='513 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='580 AnKGE-HAKE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='385 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='288 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='428 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='572 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='500 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='454 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='515 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='587 PairRE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='348 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='254 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='384 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='539 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='455 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='413 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='469 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='539 AnKGE-PairRE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='376 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='281 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='417 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='558 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='462 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='415 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='480 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='556 Table 2: AnKGE upon different model on FB15k-237 and WN18RR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The better results are bold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 1 3 5 10 50 100 HAKE Ranking 100 50 10 5 3 1 AnKGE Ranking 0 0 0 3 366 1727 2 9 19 332 5824 593 5 48 292 2189 817 29 22 283 1448 546 186 3 352 3816 882 456 214 18 9953 1250 257 143 158 15 0 200 400 600 800 1000 Figure 2: Comparison of the ranking between AnKGE and base model on the FB15k-237.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nr and Nt ∈ {1, 3, 5, 10, 20}, the basic weight of three levels αE, αR and αT ∈ {0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='01, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3}, learn rate α ∈ {1e−3, 1e−4, 1e−5}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The loss function weight γ in Equation (10) is set to 10, the transformation matrix weight λ in Equation (5) is set to 1 and 0 in FB15k-237 and WN18RR respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Before training AnKGE, we retrieve analogical objects of three levels in train dataset for once.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In both training and inference processes, AnKGE is ex- tended based on the scoring function of the original model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus, AnKGE has the same model complexity as the origi- nal model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 Link Prediction Results Main results We use HAKE (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020) as the base model for AnKGE to compare with other baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Baselines are selected from three categories Conventional KGE models including TransE (Bordes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013), ANAL- OGY (Liu, Wu, and Yang 2017), RotatE (Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019), HAKE, Rot-Pro (Song, Luo, and Huang 2021), PairRE (Chao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021), and DualE (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021), GNN- based KGE models including R-GCN (Schlichtkrull et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2018), A2N (Bansal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019), CompGCN (Vashishth et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020), and SE-GNN (Li et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022), and Enhanced KGE framework including CAKE (Niu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022), PUDA Models FB15k-237 WN18RR MRR Hit@1 MRR Hit@1 AnKGE 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='385 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='288 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='500 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='454 w/o entity-level 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='384 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='288 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='497 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='451 w/o relation-level 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='349 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='253 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='500 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='455 w/o triple-level 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='384 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='287 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='499 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='453 w/o all 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='349 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='252 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='496 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='452 Table 3: Ablation study of three analogy level, where w/o means removing the corresponding level in AnKGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (Tang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022), and REP (Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The Table 1 summarizes experiment results on FB15k- 237 and WN18RR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The result of ANALOGY is from code4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The result of TransE, RotatE, HAKE and PairRE are from our trained model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The base model and AnKGE frame- work training details are provided in Appendix D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The other results are from the published paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We can see that AnKGE enhances the analogical inference ability of the base model HAKE through analogical inference and outper- forms the baseline models on most evaluation metrics except the Hit@10 metric where results of AnKGE slightly lower than PUDA and REP and achieve the second best.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Overall, AnKGE remakes the rank of hard-predicted triples in HAKE by analogical inference, achieving the best results on both datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Compatibility results The AnKGE is a framework to en- hance the analogical inference ability of KGE models, which retrieves analogical objects through fkge predefined in KGE models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Theoretically, our framework is applicable to most KGE models defining a score function for triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We chose four C-KGE models: TransE, RotatE, HAKE, PairRE as base model to validate compatibility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' As Table 2 shows, AnKGE achieves a significant improvement over the base model on all metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The MRR metric improves by about 3% on the FB15k-237.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The result demonstrates that AnKGE is compatible with a wide range of KGE models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Moreover, AnKGE based on HAKE achieves a more significant im- provement on FB15k-237 dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' HAKE makes the entities 4https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='com/thunlp/OpenKE Incomplete triple Analogy object AnKGE Original Rank Rank Entity (diencephalon, has part, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → hypothalamus brain 5 25 (rest, derivationally related form, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → breath drowse 6 38 (roof, hypernym, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → protective covering cap 39 20 Relation (felidae, member meronym, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → panthera has part 5 17 (monodontidae, member meronym, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → delphinapterus hypernym Reverse 1 64 (literary composition, hypernym, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → writing has part 88 18 Triple (ticino, instance hypernym, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → swiss canton (switzerland, has part) 8 54 (south korea, has part, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → inchon (port, instance hypernym Reverse) 1 31 (elementary geometry, hypernym, ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=') → geometry (construct, synset domain topic of) 39 12 Table 4: Analogical inference case Study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The better ranks are blod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' hierarchical by using the depth of the entity to model differ- ent levels of the hierarchy, which is more helpful for analog- ical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Compared with WN18RR, the improvement of the model on FB15k-237 is more significant, which we speculate is because FB15k-237 has richer relational patterns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' So it has more improvement in the process of relation-level analogi- cal inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In addition, AnKGE is designed to predict the hard-predicted triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The overall accuracy of FB15k-237 is lower than WN18RR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Consequently, the boosting effect of the model is reflected more obviously.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 Model Analysis Ranking study In order to analyze the improvement ef- fect of AnKGE, we compare the ranking results in FB15k- 237 of the AnKGE-HAKE and original HAKE in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The horizontal coordinate represents the ranking range of the HAKE model, and the vertical coordinate represents the ranking range of AnKGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We found that ranking changes are less apparent when the ranking is more significant than 100, so we selected the triples ranking within 100 and di- vided them into six ranking ranges for analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The diag- onal line represents the unchanged ranking, the lower right of the diagonal line represents the AnKGE ranking as better than the HAKE ranking, and the upper left represents worse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We find some triples with worse rankings, but the number is much smaller than those with better rankings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In addition, the change in ranking is not so evident as the base model ranking increases;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' the better the base model ranking is, the more possible that AnKGE could improve the rankings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Ablation Study We conduct ablation experiments for the analogical inference part of AnkGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Table 3 shows the re- sults of the ablation study for the AnKGE-HAKE on two datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We can see that the removal of any part makes the model less effective, except the relation-level on WN18RR dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Since there are only 11 relations in WN18RR, it is hard to retrieve suitable relation-level analogical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We explain this in more detail in case study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In addition, the WN18RR consists of a lexicon containing contextual words that naturally provide entity-level analogical objects, which makes the model more effective for entity-level analogical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The result of FB15k-237 is the opposite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' It may be because it has rich relationship patterns, making the relation- level analogical inference more effective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Case Study Analogical inference can generate explana- tions for predicted triples, which are valuable for real-life applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Our method also provides an analogy view for the explanations of knowledge graph inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' As the Table 4 shows, we provide an intuitive demonstration about ana- logical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For each level, we select multiple example cases from WN18RR test set, and list their corresponding analogical objects and prediction results based on RotatE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For entity-level, the idea is to retrieve hypernym or hyponym as the analogy object.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For example, the diencephalon is lo- cated in the core of the brain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The fact that hypothalamus is part of brain improves the reliability of the people‘s trust on predicted result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, if hyponym entity becomes the analogy object, it will generate bad explanations and results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For instance, although cap can be regraded as a special type of roof, it is not the protective covering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Thus the misleading explanation that (cap, hypernym, protective covering) downgrades the trustworthiness of the predicting result, which ranks the correct answer at 39.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For relation-level, AnKGE tends to retrieve the conceptually similar rela- tions, such as the ( member meronym) and ( has part).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nevertheless, there are only 11 relations on WN18RR, which makes the AnKGE sometimes retrieve the inappro- priate analogy relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For example, ( hypernym) and ( has part) are the relations of opposite concepts, which leads to bad explanation and worse ranking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' For triple-level, AnKGE typically focuses on the (h, r) pair structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' As proof, ticino is a canton of Switzerland means that triple (switzerland, has part, swiss canton) is good explana- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, sometimes the (h, r) pair structure varies too much leading the misclassification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 6 Conclusion In this paper, we resort to analogical inference to study the knowledge graph completion task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We propose an analogical object retriever that retrieves appropriate analogical objects from entity-level, relation-level, and triple-level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Then, we design a novel and general self-supervised framework to en- hance well-trained KGEs with analogical inference capabil- ity called AnKGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Our method achieves competitive results on knowledge graph completion task and performs enhanced analogical inference ability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Some future directions include exploring more analogy patterns and a more general frame- work to adapt to the GNN-based KGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 7 Acknowledgments This work is funded by NSFCU19B2027/91846204.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' References Bansal, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Juan, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Ravi, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and McCallum, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' A2N: Attending to Neighbors for Knowledge Graph Inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ACL (1), 4387–4392.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Association for Computational Lin- guistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Bevilacqua, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Navigli, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Breaking Through the 80% Glass Ceiling: Raising the State of the Art in Word Sense Disambiguation by Incorporating Knowledge Graph Information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ACL, 2854–2864.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Association for Compu- tational Linguistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Bollacker, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Evans, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Paritosh, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Sturge, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Taylor, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Freebase: a collaboratively created graph database for structuring human knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In SIGMOD Conference, 1247–1250.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ACM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Bordes, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Usunier, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Garc´ıa-Dur´an, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Weston, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Yakhnenko, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Translating Embeddings for Modeling Multi-relational Data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In NIPS, 2787–2795.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cao, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Xu, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cao, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Huang, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Dual Quaternion Knowledge Graph Embeddings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In AAAI, 6894–6902.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' AAAI Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Chao, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' He, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Wang, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Chu, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' PairRE: Knowledge Graph Embeddings via Paired Relation Vectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ACL/IJCNLP (1), 4360–4369.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Association for Computa- tional Linguistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Chen, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Li, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Tan, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Huang, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Si, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Chen, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Relation Extraction as Open-book Exami- nation: Retrieval-enhanced Prompt Tuning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In SIGIR, 2443– 2448.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ACM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Dettmers, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Minervini, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Stenetorp, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Riedel, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Convolutional 2D Knowledge Graph Embeddings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In AAAI, 1811–1818.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' AAAI Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Gentner, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 1983.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Structure-Mapping: A Theoretical Frame- work for Analogy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cogn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=', 7(2): 155–170.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Hall, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 1989.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Computational Approaches to Analogical Reasoning: A Comparative Analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Artif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Intell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=', 39(1): 39–120.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Hu, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cao, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Huang, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Chua, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' How Knowl- edge Graph and Attention Help?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' A Qualitative Analysis into Bag-level Relation Extraction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ACL/IJCNLP (1), 4662– 4671.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Association for Computational Linguistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Khandelwal, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Levy, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Jurafsky, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zettlemoyer, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Lewis, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Generalization through Memoriza- tion: Nearest Neighbor Language Models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ICLR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Open- Review.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='net.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Lehmann, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Isele, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Jakob, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Jentzsch, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Kontokostas, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Mendes, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Hellmann, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Morsey, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' van Kleef, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Auer, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Bizer, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' DBpedia - A large-scale, multi- lingual knowledge base extracted from Wikipedia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Semantic Web, 6(2): 167–195.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Li, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cao, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhu, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Bi, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Fang, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Liu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Li, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' How Does Knowledge Graph Embedding Extrapolate to Unseen Data: A Semantic Evidence View.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In AAAI, 5781– 5791.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' AAAI Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Liu, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Wu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Yang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Analogical Infer- ence for Multi-relational Embeddings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ICML, volume 70 of Proceedings of Machine Learning Research, 2168–2178.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' PMLR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Miller, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' WORDNET: A Lexical Database for English.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In HLT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Morgan Kaufmann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Niu, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Li, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Pu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' CAKE: A Scalable Commonsense-Aware Framework For Multi-View Knowledge Graph Completion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ACL (1), 2867–2877.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' As- sociation for Computational Linguistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Schlichtkrull, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Kipf, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Bloem, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' van den Berg, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Titov, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Welling, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Modeling Relational Data with Graph Convolutional Networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ESWC, vol- ume 10843 of Lecture Notes in Computer Science, 593–607.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Springer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Song, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Luo, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Huang, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Rot-Pro: Modeling Transitivity by Projection in Knowledge Graph Embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In NeurIPS, 24695–24706.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Suchanek, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Kasneci, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Weikum, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yago: a core of semantic knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In WWW, 697–706.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ACM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Sun, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Deng, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nie, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Tang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' RotatE: Knowl- edge Graph Embedding by Relational Rotation in Complex Space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ICLR (Poster).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' OpenReview.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='net.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Tang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Pei, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhuang, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Hoehn- dorf, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Zhang, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Positive-Unlabeled Learning with Adversarial Data Augmentation for Knowledge Graph Completion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In IJCAI, 2248–2254.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ijcai.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='org.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Turney, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The Latent Relation Mapping Engine: Algorithm and Experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Artif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Intell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=', 33: 615– 655.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Vashishth, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Sanyal, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nitin, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Talukdar, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Composition-based Multi-Relational Graph Convolutional Networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ICLR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' OpenReview.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='net.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Wang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Dai, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Su, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhong, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Fang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Huang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Feng, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Chen, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Sun, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Yu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Simple and Ef- fective Relation-based Embedding Propagation for Knowl- edge Representation Learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In IJCAI, 2755–2761.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ij- cai.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='org.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yang, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yih, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' He, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Gao, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Deng, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Em- bedding Entities and Relations for Learning and Inference in Knowledge Bases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In ICLR (Poster).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yasunaga, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Ren, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Bosselut, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Liang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Leskovec, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' QA-GNN: Reasoning with Language Models and Knowledge Graphs for Question Answering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In NAACL-HLT, 535–546.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Association for Computational Lin- guistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Chen, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yao, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Chen, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yu, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Huang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Xu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Xu, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Yuan, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Xiong, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Chen, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' NeuralKG: An Open Source Library for Diverse Representation Learning of Knowledge Graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In SIGIR, 3323–3328.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' ACM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cai, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Zhang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' and Wang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Learning Hierarchy-Aware Knowledge Graph Embeddings for Link Prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In AAAI, 3065–3072.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' AAAI Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Dataset |E| |R| Train Valid Test FB15k-237 14,541 237 272,115 17,535 20,466 WN18RR 40,493 11 86,835 3,034 3,134 Table 5: Statistics of datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Train, Valid, and Test denote the size of train set, validation set, and test set, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' A KGE Models We can divide knowledge graph embedding models into two categories: conventional knowledge graph embedding models and GNN-based models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Theoretically, the AnKGE framework applies to most conventional KGE models defin- ing a score function for triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In order to demonstrate the effectiveness and compatibility of AnKGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We chose four representative conventional knowledge graph embed- ding models: TransE (Bordes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2013), RotatE (Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2019), HAKE (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2020) and PairRE (Chao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2021) as base models for AnKGE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Table 6 exhibits the gkge(·, ·) and fkge(·, ·, ·) defined in these knowledge graph embedding models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We will introduce the four KGE models, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' TransE is the first knowledge graph embedding model proposing a geometric interpretation of the latent space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The TransE model is inspired by Word2vec vectors, requiring the sum of head embedding and relation embedding close to the tail embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' It makes TransE successfully capture the re- lations between words through translations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, due to the limit of translation, TransE cannot correctly handle N-to-one, one-to-N, and symmetric relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' RotatE requires the embedding of (h, r, t) belong to Ck, and considers the relation embedding as rotation vector in a complex latent space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, the complex compo- nent conveys the rotation along that axis, whereas the real component always equals 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' RotatE has been demonstrated that rotation allows modeling correctly numerous relational patterns, such as symmetry, anti-symmetry and inversion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' However, RotatE cannot model the relation with hierarchy pattern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' HAKE is a hierarchy-aware knowledge graph embedding model that uses the depth of entity to model different levels of the hierarchy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' HAKE distinguishes the entities into two categories: the entities at different levels of the hierarchy and the entities at the same level of the hierarchy, to model the semantic hierarchies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Experiments demonstrate that HAKE can effectively model the semantic hierarchies in knowledge graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' PairRE is a method capable of simultaneously encoding complex relations and multiple relation patterns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The model uses paired relation representations to adjust the margin in loss function to fit different complex relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' PairRE cap- tures the semantic connection among relation vectors which have been demonstrated to encode three important relation patterns, symmetry/anti-symmetry, inversion and composi- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' B Loss Weight Considering the different contributions of the three levels, we introduce βE, βR and βT to adjust gradient descent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Sim- ilarity to the softmax function, firstly, we replace the original element embedding with three level aggregated embeddings respectively, then calculate the exponential sum of analogy triple scores and original triple score, which is formulated as: T =efkge(h+,r,t) + efkge(h,r+,t) + efkge(z+ e ,z+ r ,t) + efkge(h,r,t).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (14) The weights of loss function in Equation (11) are the rate of T : βE = efkge(h+,r,t)/T , βR = efkge(h,r+,t)/T , βT = efkge(z+ e ,z+ e ,t)/T .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' (15) The highest analogy triple score means mapping original el- ement embedding to aggregate embedding is necessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' If the original triple score is the highest, the triple should not analogy with other objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' C Datasets We evaluate the AnKGE framework on two widely-used datasets: WN18RR and FB15k-237.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' FB15k-237 is from the Freebase knowledge graph project, whose design is inspired by broadly used information communities such as The Se- mantic Web and Wikipedia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' FB15k-237 contains informa- tion including locations, media, geographical and people.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' WN18RR is from the WordNet knowledge graph project, a dataset that characterizes associations between English words.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='WN18RR contains information including symmetric, asymmetric and compositional relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Statistics of these datasets are shown in Table 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' D Implementation Details Firstly, we train four KGE models: TransE, RotatE, HAKE and PairRE, as base models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In the training stage, we ap- ply a widely used negative sampling loss function with self- adversarial training: L = log σ(γm − fkge(h, r, t)) + n � i=1 p(h′ i, r, t′ i) log σ(fkge(h′ i, r, t′ i) − γm), where γm is a fixed margin, σ is the sigmoid function, (h′ i, r, t′ i) is the ith corrupting negative triple for (h, r, t) and n is the number of negative triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Moreover, p(h′ j, r, t′ j) is the self-adversarial weight for this negative triple.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The cal- culation of the weight is: p(h′ j, r, t′ j) = exp αtempfkge(h′ j, r, t′ j) � i exp αtempfkge(h′ i, r, t′ i) which is the probability distribution of negative sampling triples, where αtemp is the adversarial temperature of sam- pling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' When training and testing,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' we add reverse relations to Model M fkge(h,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' t) gkge(h,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' r) Parameters TransE −∥h + r − t∥1 h + r h,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' t ∈ Rk RotatE −∥h ◦ r − t∥2 h ◦ r h,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' t ∈ Ck,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' |ri| = 1 HAKE −∥hm ◦ rm − tm∥2− Cat[∥hm ◦ rm∥2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' hm,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' tm ∈ Rk,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='rm ∈ Rk +,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' λ∥ sin((hp + rp − tp)/2)∥1 λ∥ sin((hp + rp)/2)∥1] hp,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' rp,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' tp ∈ [0,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' 2π)k,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' λ ∈ Rk PairRE −∥h ◦ rH − t ◦ rT ∥1 h ◦ rH h,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' t ∈ Rk Table 6: The details of knowledge graph embedding models,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' where ∥ · ∥1 denotes the absolute-value norm,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Cat [·] denotes the concatenate vector function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Dataset Model Emebdding Margin Adversarial Negative Batch Size Inverse Relation Dimension Temperature Samples FB15k-237 TransE 500 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 256 1024 True RotatE 500 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 256 1024 True HAKE 1000 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 512 1024 True PairRE 1500 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 256 1024 True WN18RR TransE 500 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 256 2048 True RotatE 500 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='5 1024 512 True HAKE 500 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='5 1024 512 True PairRE 500 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='5 1024 512 True Dataset Model Entity Relation Triple Entity Relation Triple Cand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Ne Cand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nr Cand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Nt lambda αE lambda αR lambda αT FB15k-237 AnKGE-TransE 1 1 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='02 AnKGE-RotatE 1 1 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05 AnKGE-HAKE 1 1 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 AnKGE-PairRE 1 1 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05 WN18RR AnKGE-TransE 1 1 20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='3 AnKGE-RotatE 1 1 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 AnKGE-HAKE 1 1 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 AnKGE-PairRE 1 1 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='2 Table 7: The hyper-parameter settings of base model and AnKGE over different datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' expand the dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Specifically, for a triple (h, r, t), we add a new reverse triple (t, r−1, h) in dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' r−1 represents the reverse relation of r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In the link prediction task, the model only predicts tail entity, which is equivalent to the effect of predicting both head and tail entities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Then, we use AnKGE to enhance the well-trained KGEs with analogical inference capability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We show that AnKGE achieves competitive results on knowledge graph comple- tion task and performs enhanced analogical inference abil- ity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The loss function weight γ in Equation (10) is set to 10, the transformation matrix weight λ in Equation (5) is set to 1 and 0 in FB15k-237 and WN18RR respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We use the grid search to select other hyper-parameters, including: en- tity candidates Ne, relation candidates Nr triple candidates Nt, entity lambda αE, relation lambda αR and triple lambda αT .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' Other experimental settings are the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The experi- ment of AnKGE-TransE on WN18RR is the only exception.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We use fixed weight parameter instead of adaptive weight parameter and cosine similarity instead of euclidean norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' In addition, since there is no negative sampling, the mem- ory footprint and time cost are lower than the base model, which is generally acceptable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' We implement all the models with PyTorch, and run ex- periments on NVIDIA RTX3090 GPUs with 24GB RAM and Intel(R) Xeon(R) Silver 4210R CPU @ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content='40GHz with 40 cores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} +page_content=' The hyper-parameter settings of base model and AnKGE are shown in Table 7' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf'} diff --git a/39AyT4oBgHgl3EQfcPct/content/tmp_files/2301.00277v1.pdf.txt b/39AyT4oBgHgl3EQfcPct/content/tmp_files/2301.00277v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..ec73a8ce4ae142d1743351b42117c984ed588eef --- /dev/null +++ b/39AyT4oBgHgl3EQfcPct/content/tmp_files/2301.00277v1.pdf.txt @@ -0,0 +1,3607 @@ +arXiv:2301.00277v1 [econ.EM] 31 Dec 2022 +Higher-order Refinements of Small Bandwidth Asymptotics for +Density-Weighted Average Derivative Estimators∗ +Matias D. Cattaneo† +Max H. Farrell‡ +Michael Jansson§ +Ricardo Masini¶ +January 3, 2023 +Abstract +The density weighted average derivative (DWAD) of a regression function is a canonical +parameter of interest in economics. Classical first-order large sample distribution theory for +kernel-based DWAD estimators relies on tuning parameter restrictions and model assumptions +leading to an asymptotic linear representation of the point estimator. +Such conditions can +be restrictive, and the resulting distributional approximation may not be representative of the +underlying sampling distribution of the statistic of interest, in particular not being robust to +bandwidth choices. Small bandwidth asymptotics offers an alternative, more general distribu- +tional approximation for kernel-based DWAD estimators that allows for, but does not require, +asymptotic linearity. The resulting inference procedures based on small bandwidth asymptotics +were found to exhibit superior finite sample performance in simulations, but no formal theory +justifying that empirical success is available in the literature. Employing Edgeworth expan- +sions, this paper shows that small bandwidth asymptotics lead to inference procedures with +demonstrable superior higher-order distributional properties relative to procedures based on +asymptotic linear approximations. +Keywords: density weighted average derivatives, Edgeworth expansions, small bandwidth asymp- +totics. +∗Prepared for the Conference in Honor of James L. Powell at UC-Berkeley, March 25–26, 2022. We thank the +conference participants for their comments. Cattaneo gratefully acknowledges financial support from the National +Science Foundation through grants SES-1947805 and DMS-2210561, Jansson gratefully acknowledges financial support +from the National Science Foundation through grant SES-1947662, and Masini gratefully acknowledges financial +support from the National Science Foundation through grant DMS-2210561. +†Department of Operations Research and Financial Engineering, Princeton University. +‡Booth School of Business, University of Chicago. +§Department of Economics, UC Berkeley. +¶Center for Statistics and Machine Learning, Princeton University. + +1 +Introduction +Identification, estimation and inference in the context of two-step semiparametric models has a long +tradition in econometrics (Powell, 1994). Canonical two-step semiparametric parameters are finite +dimensional functionals of some other unknown infinite dimensional parameters in the model (e.g., +a density or regression function), a leading example being the density weighted average derivative +(DWAD) of a regression function (Stoker, 1986). +This paper seeks to honor the many contri- +butions of Jim Powell to semiparametric theory in econometrics by juxtaposing the higher-order +distributional properties of Powell et al. (1989)’s two-step kernel-based DWAD estimator under +two alternative large sample approximation regimes: one based on the classical asymptotic linear +representation, and the other based on a more general quadratic distributional approximation.1 +In a landmark contribution, Powell et al. (1989) proposed a kernel-based DWAD estimator and +obtained first-order, asymptotically linear distribution theory employing ideas from the U-statistics +literature, along with plug-in standard error estimators, to develop valid inference procedures in +large samples. This work sparked a wealth of subsequent developments in the econometrics litera- +ture: Robinson (1995) obtained Berry-Esseen bounds, Powell and Stoker (1996) considered mean +square error expansions, Nishiyama and Robinson (2000, 2001, 2005) developed Edgeworth expan- +sions, and Newey et al. (2004) investigated bias properties, just to mention a few contributions. +The two-step semiparametric estimator in this literature employs a preliminary kernel-based esti- +mator of a density function, which requires choosing two main tuning parameters (a bandwidth and +a kernel function), and their “optimal” choices depend on the goal of interest (e.g., point estimation +vs. inference) as well as the features of the underlying data generating process (e.g., smoothness of +the unknown density and dimensionality of the covariates). +Classical first-order distribution theory for kernel-based DWAD estimators has focused on cases +where tuning parameter restrictions and model assumptions lead to an asymptotic linear representa- +tion of the two-step semiparametric point estimator (Newey and McFadden, 1994; Ichimura and Todd, +2007, for overviews), that is, the two-step estimator is approximated by a sample average based +on the so-called influence function. This approach can lead to semiparametric efficient inference +procedures in large samples, but the implied distributional approximation may not be “robust” +to tuning parameter choices and/or model features. More specifically, the limiting distribution +obtained based on the asymptotic linear representation is invariant to the way that the preliminary +nonparametric estimators are constructed, and requires potentially high smoothness levels of the +underlying unknown functions and thus the use of higher-order kernels. At its core, asymptotic +linear approximations assume away the contribution of additional terms forming the statistic of +interest, despite the fact that these terms do contribute to the sampling variability of the two-step +semiparametric estimator and, more importantly, do reflect the effect of tuning parameter choices +1Jim Powell’s contributions to semiparametric theory are numerous. Honor´e and Powell (1994), Powell and Stoker +(1996), Blundell and Powell (2004), Aradillas-Lopez et al. (2007), Ahn et al. (2018), and Graham et al. (2023) are +some of the most closely connected to the our work. These papers employ U-statistics methods for two-step kernel- +based estimators similar to those considered herein. See Powell (2017) for more discussion and references. +1 + +in finite samples. +Cattaneo et al. (2014a) proposed an alternative distributional approximation for kernel-based +DWAD estimators that allows for, but does not require, asymptotic linearity. +The key idea is +to capture the joint contribution to the sampling distribution of both linear and quadratic terms +forming the kernel-based DWAD estimator. To operationalize this idea, Cattaneo et al. (2014a) +introduced an asymptotic experiment where the bandwidth sequence is allowed to vanish at a speed +that would render the classical asymptotic linear representation invalid because the quadratic term +becomes first order even in large samples, which they termed “small bandwidth” asymptotics. This +framework was carefully developed to obtain a distributional approximation that explicitly depends +on both linear and quadratic terms, thereby forcing a more careful analysis of how the quadratic +term contributes to the sampling distribution of the statistic. +Small bandwidth asymptotics inference methods for kernel-based DWAD estimators were found +to perform well in simulations (Cattaneo et al., 2010, 2014a,b), but no formal justification for its +finite sample success is available in the literature. Methodologically, this alternative distributional +approximation leads to a new way of conducting inference (e.g., constructing confidence interval +estimators) because the original standard error formula proposed by Powell et al. (1989) must be +modified to make the asymptotic approximation valid across the full range of allowable bandwidths +(including the region where asymptotic linearity fails). Theoretically, however, the empirical success +of small bandwidth asymptotics could in principle come from two distinct sources: (i) it could deliver +a better distributional approximation to the sampling distribution of the point estimator; or (ii) it +could deliver a better distributional approximation to the sampling distribution of the Studentized +t-statistic because the standard error formula was modified. +Employing Edgeworth expansions (Bhattacharya and Rao, 1976; Hall, 1992), this paper shows +that the small bandwidth asymptotics approximation framework leads to inference procedures with +demonstrable superior higher-order distributional properties relative to procedures based on asymp- +totic linear approximations. We study both standardized and Studentized t-statistics, under both +asymptotic linearity and small bandwidth asymptotic regimes, and show that both standardized +and Studentized t-statistics emerging from the small bandwidth regime offer higher-order correc- +tions as measured by the second cummulant underlying their Edgeworth expansions. An immediate +implication of our results is that the small bandwidth asymptotic framework delivers both a better +distributional approximation (Theorem 1, standardized t-statistic) and leads to a better standard +error construction (Theorem 2, Studentized t-statistic). Therefore, our results have both theoretical +and practical implications for empirical work in economics, in addition to providing a theory-based +explanation for prior simulation-based findings exhibiting better numerical performance of infer- +ence procedures constructed using small bandwidth asymptotics relative to those constructed using +classical distributional approximations. +The closest antecedent to our work is Nishiyama and Robinson (2000, 2001), who also studied +Edgeworth expansions for kernel-based DWAD estimators. Their expansions, however, were moti- +vated by the asymptotic linear approximation to the point estimator, and hence can not be used +2 + +to compare and contrast to the distributional approximation emerging from the alternative small +bandwidth asymptotic regime. Therefore, from a technical perspective, this paper also offers novel +Edgeworth expansions that allow for different standardization and Studentization schemes, thereby +allowing us to plug-and-play when comparing the two competing asymptotic frameworks. More +specifically, Theorem 1 below concerns a generic standardized t-statistic and is proven based on +Theorem A in the appendix, which may be of independent technical interest due to is generality. +Theorem 2 below concerns a more specialized class of Studentized t-statistic because establishing +valid Edgeworth expansions is considerably harder when dealing with Studentization. +The idea of employing alternative (more general) asymptotic approximation frameworks that do +not enforce asymptotic linearity for two-step semiparametric estimators has also featured in other +context such as partially linear series-based, many covariates and many instrument estimation as +well as certain network estimation settings (Cattaneo et al., 2018a,b; Matsushita and Otsu, 2021), +as well as other non-linear two-step semiparametric settings (Cattaneo et al., 2013; Cattaneo and Jansson, +2018; Cattaneo et al., 2019). While our theoretical developments and results focus specifically on +the case of kernel-based DWAD estimation, their main conceptual conclusions can be extrapolated +to those settings as well. +The main takeaway is that employing alternative asymptotic frame- +works can deliver improved inference with smaller higher-order distributional approximation errors, +thereby offering more robust inference procedures in finite samples. +The paper continues as follows. Section 2 introduces the setup and main assumptions. Section +3 reviews the classical first-order distributional approximation based on asymptotic linearity and +the more general small bandwidth distributional approximation, along with their corresponding +choices of standard error formulas. Section 4 presents the main results of our paper. Section 5 +concludes. The appendix is organized in three parts: Appendix A provides a self-contained generic +Edgeworth expansion for second-order U-statistics, which may be of independent technical interest, +Appendix B gives the proof of Theorem 1 (standardized t-statistic), and Appendix C gives the proof +of Theorem 2 (Studentized t-statistic). +2 +Setup and Assumptions +Suppose Zi = (Yi, X′ +i)′, i = 1, . . . , n, is a random sample from the distribution of the random +vector Z = (Y, X′)′, where Y is an outcome variable of interest and X takes value on Rd with +Lebesgue density f. We consider the density weighted average derivative of the regression function +g(X) = E[Y |X] given by +θ := E[f(X)˙g(X)], +where for any function a we define ˙a(x) := +∂ +∂xa(x). +To save notation, we also define e(X) := +f(X)g(X) and v(X) := E[Y 2|X]. +We impose the following conditions on the underlying data +generating process. Let ∥ · ∥ be the Euclidean norm. +Assumption 1. +3 + +(a) E[|Y |p] < ∞, for some p ≥ 3. +(b) Σ := E[ψ(Z)ψ(Z)′] is positive definite, where ψ(Z) := 2 +� +˙e(X) − Y ˙f(X) − θ +� +. +(c) f is (S +1) times differentiable, and f and its (S +1) derivatives are bounded, for 2S > d+2; +(d) g is (S + 1) times differentiable and its first three derivatives are bounded; +(e) e and its first (S + 1) derivatives are bounded; +(f) v is twice diferentiable, and its first two derivatives are bounded, and v ˙f and E[|Y |3|X]f(X) +are bounded; +(g) f, gf, ˙gf and vf vanish on the boundaries of their convex supports; +(h) Cram´er Condition: +sup +ν∈Rd:∥v∥=1 +lim sup +|t|→∞ +|E exp(ιtℓ1/¯σν)| < 1 where ¯σν := ν′Σν. +Under Assumption 1 and using integration by parts, the DWAD vector can be expressed as +θ = −2E[Y ˙f(X)], +which motivates the celebrated plug-in analog estimator of Powell et al. (1989) given by +�θ = −2 1 +n +n +� +i=1 +Yi�˙f i(Xi), +�fi(x) = +1 +n − 1 +n +� +j=1,j̸=i +1 +hd K +�Xj − x +h +� +, +where �fi(·) is a “leave-one-out” kernel density estimator for kernel function K : Rd → R and positive +vanishing (bandwidth) sequence h. For the kernel function, we impose the following conditions. +Assumption 2. +(a) K is even, differentiable, and ˙K is bounded; +(b) +� +Rd ˙K(u) ˙K(u)′du is positive definite; +(c) For some P ≥ 2, +� +Rd |K(u)|(1 + ∥u∥P )du + +� +Rd ∥ ˙K(u)∥(1 + ∥u∥2)du < ∞ +and +� +Rd uaK(u)du = + + + + + + + + + +1, +if [a] = 0, +0, +if 0 < [a] < P +µa < ∞, +if [a] = P, +where a ∈ Zd ++ is a multi-index.2 +2We employ standard multi-index notation. For a := (a1, . . . , ad) we have (i) [a] := a1+· · ·+ad, (ii) a! := a1! . . . ad!, +(iii) xa := xa1 +1 . . . xad +d +for x ∈ Rd and (iv) q(a)(x) = +∂[a]q +∂a1 x1...∂ad xd for smooth enough q : Rd → R. +4 + +The estimator �θ can be expressed as a second-order U-statistic with n-varying kernel: +�θ = +�n +2 +�−1 +n +� +i 2 +unless d = 1, thereby forcing restrictive smoothness conditions (S ≥ P) and the use of higher-order +kernels or similar debiasing techniques (see, e.g., Chernozhukov et al., 2022, and references therein). +In addition, classical asymptotic linear theory (whenever valid) leads to a limiting experiment +which is invariant to the particular choices of smoothing (K) and bandwidth (h) tuning parameters +involved in the construction of the estimator, and therefore it is unable to “adapt” to changes in +those choices. As a result, asymptotically linear large sample distribution theory is silent with +respect to the impact that tuning parameter choices may have on the finite sample behavior of the +two-step semiparametric statistic. +To address the aforementioned limitations with classical asymptotic distribution theory, Cattaneo et al. +(2014a) proposed a more general distributional approximation for kernel-based DWAD estimators +that accommodates but does not enforces asymptotic linearity. The core idea is to characterize the +joint asymptotic distributional features of both the linear (¯L) and quadratic ( ¯Q) terms jointly, and +in the process develop an alternative first-order asymptotic theory that accommodates weaker as- +sumptions than those imposed in the classical asymptotically linear distribution theory. Formally, +if Assumptions 1 and 2 hold, and if min(nhd+2, 1)nh2 min(P,S) → 0 and n2hd → ∞, then +(V[�θ])−1/2(�θ − θ) ⇝ N(0, I), +(3.2) +where +V[�θ] = V[¯L] + V[ ¯Q], +V[¯L] = 1 +n +� +Σ + o(1) +� +, +V[ ¯Q] = +�n +2 +�−1 +h−d−2� +∆ + o(1) +� +, +and ∆ = 2E[v(X)f(X)] +� +Rd ˙K(u) ˙K(u)′du. +This more general distributional approximation was developed explicitly in an attempt to better +characterize the finite sample behavior of �θ. +The result in (3.2) shows that the conditions on +the bandwidth sequence may be considerably weakened without invalidating the limiting Gaussian +distribution, albeit the asymptotic variance formula may change. Importantly, if nhd+2 is bounded +6 + +then �θ is no longer asymptotically linear and its limiting distribution will cease to be invariant with +respect to the underlying preliminary nonparametric estimator. In particular, if nhd+2 → c > 0 +then �θ is root-n consistency but not asymptotically linear. In addition, because the bandwidth +is allowed to be “smaller” than usual, the bias of the estimator is controlled in a different way, +removing the need for higher-order kernels. Interestingly, (3.2) allows for the point estimator to +not even be consistent for θ, for sufficiently small bandwidth sequences. +Beyond the aforementioned technical considerations, the result in (3.2) can conceptually be +interpreted as a more refined first-order distributional approximation for the standarized statistics +(V[�θ])−1/2(�θ − θ), which by relying on a quadratic approximation (i.e., capturing the stochastic +contributions of both ¯L and ¯Q) it is expected to offer a “better” distributional approximation. +The idea of standarizing a U-statistic by the joint variance of the linear and quadratic terms +underlying its Hoeffding decomposition can be traced back to the original paper of Hoeffding +(1948, p. +307). +Furthermore, the asymptotic distribution theory proposed by Cattaneo et al. +(2014a) can be viewed as highlighting the well known trade-off between robustness and efficiency in +two-step semiparametric settings: �θ is semiparametric efficient if and only if nhd+2 → ∞, while it +seems possible to construct more robust inference procedures under considerably weaker conditions +that would not be semiparametric efficient. Simulation evidence reported in Cattaneo et al. (2010, +2014a,b) corroborated those conceptual interpretations numerically, but no formal justification is +available in the literature. Theorem 1 below will offer the first theoretical result in the literature +highlighting specific robustness features of the distributional approximation in (3.2) by showing that +such approximation has a demonstrably smaller higher-order distributional approximation error. +3.2 +Variance Estimation +Based on the asymptotically linear distributional approximation in (3.1), Powell et al. (1989) also +proposed the following variance estimator +�Σ = 1 +n +n +� +i=1 +�Li�L′ +i, +�Li = 2 +� +1 +n − 1 +n +� +j=1,j̸=i +Uij − �θ +� +, +and proved its consistency (i.e., �Σ →P Σ) under the same bandwidth sequences (nh2 min(P,S) → 0 +and nhd+2 → ∞) required for asymptotic linearity. This result justifies employing the Studentized +statistic +�Σ−1/2√n(�θ − θ) ⇝ N(0, I) +(3.3) +for inferences purposes, that is, to construct a confidence interval for θ and smooth trasformations +thereof, or to carry out statistical hypothesis testing in the usual way. +However, motivated by their alternative asymptotic approximation, Cattaneo et al. (2014a) showed +that +1 +n +�Σ = 1 +n[Σ + oP(1)] + 2 +�n +2 +�−1 +h−d−2[∆ + oP(1)], +7 + +which implies that the consistency result �Σ →P Σ is valid if and only if nhd+2 → ∞; otherwise, +�Σ is in general asymptotically upwards biased relative to V[�θ] in (3.2). Because �Σ is asymptoti- +cally equivalent to the jackknife variance estimator of �θ, Cattaneo et al. (2014b) also noted that +the asymptotic bias of �Σ is a result of a more generic phenomena underlying jackknife variance +estimators studied in Efron and Stein (1981). +See also Matsushita and Otsu (2021) for related +discussion. +To conduct asymptotically valid inference under the more general small bandwidth asymptotic +regime, Cattaneo et al. (2014a) proposed several “debiased” variance estimators, including the +following +�V = 1 +n +�Σ − +�n +2 +�−1 +h−d−2 �∆, +�∆ = hd+2 +�n +2 +�−1 n−1 +� +i=1 +n +� +j=i+1 +UijU ′ +ij, +and show that �∆ →P ∆ under the same bandwidth sequences (nh2 min(P,S) → 0 and n2hd → ∞) +required for (3.2) to hold. The estimator �∆ is asymptotically equivalent to the debiasing procedure +proposed in Efron and Stein (1981). This result justifies employing the Studentized statistic +�V −1/2(�θ − θ) ⇝ N(0, I) +(3.4) +for more “robust” inferences purposes relative to those constructed using (3.3). +Heuristically, robustness manifests in two distinct ways. First, the underlying Gaussian distribu- +tional approximation holds under weaker bandwidth restrictions and does not require asymptotic +linearity, thereby making the limiting distribution explicitly depend on tuning parameter choices. +Second, the new standard error formula �V is derived from the more general small bandwidth ap- +proximation and make explicit the contribution of terms regarded as higher-order by classical large +sample distributional approximations. +While not reproduced here to conserve space, the in-depth Monte Carlo evidence reported in +Cattaneo et al. (2010, 2014a,b) also showed that employing inference procedures based on (3.4) lead +to large improvements in terms of “robustness” to bandwidth choice and other tuning inputs, when +compared to classical asymptotically linear inference procedures based on (3.3). Theorem 2 below +will study those two feasible statistics and show formally that the distributional approximation +(3.4) has demonstrably smaller higher-order errors than the distributional approximation (3.3). +4 +Higher-order Distribution Theory +We present Edgeworth expansions for scalar standarized and studentized statistics based on �θν −θν +with �θν := ν′�θ and θν := ν′θ, where ν ∈ Rd is a fixed non-random vector. Considering scalar +statistics substantially simplify the developments and proofs without affecting the main conceptual +and theoretical takeaways. The sequence ϑ will first be non-random, thereby allowing us to inves- +tigate the role of classical distributional approximations based on asymptotic linearity vis-`a-vis the +more general distributional approximations based on small bandwidth asymptotics for standarized +8 + +statistics. Then, the sequence ϑ will be taken to be random based on the two alternative variance +estimators introduced in the previous section, thereby allowing us to investigate the role of variance +estimation on the performance of distributional approximations for Studentized statistics. +4.1 +Distributional Approximation +Our first theorem offers a valid Edgeworth expansion for the sampling distribution function +Fϑ(t) := P +� �θν − θν +ϑ +≤ t +� +, +t ∈ R, +with precise characterization of the first three cummulants determining the leading errors in dis- +tributional approximation of the Studentized statistic. Define the following key quantities: +β := 2(−1)P � +[k]=P +µk +k! E +� +g(X) ∂k +∂Xk ν′ ˙f(X) +� +, +σ2 := V[�θν], +κ1 := E[ν′ψ(Z)3], +κ2 := 4E[δ(Z) ˙η(Z)] − 8E[δ(Z)2]θν + 4θ3 +ν, +where δ(Z) := ν′ψ(Z)/2 + θν and η(Z2) = limn→∞ E[δ(Z1)ν′U12|Z2]. +Theorem 1 (Standardized). Suppose Assumptions 1 and 2 hold. If √nhP → 0 and nhd+2 → ∞, +then for any positive non-random sequence ϑ such that ϑ/σ → 1, +sup +t∈R +��Fϑ(t) − Gϑ(t) +�� = O(Rn) + o(n−1/2) +with +Gϑ(t) := Φ(t) − φ(t) +�β +ϑhP + +�σ2 +ϑ2 − 1 +� ++ κ1 + κ2 +6n2ϑ3 (t2 − 1) +� +, +and Rn := nh2P + +� +(log n)3 +nhd+2 +�3/2 ++ hd/3+1 +nhd+2 + +� +hd/9+2/3 +nhd+2 +�3/2 +, where Φ and φ are the c.d.f. and p.d.f. of +a standard Gaussian distribution. Furthermore, if (log n)3 +nhd+2 → 0, then Rn = o +�√nhP + +1 +nhd+2 +� +. +This theorem is proven by verifying the high-level conditions of a result in Appendix A es- +tablishing a valid Edgeworth Expansion for a generic class of U-statistics with n-varying kernels, +which may be of independent theoretical interest. +Specifically, Theorem A.1 and its corollary +A.1 improve on Jing and Wang (2003) by allowing for n-varying kernels under more general con- +dition suitable for the semiparametric problem of interest herein. Theorem 1 also improves on +Nishiyama and Robinson (2000, Theorem 1) in two respects: (i) it allows for a generic standard- +ization scheme ϑ instead of their specific choice +� +ν′Σν/n; and (ii) it presents a valid Edgeworth +expansion with precise error rates with respect to the bandwidth. These improvements enable us +to compare the two different distributional approximations of interest, (3.1) vs. (3.2). +The main conclusion in Theorem 1 follows the expected logic underlying Edgeworth Expansions: +β +ϑhP , σ2 +ϑ2 −1 and κ1+κ2 +6n2ϑ3 capture, respectively, the standardized bias, variance and higher moments of +9 + +the statistic. Inspection of these terms lead to interesting implications for large sample distribution +theory, in particular leading to a sharp contrast between distribution theory based on asymptotic +linear representations vis-`a-vis alternative asymptotics, each with either fixed-bandwidth or leading +asymptotic variance standardization. More specifically, we can consider four distinct standarization +schemes: from first-order asymptotic linear theory (3.1) we have +ϑ2 +AL := V[ν′ ¯L] = 1 +nV[ν′Li] +and +˘ϑ2 +AL := 1 +nν′Σν, +while from small bandwidth distribution theory (3.2) we have +ϑ2 +SB := V[�θν] = σ2 +and +˘ϑ2 +SB := 1 +nν′Σν + +�n +2 +�−1 +h−d−2ν′∆ν. +The standardizations ϑAL and ϑSB correspond to those constructed using the pre-asymptotic variance +of the point estimator, each justified according to the asymptotic regime considered (asymptotic +linear and small bandwidth, respectively). In contrast, the standardizations ˘ϑAL and ˘ϑSB correspond +to employing the leading term only in the large sample approximation of the pre-asymptotic variance +of the point estimator, again keeping only those terms that are justified by the asymptotic regime +considered. That is, ϑAL = ˘ϑAL + o(n−1) and ϑSB = ˘ϑSB + o(n−1) under the assumptions of Theorem +1. For comparison, Nishiyama and Robinson (2000, Theorem 1) used ˘ϑAL. +Employing Theorem 1 we can now compare the different approaches to standardization and +their associated errors generated in the distributional approximation. Firstly, it is easy to see that +employing ˘ϑAL and ˘ϑSB will generate larger distributional approximation errors relative to their pre- +asymptotic counterparts, ϑAL and ϑSB, respectively. See the proof in the appendix for exact rates, +which are not reproduced here to conserve space. The main conceptual message is that one should +always employ variance formulas that capture the full variability of the statistic whenever possible, +as opposed to employing those that capture only the leading variability in large samples. +See +Calonico et al. (2018, 2022) for closely related results in the context of nonparametric kernel-based +density and local polynomial regression estimation and inference. +Secondly, and more importantly for our purposes, Theorem 1 shows that even if the full finite- +sample variance of the point estimator is captured for standardization purposes, it is still crucial to +incorporate the variability of both the linear and quadratic terms. More precisely, setting ϑ = ϑAL +then σ2 +ϑ2 − 1 = O(n−1h−d−2), while setting ϑ = ϑSB implies that σ2 +ϑ2 − 1 = 0. As a consequence, +our first main result shows that employing the pre-asymptotic variance of the statistic, which is +naturally justified by the more general asymptotic distributional approximation (3.2), leads to the +smallest error in the distributional approximation of the sampling distribution of the standardized +statistic. This result thus provides theory-based evidence in favor of employing small bandwidth +asymptotics for kernel-based DWAD methods whenever the goal is to minimize errors of inference +procedures relying on large sample Gaussian approximations. +The methodological implications of our first theoretical result can be illustrated by analyzing the +10 + +coverage error of standardized confidence intervals. According to Theorem 1, for any α ∈ (0, 1), a +100(1 − α)% two-sided confidence interval based on asymptotic linearity satisfy +P +� +θν ∈ +��θν ± Φ1−α/2ϑAL +�� += 1 − α + +KAL +nhd+2 + o +�√nhP + n−1h−d−2 + n−1/2� +, +where Φα = Φ−1(α), and KAL = 2Φ1−α/2φ(1 − α/2)n−1h−d−2(σ2/ϑ2 +AL − 1) = O(1 + h2), with the +exact form of the leading terms described in the appendix. On the other hand, under the conditions +in Theorem 1, a 100(1− α)% two-sided confidence intervals based on small bandwidth asymptotics +satisfy +P +� +θν ∈ +��θν ± Φ1−α/2ϑSB +�� += 1 − α + o +�√nhP + n−1h−d−2 + n−1/2� +, +implying a smaller coverage error distortion in large samples. +The above coverage error comparison is conceptually useful, but it does not directly translate to +practice because the confidence intervals are infeasible. To complement the results in this section, +we consider next the implications of constructing variance estimators and hence study feasible +(Studentized) inference procedures. +4.2 +Variance Estimation +We study the role of Studentization and thus obtain valid Edgeworth expansion for the sampling +distribution functions +FAL(t) := P +� �θν − θν +�ϑAL +≤ t +� +, +�ϑAL := 1 +nν′�Σν +and +FSB(t) := P +� �θν − θν +�ϑSB +≤ t +� +, +�ϑSB := 1 +nν′�Σν − +�n +2 +�−1 +h−d−2ν′ �∆ν. +Crucially, the estimators �Σ and �∆ target the total variability nV[¯L] = V[Li] and +�n +2 +� +hd+2V[ ¯Q] = +hd+2V[Qij], respectively, and not just their leading quantities Σ and ∆. Therefore, in light of the +results reported in the previous section, we do not explicitly consider na¨ıve plug-in estimators of +˘ϑAL and ˘ϑSBA such as +2 +n2 +�n +i=1(ν′[�˙e(Xi) − y�˙f(Xi) − �θ])2 for the former, where �˙e(x) and �˙f(x) are +plug-in nonparametric estimators of ˙e(x) and ˙f(x), respectively. These alternative Studentization +schemes will lead to larger higher-order distributional approximation errors when compared to �ϑAL +and �ϑSB. +Theorem 2 (Studentized). Suppose Assumptions 1 and 2 hold with p ≥ 8. If √nhP → 0 and +nhd+2/(log n)9 → ∞, then +sup +t∈R +��FAL(t) − GAL(t) +�� = o(rn) +with +GAL(t) := Φ(t) − φ(t) +�√nhP β +ν′Σν +− +1 +nhd+2 +ν′∆ν +ν′Σν t − +1 +√n6(ν′Σν)3 +� +κ1(2t2 + 1) + κ2(t2 + 1) +�� +, +11 + +and +sup +t∈R +��FSB(t) − GSB(t) +�� = o(rn) +with +GSB(t) := Φ(t) − φ(t) +�√nhP β +ν′Σν +− +1 +√n6(ν′Σν)3 +� +κ1(2t2 + 1) + κ2(t2 + 1) +�� +, +where rn := √nhP + n−1h−d−2 + n−1/2 +This theorem shows that employing Studentization based on small bandwidth asymptotics offers +demonstrable improvements in terms of distributional approximations for the resulting feasible t- +test. The main practical implication of our second result can again be illustrated by analyzing +the coverage error of Studentized confidence intervals. According to Theorem 2, and as it was +the case for stdentized confidence intervals, a 100(1 − α)% two-sided confidence intervals based on +asymptotic linearity satisfy +P +� +θν ∈ +��θν ± Φ1−α/2 �ϑAL +�� += 1 − α + +1 +nhd+2 2Φ1−α/2φ(1 − α/2)ν′∆ν +ν′Σν + o(rn), +while, under the conditions in Theorem 2, a 100(1 − α)% two-sided confidence intervals based on +small bandwidth asymptotics satisfy +P +� +θν ∈ +��θν ± Φ1−α/2 �ϑSB +�� += 1 − α + o(rn), +implying a smaller coverage error distortion in large samples. This result provides a theoretical +justification to the simulation evidence reported in Cattaneo et al. (2014a,b, 2010) where feasible +confidence intervals based on small bandwidth asymptotics were shown to offer better finite sample +performance in terms of coverage error than their counterparts based classical asymptotic linear +approximations. +5 +Conclusion +Employing Edgeworth expansions, we study the higher-order properties of two alternative first-order +distributional approximations and their associated inference procedures (e.g., confidence intervals) +for the kernel-based DWAD estimator of Powell et al. (1989). We showed that small bandwidth +asymptotics not only give demonstrable better distributional approximations than asymptotic linear +approximations, but also justify employing a variance estimator for Studentization purposes that +also improves the distributional approximation. +The main take away from our results is that +in two-step semiparametric settings and related problems, alternative asymptotic approximations +that capture higher-order terms ignored by classic asymptotic linear approximation can deliver +better distributional approximations and, by implication, better inference procedures with improved +performance in finite samples. +While beyond the scope of this paper, it would be of interest to develop analogous Edgeworth +12 + +expansions for non-linear two-step semiparamtric procedures developed using alternative asymp- +totic approximations and resampling methods (Cattaneo et al., 2013; Cattaneo and Jansson, 2018; +Cattaneo et al., 2019). For the special case of kernel-based DWAD estimators (a linear two-step +kernle-based semiparametric estimator), Nishiyama and Robinson (2005) present results that could +be contrasted with those obtained under under small bandwidth asymptotics (Cattaneo et al., +2014b). We relegate such developments for future research due to the substantial amount of addi- +tional technical work required. +A +Edgeworth Expansion for Second-Order U-Statistic +Consider the sequence of maps (un : Rd × Rd → R, n ∈ N) where u := un is symmetric in terms +of the permutation of its two arguments for every n ∈ N. Given a random sample Z1, . . . , Zn for +n ≥ 2 of the random variable Z taking values on Rd, the object of interest in the second order +U-statistics with an n-varying kernel given by +¯U := +�n +2 +�−1 +n +� +1≤i 0 are non-random. +Theorem A.1. Let the following conditions hold: +(a) E +� +(ℓ1/σℓ)3� += O(1) and E[|q12|]2+δ < ∞, and σℓ > 0 +(b) +σq +√nσℓ → 0 and σ +ϑ → 1. +13 + +(c) lim sup +n→∞ +lim sup +|t|→∞ +|E exp(ιtℓ1/σℓ)| < 1. +Then, supt∈R |F(t) − G(t)| = O(E) + o(n−1/2) where G is the distribution function with character- +istic function +χG(t) := eιtB− t2 +2 + +1 + +9 +� +j=2 +(ιt)j γj + + , +with ι := √−1, +γ2 = 1 +2 +� +σ2 +ϑ2 − 1 +� +, +γ3 = +1 +6ϑ3n2 +� +Eℓ3 +1 + 6Eℓ1ℓ2q12 +� +, +γ4 = +1 +4ϑ2 +� +σ2 +ϑ2 − 1 +� �n +2 +�−1 +σ2 +q +γ5 = +1 +12n2ϑ5 +��n +2 +�−1 +(Eℓ3 +1)σ2 +q + 6ϑ2 � σ2 +ℓ +ϑ2n − 1 +� +Eℓ1ℓ2q12 +� +γ6 = +1 +6ϑ6n4 +� +(Eℓ3 +1)Eℓ1ℓ2q12 + 12 +�n +2 +�−2�n +4 +� +[Eℓ1ℓ2q12]2 +� +, +γ7 = 0, +γ8 = +1 +4ϑ6n4 +� σ2 +ℓ +ϑ2n − 1 +� �n +2 +�−2�n +4 +� +[Eℓ1ℓ2q12]2 , +γ9 = +1 +12ϑ9n6 +�n +2 +�−2�n +4 +� +Eℓ3 +1 [Eℓ1ℓ2q12]2 , +and +E := +� +log n +n3/2σℓ +�2+δ +Π2+δ(n) + +� +(log n) +4+δ +2+δ σ2 +q +nσ2 +ℓ +�2+δ +2 ++ +� +log n +nσℓ +�2+δ +Π2+δ(log n) ++ +1 +σ4 +ℓ nE|ℓ2 +1ℓ2q12| + +1 +σ5 +ℓ n3/2 E|ℓ2 +1ℓ2 +2q12| + +1 +σ2 +ℓ n2 E|ℓ1q2 +12| + +1 +σ5 +ℓ n3/2 E|ℓ1ℓ2ℓ3q13q23| ++ +1 +σ7 +ℓ n3/2 (Eℓ1ℓ2q12)(E|ℓ2 +1ℓ2q12|) + +1 +σ8 +ℓ n2 (Eℓ1ℓ2q12)(E|ℓ2 +1ℓ2 +2q12|), +with Π2+δ(m) := E| �[m]−1 +i=1 +�n +j=i+1 qij|2+δ for real m > 1 and [·] denoting the floor operator. +Corollary A.1. Let the assumptions of Theorem A.1 hold. If B → 0, then +sup +t∈R +|F(t) − G(t)| = O +� +B2 + E +� ++ o(n−1/2), +with +χG(t) := e− t2 +2 + +1 + Bιt + +9 +� +j=2 +� ιt +ϑ +�j γj + + . +Remark A.1. Lemma A.2 below gives the following simpler bound +Π2+δ(m) ≲ (nmσ2 +q)(2+δ)/2 ∨ mn1+δ/2E +� +(E(q2 +12|Z1))1+δ/2� +∨ nmE|q12|2+δ, +where ≲ denotes bounded up to a fixed constant, and a ∨ b = max{a, b}. +⌟ +14 + +Remark A.2. We can invert the characteristic function above to obtain a close form for F using +the fact that for non-negative integer k, +1 +2π +� +R exp (−ιtx − t2/2)(ιt)kdt = Hk(x)φ(x), where Hk(x) is +the k-th order Hermite polynomial (e.g., H0(k) = 1, H1(x) = x, H2(x) = x2 − 1, H3(x) = x3 − 3x). +Therefore, the distribution function of χG(t) from Corollary A.1 is +G(x) = Φ(x) − φ(x) + + +9 +� +j=1 +γjHj−1(x) + + . +⌟ +Remark A.3. To compare to Jing and Wang (2003), let u(·, ·) not dependent on n, θ = Eu(Z1, Z2), +ϑ2 = σ2 +ℓ /n, and E|q12|2+δ bounded. Then, E = o(n−1/2) and χG(t) = exp(−t2/2) +� +1 − ικ3t3 +6√n +� ++ +o(n−1/2), giving +G(x) = Φ(x) − φ(x) +1 +6√n +� +E +� +ℓi +σℓ +�3 ++ 6Eℓ1ℓ2q12 +σ3 +ℓ +� +(x2 − 1). +⌟ +A.1 +Proof of Theorem A.1 +Let χF denote the characteristic function F and g be the density of G. Using the well-known +“smoothing inequality” (Bhattacharya and Rao, 1976; Hall, 1992), we write +ρ(F, G) ≤ 1 +π +�� υ +−υ +���� +χF (t) − χG(t) +t +���� dt + 24 supx∈R |g(x)| +υ +� +, +υ > 0 +where ρ is the Kolmogorov distance. We set v = √n log n and split the range of integration into +“low” frequencies and “high” frequencies. By the triangle inequality, +ρ(F, G) ≲ I1 + I2 + I3 + I4 + +1 +√n log n, +(A.4) +where +I1 := +� +|t|≤log n +���� +χF(t) − χG(t) +t +���� dt, +I2 := +� +log n<|t|≤c√n +���� +χF(t) +t +���� dt, +I3 := +� +c√n<|t|≤√n log n +���� +χF (t) +t +���� dt, +I4 := +� +|t|>log n +���� +χG(t) +t +���� dt; +Moreover, c > 0 is a fixed constant to be specified later. +We now bound each of these integrals in turn. We use extensively the fact hat +������ +exp(ιx) − +2 +� +j=0 +(ιx)j +j! +������ +≤ |x|2+δ +, +∀δ ∈ [0, 1]. +(A.5) +15 + +Also, define for ψ(t) := E exp(ιtℓ1) for t ∈ R where σℓ is positive by Assumption (a). +Bound for I1 +We start by decomposing χF(t) = E exp +� +ιt( ¯U−θ +ϑ ) +� += exp(ιtb)χL+Q(t) where χL+Q(t) := E exp(ιtL) exp(ιtQ). +Use (A.5) to expand the second exponential in χL+Q(t) to write +χL+Q(t) = E exp(ιtL)[1 + ιtQ − 1 +2(tQ)2 + O((tQ)2+δ)]. +(A.6) +Since ℓ1, . . . , ℓn is a i.i.d sequence (for a given n ≥ 2), the first term in (A.6) can be written as +E exp(ιtL) = E exp +� +ιt +ϑn +n +� +i=1 +ℓi +� += E +n +� +i=1 +exp +�ιtℓi +ϑn +� += +n +� +i=1 +E exp +�ιtℓi +ϑn +� += ψn +� t +ϑn +� +. +For the second term in (A.6), we have +E exp(ιtL)ιtQ = ιt +ϑ +�n +2 +�−1 � +i 0 +ψn +� +t +σℓ +√n +� += exp +� +− 1 +2t2� +� +1 − ιt3 +6√nE +� ℓ1 +σℓ +�3� ++ o +�(|t|3 + t6) +√n +exp(−t2/4) +� +. +Let αk := σℓ +√n−k +ϑn +for k ∈ {0, 2, 3, 4}. Since αk ≍ 1 by assumption, where ≍ denotes proportional +up to a fixed finite positive constant, we obtain +ψn−k +� t +ϑn +� += ψn−k +� +αkt +σℓ +√ +n − k +� += exp +� +− 1 +2 (αkt)2� � +1 − ι(αkt)3 +6 +√ +n − kE +�ℓ1 +σℓ +�3� ++ o +�(|t|3 + t6) +√n +exp(−(αkt)2/4) +� +. +A first-order Taylor expansion yields +exp(−(αkt)2/2) = exp(−t2/2) +� +1 − (α2 +k − 1)t2 +2 + O(p(t)(α2 +k − 1)2) +� +, +and plugging it back in the previous expression, we have +ψn−k +� t +ϑn +� += exp +� +− t2 +2 +� � +1 − (α2 +k − 1)t2 +2 − ι(αkt)3 +6 +√ +n − kE +�ℓ1 +σℓ +�3� ++ O +� +(α2 +k − 1)2p(t) exp (−t2/2) +� ++ o +�(|t|3 + t6) +√n +exp(−(αkt)2/4) +� +. +Use the fact that α2 +k = α2 +0(1 − k/n) = +� +σℓ +ϑ√n +�2 ++ O(n−1) to conclude that +ψn−k +� t +ϑn +� += exp +� +− t2 +2 +� � +1 − +� σ2 +ℓ +ϑ2n − 1 +� t2 +2 − +ιt3 +6ϑ3n2 Eℓ3 +1 +� ++ O +�� σ2 +ℓ +ϑ2n − 1 +�2 +p(t) exp (−t2/2) +� ++ o +�(|t|3 + t6) +√n +exp(−t2/4) +� +, +(A.9) +for |t| ≤ δ∗√n. +18 + +Combine (A.8) and (A.9) to conclude that, for |t| ≤ δ∗√n, +χL+Q(t) = exp +� +− t2 +2 +� � +1 − +� σ2 +ℓ +ϑ2n − 1 +� t2 +2 − +ιt3 +6ϑ3n2 Eℓ3 +1 +� +× +� +1 + (it)2 +2ϑ2 +�n +2 +�−1 +σ2 +q + (ιt)3 +ϑ3n2 Eℓ1ℓ2q12 + 1 +2 +(ιt)6 +ϑ6n4 +�n +2 +�−2�n +4 +� +[Eℓ1ℓ2q12]2 +� ++ O +� +exp +� +− t2 +2 +� � +1 + +� σ2 +ℓ +ϑ2n − 1 +� +t2 + +� σ2 +ℓ +ϑ2n − 1 +�2 +p(|t|) + |t|3 +√n +� +R(t) +� ++ o +� +exp +� +− t2 +4 +� � +|t|3+t6 +√n +� +R(t) +� ++ O +�� +|t| +ϑn2 +�2+δ +Π2+δ(n) +� +, +(A.10) +where +R(t) := +t4 +ϑ4n3 E|ℓ2 +1ℓ2q12| + +|t|5 +ϑ5n4 E|ℓ2 +1ℓ2 +2q12| + +|t|3 +ϑ2n3 E|ℓ1q2 +12| + +|t|5 +ϑ5n4E|ℓ1ℓ2ℓ3q13q23| ++ |t|7 +ϑ7n5 (Eℓ1ℓ2q12)(E|ℓ2 +1ℓ2q12|) + +|t|8 +ϑ8n6 (Eℓ1ℓ2q12)(E|ℓ2 +1ℓ2 +2q12|). +After some rearrangement, the first term in (A.10) becomes +�χL+Q(t) := exp +� +− t2 +2 +� +P(t) = exp +� +− t2 +2 +� + +1 + +9 +� +j=2 +� ιt +ϑ +�j γj + + , +where +P(t) := 1 + (ιt)2 +2 +� +σ2 +ϑ2 − 1 +� ++ +(ιt)3 +6ϑ3n2 +� +Eℓ3 +1 + 6Eℓ1ℓ2q12 +� ++ (ιt)4 +4ϑ2 +� +σ2 +ϑ2 − 1 +� �n +2 +�−1 +σ2 +q ++ +(ιt)5 +12ϑ5n2 +��n +2 +�−1 +(Eℓ3 +1)σ2 +q + 6ϑ2 � σ2 +ℓ +ϑ2n − 1 +� +Eℓ1ℓ2q12 +� ++ +(ιt)6 +6ϑ6n4 +� +(Eℓ3 +1)Eℓ1ℓ2q12 + 12 +�n +2 +�−2�n +4 +� +[Eℓ1ℓ2q12]2 +� ++ 1 +4 +(ιt)8 +ϑ6n4 +� σ2 +ℓ +ϑ2n − 1 +� �n +2 +�−2�n +4 +� +[Eℓ1ℓ2q12]2 ++ 1 +12 +(ιt)9 +ϑ9n6 +�n +2 +�−2�n +4 +� +Eℓ3 +1 [Eℓ1ℓ2q12]2 . +Since �χL+Q(t) = exp(−ιtb)χG(t), we have under Assumption (a) and (b) +|χF (t) − χG(t)| = O +� +exp +� +− t2 +4 +� +R(t) + +� +|t| +ϑn2 +�2+δ +Π2+δ(n) +� +. +19 + +Therefore, +I1 = O +�� +|t|≤log n +|t|−1 exp(−t2/4)R(t)dt + Π2+δ(n) +(ϑn2)2+δ +� +|t|≤log n +|t|1+δdt +� += O +� +R(1) + +�log n +ϑn2 +�2+δ +Π2+δ(n) +� +. +Bound for I2 +For 1 ≤ m < n, define Qm := 1 +ϑ +�n +2 +�−1 �m +i=1 +�n +j=i+1 qij. Using (A.5) we can write +|χF (t)| = |χL+Q(t)| ≤ +�����E exp(ιt(L + Q − Qm)) +2 +� +k=0 +(itQm)k +k! +) +����� + |t|2+δE|Qm|2+δ. +Exploiting the fact that Q − Qm is only a function of Xm+1, . . . , Xn, we have +|E exp(ιt(L + Q − Qm)| ≤ |ψ +� t +ϑn +� +|m. +For the second term +|E exp(ιt(T − Qm)Qm| = 1 +ϑ +�n +2 +�−1 +������ +m +� +i=1 +n +� +j=i+1 +E exp(ιt(L + Q − Qm)qij +������ +≲ +1 +ϑn2 |ψ +� t +ϑn +� +|m−2mnE|q12|. +Similarly, using the fact that +� +ϑ +�n +2 +� +Qm +�2 += +m +� +i=1 +n +� +j=i+1 +q2 +ij, + +m +� +i=1 +n +� +j=i+1 +m +� +k=1, +k̸=i,j +qijqjk + +m +� +i=1 +n +� +j=i+1 +m +� +k=1, +k̸=i,j +n +� +l=k+1, +l̸=i,j +qijqkl, +we conclude for k ∈ {0, 1, 2}, +|E exp(ιt(T − Qm))Qk +m| ≲ |ψ +� t +ϑn +� +|m−2k +� +mn +ϑ +�n +2 +�−1�k +E|q12|k. +Finally, using the fact that ϑ = O(σℓ/√n) by Assumption (b) and combining the last displays, +|χF (t)| ≲ +2 +� +k=0 +�|t|m +√n +�k +|ψ +� t +ϑn +� +|m−2kE +���q12 +σℓ +��� +k ++ |t|2+δE|Qm|2+δ, +(A.11) +for 1 ≤ m < n and δ ∈ [0, 1]. +20 + +By the triangle inequality followed by (A.5), we have +|ψ +� t +ϑn +� +| − |1 − +t2 +2(ϑn)2 σ2 +ℓ | ≤ |ψ +� t +ϑn +� +− (1 − +t2 +2(ϑn)2 σ2 +ℓ)| ≤ 1 +6 +|t|3 +(ϑn)3 E|ℓ1|3. +For |t| ≤ +√ +2ϑn +σℓ +we have |1 − +t2 +2(ϑn)2 σ2 +ℓ| = 1 − +t2 +2(ϑn)2 σ2 +ℓ hence +|ψ +� t +ϑn +� +| ≤ 1 − +t2 +2(ϑn)2 σ2 +ℓ + 1 +6 +|t|3 +(ϑn)3 E|ℓ1|3; +|t| ≤ +√ +2ϑn +σℓ . +Assumption (b) together with (A.2) implies that +σℓ +√nϑ → 1 as n → ∞. Then, we can find a N1 ∈ N +such that +� +5/6 ≤ +σℓ +√nϑ ≤ (6/5)1/3 for n ≥ N1. Also, Assumption (a) implies the existence of a +constant C > 0 and N2 ∈ N such that E|ℓ1/σℓ|3 ≤ C for n ≥ N2. Then, for |t| ≤ c√n where +c := ( +√ +2/(6/5)1/3) ∧ (5/(12C)) and n ≥ N0 := N1 ∨ N2, we have +|ψ +� t +ϑn +� +| ≤ 1 − t2 +n +� +1 +2 +� σℓ +ϑ√n +�2 +− |t|E|ℓ1/σℓ|3 +6√n +� σℓ +ϑ√n +�3� +≤ 1 − t2 +3n ≤ exp(− t2 +3n). +(A.12) +For log n < |t| ≤ c√n, set m = [15n log n +t2 +] + 1 = O(n), then plug in (A.12) to conclude that +|ψ +� t +ϑn +� +|m−2k ≲ exp(− t2m +3n ) ≲ n−5. Combining this last bound with (A.11), we obtain +|χF (t)| ≲ +2 +� +k=0 +|t|k +n5−k E +���q12 +σℓ +��� +k ++ |t|2+δE|Qm|2+δ, +(A.13) +for |t| ≤ c√n and n ≥ N0. Then, +I2 ≲ +2 +� +k=0 +1 +n5−k−k/2 +E|q12|k +σk +ℓ ++ +�√n log n +n +�2+δ � +σq +σℓ +�2+δ +log n +≲ 1 +n +σ2 +q +nσ2 +ℓ ++ log n +� +(log n)σ2 +q +nσ2 +ℓ +� 2+δ +2 +. +Therefore, since +σ2 +q +nσ2 +ℓ = o(1) by Assumption (b), we conclude +I2 = o(n−1) + O + + + + + +(log n) +4+δ +2+δ σ2 +q +nσ2 +ℓ + + +2+δ +2 + + + + . +Bound for I3 and I4 +Under Assumption (c), for sufficient large n, we may find a b > 0 such that for |t| > c√n +|ψ +� t +ϑn +� +| ≤ 1 − b < exp(−b), +21 + +where c > 0 is define just before (A.12). Set m = [4 log n +b +]+1, then nm ≲ n log n and |ψ +� t +ϑn +�m−s | ≲ +n−4 for sufficient large n and s ∈ {1, 3, 4, 5}. Use these upper bounds on (A.11) to conclude that +|χF (t)| ≲ n−4 � +1 + |t| log nE|q12/σℓ| + t2(log n)2 σ2 +q +σ2 +ℓ +� ++ |t|2+δ(n log n)1+δ/2E|q12|2+δ, +(A.14) +for sufficient large n and |t| > c√n. Then, +I3 = o(n−1/2) + O +� +(n log n)1+δ/2E|q12|2+δ +� +c√n≤|t|≤√n log n +|t|1+δdt +� += o(n−1/2) + O +��log n +n +�2+δ +Π2+δ(log n) +� +. +Finally, +I4 = +� +|t|>log n +|t|−1 exp(− t2 +2 ) +������ +1 + +9 +� +j=2 +�it +ϑ +�j γj +������ +dt +≤ C +� +t>log n +t−1 exp(− t2 +2 )dt + +9 +� +j=2 +|γj| +ϑj +� +t>log n +tj−1 exp(− t2 +2 )dt, +where the first integral is o(n−1) and the second is o(1). Therefore, +I4 = o + +n−1 + +9 +� +j=2 +|γj| +ϑj + + . +The proof is complete. +A.2 +Auxiliary Lemmas +Lemma A.1. Let n ≥ 2, 1 ≤ l ≤ m < n and p ≥ 2 then +E +������ +m +� +i=l +n +� +j=i+1 +qij +������ +p +≤ Cp(n − l)p/2 max +l C +rn +(log n)2 +� +, +R2 := P +������ +�θν − θν +ϑ +����� > C log n +� +, +24 + +R3 := P +������ +�ϑ − ϑ +ϑ +B +����� > C +√nhP +log n +� +, +with C denoting a generic constant, which can take different values in different places. The term +E will give the Edgeworth expansion upon setting �ϑ and ϑ appropriately, while the terms R1–R3 +capture higher-order remainders. +Variance Estimators +The estimators �ϑ2 +AL and �ϑ2 +SB are linear combinations of U-statistics as follows: +�ϑ2 +AL = 1 +nν′�Σν = 2 +�n +2 +�−1 +¯W1 + 4 +n +n − 2 +n − 1 +¯W2 − 4 +n +�θ2 +ν +and +�n +2 +�−1 +h−d−2ν′ �∆ν = +�n +2 +�−1 +¯W1 +with +�θν = +�n +2 +�−1 � +i +Crn +n2(log n)2 +� ++ o(rn) ≤ Cn4(log n)4r−2 +n E +� +(�ϑ2 +c − ϑ2 +c)4� ++ o(rn) += n5(log n)4O(n−6 + n−8h−d−8) + o(rn) = o(rn). +Using Theorem A.1 and Corollary A.1, it follows that a valid Edgeworth expansion holds for +�θν−θν +ϑc +, which implies that +R2 = 1 − P +� �θν − θν +ϑ +≤ C log n +� ++ P +� �θν − θν +ϑ +≤ −C log n +� += 1 − Φ(C log(n)) + Φ(−C log(n)) + C φ(log n) log n +nhd+2 ++ o(rn) = o(rn), +by properties of the Gaussian distribution. +Finally, Markov inequality implies +R3 ≤ Cn(log n)2E +� +(�ϑ2 +c − ϑ2 +c)2� += n(log n)2O(n−3 + n−4h−d−4) = o(rn). +26 + +Therefore, R1 + R2 + R3 = o(rn). +Expansion for E +We consider E = ρ( ˘Fc, Gc), where +˘Fc(t) := P +�� +1 − +�ϑ2 +c − ϑ2 +c +2ϑ2c +��ν′ ¯L +ϑc ++ ν′ ¯Q +ϑc +� ++ Bc ≤ t +� +, +Bc := E[�θν] − θν +ϑc +, +and +Gc(t) := Φ(t) − φ(t) +�√nhP β +ν′Σν +− 1 − c +nhd+2 +ν′∆ν +ν′Σν t − +1 +√n6(ν′Σν)3 +� +κ1(2t2 + 1) + κ2(t2 + 1) +�� +. +Recall that, in particular, c = 0 corresponds to AL implementation and c = 1 corresponds to SB +implementation (i.e., GAL(t) = G0(t) and GSB(t) = G1(t)). Then, applying the smoothing inequality +as in Theorem A.1, +ρ( ˘Fc, Gc) ≲ ˘I1 + ˘I2 + ˘I3 + ˘I4 + +1 +√n log n, +where +˘I1 := +� +|t|≤log n +���� +χ ˘Fc(t) − χGc(t) +t +���� dt, +˘I2 := +� +log n<|t|≤c√n +���� +χ ˘Fc(t) +t +���� dt, +˘I3 := +� +c√n<|t|≤√n log n +���� +χ ˘Fc(t) +t +���� dt, +˘I4 := +� +|t|>log n +���� +χGc(t) +t +���� dt. +The last three integrals above can be upper bounded following the same arguments used in the +proof of Theorem A.1 to conclude that ˘I2 + ˘I3 + ˘I4 = o(√nhP + n−1h−d−2 + n−1/2). The first +integral, ˘I1, is analyzed by expanding χ ˘Fc(t) by generalizing the proof of Theorem A.1 to account +for the contribution from Studentization to the sampling distribution of the linearized version of +the statistic ( ˘Fc). +First, by (A.5) we write +χ ˘Fc(t) = exp(ιtBc)E exp(ιt�Uc) = +� +1 + ιtBc + O(t2B2 +c ) +� +E exp(ιt�Uc), +(C.1) +where +�Uc = +� +1 − +�ϑ2 +c − ϑ2 +c +2ϑ2c +� �ν′ ¯L +ϑc ++ ν′ ¯Q +ϑc +� +From (C.8) below, we have +− +�ϑ2 +c − ϑ2 +c +2ϑ2c += Hc + Tc +(C.2) +27 + +with +Hc := − +�n +2 +�−1 1 − c +2ϑ2c +E[q2 +12] − +1 +2nϑ2c +1 +n +n +� +i=1 +�� +ℓ2 +i − E[ℓ2 +i ] +� ++ 4E[ℓiqij|Zi] +� +− +2 +nϑ2c +�n +2 +�−1 � +i +AEB, line AO, and line +BO. When the control point Pi,p is inside the polygon region, +we draw a red line through the control point Pi,p perpendicular +to the line AC intersecting at point D. The distance di to the +safe area (outside the collision region) can be computed as: +∆di = ||D − O +′||2 − ||Pi,p − O +′||2. +(10) +On the other hand, when the control point Pi,c is inside the +circular region, the distance di to the safe area is: +∆di = r − ||Pi,c − O0||2. +(11) +For the control points Pi,out that are outside both polygon and +circular regions, we set the distance di to the safe area to zero. +So, with the distance to the safe area, we can use the following +equation to compute the final dynamic collision cost: +Cdynamic = +� +i +� +max(∆di, 0) +�3 +. +(12) +For both static and dynamic collision costs, the gradients can +be computed using the chain rule with Eqn. 9 and Eqn.12. +D. Inspection and 3D Reconstruction +After finishing the entire inspection task, the data post- +processing module applies the Structure-from-Motion (SfM) +to reconstruct the 3D shape of the inspection target from +the collected target images. When the robot has reached +the inspection target, it first explores the local area until +having enough map information about the target. Then, in +our implementation, the robot generates a zigzag pattern path + +Fig. 4. Illustration of the collision cost in our B-spline optimization. (a) The +static collision cost is calculated using the proposed circle-based guide points +(red dots). (b) The dynamic collision cost is obtained by the receding horizon +distance field, which considers the future predictions of the obstacle positions. +fully covering the target wall and collects the color images +during the flight. Our SfM pipeline for reconstruction is based +on COLMAP [29]. The algorithm first extracts the features +of each image using a numerical descriptor. Since our input +images are from the streaming of an RGB camera, the second +step utilizes sequential matching to find the correspondence in +different images. Finally, from an initial corresponding image +pair, the algorithm incrementally reconstructs the 3D shape of +the inspection target by triangulating new points. +V. RESULT AND DISCUSSION +A. Implementation Details +We conduct simulation experiments and physical flight tests +in dynamic tunnel environments to evaluate the proposed +method’s performance. The simulation environments are based +on ROS and Gazebo. For the physical experiments, we visited +a tunnel under construction in Japan and applied our cus- +tomized quadcopter (Fig. 5) to test the proposed framework. +The quadcopter is equipped with an Intel RealSense D435i +stereo camera, a PX4-based flight controller, and an NVIDIA +Jetson Xavier NX onboard computer. The weight is ∼1.5kg +with a 15-minute flight duration. We adopt the visual-inertial +odometry (VIO) algorithm [30] for robot state estimation. All +of the perception and planning computations are performed +within the onboard computer. The color images are collected +during the inspection stage with the RealSense D435i camera, +and the data post-processing for 3D reconstruction is com- +pleted using the desktop with an NVIDIA RTX 3080 GPU. +B. Evaluation of Navigation and Obstacle Avoidance +The navigation and obstacle avoidance in the forward task +(i.e., approaching the tunnel end) is the most challenging and +time-consuming part of the entire inspection process since the +environment is cluttered and unknown. So, to evaluate the +performance of forward navigation and obstacle avoidance, we +prepared 5 simulation environments containing different static +and dynamic obstacles, with one example environment shown +Fig. 5. The customized autonomous quadcopter for inspection experiments. +Fig. 6. Illustration of an example simulation tunnel environment in Gazebo. +In the forward task, the robot needs to navigate from the tunnel start (left +side) to the tunnel end (right side) and avoid static and dynamic obstacles. +in Fig. 6. For benchmarking, we select the sampling-based +planning methods (SBP) [1][5] and the dynamic exploration +planning (DEP) method [4] with modifications to the tunnel +environments. Besides, we also include our method without +using the dynamic map (mentioned in Sec. IV-B) to compare +the obstacle avoidance performance. In each experiment, we +let the robot navigate from the start of the tunnel to the end +of the tunnel. We run 10 experiments in each environment +of different obstacles and record the average navigation time, +the average replanning time for dynamic obstacle avoidance, +and the collision rate over all experiments. Note that we set +the navigation time and replanning time of the sampling-based +planning methods (SBP) [1][5] to 100% for comparison. The +collision rate is calculated by the number of experiments with +collisions divided by the total number of experiments. +From the results in Table I, one can see that our method +has the second least navigation time, which is 81.69% of the +sampling-based planning (SBP) method, and takes almost the +same amount of time as its non-dynamic-map version. The +dynamic exploration planning (DEP) method uses less time +than the sampling-based method and longer time than our +method. From our observations, both the SBP and the DEP +generate their trajectories inside the explored regions, which +is over-conservative, leading to more stop-and-go behavior. On +the contrary, since our planner adopts a hierarchical scheme, +the task planner first tries using the more aggressive local +planner for obstacle avoidance by planning in the unknown +regions and only applies the conservative exploration planner +when the local planning fails. This task-switching behavior +hugely reduces the navigation time. For the replanning time, +our method takes only 1.16% of the time compared to the +SBP and significantly less than the DEP. This huge difference +in the replanning speed is mainly due to our computationally +lightweight gradient-based trajectory optimization and the long + +Tunnel Start +Static Obstacle +Tunnel End +Robot +Dynamic Obstacle +Inspection Targetcomputation time in the information gain evaluation of the +SBP and the DEP. For the collision rate, it is shown that our +method has no collision among all experiment runs, and both +the SBP and our method without the dynamic map have a high +collision rate (around 30%). The DEP has a lower collision +rate than the SBP since it utilizes an incremental roadmap for +faster dynamic obstacle avoidance but still has more collisions +than our method. Comparing our method with and without the +dynamic map shows that the dynamic map version has a much +lower collision rate by using dynamic obstacle information. +TABLE I +THE BENCHMARK OF THE NAVIGATION TIME, THE REPLANNING TIME, +AND THE COLLISION RATE BY RUNNING 50 SIMULATION EXPERIMENTS. +Methods +Nav. Time +Replan. Time +Collision Rate +SBP [1][5] +100 ± 0% +100% +30.00% +DEP [4] +92.80 ± 3.01% +54.30% +24.00% +Ours w/o DM +81.06 ± 4.40% +1.20% +32.00% +Ours +81.69 ± 3.66% +1.16% +0.00% +C. Evaluation of Dynamic Obstacle Tracking +We measure the average tracking errors in positions, ve- +locities, and obstacle sizes shown in Table II to evaluate the +dynamic obstacle detection and tracking performance. The +ground truth states of the obstacles can be easily obtained +in the simulation experiments, and we apply the OptiTrack +motion capture system in the physical tests to obtain the +ground truth states. We let two persons walk within the motion +capture area, compare the tracking results from the robot +and the motion capture system, and use the average value +differences as tracking errors. From Table II, one can see that +the position errors are 0.09m and 0.19m in simulation and +physical tests, respectively. The position errors in the physical +tests are larger than in simulation tests due to the image’s +noises from the depth camera. Similarly, the camera noises +also make the velocity errors in physical tests greater than the +simulations’. The size errors are similar in both simulation and +physical tests. In the experiments, to account for the tracking +errors in the positions, velocities, and sizes, we increase the +safety distance to obstacles by a self-defined size r, and our +experiment results prove that our dynamic obstacle tracking +system can let successfully avoid moving obstacles. +TABLE II +MEASUREMENT OF THE DETECTION AND TRACKING ERRORS. +Errors +Simulation Tests +Physical Tests +Position Error (m) +0.09 +0.19 +Velocity Error (m/s) +0.10 +0.21 +Size Error (m) +0.25 +0.25 +D. Physical Flight Tests +To evaluate and verify the proposed framework, we ran +flight tests in a tunnel under construction in Japan, shown in +Fig. 1 and 7. In each flight test, the robot starts at 20 meters +Fig. 7. The physical inspection flight test in a tunnel under construction in +Japan. The bottom shows the Rviz of the obstacles and the trajectory. +in front of the tunnel excavation front and navigates toward +the inspection area. Note that there are static and dynamic +obstacles (i.e., walking workers) on the robot’s way to its target +location shown at the top of Fig. 7. The corresponding Rviz +visualization is shown at the bottom of Fig. 7, and one can +see that the robot can generate a collision-free trajectory for +navigation. After reaching the inspection area, the robot will +follow the zigzag path to inspect the tunnel excavation front +shown in Fig. 1d and collect RGB images for further 3D re- +construction. During the navigation period, the robot’s velocity +is maintained at 1.0m/s. The results show that our framework +can complete the entire inspection task autonomously. +E. Evaluation of 3D Reconstruction +The final output of our framework is the 3D shape of +the tunnel excavation front shown in Fig. 8. To obtain the +results, we run the SfM-based reconstruction mentioned in +Sec. IV-D with 294 color images of 640x480 resolution. The +total processing time is 30 minutes using an NVIDIA RTX +3080 GPU, and the minimum number of images required for +this experiment is 60 images which take only 5 minutes for +reconstruction. In Fig. 8, the first row shows the reconstruction +results from different views, and the second row visualizes +the error heatmap from the comparison with the ground truth +model. Note that we use the Topcon laser scanner to obtain +the ground truth model of the inspection target. The red +and blue portion of the heatmap represents the high and +low reconstruction error values. The average error of the +reconstruction model is 5.38cm with a standard deviation of +7.96cm. The third row shows the heatmap comparison with +the tunnel CAD model, the designed shape for the tunnel. +From the heatmap, the workers can identify the yellow and red +regions as the locations for concrete spraying and excavation. +VI. CONCLUSION AND FUTURE WORK +This paper presents a vision-based autonomous UAV in- +spection framework for tunnel environments. The proposed +framework adopts a hierarchical planning scheme to solve +the complicated inspection problem using different planning +layers. Our depth-based 3D dynamic map can represent static + +Dynamic Obstacle +Trajectory +Static Obstacle +RobotFig. 8. +The 3D reconstruction results of the excavation front of the tunnel +under construction in Japan. The first row shows the 3D reconstruction model +from different views. The second row visualizes the error heatmap obtained +from the comparison of the laser-scanned ground truth. The third row presents +the heatmap comparison of the reconstruction model with the CAD model. +obstacles and track dynamic obstacles simultaneously. The +experiment results prove that our framework can make the +quadcopter safely navigate toward the inspection target to +perform the inspection and return to the origin. The final +3D reconstruction results obtained from our SfM-based data +post-processing pipeline have a low error compared to the +ground truth. For future work, we want to apply learning-based +methods to classify dynamic obstacles for better performance. +VII. ACKNOWLEDGEMENT +The authors would like to thank TOPRISE CO., LTD and +Obayashi Corporation for their financial support in this work +and for providing a tunnel construction site for the flight tests. +REFERENCES +[1] A. Bircher, M. Kamel, K. Alexis, H. Oleynikova, and R. Siegwart, +“Receding horizon ”next-best-view” planner for 3d exploration,” in 2016 +IEEE International Conference on Robotics and Automation (ICRA), +2016, pp. 1462–1468. +[2] M. Selin, M. Tiger, D. Duberg, F. Heintz, and P. Jensfelt, “Efficient +autonomous exploration planning of large-scale 3-d environments,” +IEEE Robotics and Automation Letters, vol. 4, no. 2, pp. 1699–1706, +2019. +[3] L. Schmid, M. Pantic, R. Khanna, L. Ott, R. Siegwart, and J. Nieto, “An +efficient sampling-based method for online informative path planning in +unknown environments,” IEEE Robotics and Automation Letters, vol. 5, +no. 2, pp. 1500–1507, 2020. +[4] Z. Xu, D. Deng, and K. Shimada, “Autonomous uav exploration +of dynamic environments via incremental sampling and probabilistic +roadmap,” IEEE Robotics and Automation Letters, vol. 6, no. 2, pp. +2729–2736, 2021. +[5] B. Bendris and J. Cayero Becerra, “Design and experimental evaluation +of an aerial solution for visual inspection of tunnel-like infrastructures,” +Remote Sensing, vol. 14, no. 1, p. 195, 2022. +[6] H. Oleynikova, D. Honegger, and M. Pollefeys, “Reactive avoidance +using embedded stereo vision for mav flight,” in 2015 IEEE Interna- +tional Conference on Robotics and Automation (ICRA). +IEEE, 2015, +pp. 50–56. +[7] J. Lin, H. Zhu, and J. Alonso-Mora, “Robust vision-based obstacle +avoidance for micro aerial vehicles in dynamic environments,” in 2020 +IEEE International Conference on Robotics and Automation (ICRA). +IEEE, 2020, pp. 2682–2688. +[8] Z. Xu, Y. Xiu, X. Zhan, B. Chen, and K. Shimada, “Vision-aided +uav navigation and dynamic obstacle avoidance using gradient-based b- +spline trajectory optimization,” arXiv preprint arXiv:2209.07003, 2022. +[9] P. Shanthakumar, K. Yu, M. Singh, J. Orevillo, E. Bianchi, M. Heb- +don, and P. Tokekar, “View planning and navigation algorithms for +autonomous bridge inspection with uavs,” in International Symposium +on Experimental Robotics. +Springer, 2020, pp. 201–210. +[10] N. Bolourian and A. Hammad, “Lidar-equipped uav path planning con- +sidering potential locations of defects for bridge inspection,” Automation +in Construction, vol. 117, p. 103250, 2020. +[11] Y. Tan, S. Li, H. Liu, P. Chen, and Z. Zhou, “Automatic inspection data +collection of building surface based on bim and uav,” Automation in +Construction, vol. 131, p. 103881, 2021. +[12] T. Elmokadem, “A 3d reactive navigation method for uavs in unknown +tunnel-like environments,” in 2020 Australian and New Zealand Control +Conference (ANZCC). +IEEE, 2020, pp. 119–124. +[13] T. Elmokadem and A. V. Savkin, “A method for autonomous collision- +free navigation of a quadrotor uav in unknown tunnel-like environ- +ments,” Robotica, vol. 40, no. 4, pp. 835–861, 2022. +[14] R. S. Pahwa, K. Y. Chan, J. Bai, V. B. Saputra, M. N. Do, and +S. Foong, “Dense 3d reconstruction for visual tunnel inspection using +unmanned aerial vehicle,” in 2019 IEEE/RSJ International Conference +on Intelligent Robots and Systems (IROS). IEEE, 2019, pp. 7025–7032. +[15] C. Connolly, “The determination of next best views,” in Proceedings. +1985 IEEE international conference on robotics and automation, vol. 2. +IEEE, 1985, pp. 432–435. +[16] B. Yamauchi, “A frontier-based approach for autonomous exploration,” +in Proceedings 1997 IEEE International Symposium on Computational +Intelligence in Robotics and Automation CIRA’97.’Towards New Com- +putational Principles for Robotics and Automation’. +IEEE, 1997, pp. +146–151. +[17] T. Cieslewski, E. Kaufmann, and D. Scaramuzza, “Rapid exploration +with multi-rotors: A frontier selection method for high speed flight,” +in 2017 IEEE/RSJ International Conference on Intelligent Robots and +Systems (IROS). +IEEE, 2017, pp. 2135–2142. +[18] B. Charrow, G. Kahn, S. Patil, S. Liu, K. Goldberg, P. Abbeel, +N. Michael, and V. Kumar, “Information-theoretic planning with tra- +jectory optimization for dense 3d mapping.” in Robotics: Science and +Systems, vol. 11, 2015, pp. 3–12. +[19] O. Khatib, “Real-time obstacle avoidance for manipulators and mobile +robots,” in Autonomous robot vehicles. +Springer, 1986, pp. 396–404. +[20] J. v. d. Berg, S. J. Guy, M. Lin, and D. Manocha, “Reciprocal n-body +collision avoidance,” in Robotics research. +Springer, 2011, pp. 3–19. +[21] P. Fiorini and Z. Shiller, “Motion planning in dynamic environments +using velocity obstacles,” The international journal of robotics research, +vol. 17, no. 7, pp. 760–772, 1998. +[22] L. Blackmore, M. Ono, and B. C. Williams, “Chance-constrained +optimal path planning with obstacles,” IEEE Transactions on Robotics, +vol. 27, no. 6, pp. 1080–1094, 2011. +[23] H. Zhu and J. Alonso-Mora, “Chance-constrained collision avoidance +for mavs in dynamic environments,” IEEE Robotics and Automation +Letters, vol. 4, no. 2, pp. 776–783, 2019. +[24] J. Lin, H. Zhu, and J. Alonso-Mora, “Robust vision-based obstacle +avoidance for micro aerial vehicles in dynamic environments,” in 2020 +IEEE International Conference on Robotics and Automation (ICRA). +IEEE, 2020, pp. 2682–2688. +[25] Z. Xu, D. Deng, Y. Dong, and K. Shimada, “Dpmpc-planner: A real- +time uav trajectory planning framework for complex static environments +with dynamic obstacles,” in 2022 International Conference on Robotics +and Automation (ICRA). +IEEE, 2022, pp. 250–256. +[26] G. Chen, P. Peng, P. Zhang, and W. Dong, “Risk-aware trajectory +sampling for quadrotor obstacle avoidance in dynamic environments,” +arXiv preprint arXiv:2201.06645, 2022. +[27] D. Mellinger and V. Kumar, “Minimum snap trajectory generation +and control for quadrotors,” in 2011 IEEE international conference on +robotics and automation. +IEEE, 2011, pp. 2520–2525. +[28] C. Richter, A. Bry, and N. Roy, “Polynomial trajectory planning for +aggressive quadrotor flight in dense indoor environments,” in Robotics +research. +Springer, 2016, pp. 649–666. +[29] J. L. Sch¨onberger and J.-M. Frahm, “Structure-from-motion revisited,” +in Conference on Computer Vision and Pattern Recognition (CVPR), +2016. +[30] T. Qin, P. Li, and S. Shen, “Vins-mono: A robust and versatile monocular +visual-inertial state estimator,” IEEE Transactions on Robotics, vol. 34, +no. 4, pp. 1004–1020, 2018. + diff --git a/39FAT4oBgHgl3EQfEhxj/content/tmp_files/load_file.txt b/39FAT4oBgHgl3EQfEhxj/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..98f5196d7f1246b9d95c7d2086dc68136c20b429 --- /dev/null +++ b/39FAT4oBgHgl3EQfEhxj/content/tmp_files/load_file.txt @@ -0,0 +1,638 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf,len=637 +page_content='A vision-based autonomous UAV inspection framework for unknown tunnel construction sites with dynamic obstacles Zhefan Xu, Baihan Chen, Xiaoyang Zhan, Yumeng Xiu, Christopher Suzuki, and Kenji Shimada Abstract—Tunnel construction using the drill-and-blast method requires the 3D measurement of the excavation front to evaluate underbreak locations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Considering the inspection and measure- ment task’s safety, cost, and efficiency, deploying lightweight autonomous robots, such as unmanned aerial vehicles (UAV), becomes more necessary and popular.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Most of the previous works use a prior map for inspection viewpoint determination and do not consider dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To maximally increase the level of autonomy, this paper proposes a vision-based UAV inspection framework for dynamic tunnel environments without using a prior map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Our approach utilizes a hierarchical planning scheme, decomposing the inspection problem into different levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The high-level decision maker first determines the task for the robot and generates the target point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, the mid-level path planner finds the waypoint path and optimizes the collision-free static trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Finally, the static trajectory will be fed into the low- level local planner to avoid dynamic obstacles and navigate to the target point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Besides, our framework contains a novel dynamic map module that can simultaneously track dynamic obstacles and represent static obstacles based on an RGB-D camera.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' After inspection, the Structure-from-Motion (SfM) pipeline is applied to generate the 3D shape of the target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To our best knowledge, this is the first time autonomous inspection has been realized in unknown and dynamic tunnel environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Our flight experiments in a real tunnel prove that our method can autonomously inspect the tunnel excavation front surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Index Terms—Field Robotics, Motion and Path Planning, Per- ception and Autonomy, Robotics and Automation in Construction I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' INTRODUCTION Drilling and blasting is a common tunnel construction and excavation method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The main cycle of this method includes steps such as drilling for explosives, blasting, measuring underbreaks, and spraying concrete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Among these steps, mea- suring underbreaks in the tunnel excavation front is dangerous for workers because of the potential falling rocks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' With the emergence of lightweight unmanned aerial vehicles, the robot becomes suitable for handling measurement and inspection tasks as it can avoid potential human dangers and inspect un- reachable locations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Consequently, an autonomous inspection framework is essential to improve the safety and efficiency of underbreaks measurement and tunnel construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' There are two main challenges of autonomous UAV in- spection in tunnel environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' First, since the tunnel en- vironments under construction are changing with time, it is unlikely to have update-to-date maps of huge construction Zhefan Xu, Baihan Chen, Xiaoyang Zhan, Yumeng Xiu, Christopher Suzuki, and Kenji Shimada are with the Department of Mechanical Engineer- ing, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA, 15213, USA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', zhefanx@andrew.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='cmu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='edu Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Illustration of UAV navigating and inspecting the excavation front in the tunnel environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (a) The tunnel under construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (b) The target inspection area (the excavation front).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (c) The robot navigates toward the inspection target and avoids obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (d) The robot inspects the target area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' vehicles and equipment nearby the excavation front.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In this way, the robot should be able to navigate from arbitrary positions in the tunnel towards the excavation front area (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', the end of the tunnel) based on the onboard sensing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Previous works of the sampling-based unknown exploration [1][2][3][4] can make the robot successfully navigate and map unknown environments with the onboard sensor and applies this exploration method to the unknown tunnel inspection [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' However, because their approaches only utilize the explored map information to randomly sample viewpoints, the output trajectory could be zigzag and over-conservative, making navigation less efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The second challenge comes from the moving workers and machines in tunnels, as the robot should track them and avoid them safely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Even though some recent research [6][7][8] has investigated the UAV dynamic obstacle avoidance problems, their local planning strategies without global path fusion make them insufficient for complex inspection tasks in tunnel environments, which contain com- plicated static structures and unpredictable dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To solve these issues, this paper proposes a vision-based autonomous UAV inspection framework for unknown and dynamic tunnel environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' We develop a small, lightweight quadcopter with an RGB-D camera for safely sharing and operating with vehicles, equipment and workers in the tun- nel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The proposed approach utilizes the hierarchical planning method decomposing the entire inspection planning into high, mid, and low levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The current task is determined at the high planning level to generate the goal position for navigation and arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='08422v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='RO] 20 Jan 2023 b Excavation Front Target Inpection Area Inspection Navigation (d) Cexploration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, the mid-level planner will find and optimize a smooth trajectory toward the goal based on the static obstacle information from the incrementally built map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Finally, at the low level, our vision-aided gradient-based planner is applied to locally optimize the trajectory for avoiding dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In addition, we propose a novel dynamic map representation that can simultaneously represent static and track dynamic ob- stacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The example tunnel environment and the autonomous robot using the proposed method are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The main contributions and novelties of this work are: Hierarchical inspection framework: This paper applies a hierarchical scheme to solve the autonomous inspection problem based on different planning layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Depth-based 3D dynamic map: Our method utilizes depth images to detect and track dynamic obstacles and update the occupancy information of static environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Gradient-based dynamic obstacle avoidance: We pro- pose a gradient-based B-spline trajectory optimization to avoid dynamic obstacles in real time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Tunnel experiments with 3D reconstruction: The entire system is verified with a customized quadcopter in a tunnel with 3D reconstruction results of the target surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' RELATED WORK This section first discusses the recent trends and approaches in construction site inspection by autonomous UAVs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, relevant works on the key challenges of tunnel inspection (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', exploration and dynamic obstacle avoidance) are reviewed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' There are mainly two categories of construction site and building inspection methods: model-based and non-model- based methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the model-based methods, the inspection target model is usually available, and the planner generates a set of optimal viewpoints based on the provided model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In [9], the target bridge is first partitioned into surfaces with inspection nodes, and their GTSP solver is then applied to find optimal paths for inspection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Similarly, some works use the BIM model to find viewpoints of interest (VPI) and solve the path-planning problem using the TSP-based method [10][11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' However, the target model can be unavailable for tunnel inspection, so the robot can only rely on the onboard sensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In this way, the reactive methods are proposed for unknown tunnel navigation using the lidar points measurement [12][13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Their methods can navigate tunnels of arbitrary shapes but do not consider obstacle avoidance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bendris et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [5] utilize the sampling-based method to generate viewpoints for unknown exploration and inspection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Their method can successfully avoid static obstacles but might not be safe for dynamic obstacles due to the long replanning time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Besides, their random sampling strategy in the explored area can lead to zigzag and over-conservative paths for navigation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In [14], it proposes a 3D reconstruction method for UAV tunnel inspection without the path-planning strategy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The unknown exploration problem can be viewed as deter- mining a series of informative viewpoints [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Yamauchi [16] first uses the frontier exploration approach, allowing robots to visit the map boundary to gain environment information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Later in [17], it extends the frontier exploration to high-speed UAVs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Some approach [18] applies the information-theoretic method to evaluate the information gains of viewpoints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Considering the limited computation power of lightweight UAVs, the sampling-based methods [1][2][3][4] have been preferred in recent years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In [1], their RH-NBV planner grows an RRT with the information gains stored in each node.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The robot will then follow the highest gain branch in a receding horizon manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Selin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [2] combine the RH-NBV with frontier exploration, further improving the exploration efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To save and reuse the computation in each planning iteration, Schmid et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [3] adopt the RRT* algorithm with the rewiring to incrementally build the tree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' With a similar incremental sampling idea in [4], it proposes a PRM-based method for exploration and obstacle avoidance in dynamic environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Dynamic obstacle avoidance problem still remains open in recent years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the reactive-based methods, the robots directly generate control velocities to avoid obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Khatib [19] constructs the artificial potential field to find the velocity for obstacle avoidance and navigation, and Berg et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [20] use linear programming to optimize velocities based on Velocity Obstacle [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' These methods require less computation than the trajectory-based methods but might lead to more myopic performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The trajectory-based methods are more prevalent in UAV planning in recent years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Some [22][23][24][25] use the model predictive control scheme to generate collision- free trajectories based on the kinematic constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In [8], it utilizes the B-spline optimization to generate collision-free trajectory with vision aided, and Chen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [26] evaluate trajectory risks using their dual-structure particle map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' PROBLEM DESCRIPTION In an unknown tunnel space, Vt ∈ R3, with a straight tunnel centerline C of a finite length, there exists an excavation front (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', the target wall for inspection) at the end of the tunnel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Inside the tunnel space Vt, there are different sizes of static obstacles Ostatic and dynamic obstacles Odynamic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' A UAV with an onboard depth camera is deployed for the inspection task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Without a prior map M, the robot needs to first navigate toward the excavation front area from an arbitrary position in the space Vt, then generate an inspection path to collect RGB images of the inspection target, and finally return to the start location.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' During the forward navigation and returning period, the robot should avoid all static obstacles Oall static and dynamic obstacles Osensor dynamic in its sensor range.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The final output of the entire system should be the 3D shape of the inspection target reconstructed using the collected RGB images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' PROPOSED METHOD The proposed inspection framework has three main compo- nents shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2: visual perception, hierarchical planning, and data post-processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The visual perception step processes the sensor measurements from the onboard depth camera and the inertial measurement unit (IMU).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The localization module runs the visual-inertial odometry (VIO) algorithm with the EKF fusion to get robot state estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Besides, the dynamic Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' System framework for autonomous inspection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Our proposed framework contains three parts: visual perception, hierarchical planning, and data post- processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the visual perception step, the localization module applies the visual-inertial odometry with EKF fusion for state estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The dynamic map module builds the static voxel map and tracks dynamic obstacles based on depth images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the hierarchical planning section, the high-level and mid-level planners use the static voxel map to generate the static trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, the low-level planner uses the dynamic obstacle information to optimize the output trajectory for execution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The final data post-processing step takes the images collected from the inspection stage to reconstruct the target model for analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' map module utilizes depth images to track dynamic obstacles and update the occupancy information for static obstacles using the voxel map, which will be further discussed in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='IV-B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' After the perception step, the hierarchical planning section generates collision-free trajectories for the robot to achieve the entire inspection task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IV-A will introduce the logic of our hierarchical planning for the tunnel inspection and the task decision maker in the high-level planner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, the obstacle avoidance based on the mid-level trajectory planner and low-level dynamic planner will be covered in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IV-C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' After finishing the inspection task, the data post-processing step, mentioned in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IV-D, takes the collected target images to perform 3D reconstruction to obtain the target model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Hierarchical Planning and High-level Task Planner Since our inspection problem consists of multiple compli- cated procedures, applying only one planner cannot efficiently accomplish the entire task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' There are mainly three stages of the inspection: (a) approaching the inspection target (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', the end of the tunnel), (b) collecting target images, and (c) returning to the start location.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Based on the inspection stages, we decompose the problem into the following abstract tasks: ST = {Forward, Explore, Inspect, Return}, (1) where the Forward task aims at approaching the inspection target, the Explore task helps the robot gain local map in- formation for navigation, the Inspect task mode generates the path for collecting target images, and the Return task mode navigates the robot back to the starting location.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' During the inspection process, the robot constantly alternates the task mode using the proposed task planning algorithm (Alg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For each abstract task, the task planner generates the corresponding goal positions and passes them to the lower-level planners for path planning and trajectory optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the beginning stage of task planning (Alg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1), the task planner sets the robot to the Forward task mode as the robot needs first to approach the tunnel end (Line 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The task planner runs at a certain replanning frequency to select the current task mode for the robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Before the robot arrives at the inspection location, the Forward mode (Lines 7-12) lets the robot generate a forward goal with a distance l from the current robot position for navigation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Since, at this stage, the robot does not have a complete environment map and can only rely on the partially built from its flight, it will first try using the partial map to perform local obstacle avoidance to achieve the forward goal (Line 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Suppose the lower-level planner fails to find a collision-free trajectory due to the lack of environmental knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In that case, the task planner will switch the current task to the explore mode to increase the local map information (Lines 10-12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the Explore mode, the planner first samples to get the best viewpoints with the highest sensor information gain in the current map then uses the lower- level planner to generate a feasible trajectory for exploration, and finally switches back to the previous task mode (Lines 13- 16).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the information gain evaluation, refers to [1][2][3][4] for further details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' At the start of each replanning iteration, the algorithm checks whether the robot has reached the inspection target (Lines 4-6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' If the robot detects the inspection target wall, the planner will enter the Inspect mode and generate a zigzag path for collecting target images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' However, when the built map around the target is not detailed enough for the inspection path generation, the planner will switch to the explore mode again to increase the explored map range (Lines 17-21).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' After finishing collecting images, the planner will enter the Return mode and navigate back to the start position (Lines 24-27).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Note that in the returning step, the robot has already had a sufficient informative map for static obstacles, incrementally built from the forward and explore step, to generate a global trajectory to the origin directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Localization Module ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='High-level Task Planner ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Navigation ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Forward ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Visual Inertial ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='PX4 EKF Fusion ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Goal ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Task Decision ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Odometry ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Explore ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Maker ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Exploration ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Viewpoint ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Backward * ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Dynamic Map Module ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Inspect ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Inspection ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Return Position ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Dynamic Obstacle ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Dynamic Obstacle ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Location ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Proposal Detection ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Tracking ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='★ Target Position ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Static Occupancy ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Mid-level Static Planner ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Map Update ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='RRT* Waypoint ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Minimum Snap ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Planner ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='raiectoryplanner ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Obstacle ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Static Trajectory ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Bounding ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Low-level Dynamic Planner ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Boxes ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='3D Reconstruction Module ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Vision-aided B-spline ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Collision Cheking ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Correspondence ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Incremental ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Trajectory Planner ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='& Replanning ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='Search ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='ReconstructionAlgorithm 1: High-level Task Planning Algorithm ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='1 Tcurr ← Forward Mode ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' ▷ initial task 2 Ct ← false ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' ▷ termination condition 3 while not Ct do 4 Icond ← reachInspectionTarget();' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 5 if Icond then 6 Tcurr ← Inspect Mode;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 7 if Tcurr ≡ Forward Mode then 8 Pgoal ← getForwardGoal();' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 9 σtraj, success ← lowerLevelPlanner(Pgoal);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 10 if not success then 11 Tcurr ← Explore Mode;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 12 Tprev ← Forward Mode;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 13 else if Tcurr ≡ Explore Mode then 14 Pgoal ← getBestViewpoint();' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 15 σtraj ← lowerLevelPlanner(Pgoal);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 16 Tcurr ← Tprev;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 17 else if Tcurr ≡ Inspect Mode then 18 σtraj, success ← getInspectionPath();' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 19 if not success then 20 Tcurr ← Explore Mode;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 21 Tprev ← Inspect Mode;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 22 else 23 Tcurr ← Return Mode;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 24 else if Tcurr ≡ Return Mode then 25 Pgoal ← getReturnGoal();' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 26 σtraj ← lowerLevelPlanner(Pgoal);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 27 Ct ← isInspectionComplete();' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Perception and 3D Dynamic Mapping This section introduces our proposed 3D dynamic map for navigating dynamic environments, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 3d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Our dynamic map adopts a hybrid method to represent environ- ments by using the occupancy voxels for static obstacles and the bounding boxes for dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For static obstacles, we predefine a static voxel map size (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', maximum voxel numbers) based on the environment and store the occupancy information of each voxel in an array with the preserved length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' This allows our planners to access the occupancy information with O(1) time complexity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the occupancy information update of each voxel, as most static occupancy mapping algorithm does, we apply the classic Bayesian filter with the Markov assumption: lt(x) = log p(x|zt) p(¯x|zt) + log p(¯x) p(x) + lt−1(x), (2) where lt(x) is the log odds for the voxel being occupied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' By applying Eqn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2, we can update the occupancy information (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', log odds) for each voxel by recursively adding the inverse sensor model log p(x|zt) p(¯x|zt) with the predefined prior log p(¯x) p(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Besides, since dynamic obstacles can also be mapped into the static voxel map, which can lead to noisy voxels, we iterate through each detected dynamic obstacle bounding box and set all voxels inside the dynamic regions to be free.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Illustration of the proposed 3D dynamic map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (a) A person walks in front of the robot in the RGB camera view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (b) The person is detected as a dynamic obstacle in the depth image.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (c) The detection results in the U-depth map for obstacle widths and thicknesses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (d) The 3D dynamic map shows the dynamic obstacle as a bounding box and static obstacles as the voxel map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The dynamic obstacles are detected and tracked using the depth image and represented by axis-aligned 3D bounding boxes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' There are mainly three steps in the proposed method: region proposal detection, map-depth fusion and dynamic obstacle filtering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the region proposal detection step, we use the method mentioned in [6] to generate the U-depth map, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 3c, by constructing a histogram of the depth values using the depth image.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The vertical axis from top to bottom of the U-depth map represents the depth range of the user-defined bin width.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Intuitively, the U-depth map can be viewed as a top-down view image.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Inspired by [6][24], we apply the line grouping method to detect the obstacle regions in the U-depth map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' With these detection results, we can obtain the widths and thicknesses of obstacles and then further find the corresponding heights in the original depth image as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 3b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' After this step, we can get the “region proposal bounding boxes” for dynamic obstacles by applying coordinate transformation into the map frame.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Since the region proposals are only the rough detection results, our second step, map- depth fusion, inflates those region proposals locally with a ratio λ and then searches occupied voxels from the static voxel map to get the refined bounding boxes of obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' With the refined bounding boxes, the dynamic obstacle filtering method is applied to identify and track dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' First, we utilize the Kalman filter to track and compute the velocity of each obstacle bounding box with the linear propagation model: pk+1 o = pk o + vk o(tk+1 − tk), vk o = pk o − pk−1 o tk − tk−1 , (3) where pk+1 o is the predicted obstacle position in the next time step and vk o is the previously estimated velocity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, we identify those bounding boxes with velocities greater than the threshold Vth as the dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Finally, we remove the bounding boxes with jerky motions using the obstacles’ history velocities, considering the detection noises that make static obstacles shake back and forth slightly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Dynamic Obstacle Dynamic Obstacle Camera Pose Dynamic Obstacle Robot Voxel Map (static) (d) 3D Dynamic MapC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Navigation and Obstacle Avoidance When a goal position is determined by the high-level task planner, the mid-level static planner first finds a smooth trajectory considering static obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, using this static trajectory, the low-level dynamic planner optimizes a collision- free trajectory based on static and dynamic obstacles at a certain replanning frequency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the mid-level static planner, we apply the RRT* planner to find the waypoint path and use the minimum snap-based polynomial optimization with corri- dor constraints [27][28] for trajectory generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To achieve fast replanning for dynamic obstacle avoidance, the low-level planner adopts our gradient-based trajectory optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The B-spline trajectory with order k over a time knot vector can be parameterized as a series of control points: ˆS = {P1, P2, P3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', PN−1, PN}, Pi ∈ R3, (4) where the optimization variable set S contains the N−2(k−1) intermediate control points Pi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' With the trajectory optimization variables, we can write the objective function as follows: Ctotal(S) = αcontrol · Ccontrol + αsmooth · Csmooth +αstatic · Cstatic + αdynamic · Cdynamic, (5) and the weighted sum has four costs to minimize: the control limit cost, the smoothness cost, the static collision cost, and the dynamic collision cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The control limit cost ensures the trajectory has feasible velocities and accelerations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The control points for velocity Vi and acceleration Ai are computed by: Vi = Pi+1 − Pi δt , Ai = Vi+1 − Vi δt , (6) where δt is the time step.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' We use the L2 norm to penalize the infeasible velocities and accelerations: Ccontrol = � i ||Vi − vmax||2 2 λvel + ||Ai − amax||2 2 λacc , (7) in which vmax and amax are the maximum velocity and accel- eration limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The λ terms are the unit normalization factor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Note that the control limit costs are zero for velocities and acceleration that are less than the limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The smoothness cost tries to reduce the jerk (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', the third derivative to position) of the trajectory using the following equations: Csmooth = � i ||Ji||2 2, Ji = Ai+1 − Ai δt .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (8) The static collision cost is computed based on the proposed circle-based guide-point method shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The initial trajectory is shown as the blue dot line with the brown collision control points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To calculate the costs for those collision control points, we first search a collision-free path (purple dots and lines in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4a) using A* or Dijkstra to bypass the static obstacle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' If there are N collision control points, we cast a ray for the collision control point of sequence order n with the angle 180 n+1 degree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Note that the angle is between the casting ray (dot blue arrow) and the line connecting the first and last collision control points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The guide points Pguide are the intersection points of the casting ray with the searched path.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The algorithm is circle-based because the direction angles sweep a semi-circle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' With the associated guide points for each collision control point, we design the total static collision cost based on experiments as a clipped cubic penalty function: Cstatic = � i � max � dsafe − signDist(Pi, Pi guide), 0 ��3 , (9) where dsafe is the user-defined safe distance, and the signed distance function defines the positive and negative distance as the control point outside and inside the obstacle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Intuitively, we penalize the control points with small or negative distances to obstacles, and the static collision costs are zero for control points with a distance greater than the safe distance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Since the dynamic obstacles are moving, it is unreliable to only use the current detected information for cost computation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' So, we propose the receding horizon distance field to estimate the dynamic collision cost with future predictions shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In this figure, the dynamic obstacle with left moving velocity Vo is represented as the blue circle with the center O and the radius r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' We apply linear prediction to get the obstacle’s future position C with the prediction horizon k time step.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Since the reliability of future prediction decreases with the increasing prediction time, we linearly decrease the obstacle size to zero at the final predicted position C in the receding horizon manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' So, we can obtain the collision region as the combination of a polygon region AOBC and a circular region enclosed by the arc > AEB, line AO, and line BO.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' When the control point Pi,p is inside the polygon region, we draw a red line through the control point Pi,p perpendicular to the line AC intersecting at point D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The distance di to the safe area (outside the collision region) can be computed as: ∆di = ||D − O ′||2 − ||Pi,p − O ′||2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (10) On the other hand, when the control point Pi,c is inside the circular region, the distance di to the safe area is: ∆di = r − ||Pi,c − O0||2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (11) For the control points Pi,out that are outside both polygon and circular regions, we set the distance di to the safe area to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' So, with the distance to the safe area, we can use the following equation to compute the final dynamic collision cost: Cdynamic = � i � max(∆di, 0) �3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (12) For both static and dynamic collision costs, the gradients can be computed using the chain rule with Eqn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 9 and Eqn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Inspection and 3D Reconstruction After finishing the entire inspection task, the data post- processing module applies the Structure-from-Motion (SfM) to reconstruct the 3D shape of the inspection target from the collected target images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' When the robot has reached the inspection target, it first explores the local area until having enough map information about the target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Then, in our implementation, the robot generates a zigzag pattern path Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Illustration of the collision cost in our B-spline optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (a) The static collision cost is calculated using the proposed circle-based guide points (red dots).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' (b) The dynamic collision cost is obtained by the receding horizon distance field, which considers the future predictions of the obstacle positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' fully covering the target wall and collects the color images during the flight.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Our SfM pipeline for reconstruction is based on COLMAP [29].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The algorithm first extracts the features of each image using a numerical descriptor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Since our input images are from the streaming of an RGB camera, the second step utilizes sequential matching to find the correspondence in different images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Finally, from an initial corresponding image pair, the algorithm incrementally reconstructs the 3D shape of the inspection target by triangulating new points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' RESULT AND DISCUSSION A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Implementation Details We conduct simulation experiments and physical flight tests in dynamic tunnel environments to evaluate the proposed method’s performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The simulation environments are based on ROS and Gazebo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the physical experiments, we visited a tunnel under construction in Japan and applied our cus- tomized quadcopter (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 5) to test the proposed framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The quadcopter is equipped with an Intel RealSense D435i stereo camera, a PX4-based flight controller, and an NVIDIA Jetson Xavier NX onboard computer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The weight is ∼1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='5kg with a 15-minute flight duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' We adopt the visual-inertial odometry (VIO) algorithm [30] for robot state estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' All of the perception and planning computations are performed within the onboard computer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The color images are collected during the inspection stage with the RealSense D435i camera, and the data post-processing for 3D reconstruction is com- pleted using the desktop with an NVIDIA RTX 3080 GPU.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Evaluation of Navigation and Obstacle Avoidance The navigation and obstacle avoidance in the forward task (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', approaching the tunnel end) is the most challenging and time-consuming part of the entire inspection process since the environment is cluttered and unknown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' So, to evaluate the performance of forward navigation and obstacle avoidance, we prepared 5 simulation environments containing different static and dynamic obstacles, with one example environment shown Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The customized autonomous quadcopter for inspection experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Illustration of an example simulation tunnel environment in Gazebo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the forward task, the robot needs to navigate from the tunnel start (left side) to the tunnel end (right side) and avoid static and dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For benchmarking, we select the sampling-based planning methods (SBP) [1][5] and the dynamic exploration planning (DEP) method [4] with modifications to the tunnel environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Besides, we also include our method without using the dynamic map (mentioned in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IV-B) to compare the obstacle avoidance performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In each experiment, we let the robot navigate from the start of the tunnel to the end of the tunnel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' We run 10 experiments in each environment of different obstacles and record the average navigation time, the average replanning time for dynamic obstacle avoidance, and the collision rate over all experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Note that we set the navigation time and replanning time of the sampling-based planning methods (SBP) [1][5] to 100% for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The collision rate is calculated by the number of experiments with collisions divided by the total number of experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' From the results in Table I, one can see that our method has the second least navigation time, which is 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='69% of the sampling-based planning (SBP) method, and takes almost the same amount of time as its non-dynamic-map version.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The dynamic exploration planning (DEP) method uses less time than the sampling-based method and longer time than our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' From our observations, both the SBP and the DEP generate their trajectories inside the explored regions, which is over-conservative, leading to more stop-and-go behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' On the contrary, since our planner adopts a hierarchical scheme, the task planner first tries using the more aggressive local planner for obstacle avoidance by planning in the unknown regions and only applies the conservative exploration planner when the local planning fails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' This task-switching behavior hugely reduces the navigation time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the replanning time, our method takes only 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='16% of the time compared to the SBP and significantly less than the DEP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' This huge difference in the replanning speed is mainly due to our computationally lightweight gradient-based trajectory optimization and the long Tunnel Start Static Obstacle Tunnel End Robot Dynamic Obstacle Inspection Targetcomputation time in the information gain evaluation of the SBP and the DEP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For the collision rate, it is shown that our method has no collision among all experiment runs, and both the SBP and our method without the dynamic map have a high collision rate (around 30%).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The DEP has a lower collision rate than the SBP since it utilizes an incremental roadmap for faster dynamic obstacle avoidance but still has more collisions than our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Comparing our method with and without the dynamic map shows that the dynamic map version has a much lower collision rate by using dynamic obstacle information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' TABLE I THE BENCHMARK OF THE NAVIGATION TIME, THE REPLANNING TIME, AND THE COLLISION RATE BY RUNNING 50 SIMULATION EXPERIMENTS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Methods Nav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Time Replan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Time Collision Rate SBP [1][5] 100 ± 0% 100% 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='00% DEP [4] 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='80 ± 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='01% 54.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='30% 24.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='00% Ours w/o DM 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='06 ± 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='40% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='20% 32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='00% Ours 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='69 ± 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='66% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='16% 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='00% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Evaluation of Dynamic Obstacle Tracking We measure the average tracking errors in positions, ve- locities, and obstacle sizes shown in Table II to evaluate the dynamic obstacle detection and tracking performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The ground truth states of the obstacles can be easily obtained in the simulation experiments, and we apply the OptiTrack motion capture system in the physical tests to obtain the ground truth states.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' We let two persons walk within the motion capture area, compare the tracking results from the robot and the motion capture system, and use the average value differences as tracking errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' From Table II, one can see that the position errors are 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='09m and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='19m in simulation and physical tests, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The position errors in the physical tests are larger than in simulation tests due to the image’s noises from the depth camera.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Similarly, the camera noises also make the velocity errors in physical tests greater than the simulations’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The size errors are similar in both simulation and physical tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In the experiments, to account for the tracking errors in the positions, velocities, and sizes, we increase the safety distance to obstacles by a self-defined size r, and our experiment results prove that our dynamic obstacle tracking system can let successfully avoid moving obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' TABLE II MEASUREMENT OF THE DETECTION AND TRACKING ERRORS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Errors Simulation Tests Physical Tests Position Error (m) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='09 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='19 Velocity Error (m/s) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='21 Size Error (m) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='25 D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Physical Flight Tests To evaluate and verify the proposed framework, we ran flight tests in a tunnel under construction in Japan, shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1 and 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In each flight test, the robot starts at 20 meters Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The physical inspection flight test in a tunnel under construction in Japan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The bottom shows the Rviz of the obstacles and the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' in front of the tunnel excavation front and navigates toward the inspection area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Note that there are static and dynamic obstacles (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', walking workers) on the robot’s way to its target location shown at the top of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The corresponding Rviz visualization is shown at the bottom of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 7, and one can see that the robot can generate a collision-free trajectory for navigation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' After reaching the inspection area, the robot will follow the zigzag path to inspect the tunnel excavation front shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1d and collect RGB images for further 3D re- construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' During the navigation period, the robot’s velocity is maintained at 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='0m/s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The results show that our framework can complete the entire inspection task autonomously.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Evaluation of 3D Reconstruction The final output of our framework is the 3D shape of the tunnel excavation front shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' To obtain the results, we run the SfM-based reconstruction mentioned in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IV-D with 294 color images of 640x480 resolution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The total processing time is 30 minutes using an NVIDIA RTX 3080 GPU, and the minimum number of images required for this experiment is 60 images which take only 5 minutes for reconstruction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 8, the first row shows the reconstruction results from different views, and the second row visualizes the error heatmap from the comparison with the ground truth model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Note that we use the Topcon laser scanner to obtain the ground truth model of the inspection target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The red and blue portion of the heatmap represents the high and low reconstruction error values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The average error of the reconstruction model is 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='38cm with a standard deviation of 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='96cm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The third row shows the heatmap comparison with the tunnel CAD model, the designed shape for the tunnel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' From the heatmap, the workers can identify the yellow and red regions as the locations for concrete spraying and excavation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' CONCLUSION AND FUTURE WORK This paper presents a vision-based autonomous UAV in- spection framework for tunnel environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The proposed framework adopts a hierarchical planning scheme to solve the complicated inspection problem using different planning layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Our depth-based 3D dynamic map can represent static Dynamic Obstacle Trajectory Static Obstacle RobotFig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The 3D reconstruction results of the excavation front of the tunnel under construction in Japan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The first row shows the 3D reconstruction model from different views.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The second row visualizes the error heatmap obtained from the comparison of the laser-scanned ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The third row presents the heatmap comparison of the reconstruction model with the CAD model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' obstacles and track dynamic obstacles simultaneously.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The experiment results prove that our framework can make the quadcopter safely navigate toward the inspection target to perform the inspection and return to the origin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' The final 3D reconstruction results obtained from our SfM-based data post-processing pipeline have a low error compared to the ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' For future work, we want to apply learning-based methods to classify dynamic obstacles for better performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' VII.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' ACKNOWLEDGEMENT The authors would like to thank TOPRISE CO.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=', LTD and Obayashi Corporation for their financial support in this work and for providing a tunnel construction site for the flight tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' REFERENCES [1] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bircher, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Kamel, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Alexis, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Oleynikova, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Siegwart, “Receding horizon ”next-best-view” planner for 3d exploration,” in 2016 IEEE International Conference on Robotics and Automation (ICRA), 2016, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1462–1468.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [2] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Selin, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Tiger, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Duberg, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Heintz, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Jensfelt, “Efficient autonomous exploration planning of large-scale 3-d environments,” IEEE Robotics and Automation Letters, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1699–1706, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [3] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Schmid, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Pantic, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Khanna, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Ott, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Siegwart, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Nieto, “An efficient sampling-based method for online informative path planning in unknown environments,” IEEE Robotics and Automation Letters, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 5, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1500–1507, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [4] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Xu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Deng, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Shimada, “Autonomous uav exploration of dynamic environments via incremental sampling and probabilistic roadmap,” IEEE Robotics and Automation Letters, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 6, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2729–2736, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [5] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bendris and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Cayero Becerra, “Design and experimental evaluation of an aerial solution for visual inspection of tunnel-like infrastructures,” Remote Sensing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 14, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 195, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [6] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Oleynikova, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Honegger, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Pollefeys, “Reactive avoidance using embedded stereo vision for mav flight,” in 2015 IEEE Interna- tional Conference on Robotics and Automation (ICRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 50–56.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [7] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Lin, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Zhu, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Alonso-Mora, “Robust vision-based obstacle avoidance for micro aerial vehicles in dynamic environments,” in 2020 IEEE International Conference on Robotics and Automation (ICRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2682–2688.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [8] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Xu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Xiu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Zhan, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Chen, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Shimada, “Vision-aided uav navigation and dynamic obstacle avoidance using gradient-based b- spline trajectory optimization,” arXiv preprint arXiv:2209.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='07003, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [9] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Shanthakumar, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Yu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Singh, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Orevillo, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bianchi, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Heb- don, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Tokekar, “View planning and navigation algorithms for autonomous bridge inspection with uavs,” in International Symposium on Experimental Robotics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Springer, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 201–210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [10] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bolourian and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Hammad, “Lidar-equipped uav path planning con- sidering potential locations of defects for bridge inspection,” Automation in Construction, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 117, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 103250, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [11] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Tan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Li, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Liu, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Chen, and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Zhou, “Automatic inspection data collection of building surface based on bim and uav,” Automation in Construction, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 131, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 103881, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [12] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Elmokadem, “A 3d reactive navigation method for uavs in unknown tunnel-like environments,” in 2020 Australian and New Zealand Control Conference (ANZCC).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 119–124.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [13] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Elmokadem and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Savkin, “A method for autonomous collision- free navigation of a quadrotor uav in unknown tunnel-like environ- ments,” Robotica, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 40, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 835–861, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [14] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Pahwa, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Chan, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bai, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Saputra, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Do, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Foong, “Dense 3d reconstruction for visual tunnel inspection using unmanned aerial vehicle,” in 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 7025–7032.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [15] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Connolly, “The determination of next best views,” in Proceedings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1985 IEEE international conference on robotics and automation, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 1985, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 432–435.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [16] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Yamauchi, “A frontier-based approach for autonomous exploration,” in Proceedings 1997 IEEE International Symposium on Computational Intelligence in Robotics and Automation CIRA’97.’Towards New Com- putational Principles for Robotics and Automation’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 1997, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 146–151.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [17] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Cieslewski, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Kaufmann, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Scaramuzza, “Rapid exploration with multi-rotors: A frontier selection method for high speed flight,” in 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2135–2142.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [18] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Charrow, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Kahn, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Patil, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Liu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Goldberg, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Abbeel, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Michael, and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Kumar, “Information-theoretic planning with tra- jectory optimization for dense 3d mapping.” in Robotics: Science and Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 11, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 3–12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [19] O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Khatib, “Real-time obstacle avoidance for manipulators and mobile robots,” in Autonomous robot vehicles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Springer, 1986, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 396–404.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [20] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Berg, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Guy, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Lin, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Manocha, “Reciprocal n-body collision avoidance,” in Robotics research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Springer, 2011, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 3–19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [21] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Fiorini and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Shiller, “Motion planning in dynamic environments using velocity obstacles,” The international journal of robotics research, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 760–772, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [22] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Blackmore, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Ono, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Williams, “Chance-constrained optimal path planning with obstacles,” IEEE Transactions on Robotics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 27, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1080–1094, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [23] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Zhu and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Alonso-Mora, “Chance-constrained collision avoidance for mavs in dynamic environments,” IEEE Robotics and Automation Letters, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 776–783, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [24] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Lin, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Zhu, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Alonso-Mora, “Robust vision-based obstacle avoidance for micro aerial vehicles in dynamic environments,” in 2020 IEEE International Conference on Robotics and Automation (ICRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2682–2688.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [25] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Xu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Deng, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Dong, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Shimada, “Dpmpc-planner: A real- time uav trajectory planning framework for complex static environments with dynamic obstacles,” in 2022 International Conference on Robotics and Automation (ICRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2022, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 250–256.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [26] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Chen, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Peng, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Zhang, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Dong, “Risk-aware trajectory sampling for quadrotor obstacle avoidance in dynamic environments,” arXiv preprint arXiv:2201.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='06645, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [27] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Mellinger and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Kumar, “Minimum snap trajectory generation and control for quadrotors,” in 2011 IEEE international conference on robotics and automation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' IEEE, 2011, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 2520–2525.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [28] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Richter, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Bry, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Roy, “Polynomial trajectory planning for aggressive quadrotor flight in dense indoor environments,” in Robotics research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Springer, 2016, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 649–666.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [29] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Sch¨onberger and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Frahm, “Structure-from-motion revisited,” in Conference on Computer Vision and Pattern Recognition (CVPR), 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' [30] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Qin, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Li, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' Shen, “Vins-mono: A robust and versatile monocular visual-inertial state estimator,” IEEE Transactions on Robotics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 34, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} +page_content=' 1004–1020, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/39FAT4oBgHgl3EQfEhxj/content/2301.08422v1.pdf'} diff --git a/3tFAT4oBgHgl3EQfERy2/content/tmp_files/2301.08421v1.pdf.txt b/3tFAT4oBgHgl3EQfERy2/content/tmp_files/2301.08421v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..28362cd8891a73b33858b5b09f01d77fb6e5cb44 --- /dev/null +++ b/3tFAT4oBgHgl3EQfERy2/content/tmp_files/2301.08421v1.pdf.txt @@ -0,0 +1,1420 @@ +Peculiar properties in quasi-normal spectra from loop quantum +gravity effect +Guoyang Fu1,∗ Dan Zhang 2,† Peng Liu 3,‡ Xiao-Mei Kuang1,4,§ and Jian-Pin Wu1,4¶ +1 Center for Gravitation and Cosmology, +College of Physical Science and Technology, +Yangzhou University, Yangzhou 225009, China +2 +Key Laboratory of Low Dimensional Quantum +Structures and Quantum Control of Ministry of Education, +Synergetic Innovation Center for Quantum Effects and Applications, +and Department of Physics, Hunan Normal University, Changsha, Hunan 410081, China +3 Department of Physics and Siyuan Laboratory, +Jinan University, Guangzhou 510632, P.R. China and +4 Shanghai Frontier Science Center for Gravitational Wave Detection, +Shanghai Jiao Tong University, Shanghai 200240, China +Abstract +We investigate the quasi-normal mode (QNM) spectra for scalar and electromagnetic fields over +a covairant loop quantum gravity black hole (LQG-BH). For the fundamental modes, the LQG +effect reduces the oscillations in the scalar field, however it induces stronger oscillations in the elec- +tromagnetic field, comparing to the classical case. Under the scalar field perturbation, the system +enjoys faster decaying modes with more oscillations than the electromagnetic field. Some peculiar +phenomena emerge in the scalar field’s QNM spectra with high overtones for the angular quantum +numbers l > 0. It is that the LQG-BH has a larger real part of QNM with high overtones than +the Schwarzschild black hole (SS-BH). Such an anomalous phenomenon results in the oscillation +of the scalar field in the LQG-BH to be nearly identical to that in the SS-BH. Therefore, the high +overtone modes of the scalar field in LQG-BH play an important role in the modes with l > 0. +This anomalous phenomenon, however, does not occur in the electromagnetic field’s QNM spectra. +∗FuguoyangEDU@163.com +†danzhanglnk@163.com +‡phylp@email.jnu.edu.cn +§xmeikuang@yzu.edu.cn +¶jianpinwu@yzu.edu.cn +1 +arXiv:2301.08421v1 [gr-qc] 20 Jan 2023 + +I. +INTRODUCTION +A non-perturbative and background-independent technique, loop quantum gravity (LQG) +[1–4], provides a scenario for quantizing space-time structure. This approach has been suc- +cessfully applied to quantize symmetry reduced cosmological space-times, known as loop +quantum cosmology (LQC) [5–12]. Effective LQC theory can be constructed by incorporat- +ing two key quantum gravity effects, namely the inverse volume correction and the holonomy +correction, which can be achieved using both the canonical approach [13–18] and the path +integral perspectives [19–25]. The quantum gravity effects in LQC can be connected to +low-energy physics, resulting in a solvable cosmological model for studying quantum gravity +effects. In particular, the big bang singularity in classical general relativity (GR) is suc- +cessfully avoided by the quantum gravity effects [5–12, 26–31], which instead result in a +non-singular big bounce even at the semi-classical level [32, 33]. +Following the same idea in LQC [5–12], several effective black holes (BH) models with +LQG corrections have been constructed. Up to date, most of effective LQG-BHs are im- +plemented through the input of the holonomy correction; see, for example, [34–44] and +references therein. A common feature of LQG-BHs is that the singularity is replaced by a +transition surface between a trapped and an anti-trapped region, which can be understood +as the interior region of black hole and white hole. +The heart of the holonomy correction is the phase space regularisation technique called +polymerisation [45]. Because of this, the effective LQG-BH with holonomy correction is also +known as the polymer BH. The basic idea behind polymerisation is the replacement of the +conjugate momentum p with their regularised counterpart sin(¯λp)/¯λ, where ¯λ is a quantity +known as polymerisation scale, which is linked to the area-gap. Depending on whether the +polymerization scale is constant or phase space dependent function, the polymer BHs are +classified into two basic types: +• µ0-type scheme +In this scheme, the polymerization scale is assumed to remain constant over the whole +phase space [34–38]. This approach has the drawback that the final result is reliant on +the fiducial structures, which are introduced in the construction of the classical phase +space. In addition, even in the low-curvature regimes, significant quantum effects may +manifest, making these models unphysical. +2 + +• ¯µ-type scheme +The polymerization scale in ¯µ-type scheme is chosen to be a function of the phase +space [39–42] such that the dependency on fiducial structures is removed, though in +this scheme significant quantum corrections near the horizon may still survive. +Further, to fix the problems mentioned above, the authors in [46, 47] came up with an +generalized version of the µ0-scheme in which the polymerization scale relies on the black hole +mass such that it stays the same only along the dynamical trajectories. This effective model +does remove the problems described above, namely, the dependence on fiducial structures +and the large quantum effects that emerge in the low-curvature regime. This model, however, +also suffers from mass amplifications when crossing the transition surface. More recently, +A. Ashtekar, J. Olmedo, and P. Singh proposed an improved version of the generalized +µ0-scheme [48, 49], which is now known as the AOS model. The polymerization scale in +this model is thought to depend on the effective Hamiltonian itself. This model is quite +interesting since it removes not only the drawbacks of the µ0-scheme, but also the mass +amplifications in the primitive version of the generalized µ0-scheme [46, 47]. +However, the covariance in the aforementioned models is usually broken [50–53]. Follow- +ing the idea of the anomaly-free polymerization in [54], the authors in [55, 56] construct a +covariant model of a spherically symmetric BH with holonomy correction. The polymeriza- +tion scale ¯λ is a constant in this model, and it is related to a fundamental length scal r0 +by a constant of motion m. The resulting geometry corresponds to a singularity-free inte- +rior region and two asymptotically flat exterior regions of equal mass. It is expected that +this covariant model can alleviate certain long-standing concerns in the LQG community. +Therefore, it certainly deserves further exploration. +In this paper, we will mainly study the properties of the quasi-normal modes (QNMs) +of a probe scalar field and a probe Maxwell field over this covariant polymer BH. As we all +know, during the ringdown phase of binary system coalescence, the BH emits the gravita- +tional waves (GWs) with typical discrete frequencies, i.e., quasi-normal frequencies (QNFs). +According to [57], QNFs encode decaying scales and damped oscillating frequencies . Cer- +tainly, quantum effects have the imprints in the QNM spectra, which are expected to be +detected in GW observations. Also, conversely, GW detection will serve as an important +criterion for the correctness of candidate quantum gravity theories. +3 + +Our paper is organized as follows. In section II, we present a brief discussion on the +effective potentials of scalar and Maxwell fields over the covariant LQG-BH. Section III +is dedicated to the properties of the QNM spectra. Then, we further study the ringdown +waveform in section IV. We present the conclusions and discussions in section V. Appendixes +A and B present the detailed derivation of the wave equations and the QNMs in the eikonal +limit. +II. +SCALAR FIELD AND MAXWELL FIELD OVER A COVARIANT LQG-BH +In [55, 56], the authors proposed a novel effective LQG black hole model with holonomy +correction that is covariant. The exterior geometry of this covariant LQG black hole is given +by +ds2 = −f(r)dt2 + +1 +g(r)f(r)dr2 + r2dΩ2 , +f(r) = 1 − 2m +r , +g(r) = 1 − r0 +r . +(1) +Thanks to the quantum gravity effects, a new length scale r0 is introduced +r0 = 2m +¯λ2 +1 + ¯λ2 , +(2) +where the parameter ¯λ is a dimensionless constant related to the fiducial length of the +holonomies and m is a constant of motion. The length scale r0 define a minimum area r2 +0 +of this model [55, 56]. In the ¯λ → ∞ limit, this new length scale vanishes, i.e., r0 = 0, +restoring the classical Schwarzschild black hole is recovered. In addition, as we move to the +low curvature regions, the quantum gravity effects die off. Without loss of generality, we +shall set m = 1/2 through this paper, which leads to the horizon located at rh = 1. +We focus on the perturbations of the massless scalar field Φ and electromagnetic field Aµ +over this LQG black hole and study their response. We write down the covariant equations +for the test scalar field and electromagnetic field as follows: +1 +√−g(gµν√−gΦµ),ν = 0 , +(3) +1 +√−g(gαµgσν√−gFασ),ν = 0 , +(4) +where Fασ = ∂αAσ − ∂σAα is the field strength of the Maxwell field. After the separation of +variables, the aforementioned equations can be packaged into the Schr¨odinger-like form (for +4 + +more details, see Appendix A) +∂2Ψ +∂r2 +∗ ++ (ω2 − Veff)Ψ = 0 , +(5) +where r∗ is the tortoise coordinate and Veff is the effective potentials: +Veff = f(r)l(l + 1) +r2 ++ 1 − s +r +d +dr∗ +f(r) +� +g(r) , +(6) +with l being the angular quantum numbers. s = 0 and s = 1 correspond to the scalar field +and electromagnetic field, respectively. Figs.1 and 2 demonstrate the effective potentials as +a function of r∗ for scalar and electromagnetic fields with different l and r0. It is found that +both effective potentials are positive, indicating the LQG black hole is stable under scalar +and electromagnetic perturbations. Furthermore, we would like to compare the differences +in effective potentials between scalar and electromagnetic fields. It is easy to find that for +the electromagnetic field (s = 1), the second term in Eq.(6) vanishes, such that all the peaks +of the effective potentials Vel have the same height for different r0 (see Fig.2). However, for +the scalar field, i.e., s = 0, the second term in Eq.(6) survives and the height of the effective +potential Vs depends on r0. In particular, with increasing r0, the height of Vs decreases +(Fig.1). The shape of the effective potentials shall definitely results in different properties +of the QNMs. +r0=0 +r0=1/4 +r0=1/2 +r0=3/4 +-10 +10 +20 +r* +0.02 +0.04 +0.06 +0.08 +0.10 +Vs(r) +l=0 +r0=0 +r0=1/4 +r0=1/2 +r0=3/4 +-10 +10 +20 +r* +0.1 +0.2 +0.3 +0.4 +Vs(r) +l=1 +FIG. 1: The effective potentials Vs(r∗) of the scalar field for different r0 with fixed l. +5 + +r0=0 +r0=1/4 +r0=1/2 +r0=3/4 +0.0 +0.5 +1.0 +1.5 +0.275 +0.280 +0.285 +0.290 +0.295 +0.300 +-10 +10 +20 +r* +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 +Vel(r) +l=1 +r0=0 +r0=1/4 +r0=1/2 +r0=3/4 +0.0 +0.5 +1.0 +1.5 +0.86 +0.87 +0.88 +0.89 +0.90 +-10 +10 +20 +r* +0.2 +0.4 +0.6 +0.8 +Vel(r) +l=2 +FIG. 2: The effective potentials Vel(r∗) of the electromagnetic field for different r0 with fixed l. +III. +QUASI-NORMAL MODES +In this section, we investigate the QNMs spectra and specially focus on the effects from +quantum gravity corrections. The nature of determining the QNMs is to solve the eigenvalue +problem. To this end, we will impose a purely outgoing wave at infinity and purely ingoing +wave at the horizon: +horizon: ∂tΨ − ∂r∗Ψ = 0, +infinity: ∂tΨ + ∂r∗Ψ = 0. +(7) +By solving Eq.(5) with the aforementioned boundary conditions, numerous techniques have +been developed to determining the QNMs spectra, such as the WKB method [58–63], +Horowitz-Hubeny method [64], continued fraction method [65], asymptotic iteration method +[66–68], pseudo-spectral method [69, 70], and so on. In this paper, we will solve the eigen- +value problem using the pseudo-spectral method. For more applications of pseudo-spectral +method in determining the QNMs in the black hole physics, we can refer to [71–80] and +references therein. It is convenient to work in the Eddington-Finkelstein coordinate, which +makes the wave equation (5) is linear in the frequency. To achieve this goal, it is direct to +make a transformation as +r → 1/u and Ψ = e−iωr∗(u)ψ . +(8) +6 + +Then, the wave equation (5) turns into the following form: +ψ′′(u) + +� +f ′(u) +f(u) + g′(u) +2g(u) + +2iω +u2f(u) +� +g(u) +� +ψ′(u) +−1 +u +� +2iω +u2f(u) +� +g(u) ++ +Veff(u) +u3f(u)2g(u) + f ′(u) +f(u) + g′(u) +2g(u) +� +ψ(u) = 0. +(9) +Combining with the boundary conditions (7), one can solve Eq.(9) by the pseudo-spectral +method. +0.0 +0.2 +0.4 +0.6 +0.8 +1.0r0 +0.17 +0.18 +0.19 +0.20 +0.21 +0.22 +Reω +l=0, n=0 +0.2 +0.4 +0.6 +0.8 +r0 +-0.20 +-0.18 +-0.16 +-0.14 +Imω +l=0, n=0 +0.0 +0.2 +0.4 +0.6 +0.8 +1.0r0 +0.570 +0.575 +0.580 +0.585 +Reω +l=1, n=0 +0.2 +0.4 +0.6 +0.8 +r0 +-0.18 +-0.16 +-0.14 +Imω +l=1, n=0 +FIG. 3: QNFs as a function of r0 for the scalar field perturbation. +Now, we evaluate the QNM spectra for various values of the free parameter r0 to explore +the LQG effects on these spectra, as well as the differences between them and those of the +Schwarzschild black hole (r0 = 0). First, we focus on the fundamental modes and show the +QNF as a function of r0 in Fig.3 for the scalar field and Fig.4 for the electromagnetic field. +The main properties are presented as what follows. +• For scalar field, the real parts of the QNF, Reω decreases with increasing r0 (left plots +in Fig.3). +It means that the LQG effect reduces the oscillations in comparison to +7 + +the Schwarzschild black hole. By contrast, Reω of the electromagnetic field exhibits +an inverse tendency. +That is, when r0 increases, so does Reω. +As a result, the +LQG effect produces stronger oscillations in the electromagnetic field than that of the +Schwarzschild black hole. +• Whether for scalar or electromagnetic field, the imaginary part of QNF Imω al- +ways lives in the lower half-plane, and their absolute values are less than that of +the Schwarzschild black hole. Therefore, the system is stable in the presence of scalar +or electromagnetic field perturbations, and the LQG effect results in faster decaying +modes. +• When we fix r0, the scalar field has larger absolute values of Reω or Imω than the +electromagnetic field (see Figs.3 and 4). It indicates that in comparison to the elec- +tromagnetic field, the system under scalar field perturbation enjoys faster decaying +modes with greater oscillations. +0.0 +0.2 +0.4 +0.6 +0.8 +r0 +0.500 +0.505 +0.510 +0.515 +0.520 +0.525 +Reω +l=1, n=0 +0.2 +0.4 +0.6 +0.8 +r0 +-0.18 +-0.16 +-0.14 +-0.12 +Imω +l=1, n=0 +0.0 +0.2 +0.4 +0.6 +0.8 +r0 +0.920 +0.925 +0.930 +Reω +l=2, n=0 +0.2 +0.4 +0.6 +0.8 +r0 +-0.18 +-0.16 +-0.14 +-0.12 +Imω +l=2, n=0 +FIG. 4: QNFs as a function of r0 for the electromagnetic field perturbation. +We also work out the QNM spectra with high overtones. Table I shows the results for +8 + +scalar field. For l = 0, we see that the LQG-BH has a lower Reω than the Schwarzschild +black hole (SS-BH). This is consistent with the fundamental mode’s behavior. The most +striking difference occurs at the case with l > 0. To demonstrate this, we define the difference +in QNFs between SS-BH (r0 = 0) and LQG-BH (r0 ̸= 0) as follows: +δω = ωLQG − ωSS . +(10) +Observing the left plot in Fig.5 (also see the second column in Table I), Reω with high +overtones is larger for the LQG-BH than the SS-BH for l > 0. It indicates that the overtones +may play an important role in the modes with l > 0. We shall testify this point by the time +evolution of the field. +We also briefly address the properties of the QNMs for the electromagnetic field. Table +II shows the QNM spectra for the electromagnetic field. It is found that for all modes, Reω +for the LQG-BH is always smaller than that of the SS-BH. It differs from the scalar field, +where Reω with high overtones is larger for the LQG-BH than the SS-BH. This discrepancy +also results in the corresponding difference in the evolutions of the scalar field and the +electromagnetic field, which will be addressed below. +l = 0 +l = 1 +n +ω (r0 = 0) +ω (r0 = 1/2) +ω (r0 = 0) +ω (r0 = 1/2) +0 0.220910-0.209792i 0.200799-0.164527i 0.585872-0.195320i 0.579649-0.158265i +1 0.172223-0.696106i 0.160438-0.534669i 0.528897-0.612515i 0.547089-0.487735i +2 0.151564-1.202642i 0.126266-0.921455i 0.459079-1.080267i 0.502191-0.843179i +3 0.142272-1.705216i 0.076951-1.314823i 0.406517-1.576596i 0.461392-1.216781i +4 0.134739-2.211987i 0.053109-1.808749i 0.370218-2.081524i 0.426854-1.597881i +5 0.129639-2.712112i 0.098367-2.213623i 0.344154-2.588236i 0.395550-1.981462i +TABLE I: The QNM spectra for the scalar field perturbation with different n, l, and r0. +9 + +r0=1/100 +r0=1/10 +r0=1/2 +1 +2 +3 +4 n +0.01 +0.02 +0.03 +0.04 +0.05 +0.06 +δReω +l=1 +r0=1/100 +r0=1/10 +r0=1/2 +1 +2 +3 +4 n +0.1 +0.2 +0.3 +0.4 +0.5 +δImω +l=1 +FIG. 5: The difference of QNFs of scalar field for the mode with l = 1 between the LQG-BH and +SS-BH. +l = 1 +l = 2 +n +ω (r0 = 0) +ω (r0 = 1/2) +ω (r0 = 0) +ω (r0 = 1/2) +0 0.496527-0.184975i 0.513377-0.152855i 0.915191-0.190009i 0.924716-0.155637i +1 0.429031-0.587335i 0.476434-0.474099i 0.873085-0.581420i 0.901934-0.472399i +2 0.349547-1.050375i 0.427459-0.825862i 0.802373-1.003175i 0.862549-0.803573i +3 0.292353-1.543818i 0.385422-1.197325i 0.725190-1.460397i 0.816205-1.152343i +4 0.253105-2.045090i 0.351646-1.576036i 0.657473-1.943219i 0.770903-1.515796i +5 0.224562-2.547950i 0.322640-1.956797i 0.602986-2.439431i 0.730157-1.888692i +TABLE II: The QNM spectra for the electromagnetic field perturbation with different system +parameters n, l and r0. +Finally, we will discuss the properties of the QNMs in the eikonal limit (l → ∞). In [81], +Cardoso et al have demonstrated that, in the eikonal limit, QNMs may be connected with the +behavior of null particle trapped on the unstable circular geodesic of the spacetime, which +have been validated in most static, spherically symmetric, asymptotically flat spacetime. +The Reω is determined by the angular velocity Ωc at the unstable null geodesic [82–86], +whereas the Imω is connected to the Lyapunov exponent λ [87, 88]. +In the LQG-BH +background, we can calculate the QNMs in the eikonal limit, which is given by +ω = Ωcl − i +� +n + 1 +2 +� +|λ| . +(11) +10 + +For the detailed calculation, we can refer to Appendix B. It is found that as SS-BH, the +angular velocity Ωc is completely determined by the black hole mass: +Ωc = +1 +3 +√ +3m . +(12) +Therefore, the Reω is independent of the LQG parameter r0. While the Lyapunov exponent +λ is given by +λ = +� +− r2 +c +f(rc) +� d2 +dr2 +∗ +f(r) +r2 +� ��� +r=rc , +(13) +where rc is the radius of the photon sphere. Obviously, the Lyapunov exponent is affected +by the LQG correction. Left plot in Fig.6 shows the Lyapunov exponent λ as a function of +r0. We see that the Lyapunov exponent decreases with r0 increasing. Correspondingly, the +absolution value of Imω is suppressed by the the LQG effect (see the right plot in Fig.6). +0.2 +0.4 +0.6 +0.8 +1.0r0 +-0.18 +-0.16 +-0.14 +-0.12 +-|λ|/2 +38.60 +38.65 +38.70 +38.75 +-0.20 +-0.18 +-0.16 +-0.14 +-0.12 +Re ω +Im ω +l=100,n=0 +FIG. 6: Left plot: The Lyapunov exponent λ as a function of the LQG corrected parameter r0. +Right plot: The QNFs for different r0 for large l. +We notice that since the real part of QNF is independent of the LQG parameter r0 in +the eikonal limit. Therefore, we expect that as l increases, the difference in Reω between +LQG-BH and SS-BH will be suppressed and vanish. Fig.7 validates this argument that as l +increases, the difference rapidly decreases and goes to zero. +11 + +90 +92 +94 +96 +98 +-0.000100 +-0.000098 +-0.000096 +-0.000094 +-0.000092 +20 +40 +60 +80 +100l +-0.020 +-0.015 +-0.010 +-0.005 +δReω n=0 +90 92 94 96 98 +0.00040 +0.00041 +0.00042 +0.00043 +0.00044 +20 +40 +60 +80 +100 l +-0.010 +-0.005 +0.005 +0.010 +0.015 +δReω n=1 +FIG. 7: The difference of QNFs of scalar field between the LQG-BH and SS-BH. Left plot is for +n = 0 and right plot for n = 1. +IV. +RINGDOWN WAVEFORM +In this section, we will study the time evolution of the scalar and electromagnetic per- +turbations, which help us to further know the total contributions from overtones. Here, we +will use the finite difference method (FDM) technics to implement the dynamical evolution. +For more details on the FDM, we can refer to Refs.[73, 89–92] and references therein. To +this end, we write the wave equation in difference form as +−(Ψi+1,j − 2Ψi,j + Ψi−1,j) +△t2 ++ (Ψi,j+1 − 2Ψi,j + Ψi,j−1) +△r2 +∗ +− VjΨi,j + O(△t2) + O(△r2 +∗) = 0 , +(14) +where △t and △r∗ are the time and radial intervals, respectively, wihch are defined by +t = i△t and r∗ = j△r∗. The Vj is the discrete form of the effective potential (6). Then, the +iterate formula is derived as: +Ψi+1,j = −Ψi−1,j + △t2 +△r2 +∗ +(Ψi,j+1 + Ψi,j−1) + (2 − 2 △t2 +△r2 +∗ +− △t2Vj)Ψi,j . +(15) +Notice that the Courant-Friedrichs-Lewy (CFL) condition for instability requires that +△t/△r∗ < 1. +Using the iterate formula (15) with the initial Gaussian distribution +Ψ(r∗, t < 0) = 0 and Ψ(r∗, t = 0) = exp − (r∗−a)2 +2b2 +, one can obtain the ringdown profiles. +In general, there are three different stages in time-evolution profile: initial outburst, +quasinormal ringing, which depends only on the black hole’s characteristics and is very +important for GW observations [57, 93–95], and the late tail, which exhibits the power-law +12 + +behavior for the asymptotically flat spacetimes or exponential behavior for asymptotically +de-Sitter spacetimes. We will focus on the properties of the latter two stages in this section. +Schwarschild BH +r0=1/4 +r0=1/2 +0 +50 +100 +150 +200 +0.001 +0.010 +0.100 +1 +10 +100 +t +|Ψs| +l=0 +Schwarschild BH +r0=1/4 +r0=1/2 +0 +50 +100 +150 +200 +10-9 +10-7 +10-5 +0.001 +0.100 +10 +t +|Ψs| +l=1 +FIG. 8: The time evolution of the scalar field |Ψs(r)| for different r0 with fixed l (left plot for l = 0 +and right plot for l = 1). +Left plot in Fig.8 shows the time-domain profile for the scalar field perturbation with +l = 0. In comparison to the SS-BH, the oscillation is slightly weaker and the decay becomes +slower during the intermediate time. Recalling that both the real and imaginary parts of +the fundamental QNF all reduce as the LQG corrected parameter r0 enhances. It suggests +that in the scalar evolution of LQG-BH with l = 0 the fundamental QNMs dominate over +the ones with high overtones, which is consistent with the case of SS-BH. At asymptotically +late-times, quasinormal ringing is suppressed, and it follows the same power-law tail as +Ψ(t) ∼ t−(2l+3) for both LQG-BH and SS-BH [96–98]. +However, for multipoles l > 0, we observe some peculiar behavior that differs from that +of l = 0. Carefully observing the right plot in Fig.8, we find that the slope of quasinormal +ringing is smaller for the LQG-BH than for the SS-BH. This observation is consistent with +the QNFs, which show that the absolute value of Imω for all discrete overtones is smaller +for the LQG-BH than for the SS-BH (see the right column in Table I). Nevertheless, the +oscillation for the LQG-BH is nearly coincide with that for the SS-BH (the right plot in +Fig.8 and also see Fig.9). Recalling that for l > 0, the LQG-BH has a lower Reω for the +fundamental mode than the SS-BH, whereas the case is reversed for high overtones. +It +means that the contribution from the high overtone modes reduces the difference between +the LQG-BH and SS-BH time-domain profiles. That is, the high overtone modes in the Reω +13 + +of the LQG-BH play an important role in determining the oscillation of the time evolution +of the scalar field. +r0=0 +r0=1/100 +r0=1/10 +r0=1/4 +0 +10 +20 +30 +40 +50 +-30 +-20 +-10 +0 +10 +20 +30 +40 +t +|Ψs| +l=1 +r0=0 +r0=1/100 +r0=1/10 +r0=1/4 +10 +20 +30 +40 +50 +60 +70 +10-4 +0.001 +0.010 +0.100 +1 +10 +t +|Ψs| +l=1 +FIG. 9: The time evolution of the scalar field |Ψs(r)| for different r0 with fixed l. Notice that the +right plot is the semi-log plot. +Schwarschild BH +r0=1/2 +0 +50 +100 +150 +200 +10-6 +0.001 +1 +t +|Ψel| +l=1 +Schwarschild BH +r0=1/2 +0 +50 +100 +150 +200 +10-9 +10-6 +0.001 +1 +t +|Ψel| +l=2 +FIG. 10: The semi-log plot of the time evolution of the electromagnetic field |Ψel(r)| for different +r0 with fixed l. +We also study the time evolution of the electromagnetic field, as seen in Fig.10. We +observe that the slop of quasinormal ringing is smaller for the LQG-BH than the SS-BH, +which is similar to the scalar field. However, unlike in the case of scalar field, the oscillations +of the LQG-BH and the SS-BH are not the same. It is expected because for l > 0, the +anomalous phenomena seen in the QNMs of scalar field that Reω with high overtones is +larger for the LQG-BH than the SS-BH does not happen for electromagnetic field. +14 + +V. +CONCLUSION AND DISCUSSION +As the rapid development of the GW detection technics, it is expected to detect the +quantum gravity effect. To extract substantial information from GW detectors, one must +thoroughly know the main features and behaviors of QNM for LQG-BH. As the first step, +we investigate the QNM for scalar and electromagnetic fields over the covariant LQG-BH +proposed in [55, 56]. The QNM spectra for scalar and electromagnetic fields share some +common features. But they also exhibit many different features and behaviors. +First, we focus on the fundamental modes. It is found that the system is always stable +under scalar field or electromagnetic field perturbations, and the LQG effect results in faster +decaying modes. The difference is that the LQG effect reduces the oscillations in the scalar +field, however it enhances oscillations in the electromagnetic field. +In addition, we find +that the system under the scalar field perturbation enjoys faster decaying modes with more +oscillations than the electromagnetic field. +Some peculiar phenomena emerge in the scalar field QNM spectra with high overtones +for l > 0. It is that the LQG-BH has a larger ωR with high overtones than the SS-BH. Such +an anomalous phenomenon results in the oscillation of the scalar field in the LQG-BH to be +nearly identical to that in the SS-BH. Therefore, the high overtone modes of the scalar field +in LQG-BH play an important role in the modes with l > 0. This anomalous phenomenon, +however, cannot be observed in the electromagnetic field’s QNM spectra. +Finally, we comment some open questions deserving further exploration. +• It would be interesting to extend our investigation to the Dirac field and see if the +peculiar property still emerges in the QNM spectra. +• It is definitely interesting and valuable to further study the QNM spectrum of the +gravity perturbations. It provides us a platform for detecting quantum gravity effects +using the GW detector. In addition, we can examinate if the isospectrality still holds +in this LQG-BH model. +• In [99], the anomalous decay rate of QNMs of a massive scalar field is observed. De- +pending on how large the mass of the scalar field is, the decay timescales of the QNMs +either grow or decay with increasing angular harmonic numbers. This anomalous be- +havior is seen in much larger class models beyond a simple massive scalar field, see +15 + +[100–104] and references therein. It will interesting to see how the LQG effect affects +this anomalous behavior. +• We can also construct an effective rotating LQG-BH solution using the Newman-Janis +algorithm, starting with this spherical sysmetric LQG-BH, and study the LQG effects +on its QNM spectrum and shadow, allowing us to constrain the LQG parameters using +the GW detector and the Event Horizon Telescope (EHT). +We plan to investigate these questions and publish our results in the near future. +Acknowledgments +This work is supported by National Key R&D Program of China (No. 2020YFC2201400), +the Natural Science Foundation of China under Grants No. 11905083, the Postgraduate Re- +search & Practice Innovation Program of Jiangsu Province under Grant No. KYCX20 2973, +the Postgraduate Scientific Research Innovation Project of Hunan Province, the Science and +Technology Planning Project of Guangzhou (202201010655), the Fok Ying Tung Education +Foundation under Grant No. 171006, the Natural Science Foundation of Jiangsu Province +under Grant No.BK20211601. J.-P.W. is also supported by Top Talent Support Program +from Yangzhou University. +Appendix A: Wave equations +In this appendix, we will derive the wave equations for the scalar and electromagnetic +fields in detail. First, we shall provide a generic version of the wave equation in a static +spherically symmetric spacetime. The cases of scalar field and electromagnetic field are then +discussed in detail. +Because the spacetime is static spherically symmetric, we can separate variables using +the spherical function and write the radial equation in the form +(K(r)S(r)ˆΨ′(r))′ + +� +ΛF(r) + K(r) ω2 +S(r) +� +ˆΨ(r) = 0 , +(A1) +where ˆΨ is the radial part of the wave function, the coefficient functions {K , F , S} only +depend on the radial coordinate r, and Λ is the separation constant. After introducing the +16 + +tortoise coordinate r∗ and redefining the wave function as +dr∗ +dr = +1 +S(r) , +ˆΨ(r) = +Ψ +� +K(r) +, +(A2) +Eq.(A1) can be recasted into the following form +d2Ψ(r∗) +dr2 +∗ ++ (ω2 − Veff(r∗))Ψ(r∗) = 0 . +(A3) +The above formula provides a general transformation from the usual wave equation to its +Schr¨odinger-like counterpart. +In the following, we will go over the specific form of the wave equations for scalar +and electromagnetic fields. +For the scalar field equation, we perform the separation as +Φ(t, r, θ, φ) = � +l,m ˆΨ(r)e−iωtYlm(θ, φ), where Ylm(θ, φ) is the spherical harmonics. When +the particular form of the LQG-BH background (1) is substituted into the wave equation +(A1), one obtains +� +r2f(r) +� +g(r)ˆΨ′(r) +�′ ++ +� +r2ω2 +f(r) +� +g(r) +− l(l + 1) +� +g(r) +� +ˆΨ(r) = 0 . +(A4) +We can read off the coefficient functions by comparing Eq.(A4) to Eq.(A1) +K(r) = r2 , +S = f(r) +� +g(r) . +(A5) +The Schr¨odinger-like version of the wave equation is then easily given as +∂2Ψ +∂r2 +∗ ++ (ω2 − Vs)Ψ = 0 , +(A6) +Vs = f(r)l(l + 1) +r2 ++ 1 +2r +d +drf(r)2g(r) . +(A7) +For the electromagnetic field, we can expand the gauge field Aµ in vector spherical har- +monics [105, 106], +Aµ(t, r, θ, φ) = +� +l,m +� +� +� +� +� +� +� +� +������ +0 +0 +alm(r) +sin θ ∂φYlm +−alm(r) sin θ∂θYlm +� +������ ++ +� +������ +plm(r)Ylm +hlm(r)Ylm +klm(r)∂θYlm +klm(r)∂φYlm +� +������ +� +� +� +� +� +� +� +e−iωt , +(A8) +where the first term is the odd (axial) perturbation and second term is even (polar) pertur- +bation. Then, in the following, we will show how to derive the odd perturbation equation +and even perturbation equation. +17 + +When we switch on the odd electromagnetic field perturbation, we can explicitly write +down the radial equation as +� +f(r) +� +g(r)a′ +lm(r) +�′ ++ +� +ω2 +f(r) +� +g(r) +− l(l + 1) +r2� +g(r) +� +alm(r) = 0 , +(A9) +It is easy to find that K = 1 and S = f(r) +� +g(r). Thus, we have +Vodd = f(r)l(l + 1) +r2 +, +(A10) +where Ψ = alm(r). +For the even perturbation of the electromagnetic field, the radial equation becomes +p′′ +lm(r) + q(r)p′ +lm(r) + iω (h′ +lm(r) + q(r)hlm(r)) + +l(l + 1) +r2f(r)g(r)(plm(r) + iωklm(r)) = 0 , +−iωp′ +lm(r) + ω2hlm(r) + l(l + 1) +r2 +f(r)(−hlm(r) + k′ +lm(r)) = 0 , +(A11) +where q(r) = 2 +r + g′(r) +2g(r). After introducing a new variable +ˆΨ(r) = −p′ +lm(r) − iωhlm(r) , +(A12) +Eq.(A11) can be reduced to +(r4f(r)g(r)3/2 ˆΨ′(r))′ + +� +r4ω2� +g(r) +f(r) +− l(l + 1)r2 +� +g(r) + 1 +2J(r) +� +ˆΨ(r) = 0 +(A13) +where J(r) = r2� +g(r)(rf ′(r)(4g(r) + rg′(r)) + f(r)(4g(r) + r(6g′(r) + rg′′(r)))). Thus, the +coefficient functions are K = r4� +g(r) and S = f(r) +� +g(r) and then we have +Veven = f(r)l(l + 1) +r2 +. +(A14) +We find that the effective potentials for odd and even electromagnetic field perturbations are +the same. Therefore, we will use Vel to signify the effective potential of the electromagnetic +field rather than Vodd and Veven. +Appendix B: QNMs in the eikonal limit +In this appendix, we will show the connection between the QNMs in the eikonal limit and +the behavior of null particle trapped on the unstable circular geodesic. For a null particle, +18 + +the Lagrange is1 +L(x, ˙x) = 1/2gµν ˙xµ ˙xν . +(B1) +We start with the spherically symmetric geometry (1). Thanks to the symmetry, one can +only consider the geodesics in the equatorial plane: θ = π/2. Then the Lagrangian (B1) +becomes +2L = −f(r)˙t2 + +˙r2 +f(r)g(r) + r2 ˙φ2 , +(B2) +where the dot represents the derivative with respect to the affine parameter τ. +In this +system, there are two constants of the motion, which are +Pt = −f(r)˙t = −E , +Pφ = r2 ˙φ = L . +(B3) +Using the canonical transform and combining the above equations (B2) and (B3), we have +the following reduced Hamiltonian system: +2H = E ˙t + +˙r2 +f(r)g(r) + L ˙φ . +(B4) +Since the Hamiltonian H satisfies the constraint H = 0, we have +˙r2 + Veff = 0 , +(B5) +where the effective potential is +Veff = g(r) +�L2 +r2 f(r) − E2 +� +, +(B6) +Because ˙r2 > 0, the photon can only emerge in the area of negative potential. When the +angular momentum is small, the photon will fall from infinity into the black hole. However, +for the large angular momentum, the photon will escape the bondage of the black hole and +go back to infinity. Therefore, the critical circular orbit for the photon can be derived from +the unstable conditions +Veff = 0 , +∂Veff +∂r += 0 , +∂2Veff +∂r2 +< 0 . +(B7) +1 For the calculation details of the geodesic of a null particle, please refer to [81, 82, 107, 108]. +19 + +From the above conditions, we can obtain the equation for the critical radius rc +2fc(r) = rcf ′ +c(r) . +(B8) +Correspondingly, we have the critical impact parameters bc: +bc = L +E = +rc +� +fc(r) +. +(B9) +Then, the shadow radius Rs and Lyapunov exponents λ can be calculated as follows: +Rs = +� +ζ2 + η2 = bc = 3 +√ +3m , +(B10) +λ = +� +V ′′ +eff +2˙t2 = +� +− r2 +c +f(rc) +� d2 +dr2 +∗ +f(r) +r2 +� ��� +r=rc , +(B11) +where {ζ , η} are the celestial coordinates. We find that the shadow radius reduces to the +one of SS-BH [109, 110]. It means that the LQG effect doesn’t change the shape of the +shadow. However, the LQG correction affects the Lyapunov exponent λ. +On the other hand, we shall use the first order WKB approximation to obtain the analytic +form of the QNMs in the eikonal limit (l → ∞). In this limit, the last term of the effective +potential (6) can be ignored, resulting in the following form of the effective potential +V∞(r) = f(r) l2 +r2 . +(B12) +Reminding that the potential (B6) and (B12) are the same. Therefore, in the eikonal limit, +the QNMs may be obtained by the multiples of the frequency and the instability timescale +of the unstable circular null geodesic [81]: +ω = Ωcl − i(n + 1 +2)|λ| , +(B13) +where Ωc is the angular velocity and can be worked out as +Ωc = +˙φ +˙t = 1 +bc +. +(B14) +[1] C. Rovelli, Quantum Gravity, Cambridge University Press, Cambridge, UK (2004). +[2] T. Thiemann, Modern canonical quantum general relativity, gr-qc/0110034. +20 + +[3] A. Ashtekar and J. Lewandowski, Background independent quantum gravity: A Status +report, Class. Quant. Grav. 21 (2004) R53, [gr-qc/0404018]. +[4] M. Han, W. Huang, and Y. Ma, Fundamental structure of loop quantum gravity, Int. J. +Mod. Phys. D 16 (2007) 1397–1474, [gr-qc/0509064]. +[5] M. Bojowald, Absence of singularity in loop quantum cosmology, Phys. Rev. Lett. 86 (2001) +5227–5230, [gr-qc/0102069]. +[6] A. Ashtekar, T. Pawlowski, and P. Singh, Quantum nature of the big bang, Phys. Rev. Lett. +96 (2006) 141301, [gr-qc/0602086]. +[7] A. Ashtekar, T. Pawlowski, and P. Singh, Quantum Nature of the Big Bang: An Analytical +and Numerical Investigation. I., Phys. Rev. D 73 (2006) 124038, [gr-qc/0604013]. +[8] A. Ashtekar, T. Pawlowski, and P. Singh, Quantum Nature of the Big Bang: Improved +dynamics, Phys. Rev. D 74 (2006) 084003, [gr-qc/0607039]. +[9] A. Ashtekar, M. Bojowald, and J. Lewandowski, Mathematical structure of loop quantum +cosmology, Adv. Theor. Math. Phys. 7 (2003), no. 2 233–268, [gr-qc/0304074]. +[10] M. Bojowald, Loop quantum cosmology, Living Rev. Rel. 8 (2005) 11, [gr-qc/0601085]. +[11] A. Ashtekar and P. Singh, Loop Quantum Cosmology: A Status Report, Class. Quant. Grav. +28 (2011) 213001, [arXiv:1108.0893]. +[12] E. Wilson-Ewing, Testing loop quantum cosmology, Comptes Rendus Physique 18 (2017) +207–225, [arXiv:1612.04551]. +[13] V. Taveras, Corrections to the Friedmann Equations from LQG for a Universe with a Free +Scalar Field, Phys. Rev. D 78 (2008) 064072, [arXiv:0807.3325]. +[14] Y. Ding, Y. Ma, and J. Yang, Effective Scenario of Loop Quantum Cosmology, Phys. Rev. +Lett. 102 (2009) 051301, [arXiv:0808.0990]. +[15] J. Yang, Y. Ding, and Y. Ma, Alternative quantization of the Hamiltonian in loop quantum +cosmology II: Including the Lorentz term, Phys. Lett. B 682 (2009) 1–7, +[arXiv:0904.4379]. +[16] M. Bojowald and A. Tsobanjan, Effective Constraints for Relativistic Quantum Systems, +Phys. Rev. D 80 (2009) 125008, [arXiv:0906.1772]. +[17] M. Bojowald and A. Tsobanjan, Effective Constraints and Physical Coherent States in +Quantum Cosmology: A Numerical Comparison, Class. Quant. Grav. 27 (2010) 145004, +[arXiv:0911.4950]. +21 + +[18] M. Bojowald, D. Brizuela, H. H. Hernandez, M. J. Koop, and H. A. Morales-Tecotl, +High-order quantum back-reaction and quantum cosmology with a positive cosmological +constant, Phys. Rev. D 84 (2011) 043514, [arXiv:1011.3022]. +[19] A. Ashtekar, M. Campiglia, and A. Henderson, Loop Quantum Cosmology and Spin Foams, +Phys. Lett. B 681 (2009) 347–352, [arXiv:0909.4221]. +[20] A. Ashtekar, M. Campiglia, and A. Henderson, Casting Loop Quantum Cosmology in the +Spin Foam Paradigm, Class. Quant. Grav. 27 (2010) 135020, [arXiv:1001.5147]. +[21] A. Ashtekar, M. Campiglia, and A. Henderson, Path Integrals and the WKB approximation +in Loop Quantum Cosmology, Phys. Rev. D 82 (2010) 124043, [arXiv:1011.1024]. +[22] H. Huang, Y. Ma, and L. Qin, Path Integral and Effective Hamiltonian in Loop Quantum +Cosmology, Gen. Rel. Grav. 45 (2013) 1191–1210, [arXiv:1102.4755]. +[23] L. Qin, G. Deng, and Y.-G. Ma, Path integrals and alternative effective dynamics in loop +quantum cosmology, Commun. Theor. Phys. 57 (2012) 326–332, [arXiv:1206.1131]. +[24] L. Qin and Y. Ma, Coherent State Functional Integrals in Quantum Cosmology, Phys. Rev. +D 85 (2012) 063515, [arXiv:1110.5480]. +[25] L. Qin and Y. Ma, Coherent State Functional Integral in Loop Quantum Cosmology: +Alternative Dynamics, Mod. Phys. Lett. A 27 (2012) 1250078, [arXiv:1206.1128]. +[26] M. Bojowald, G. Date, and K. Vandersloot, Homogeneous loop quantum cosmology: The +Role of the spin connection, Class. Quant. Grav. 21 (2004) 1253–1278, [gr-qc/0311004]. +[27] P. Singh and A. Toporensky, Big crunch avoidance in K=1 semiclassical loop quantum +cosmology, Phys. Rev. D 69 (2004) 104008, [gr-qc/0312110]. +[28] G. V. Vereshchagin, Qualitative approach to semi-classical loop quantum cosmology, JCAP +07 (2004) 013, [gr-qc/0406108]. +[29] G. Date, Absence of the Kasner singularity in the effective dynamics from loop quantum +cosmology, Phys. Rev. D 71 (2005) 127502, [gr-qc/0505002]. +[30] G. Date and G. M. Hossain, Genericity of big bounce in isotropic loop quantum cosmology, +Phys. Rev. Lett. 94 (2005) 011302, [gr-qc/0407074]. +[31] R. Goswami, P. S. Joshi, and P. Singh, Quantum evaporation of a naked singularity, Phys. +Rev. Lett. 96 (2006) 031302, [gr-qc/0506129]. +[32] M. Bojowald, The Early universe in loop quantum cosmology, J. Phys. Conf. Ser. 24 (2005) +77–86, [gr-qc/0503020]. +22 + +[33] T. Stachowiak and M. Szydlowski, Exact solutions in bouncing cosmology, Phys. Lett. B +646 (2007) 209–214, [gr-qc/0610121]. +[34] A. Ashtekar and M. Bojowald, Quantum geometry and the Schwarzschild singularity, Class. +Quant. Grav. 23 (2006) 391–411, [gr-qc/0509075]. +[35] L. Modesto, Loop quantum black hole, Class. Quant. Grav. 23 (2006) 5587–5602, +[gr-qc/0509078]. +[36] L. Modesto, Semiclassical loop quantum black hole, Int. J. Theor. Phys. 49 (2010) +1649–1683, [arXiv:0811.2196]. +[37] M. Campiglia, R. Gambini, and J. Pullin, Loop quantization of spherically symmetric +midi-superspaces, Class. Quant. Grav. 24 (2007) 3649–3672, [gr-qc/0703135]. +[38] M. Bojowald and S. Brahma, Signature change in two-dimensional black-hole models of +loop quantum gravity, Phys. Rev. D 98 (2018), no. 2 026012, [arXiv:1610.08850]. +[39] C. G. Boehmer and K. Vandersloot, Loop Quantum Dynamics of the Schwarzschild +Interior, Phys. Rev. D 76 (2007) 104030, [arXiv:0709.2129]. +[40] D.-W. Chiou, Phenomenological loop quantum geometry of the Schwarzschild black hole, +Phys. Rev. D 78 (2008) 064040, [arXiv:0807.0665]. +[41] D.-W. Chiou, Phenomenological dynamics of loop quantum cosmology in Kantowski-Sachs +spacetime, Phys. Rev. D 78 (2008) 044019, [arXiv:0803.3659]. +[42] A. Joe and P. Singh, Kantowski-Sachs spacetime in loop quantum cosmology: bounds on +expansion and shear scalars and the viability of quantization prescriptions, Class. Quant. +Grav. 32 (2015), no. 1 015009, [arXiv:1407.2428]. +[43] J. Yang, C. Zhang, and Y. Ma, Loop quantum black hole in a gravitational collapse model, +arXiv:2211.04263. +[44] W.-C. Gan, X.-M. Kuang, Z.-H. Yang, Y. Gong, A. Wang, and B. Wang, Non-existence of +quantum black hole horizons in the improved dynamics approach, arXiv:2212.14535. +[45] A. Corichi, T. Vukasinac, and J. A. Zapata, Polymer Quantum Mechanics and its +Continuum Limit, Phys. Rev. D 76 (2007) 044016, [arXiv:0704.0007]. +[46] A. Corichi and P. Singh, Loop quantization of the Schwarzschild interior revisited, Class. +Quant. Grav. 33 (2016), no. 5 055006, [arXiv:1506.08015]. +[47] J. Olmedo, S. Saini, and P. Singh, From black holes to white holes: a quantum gravitational, +symmetric bounce, Class. Quant. Grav. 34 (2017), no. 22 225011, [arXiv:1707.07333]. +23 + +[48] A. Ashtekar, J. Olmedo, and P. Singh, Quantum Transfiguration of Kruskal Black Holes, +Phys. Rev. Lett. 121 (2018), no. 24 241301, [arXiv:1806.00648]. +[49] A. Ashtekar, J. Olmedo, and P. Singh, Quantum extension of the Kruskal spacetime, Phys. +Rev. D 98 (2018), no. 12 126003, [arXiv:1806.02406]. +[50] M. Bojowald, Black-Hole Models in Loop Quantum Gravity, Universe 6 (2020), no. 8 125, +[arXiv:2009.13565]. +[51] M. Bojowald, No-go result for covariance in models of loop quantum gravity, Phys. Rev. D +102 (2020), no. 4 046006, [arXiv:2007.16066]. +[52] M. Bojowald, S. Brahma, and J. D. Reyes, Covariance in models of loop quantum gravity: +Spherical symmetry, Phys. Rev. D 92 (2015), no. 4 045043, [arXiv:1507.00329]. +[53] A. Alonso-Bardaji and D. Brizuela, Holonomy and inverse-triad corrections in spherical +models coupled to matter, Eur. Phys. J. C 81 (2021), no. 4 283, [arXiv:2010.14437]. +[54] A. Alonso-Bardaji and D. Brizuela, Anomaly-free deformations of spherical general +relativity coupled to matter, Phys. Rev. D 104 (2021), no. 8 084064, [arXiv:2106.07595]. +[55] A. AlonsoBardaji, D. Brizuela, and R. Vera, An effective model for the quantum +Schwarzschild black hole, Phys. Lett. B 829 (2022) 137075, [arXiv:2112.12110]. +[56] A. AlonsoBardaji, D. Brizuela, and R. Vera, Nonsingular spherically symmetric black-hole +model with holonomy corrections, Phys. Rev. D 106 (2022), no. 2 024035, +[arXiv:2205.02098]. +[57] E. Berti, V. Cardoso, and A. O. Starinets, Quasinormal modes of black holes and black +branes, Class. Quant. Grav. 26 (2009) 163001, [arXiv:0905.2975]. +[58] B. F. Schutz and C. M. Will, Black hole normal modes - A semianalytic approach, +Astrophys. J. Lett , Astrophys. J. Lett, 291 (Apr., 1985) L33–L36. +[59] S. Iyer and C. M. Will, Black Hole Normal Modes: A WKB Approach. 1. Foundations and +Application of a Higher Order WKB Analysis of Potential Barrier Scattering, Phys. Rev. D +35 (1987) 3621. +[60] J. W. Guinn, C. M. Will, Y. Kojima, and B. F. Schutz, High Overtone Normal Modes of +Schwarzschild Black Holes, Class. Quant. Grav. 7 (1990) L47. +[61] R. A. Konoplya, Quasinormal modes of the Schwarzschild black hole and higher order WKB +approach, J. Phys. Stud. 8 (2004) 93–100. +[62] R. A. Konoplya, Quasinormal behavior of the d-dimensional Schwarzschild black hole and +24 + +higher order WKB approach, Phys. Rev. D 68 (2003) 024018, [gr-qc/0303052]. +[63] J. Matyjasek and M. Opala, Quasinormal modes of black holes. The improved semianalytic +approach, Phys. Rev. D 96 (2017), no. 2 024011, [arXiv:1704.00361]. +[64] G. T. Horowitz and V. E. Hubeny, Quasinormal modes of AdS black holes and the approach +to thermal equilibrium, Phys. Rev. D 62 (2000) 024027, [hep-th/9909056]. +[65] E. W. Leaver, An Analytic representation for the quasi normal modes of Kerr black holes, +Proc. Roy. Soc. Lond. A 402 (1985) 285–298. +[66] H. Ciftci, R. L. Hall, and N. Saad, Perturbation theory in a framework of iteration methods, +Phys. Lett. A 340 (2005) 388–396, [math-ph/0504056]. +[67] H. T. Cho, A. S. Cornell, J. Doukas, and W. Naylor, Black hole quasinormal modes using +the asymptotic iteration method, Class. Quant. Grav. 27 (2010) 155004, [arXiv:0912.2740]. +[68] H. T. Cho, A. S. Cornell, J. Doukas, T. R. Huang, and W. Naylor, A New Approach to +Black Hole Quasinormal Modes: A Review of the Asymptotic Iteration Method, Adv. Math. +Phys. 2012 (2012) 281705, [arXiv:1111.5024]. +[69] J. P. Boyd, Chebyshev & Fourier Spectral Methods, Courier Dover Publications. +[70] A. Jansen, Overdamped modes in Schwarzschild-de Sitter and a Mathematica package for +the numerical computation of quasinormal modes, Eur. Phys. J. Plus 132 (2017), no. 12 +546, [arXiv:1709.09178]. +[71] J.-P. Wu and P. Liu, Quasi-normal modes of holographic system with Weyl correction and +momentum dissipation, Phys. Lett. B 780 (2018) 616–621, [arXiv:1804.10897]. +[72] G. Fu and J.-P. Wu, EM Duality and Quasinormal Modes from Higher Derivatives with +Homogeneous Disorder, Adv. High Energy Phys. 2019 (2019) 5472310, +[arXiv:1812.11522]. +[73] G. Fu, D. Zhang, P. Liu, X.-M. Kuang, Q. Pan, and J.-P. Wu, Quasi-normal modes and +Hawking radiation of a charged Weyl black hole, arXiv:2207.12927. +[74] W. Xiong, P. Liu, C.-Y. Zhang, and C. Niu, Quasi-normal modes of the +Einstein-Maxwell-aether Black Hole, arXiv:2112.12523. +[75] P. Liu, C. Niu, and C.-Y. Zhang, Linear instability of charged massless scalar perturbation +in regularized 4D charged Einstein-Gauss-Bonnet anti de-Sitter black holes, Chin. Phys. C +45 (2021), no. 2 025111. +[76] P. Liu, C. Niu, and C.-Y. Zhang, Instability of regularized 4D charged +25 + +Einstein-Gauss-Bonnet de-Sitter black holes, Chin. Phys. C 45 (2021), no. 2 025104. +[77] J. L. Jaramillo, R. Panosso Macedo, and L. Al Sheikh, Pseudospectrum and Black Hole +Quasinormal Mode Instability, Phys. Rev. X 11 (2021), no. 3 031003, [arXiv:2004.06434]. +[78] J. L. Jaramillo, R. Panosso Macedo, and L. A. Sheikh, Gravitational wave signatures of +black hole quasi-normal mode instability, arXiv:2105.03451. +[79] K. Destounis, R. P. Macedo, E. Berti, V. Cardoso, and J. L. Jaramillo, Pseudospectrum of +Reissner-Nordstr¨om black holes: Quasinormal mode instability and universality, Phys. Rev. +D 104 (2021), no. 8 084091, [arXiv:2107.09673]. +[80] L. A. H. Mamani, A. D. D. Masa, L. T. Sanches, and V. T. Zanchin, Revisiting the +quasinormal modes of the Schwarzschild black hole: Numerical analysis, arXiv:2206.03512. +[81] V. Cardoso, A. S. Miranda, E. Berti, H. Witek, and V. T. Zanchin, Geodesic stability, +Lyapunov exponents and quasinormal modes, Phys. Rev. D 79 (2009), no. 6 064016, +[arXiv:0812.1806]. +[82] S.-W. Wei and Y.-X. Liu, Null Geodesics, Quasinormal Modes, and Thermodynamic Phase +Transition for Charged Black Holes in Asymptotically Flat and dS Spacetimes, Chin. Phys. +C 44 (2020), no. 11 115103, [arXiv:1909.11911]. +[83] K. Jusufi, Quasinormal Modes of Black Holes Surrounded by Dark Matter and Their +Connection with the Shadow Radius, Phys. Rev. D 101 (2020), no. 8 084055, +[arXiv:1912.13320]. +[84] H. Guo, H. Liu, X.-M. Kuang, and B. Wang, Acoustic black hole in Schwarzschild +spacetime: quasi-normal modes, analogous Hawking radiation and shadows, Phys. Rev. D +102 (2020) 124019, [arXiv:2007.04197]. +[85] C. Liu, T. Zhu, Q. Wu, K. Jusufi, M. Jamil, M. Azreg-A¨ınou, and A. Wang, Shadow and +quasinormal modes of a rotating loop quantum black hole, Phys. Rev. D 101 (2020), no. 8 +084001, [arXiv:2003.00477]. [Erratum: Phys.Rev.D 103, 089902 (2021)]. +[86] R. Ling, H. Guo, H. Liu, X.-M. Kuang, and B. Wang, Shadow and near-horizon +characteristics of the acoustic charged black hole in curved spacetime, Phys. Rev. D 104 +(2021), no. 10 104003, [arXiv:2107.05171]. +[87] L. Bombelli and E. Calzetta, Chaos around a black hole, Class. Quant. Grav. 9 (1992) +2573–2599. +[88] N. J. Cornish and J. J. Levin, Lyapunov timescales and black hole binaries, Class. Quant. +26 + +Grav. 20 (2003) 1649–1660, [gr-qc/0304056]. +[89] K. Lin and W.-L. Qian, Echoes in star quasinormal modes using an alternative finite +difference method, arXiv:2204.09531. +[90] Z. Zhu, S.-J. Zhang, C. E. Pellicer, B. Wang, and E. Abdalla, Stability of +Reissner-Nordstr¨om black hole in de Sitter background under charged scalar perturbation, +Phys. Rev. D 90 (2014), no. 4 044042, [arXiv:1405.4931]. [Addendum: Phys.Rev.D 90, +049904 (2014)]. +[91] E. Abdalla, C. E. Pellicer, J. de Oliveira, and A. B. Pavan, Phase transitions and regions of +stability in Reissner-Nordstr¨om holographic superconductors, Phys. Rev. D 82 (2010) +124033, [arXiv:1010.2806]. +[92] Z.-H. Yang, G. Fu, X.-M. Kuang, and J.-P. Wu, Instability of de-Sitter black hole with +massive scalar field coupled to Gauss–Bonnet invariant and the scalarized black holes, Eur. +Phys. J. C 82 (2022), no. 10 868, [arXiv:2112.15052]. +[93] LIGO Scientific, Virgo Collaboration, B. P. Abbott et al., Observation of Gravitational +Waves from a Binary Black Hole Merger, Phys. Rev. Lett. 116 (2016), no. 6 061102, +[arXiv:1602.03837]. +[94] R. A. Konoplya and A. Zhidenko, Quasinormal modes of black holes: From astrophysics to +string theory, Rev. Mod. Phys. 83 (2011) 793–836, [arXiv:1102.4014]. +[95] K. D. Kokkotas and B. G. Schmidt, Quasinormal modes of stars and black holes, Living +Rev. Rel. 2 (1999) 2, [gr-qc/9909058]. +[96] C. Gundlach, R. H. Price, and J. Pullin, Late time behavior of stellar collapse and +explosions: 1. Linearized perturbations, Phys. Rev. D 49 (1994) 883–889, [gr-qc/9307009]. +[97] R. H. Price, Nonspherical Perturbations of Relativistic Gravitational Collapse. II. +Integer-Spin, Zero-Rest-Mass Fields, Phys. Rev. D 5 (1972) 2439–2454. +[98] R. H. Price, Nonspherical perturbations of relativistic gravitational collapse. 1. Scalar and +gravitational perturbations, Phys. Rev. D 5 (1972) 2419–2438. +[99] M. Lagos, P. G. Ferreira, and O. J. Tattersall, Anomalous decay rate of quasinormal modes, +Phys. Rev. D 101 (2020), no. 8 084018, [arXiv:2002.01897]. +[100] A. Arag´on, P. A. Gonz´alez, E. Papantonopoulos, and Y. V´asquez, Anomalous decay rate of +quasinormal modes in Schwarzschild-dS and Schwarzschild-AdS black holes, JHEP 08 +(2020) 120, [arXiv:2004.09386]. +27 + +[101] A. Arag´on, R. B´ecar, P. A. Gonz´alez, and Y. V´asquez, Massive Dirac quasinormal modes +in Schwarzschild–de Sitter black holes: Anomalous decay rate and fine structure, Phys. Rev. +D 103 (2021), no. 6 064006, [arXiv:2009.09436]. +[102] R. D. B. Fontana, P. A. Gonz´alez, E. Papantonopoulos, and Y. V´asquez, Anomalous decay +rate of quasinormal modes in Reissner-Nordstr¨om black holes, Phys. Rev. D 103 (2021), +no. 6 064005, [arXiv:2011.10620]. +[103] P. A. Gonz´alez, E. Papantonopoulos, J. Saavedra, and Y. V´asquez, Quasinormal modes for +massive charged scalar fields in Reissner-Nordstr¨om dS black holes: anomalous decay rate, +JHEP 06 (2022) 150, [arXiv:2204.01570]. +[104] P. A. Gonz´alez, E. Papantonopoulos, A. Rinc´on, and Y. V´asquez, Quasinormal modes of +massive scalar fields in four-dimensional wormholes: Anomalous decay rate, Phys. Rev. D +106 (2022), no. 2 024050, [arXiv:2205.06079]. +[105] R.Ruffini, in Black Holes: les Astres Occlus, Gordon and Breach Science Publishers. +[106] V. Cardoso, Quasinormal modes and gravitational radiation in black hole spacetimes, other +thesis, 12, 2003. +[107] S. Chandrasekhar, The Mathematical Theory of Black Holes, Oxford University Press, New +York. +[108] V. Perlick, O. Y. Tsupko, and G. S. Bisnovatyi-Kogan, Influence of a plasma on the shadow +of a spherically symmetric black hole, Phys. Rev. D 92 (2015), no. 10 104031, +[arXiv:1507.04217]. +[109] H.-J. Blome and B. Mashhoon, Quasi-Normal Oscillations Of A Schwarzschild Black Hole, +Phys. Lett. A110, 231. +[110] M. S. Churilova, Analytical quasinormal modes of spherically symmetric black holes in the +eikonal regime, Eur. Phys. J. C 79 (2019), no. 7 629, [arXiv:1905.04536]. +28 + diff --git a/3tFAT4oBgHgl3EQfERy2/content/tmp_files/load_file.txt b/3tFAT4oBgHgl3EQfERy2/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..babb12aed4963c8e0e429e3f390d69657d3ed72a --- /dev/null +++ b/3tFAT4oBgHgl3EQfERy2/content/tmp_files/load_file.txt @@ -0,0 +1,1405 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf,len=1404 +page_content='Peculiar properties in quasi-normal spectra from loop quantum gravity effect Guoyang Fu1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='∗ Dan Zhang 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='† Peng Liu 3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='‡ Xiao-Mei Kuang1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='§ and Jian-Pin Wu1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4¶ 1 Center for Gravitation and Cosmology,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' College of Physical Science and Technology,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yangzhou University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yangzhou 225009,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' China 2 Key Laboratory of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Synergetic Innovation Center for Quantum Effects and Applications,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' and Department of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Hunan Normal University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Changsha,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Hunan 410081,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' China 3 Department of Physics and Siyuan Laboratory,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jinan University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Guangzhou 510632,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' China and 4 Shanghai Frontier Science Center for Gravitational Wave Detection, Shanghai Jiao Tong University, Shanghai 200240, China Abstract We investigate the quasi-normal mode (QNM) spectra for scalar and electromagnetic fields over a covairant loop quantum gravity black hole (LQG-BH).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For the fundamental modes, the LQG effect reduces the oscillations in the scalar field, however it induces stronger oscillations in the elec- tromagnetic field, comparing to the classical case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Under the scalar field perturbation, the system enjoys faster decaying modes with more oscillations than the electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Some peculiar phenomena emerge in the scalar field’s QNM spectra with high overtones for the angular quantum numbers l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is that the LQG-BH has a larger real part of QNM with high overtones than the Schwarzschild black hole (SS-BH).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Such an anomalous phenomenon results in the oscillation of the scalar field in the LQG-BH to be nearly identical to that in the SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, the high overtone modes of the scalar field in LQG-BH play an important role in the modes with l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This anomalous phenomenon, however, does not occur in the electromagnetic field’s QNM spectra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' ∗FuguoyangEDU@163.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='com †danzhanglnk@163.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='com ‡phylp@email.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='jnu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='cn §xmeikuang@yzu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='cn ¶jianpinwu@yzu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='cn 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='08421v1 [gr-qc] 20 Jan 2023 I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' INTRODUCTION A non-perturbative and background-independent technique, loop quantum gravity (LQG) [1–4], provides a scenario for quantizing space-time structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This approach has been suc- cessfully applied to quantize symmetry reduced cosmological space-times, known as loop quantum cosmology (LQC) [5–12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Effective LQC theory can be constructed by incorporat- ing two key quantum gravity effects, namely the inverse volume correction and the holonomy correction, which can be achieved using both the canonical approach [13–18] and the path integral perspectives [19–25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The quantum gravity effects in LQC can be connected to low-energy physics, resulting in a solvable cosmological model for studying quantum gravity effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In particular, the big bang singularity in classical general relativity (GR) is suc- cessfully avoided by the quantum gravity effects [5–12, 26–31], which instead result in a non-singular big bounce even at the semi-classical level [32, 33].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Following the same idea in LQC [5–12], several effective black holes (BH) models with LQG corrections have been constructed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Up to date, most of effective LQG-BHs are im- plemented through the input of the holonomy correction;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' see, for example, [34–44] and references therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A common feature of LQG-BHs is that the singularity is replaced by a transition surface between a trapped and an anti-trapped region, which can be understood as the interior region of black hole and white hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The heart of the holonomy correction is the phase space regularisation technique called polymerisation [45].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Because of this, the effective LQG-BH with holonomy correction is also known as the polymer BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The basic idea behind polymerisation is the replacement of the conjugate momentum p with their regularised counterpart sin(¯λp)/¯λ, where ¯λ is a quantity known as polymerisation scale, which is linked to the area-gap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Depending on whether the polymerization scale is constant or phase space dependent function, the polymer BHs are classified into two basic types: µ0-type scheme In this scheme, the polymerization scale is assumed to remain constant over the whole phase space [34–38].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This approach has the drawback that the final result is reliant on the fiducial structures, which are introduced in the construction of the classical phase space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In addition, even in the low-curvature regimes, significant quantum effects may manifest, making these models unphysical.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 ¯µ-type scheme The polymerization scale in ¯µ-type scheme is chosen to be a function of the phase space [39–42] such that the dependency on fiducial structures is removed, though in this scheme significant quantum corrections near the horizon may still survive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Further, to fix the problems mentioned above, the authors in [46, 47] came up with an generalized version of the µ0-scheme in which the polymerization scale relies on the black hole mass such that it stays the same only along the dynamical trajectories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This effective model does remove the problems described above, namely, the dependence on fiducial structures and the large quantum effects that emerge in the low-curvature regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This model, however, also suffers from mass amplifications when crossing the transition surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' More recently, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Olmedo, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh proposed an improved version of the generalized µ0-scheme [48, 49], which is now known as the AOS model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The polymerization scale in this model is thought to depend on the effective Hamiltonian itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This model is quite interesting since it removes not only the drawbacks of the µ0-scheme, but also the mass amplifications in the primitive version of the generalized µ0-scheme [46, 47].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' However, the covariance in the aforementioned models is usually broken [50–53].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Follow- ing the idea of the anomaly-free polymerization in [54], the authors in [55, 56] construct a covariant model of a spherically symmetric BH with holonomy correction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The polymeriza- tion scale ¯λ is a constant in this model, and it is related to a fundamental length scal r0 by a constant of motion m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The resulting geometry corresponds to a singularity-free inte- rior region and two asymptotically flat exterior regions of equal mass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is expected that this covariant model can alleviate certain long-standing concerns in the LQG community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, it certainly deserves further exploration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In this paper, we will mainly study the properties of the quasi-normal modes (QNMs) of a probe scalar field and a probe Maxwell field over this covariant polymer BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' As we all know, during the ringdown phase of binary system coalescence, the BH emits the gravita- tional waves (GWs) with typical discrete frequencies, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=', quasi-normal frequencies (QNFs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' According to [57], QNFs encode decaying scales and damped oscillating frequencies .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cer- tainly, quantum effects have the imprints in the QNM spectra, which are expected to be detected in GW observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Also, conversely, GW detection will serve as an important criterion for the correctness of candidate quantum gravity theories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 3 Our paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In section II, we present a brief discussion on the effective potentials of scalar and Maxwell fields over the covariant LQG-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Section III is dedicated to the properties of the QNM spectra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Then, we further study the ringdown waveform in section IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We present the conclusions and discussions in section V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Appendixes A and B present the detailed derivation of the wave equations and the QNMs in the eikonal limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' SCALAR FIELD AND MAXWELL FIELD OVER A COVARIANT LQG-BH In [55, 56], the authors proposed a novel effective LQG black hole model with holonomy correction that is covariant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The exterior geometry of this covariant LQG black hole is given by ds2 = −f(r)dt2 + 1 g(r)f(r)dr2 + r2dΩ2 , f(r) = 1 − 2m r , g(r) = 1 − r0 r .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (1) Thanks to the quantum gravity effects, a new length scale r0 is introduced r0 = 2m ¯λ2 1 + ¯λ2 , (2) where the parameter ¯λ is a dimensionless constant related to the fiducial length of the holonomies and m is a constant of motion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The length scale r0 define a minimum area r2 0 of this model [55, 56].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In the ¯λ → ∞ limit, this new length scale vanishes, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=', r0 = 0, restoring the classical Schwarzschild black hole is recovered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In addition, as we move to the low curvature regions, the quantum gravity effects die off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Without loss of generality, we shall set m = 1/2 through this paper, which leads to the horizon located at rh = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We focus on the perturbations of the massless scalar field Φ and electromagnetic field Aµ over this LQG black hole and study their response.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We write down the covariant equations for the test scalar field and electromagnetic field as follows: 1 √−g(gµν√−gΦµ),ν = 0 , (3) 1 √−g(gαµgσν√−gFασ),ν = 0 , (4) where Fασ = ∂αAσ − ∂σAα is the field strength of the Maxwell field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' After the separation of variables, the aforementioned equations can be packaged into the Schr¨odinger-like form (for 4 more details, see Appendix A) ∂2Ψ ∂r2 ∗ + (ω2 − Veff)Ψ = 0 , (5) where r∗ is the tortoise coordinate and Veff is the effective potentials: Veff = f(r)l(l + 1) r2 + 1 − s r d dr∗ f(r) � g(r) , (6) with l being the angular quantum numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' s = 0 and s = 1 correspond to the scalar field and electromagnetic field, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1 and 2 demonstrate the effective potentials as a function of r∗ for scalar and electromagnetic fields with different l and r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is found that both effective potentials are positive, indicating the LQG black hole is stable under scalar and electromagnetic perturbations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Furthermore, we would like to compare the differences in effective potentials between scalar and electromagnetic fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is easy to find that for the electromagnetic field (s = 1), the second term in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (6) vanishes, such that all the peaks of the effective potentials Vel have the same height for different r0 (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' However, for the scalar field, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=', s = 0, the second term in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (6) survives and the height of the effective potential Vs depends on r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In particular, with increasing r0, the height of Vs decreases (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The shape of the effective potentials shall definitely results in different properties of the QNMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' r0=0 r0=1/4 r0=1/2 r0=3/4 10 10 20 r* 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='10 Vs(r) l=0 r0=0 r0=1/4 r0=1/2 r0=3/4 10 10 20 r* 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 Vs(r) l=1 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 1: The effective potentials Vs(r∗) of the scalar field for different r0 with fixed l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 5 r0=0 r0=1/4 r0=1/2 r0=3/4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='275 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='280 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='285 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='290 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='295 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='300 10 10 20 r* 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='30 Vel(r) l=1 r0=0 r0=1/4 r0=1/2 r0=3/4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='86 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='87 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='88 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='89 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='90 10 10 20 r* 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 Vel(r) l=2 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2: The effective potentials Vel(r∗) of the electromagnetic field for different r0 with fixed l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' QUASI-NORMAL MODES In this section, we investigate the QNMs spectra and specially focus on the effects from quantum gravity corrections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The nature of determining the QNMs is to solve the eigenvalue problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' To this end, we will impose a purely outgoing wave at infinity and purely ingoing wave at the horizon: horizon: ∂tΨ − ∂r∗Ψ = 0, infinity: ∂tΨ + ∂r∗Ψ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (7) By solving Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (5) with the aforementioned boundary conditions, numerous techniques have been developed to determining the QNMs spectra, such as the WKB method [58–63], Horowitz-Hubeny method [64], continued fraction method [65], asymptotic iteration method [66–68], pseudo-spectral method [69, 70], and so on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In this paper, we will solve the eigen- value problem using the pseudo-spectral method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For more applications of pseudo-spectral method in determining the QNMs in the black hole physics, we can refer to [71–80] and references therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is convenient to work in the Eddington-Finkelstein coordinate, which makes the wave equation (5) is linear in the frequency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' To achieve this goal, it is direct to make a transformation as r → 1/u and Ψ = e−iωr∗(u)ψ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (8) 6 Then, the wave equation (5) turns into the following form: ψ′′(u) + � f ′(u) f(u) + g′(u) 2g(u) + 2iω u2f(u) � g(u) � ψ′(u) −1 u � 2iω u2f(u) � g(u) + Veff(u) u3f(u)2g(u) + f ′(u) f(u) + g′(u) 2g(u) � ψ(u) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (9) Combining with the boundary conditions (7), one can solve Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (9) by the pseudo-spectral method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='17 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='19 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='21 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='22 Reω l=0, n=0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14 Imω l=0, n=0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='570 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='575 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='580 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='585 Reω l=1, n=0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14 Imω l=1, n=0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 3: QNFs as a function of r0 for the scalar field perturbation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Now, we evaluate the QNM spectra for various values of the free parameter r0 to explore the LQG effects on these spectra, as well as the differences between them and those of the Schwarzschild black hole (r0 = 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' First, we focus on the fundamental modes and show the QNF as a function of r0 in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3 for the scalar field and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 for the electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The main properties are presented as what follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For scalar field, the real parts of the QNF, Reω decreases with increasing r0 (left plots in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It means that the LQG effect reduces the oscillations in comparison to 7 the Schwarzschild black hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' By contrast, Reω of the electromagnetic field exhibits an inverse tendency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' That is, when r0 increases, so does Reω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' As a result, the LQG effect produces stronger oscillations in the electromagnetic field than that of the Schwarzschild black hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Whether for scalar or electromagnetic field, the imaginary part of QNF Imω al- ways lives in the lower half-plane, and their absolute values are less than that of the Schwarzschild black hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, the system is stable in the presence of scalar or electromagnetic field perturbations, and the LQG effect results in faster decaying modes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' When we fix r0, the scalar field has larger absolute values of Reω or Imω than the electromagnetic field (see Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3 and 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It indicates that in comparison to the elec- tromagnetic field, the system under scalar field perturbation enjoys faster decaying modes with greater oscillations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='500 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='505 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='510 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='515 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='520 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='525 Reω l=1, n=0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12 Imω l=1, n=0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='920 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='925 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='930 Reω l=2, n=0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12 Imω l=2, n=0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 4: QNFs as a function of r0 for the electromagnetic field perturbation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We also work out the QNM spectra with high overtones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Table I shows the results for 8 scalar field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For l = 0, we see that the LQG-BH has a lower Reω than the Schwarzschild black hole (SS-BH).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This is consistent with the fundamental mode’s behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The most striking difference occurs at the case with l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' To demonstrate this, we define the difference in QNFs between SS-BH (r0 = 0) and LQG-BH (r0 ̸= 0) as follows: δω = ωLQG − ωSS .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (10) Observing the left plot in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5 (also see the second column in Table I), Reω with high overtones is larger for the LQG-BH than the SS-BH for l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It indicates that the overtones may play an important role in the modes with l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We shall testify this point by the time evolution of the field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We also briefly address the properties of the QNMs for the electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Table II shows the QNM spectra for the electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is found that for all modes, Reω for the LQG-BH is always smaller than that of the SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It differs from the scalar field, where Reω with high overtones is larger for the LQG-BH than the SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This discrepancy also results in the corresponding difference in the evolutions of the scalar field and the electromagnetic field, which will be addressed below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' l = 0 l = 1 n ω (r0 = 0) ω (r0 = 1/2) ω (r0 = 0) ω (r0 = 1/2) 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='220910-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='209792i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='200799-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='164527i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='585872-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='195320i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='579649-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='158265i 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='172223-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='696106i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='160438-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='534669i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='528897-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='612515i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='547089-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='487735i 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='151564-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='202642i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='126266-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='921455i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='459079-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='080267i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='502191-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='843179i 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='142272-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='705216i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='076951-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='314823i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='406517-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='576596i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='461392-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='216781i 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='134739-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='211987i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='053109-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='808749i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='370218-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='081524i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='426854-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='597881i 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='129639-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='712112i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='098367-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='213623i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='344154-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='588236i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='395550-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='981462i TABLE I: The QNM spectra for the scalar field perturbation with different n, l, and r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 9 r0=1/100 r0=1/10 r0=1/2 1 2 3 4 n 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='03 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='06 δReω l=1 r0=1/100 r0=1/10 r0=1/2 1 2 3 4 n 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5 δImω l=1 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 5: The difference of QNFs of scalar field for the mode with l = 1 between the LQG-BH and SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' l = 1 l = 2 n ω (r0 = 0) ω (r0 = 1/2) ω (r0 = 0) ω (r0 = 1/2) 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='496527-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='184975i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='513377-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='152855i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='915191-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='190009i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='924716-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='155637i 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='429031-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='587335i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='476434-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='474099i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='873085-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='581420i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='901934-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='472399i 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='349547-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='050375i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='427459-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='825862i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='802373-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='003175i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='862549-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='803573i 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='292353-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='543818i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='385422-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='197325i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='725190-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='460397i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='816205-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='152343i 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='253105-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='045090i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='351646-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='576036i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='657473-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='943219i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='770903-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='515796i 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='224562-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='547950i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='322640-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='956797i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='602986-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='439431i 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='730157-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='888692i TABLE II: The QNM spectra for the electromagnetic field perturbation with different system parameters n, l and r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Finally, we will discuss the properties of the QNMs in the eikonal limit (l → ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In [81], Cardoso et al have demonstrated that, in the eikonal limit, QNMs may be connected with the behavior of null particle trapped on the unstable circular geodesic of the spacetime, which have been validated in most static, spherically symmetric, asymptotically flat spacetime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The Reω is determined by the angular velocity Ωc at the unstable null geodesic [82–86], whereas the Imω is connected to the Lyapunov exponent λ [87, 88].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In the LQG-BH background, we can calculate the QNMs in the eikonal limit, which is given by ω = Ωcl − i � n + 1 2 � |λ| .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (11) 10 For the detailed calculation, we can refer to Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is found that as SS-BH, the angular velocity Ωc is completely determined by the black hole mass: Ωc = 1 3 √ 3m .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (12) Therefore, the Reω is independent of the LQG parameter r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' While the Lyapunov exponent λ is given by λ = � − r2 c f(rc) � d2 dr2 ∗ f(r) r2 � ��� r=rc , (13) where rc is the radius of the photon sphere.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Obviously, the Lyapunov exponent is affected by the LQG correction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Left plot in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 shows the Lyapunov exponent λ as a function of r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We see that the Lyapunov exponent decreases with r0 increasing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Correspondingly, the absolution value of Imω is suppressed by the the LQG effect (see the right plot in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0r0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12 |λ|/2 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='60 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='65 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='70 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12 Re ω Im ω l=100,n=0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 6: Left plot: The Lyapunov exponent λ as a function of the LQG corrected parameter r0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Right plot: The QNFs for different r0 for large l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We notice that since the real part of QNF is independent of the LQG parameter r0 in the eikonal limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, we expect that as l increases, the difference in Reω between LQG-BH and SS-BH will be suppressed and vanish.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='7 validates this argument that as l increases, the difference rapidly decreases and goes to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 11 90 92 94 96 98 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='000100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='000098 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='000096 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='000094 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='000092 20 40 60 80 100l 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='020 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='015 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='010 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='005 δReω n=0 90 92 94 96 98 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00040 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00041 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00042 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00043 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00044 20 40 60 80 100 l 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='010 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='005 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='005 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='010 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='015 δReω n=1 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 7: The difference of QNFs of scalar field between the LQG-BH and SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Left plot is for n = 0 and right plot for n = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' RINGDOWN WAVEFORM In this section, we will study the time evolution of the scalar and electromagnetic per- turbations, which help us to further know the total contributions from overtones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Here, we will use the finite difference method (FDM) technics to implement the dynamical evolution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For more details on the FDM, we can refer to Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [73, 89–92] and references therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' To this end, we write the wave equation in difference form as −(Ψi+1,j − 2Ψi,j + Ψi−1,j) △t2 + (Ψi,j+1 − 2Ψi,j + Ψi,j−1) △r2 ∗ − VjΨi,j + O(△t2) + O(△r2 ∗) = 0 , (14) where △t and △r∗ are the time and radial intervals, respectively, wihch are defined by t = i△t and r∗ = j△r∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The Vj is the discrete form of the effective potential (6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Then, the iterate formula is derived as: Ψi+1,j = −Ψi−1,j + △t2 △r2 ∗ (Ψi,j+1 + Ψi,j−1) + (2 − 2 △t2 △r2 ∗ − △t2Vj)Ψi,j .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (15) Notice that the Courant-Friedrichs-Lewy (CFL) condition for instability requires that △t/△r∗ < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Using the iterate formula (15) with the initial Gaussian distribution Ψ(r∗, t < 0) = 0 and Ψ(r∗, t = 0) = exp − (r∗−a)2 2b2 , one can obtain the ringdown profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In general, there are three different stages in time-evolution profile: initial outburst, quasinormal ringing, which depends only on the black hole’s characteristics and is very important for GW observations [57, 93–95], and the late tail, which exhibits the power-law 12 behavior for the asymptotically flat spacetimes or exponential behavior for asymptotically de-Sitter spacetimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We will focus on the properties of the latter two stages in this section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Schwarschild BH r0=1/4 r0=1/2 0 50 100 150 200 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='001 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='010 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='100 1 10 100 t |Ψs| l=0 Schwarschild BH r0=1/4 r0=1/2 0 50 100 150 200 10-9 10-7 10-5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='001 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='100 10 t |Ψs| l=1 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8: The time evolution of the scalar field |Ψs(r)| for different r0 with fixed l (left plot for l = 0 and right plot for l = 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Left plot in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 shows the time-domain profile for the scalar field perturbation with l = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In comparison to the SS-BH, the oscillation is slightly weaker and the decay becomes slower during the intermediate time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Recalling that both the real and imaginary parts of the fundamental QNF all reduce as the LQG corrected parameter r0 enhances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It suggests that in the scalar evolution of LQG-BH with l = 0 the fundamental QNMs dominate over the ones with high overtones, which is consistent with the case of SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' At asymptotically late-times, quasinormal ringing is suppressed, and it follows the same power-law tail as Ψ(t) ∼ t−(2l+3) for both LQG-BH and SS-BH [96–98].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' However, for multipoles l > 0, we observe some peculiar behavior that differs from that of l = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Carefully observing the right plot in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8, we find that the slope of quasinormal ringing is smaller for the LQG-BH than for the SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This observation is consistent with the QNFs, which show that the absolute value of Imω for all discrete overtones is smaller for the LQG-BH than for the SS-BH (see the right column in Table I).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Nevertheless, the oscillation for the LQG-BH is nearly coincide with that for the SS-BH (the right plot in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='8 and also see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Recalling that for l > 0, the LQG-BH has a lower Reω for the fundamental mode than the SS-BH, whereas the case is reversed for high overtones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It means that the contribution from the high overtone modes reduces the difference between the LQG-BH and SS-BH time-domain profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' That is, the high overtone modes in the Reω 13 of the LQG-BH play an important role in determining the oscillation of the time evolution of the scalar field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' r0=0 r0=1/100 r0=1/10 r0=1/4 0 10 20 30 40 50 30 20 10 0 10 20 30 40 t |Ψs| l=1 r0=0 r0=1/100 r0=1/10 r0=1/4 10 20 30 40 50 60 70 10-4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='001 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='010 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='100 1 10 t |Ψs| l=1 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 9: The time evolution of the scalar field |Ψs(r)| for different r0 with fixed l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Notice that the right plot is the semi-log plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Schwarschild BH r0=1/2 0 50 100 150 200 10-6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='001 1 t |Ψel| l=1 Schwarschild BH r0=1/2 0 50 100 150 200 10-9 10-6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='001 1 t |Ψel| l=2 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 10: The semi-log plot of the time evolution of the electromagnetic field |Ψel(r)| for different r0 with fixed l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We also study the time evolution of the electromagnetic field, as seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We observe that the slop of quasinormal ringing is smaller for the LQG-BH than the SS-BH, which is similar to the scalar field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' However, unlike in the case of scalar field, the oscillations of the LQG-BH and the SS-BH are not the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is expected because for l > 0, the anomalous phenomena seen in the QNMs of scalar field that Reω with high overtones is larger for the LQG-BH than the SS-BH does not happen for electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 14 V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' CONCLUSION AND DISCUSSION As the rapid development of the GW detection technics, it is expected to detect the quantum gravity effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' To extract substantial information from GW detectors, one must thoroughly know the main features and behaviors of QNM for LQG-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' As the first step, we investigate the QNM for scalar and electromagnetic fields over the covariant LQG-BH proposed in [55, 56].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The QNM spectra for scalar and electromagnetic fields share some common features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' But they also exhibit many different features and behaviors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' First, we focus on the fundamental modes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is found that the system is always stable under scalar field or electromagnetic field perturbations, and the LQG effect results in faster decaying modes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The difference is that the LQG effect reduces the oscillations in the scalar field, however it enhances oscillations in the electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In addition, we find that the system under the scalar field perturbation enjoys faster decaying modes with more oscillations than the electromagnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Some peculiar phenomena emerge in the scalar field QNM spectra with high overtones for l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is that the LQG-BH has a larger ωR with high overtones than the SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Such an anomalous phenomenon results in the oscillation of the scalar field in the LQG-BH to be nearly identical to that in the SS-BH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, the high overtone modes of the scalar field in LQG-BH play an important role in the modes with l > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This anomalous phenomenon, however, cannot be observed in the electromagnetic field’s QNM spectra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Finally, we comment some open questions deserving further exploration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It would be interesting to extend our investigation to the Dirac field and see if the peculiar property still emerges in the QNM spectra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It is definitely interesting and valuable to further study the QNM spectrum of the gravity perturbations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It provides us a platform for detecting quantum gravity effects using the GW detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In addition, we can examinate if the isospectrality still holds in this LQG-BH model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In [99], the anomalous decay rate of QNMs of a massive scalar field is observed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' De- pending on how large the mass of the scalar field is, the decay timescales of the QNMs either grow or decay with increasing angular harmonic numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' This anomalous be- havior is seen in much larger class models beyond a simple massive scalar field, see 15 [100–104] and references therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It will interesting to see how the LQG effect affects this anomalous behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We can also construct an effective rotating LQG-BH solution using the Newman-Janis algorithm, starting with this spherical sysmetric LQG-BH, and study the LQG effects on its QNM spectrum and shadow, allowing us to constrain the LQG parameters using the GW detector and the Event Horizon Telescope (EHT).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We plan to investigate these questions and publish our results in the near future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Acknowledgments This work is supported by National Key R&D Program of China (No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2020YFC2201400), the Natural Science Foundation of China under Grants No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 11905083, the Postgraduate Re- search & Practice Innovation Program of Jiangsu Province under Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' KYCX20 2973, the Postgraduate Scientific Research Innovation Project of Hunan Province, the Science and Technology Planning Project of Guangzhou (202201010655), the Fok Ying Tung Education Foundation under Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 171006, the Natural Science Foundation of Jiangsu Province under Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='BK20211601.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' is also supported by Top Talent Support Program from Yangzhou University.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Appendix A: Wave equations In this appendix, we will derive the wave equations for the scalar and electromagnetic fields in detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' First, we shall provide a generic version of the wave equation in a static spherically symmetric spacetime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The cases of scalar field and electromagnetic field are then discussed in detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Because the spacetime is static spherically symmetric, we can separate variables using the spherical function and write the radial equation in the form (K(r)S(r)ˆΨ′(r))′ + � ΛF(r) + K(r) ω2 S(r) � ˆΨ(r) = 0 , (A1) where ˆΨ is the radial part of the wave function, the coefficient functions {K , F , S} only depend on the radial coordinate r, and Λ is the separation constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' After introducing the 16 tortoise coordinate r∗ and redefining the wave function as dr∗ dr = 1 S(r) , ˆΨ(r) = Ψ � K(r) , (A2) Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A1) can be recasted into the following form d2Ψ(r∗) dr2 ∗ + (ω2 − Veff(r∗))Ψ(r∗) = 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A3) The above formula provides a general transformation from the usual wave equation to its Schr¨odinger-like counterpart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In the following, we will go over the specific form of the wave equations for scalar and electromagnetic fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For the scalar field equation, we perform the separation as Φ(t, r, θ, φ) = � l,m ˆΨ(r)e−iωtYlm(θ, φ), where Ylm(θ, φ) is the spherical harmonics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' When the particular form of the LQG-BH background (1) is substituted into the wave equation (A1), one obtains � r2f(r) � g(r)ˆΨ′(r) �′ + � r2ω2 f(r) � g(r) − l(l + 1) � g(r) � ˆΨ(r) = 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A4) We can read off the coefficient functions by comparing Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A4) to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A1) K(r) = r2 , S = f(r) � g(r) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A5) The Schr¨odinger-like version of the wave equation is then easily given as ∂2Ψ ∂r2 ∗ + (ω2 − Vs)Ψ = 0 , (A6) Vs = f(r)l(l + 1) r2 + 1 2r d drf(r)2g(r) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A7) For the electromagnetic field, we can expand the gauge field Aµ in vector spherical har- monics [105, 106], Aµ(t, r, θ, φ) = � l,m � � � � � � � � ������ 0 0 alm(r) sin θ ∂φYlm −alm(r) sin θ∂θYlm � ������ + � ������ plm(r)Ylm hlm(r)Ylm klm(r)∂θYlm klm(r)∂φYlm � ������ � � � � � � � e−iωt , (A8) where the first term is the odd (axial) perturbation and second term is even (polar) pertur- bation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Then, in the following, we will show how to derive the odd perturbation equation and even perturbation equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 17 When we switch on the odd electromagnetic field perturbation, we can explicitly write down the radial equation as � f(r) � g(r)a′ lm(r) �′ + � ω2 f(r) � g(r) − l(l + 1) r2� g(r) � alm(r) = 0 , (A9) It is easy to find that K = 1 and S = f(r) � g(r).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Thus, we have Vodd = f(r)l(l + 1) r2 , (A10) where Ψ = alm(r).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For the even perturbation of the electromagnetic field, the radial equation becomes p′′ lm(r) + q(r)p′ lm(r) + iω (h′ lm(r) + q(r)hlm(r)) + l(l + 1) r2f(r)g(r)(plm(r) + iωklm(r)) = 0 , −iωp′ lm(r) + ω2hlm(r) + l(l + 1) r2 f(r)(−hlm(r) + k′ lm(r)) = 0 , (A11) where q(r) = 2 r + g′(r) 2g(r).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' After introducing a new variable ˆΨ(r) = −p′ lm(r) − iωhlm(r) , (A12) Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A11) can be reduced to (r4f(r)g(r)3/2 ˆΨ′(r))′ + � r4ω2� g(r) f(r) − l(l + 1)r2 � g(r) + 1 2J(r) � ˆΨ(r) = 0 (A13) where J(r) = r2� g(r)(rf ′(r)(4g(r) + rg′(r)) + f(r)(4g(r) + r(6g′(r) + rg′′(r)))).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Thus, the coefficient functions are K = r4� g(r) and S = f(r) � g(r) and then we have Veven = f(r)l(l + 1) r2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (A14) We find that the effective potentials for odd and even electromagnetic field perturbations are the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, we will use Vel to signify the effective potential of the electromagnetic field rather than Vodd and Veven.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Appendix B: QNMs in the eikonal limit In this appendix, we will show the connection between the QNMs in the eikonal limit and the behavior of null particle trapped on the unstable circular geodesic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' For a null particle, 18 the Lagrange is1 L(x, ˙x) = 1/2gµν ˙xµ ˙xν .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B1) We start with the spherically symmetric geometry (1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Thanks to the symmetry, one can only consider the geodesics in the equatorial plane: θ = π/2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Then the Lagrangian (B1) becomes 2L = −f(r)˙t2 + ˙r2 f(r)g(r) + r2 ˙φ2 , (B2) where the dot represents the derivative with respect to the affine parameter τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In this system, there are two constants of the motion, which are Pt = −f(r)˙t = −E , Pφ = r2 ˙φ = L .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B3) Using the canonical transform and combining the above equations (B2) and (B3), we have the following reduced Hamiltonian system: 2H = E ˙t + ˙r2 f(r)g(r) + L ˙φ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B4) Since the Hamiltonian H satisfies the constraint H = 0, we have ˙r2 + Veff = 0 , (B5) where the effective potential is Veff = g(r) �L2 r2 f(r) − E2 � , (B6) Because ˙r2 > 0, the photon can only emerge in the area of negative potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' When the angular momentum is small, the photon will fall from infinity into the black hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' However, for the large angular momentum, the photon will escape the bondage of the black hole and go back to infinity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, the critical circular orbit for the photon can be derived from the unstable conditions Veff = 0 , ∂Veff ∂r = 0 , ∂2Veff ∂r2 < 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B7) 1 For the calculation details of the geodesic of a null particle, please refer to [81, 82, 107, 108].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 19 From the above conditions, we can obtain the equation for the critical radius rc 2fc(r) = rcf ′ c(r) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B8) Correspondingly, we have the critical impact parameters bc: bc = L E = rc � fc(r) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B9) Then, the shadow radius Rs and Lyapunov exponents λ can be calculated as follows: Rs = � ζ2 + η2 = bc = 3 √ 3m , (B10) λ = � V ′′ eff 2˙t2 = � − r2 c f(rc) � d2 dr2 ∗ f(r) r2 � ��� r=rc , (B11) where {ζ , η} are the celestial coordinates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' We find that the shadow radius reduces to the one of SS-BH [109, 110].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' It means that the LQG effect doesn’t change the shape of the shadow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' However, the LQG correction affects the Lyapunov exponent λ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' On the other hand, we shall use the first order WKB approximation to obtain the analytic form of the QNMs in the eikonal limit (l → ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' In this limit, the last term of the effective potential (6) can be ignored, resulting in the following form of the effective potential V∞(r) = f(r) l2 r2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B12) Reminding that the potential (B6) and (B12) are the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Therefore, in the eikonal limit, the QNMs may be obtained by the multiples of the frequency and the instability timescale of the unstable circular null geodesic [81]: ω = Ωcl − i(n + 1 2)|λ| , (B13) where Ωc is the angular velocity and can be worked out as Ωc = ˙φ ˙t = 1 bc .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' (B14) [1] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rovelli, Quantum Gravity, Cambridge University Press, Cambridge, UK (2004).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [2] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Thiemann, Modern canonical quantum general relativity, gr-qc/0110034.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 20 [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lewandowski, Background independent quantum gravity: A Status report, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 21 (2004) R53, [gr-qc/0404018].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [4] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Han, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Huang, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, Fundamental structure of loop quantum gravity, Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 16 (2007) 1397–1474, [gr-qc/0509064].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [5] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, Absence of singularity in loop quantum cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 86 (2001) 5227–5230, [gr-qc/0102069].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [6] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pawlowski, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Quantum nature of the big bang, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 96 (2006) 141301, [gr-qc/0602086].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [7] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pawlowski, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Quantum Nature of the Big Bang: An Analytical and Numerical Investigation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=', Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 73 (2006) 124038, [gr-qc/0604013].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pawlowski, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Quantum Nature of the Big Bang: Improved dynamics, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 74 (2006) 084003, [gr-qc/0607039].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [9] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lewandowski, Mathematical structure of loop quantum cosmology, Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 7 (2003), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 233–268, [gr-qc/0304074].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [10] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, Loop quantum cosmology, Living Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 (2005) 11, [gr-qc/0601085].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Loop Quantum Cosmology: A Status Report, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 28 (2011) 213001, [arXiv:1108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0893].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [12] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wilson-Ewing, Testing loop quantum cosmology, Comptes Rendus Physique 18 (2017) 207–225, [arXiv:1612.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04551].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [13] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Taveras, Corrections to the Friedmann Equations from LQG for a Universe with a Free Scalar Field, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 78 (2008) 064072, [arXiv:0807.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3325].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [14] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ding, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yang, Effective Scenario of Loop Quantum Cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 102 (2009) 051301, [arXiv:0808.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0990].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ding, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, Alternative quantization of the Hamiltonian in loop quantum cosmology II: Including the Lorentz term, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B 682 (2009) 1–7, [arXiv:0904.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4379].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [16] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Tsobanjan, Effective Constraints for Relativistic Quantum Systems, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 80 (2009) 125008, [arXiv:0906.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1772].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [17] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Tsobanjan, Effective Constraints and Physical Coherent States in Quantum Cosmology: A Numerical Comparison, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 27 (2010) 145004, [arXiv:0911.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4950].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 21 [18] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brizuela, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Hernandez, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Koop, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Morales-Tecotl, High-order quantum back-reaction and quantum cosmology with a positive cosmological constant, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 84 (2011) 043514, [arXiv:1011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3022].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [19] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Campiglia, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Henderson, Loop Quantum Cosmology and Spin Foams, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B 681 (2009) 347–352, [arXiv:0909.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4221].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [20] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Campiglia, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Henderson, Casting Loop Quantum Cosmology in the Spin Foam Paradigm, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 27 (2010) 135020, [arXiv:1001.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5147].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [21] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Campiglia, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Henderson, Path Integrals and the WKB approximation in Loop Quantum Cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 82 (2010) 124043, [arXiv:1011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1024].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [22] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Huang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Qin, Path Integral and Effective Hamiltonian in Loop Quantum Cosmology, Gen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 45 (2013) 1191–1210, [arXiv:1102.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4755].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [23] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Qin, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Deng, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, Path integrals and alternative effective dynamics in loop quantum cosmology, Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 57 (2012) 326–332, [arXiv:1206.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1131].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [24] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Qin and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, Coherent State Functional Integrals in Quantum Cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 85 (2012) 063515, [arXiv:1110.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5480].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [25] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Qin and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, Coherent State Functional Integral in Loop Quantum Cosmology: Alternative Dynamics, Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A 27 (2012) 1250078, [arXiv:1206.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1128].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [26] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Date, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Vandersloot, Homogeneous loop quantum cosmology: The Role of the spin connection, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 21 (2004) 1253–1278, [gr-qc/0311004].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [27] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Toporensky, Big crunch avoidance in K=1 semiclassical loop quantum cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 69 (2004) 104008, [gr-qc/0312110].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [28] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Vereshchagin, Qualitative approach to semi-classical loop quantum cosmology, JCAP 07 (2004) 013, [gr-qc/0406108].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [29] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Date, Absence of the Kasner singularity in the effective dynamics from loop quantum cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 71 (2005) 127502, [gr-qc/0505002].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [30] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Date and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Hossain, Genericity of big bounce in isotropic loop quantum cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 94 (2005) 011302, [gr-qc/0407074].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [31] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Goswami, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Joshi, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Quantum evaporation of a naked singularity, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 96 (2006) 031302, [gr-qc/0506129].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [32] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, The Early universe in loop quantum cosmology, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 24 (2005) 77–86, [gr-qc/0503020].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 22 [33] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Stachowiak and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Szydlowski, Exact solutions in bouncing cosmology, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B 646 (2007) 209–214, [gr-qc/0610121].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [34] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, Quantum geometry and the Schwarzschild singularity, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 23 (2006) 391–411, [gr-qc/0509075].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [35] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Modesto, Loop quantum black hole, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 23 (2006) 5587–5602, [gr-qc/0509078].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [36] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Modesto, Semiclassical loop quantum black hole, Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 49 (2010) 1649–1683, [arXiv:0811.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2196].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [37] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Campiglia, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gambini, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pullin, Loop quantization of spherically symmetric midi-superspaces, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 24 (2007) 3649–3672, [gr-qc/0703135].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [38] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brahma, Signature change in two-dimensional black-hole models of loop quantum gravity, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 98 (2018), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 026012, [arXiv:1610.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='08850].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [39] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Boehmer and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Vandersloot, Loop Quantum Dynamics of the Schwarzschild Interior, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 76 (2007) 104030, [arXiv:0709.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2129].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [40] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Chiou, Phenomenological loop quantum geometry of the Schwarzschild black hole, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 78 (2008) 064040, [arXiv:0807.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0665].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [41] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Chiou, Phenomenological dynamics of loop quantum cosmology in Kantowski-Sachs spacetime, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 78 (2008) 044019, [arXiv:0803.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='3659].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [42] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Joe and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Kantowski-Sachs spacetime in loop quantum cosmology: bounds on expansion and shear scalars and the viability of quantization prescriptions, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 32 (2015), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 1 015009, [arXiv:1407.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2428].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [43] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yang, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhang, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ma, Loop quantum black hole in a gravitational collapse model, arXiv:2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04263.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [44] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gan, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kuang, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gong, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wang, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wang, Non-existence of quantum black hole horizons in the improved dynamics approach, arXiv:2212.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14535.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [45] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Corichi, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Vukasinac, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zapata, Polymer Quantum Mechanics and its Continuum Limit, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 76 (2007) 044016, [arXiv:0704.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='0007].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [46] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Corichi and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Loop quantization of the Schwarzschild interior revisited, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 33 (2016), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 5 055006, [arXiv:1506.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='08015].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [47] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Olmedo, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Saini, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, From black holes to white holes: a quantum gravitational, symmetric bounce, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 34 (2017), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 22 225011, [arXiv:1707.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='07333].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 23 [48] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Olmedo, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Quantum Transfiguration of Kruskal Black Holes, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 121 (2018), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 24 241301, [arXiv:1806.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00648].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [49] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ashtekar, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Olmedo, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Singh, Quantum extension of the Kruskal spacetime, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 98 (2018), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 12 126003, [arXiv:1806.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='02406].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [50] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, Black-Hole Models in Loop Quantum Gravity, Universe 6 (2020), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 125, [arXiv:2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='13565].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [51] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, No-go result for covariance in models of loop quantum gravity, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 102 (2020), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 4 046006, [arXiv:2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='16066].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [52] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bojowald, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brahma, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Reyes, Covariance in models of loop quantum gravity: Spherical symmetry, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 92 (2015), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 4 045043, [arXiv:1507.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00329].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [53] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Alonso-Bardaji and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brizuela, Holonomy and inverse-triad corrections in spherical models coupled to matter, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' C 81 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 4 283, [arXiv:2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='14437].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [54] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Alonso-Bardaji and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brizuela, Anomaly-free deformations of spherical general relativity coupled to matter, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 104 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 084064, [arXiv:2106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='07595].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [55] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' AlonsoBardaji, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brizuela, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Vera, An effective model for the quantum Schwarzschild black hole, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B 829 (2022) 137075, [arXiv:2112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12110].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [56] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' AlonsoBardaji, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Brizuela, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Vera, Nonsingular spherically symmetric black-hole model with holonomy corrections, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 106 (2022), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 024035, [arXiv:2205.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='02098].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [57] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Berti, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cardoso, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Starinets, Quasinormal modes of black holes and black branes, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 26 (2009) 163001, [arXiv:0905.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2975].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [58] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Schutz and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Will, Black hole normal modes - A semianalytic approach, Astrophys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett , Astrophys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett, 291 (Apr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=', 1985) L33–L36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [59] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Iyer and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Will, Black Hole Normal Modes: A WKB Approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Foundations and Application of a Higher Order WKB Analysis of Potential Barrier Scattering, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 35 (1987) 3621.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [60] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Guinn, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Will, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kojima, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Schutz, High Overtone Normal Modes of Schwarzschild Black Holes, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 7 (1990) L47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [61] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Konoplya, Quasinormal modes of the Schwarzschild black hole and higher order WKB approach, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Stud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 (2004) 93–100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [62] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Konoplya, Quasinormal behavior of the d-dimensional Schwarzschild black hole and 24 higher order WKB approach, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 68 (2003) 024018, [gr-qc/0303052].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [63] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Matyjasek and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Opala, Quasinormal modes of black holes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' The improved semianalytic approach, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 96 (2017), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 024011, [arXiv:1704.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00361].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [64] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Horowitz and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Hubeny, Quasinormal modes of AdS black holes and the approach to thermal equilibrium, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 62 (2000) 024027, [hep-th/9909056].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [65] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Leaver, An Analytic representation for the quasi normal modes of Kerr black holes, Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Roy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A 402 (1985) 285–298.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [66] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ciftci, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Hall, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Saad, Perturbation theory in a framework of iteration methods, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A 340 (2005) 388–396, [math-ph/0504056].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [67] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cho, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cornell, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Doukas, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Naylor, Black hole quasinormal modes using the asymptotic iteration method, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 27 (2010) 155004, [arXiv:0912.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2740].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [68] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cho, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cornell, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Doukas, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Huang, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Naylor, A New Approach to Black Hole Quasinormal Modes: A Review of the Asymptotic Iteration Method, Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2012 (2012) 281705, [arXiv:1111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='5024].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [69] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Boyd, Chebyshev & Fourier Spectral Methods, Courier Dover Publications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [70] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jansen, Overdamped modes in Schwarzschild-de Sitter and a Mathematica package for the numerical computation of quasinormal modes, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Plus 132 (2017), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 12 546, [arXiv:1709.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='09178].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [71] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wu and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, Quasi-normal modes of holographic system with Weyl correction and momentum dissipation, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B 780 (2018) 616–621, [arXiv:1804.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='10897].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [72] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Fu and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wu, EM Duality and Quasinormal Modes from Higher Derivatives with Homogeneous Disorder, Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' High Energy Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2019 (2019) 5472310, [arXiv:1812.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='11522].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [73] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Fu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kuang, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pan, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wu, Quasi-normal modes and Hawking radiation of a charged Weyl black hole, arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12927.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [74] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Xiong, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhang, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Niu, Quasi-normal modes of the Einstein-Maxwell-aether Black Hole, arXiv:2112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='12523.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [75] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Niu, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhang, Linear instability of charged massless scalar perturbation in regularized 4D charged Einstein-Gauss-Bonnet anti de-Sitter black holes, Chin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' C 45 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 025111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [76] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Niu, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhang, Instability of regularized 4D charged 25 Einstein-Gauss-Bonnet de-Sitter black holes, Chin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' C 45 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 025104.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [77] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jaramillo, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Panosso Macedo, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Al Sheikh, Pseudospectrum and Black Hole Quasinormal Mode Instability, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' X 11 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 3 031003, [arXiv:2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='06434].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [78] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jaramillo, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Panosso Macedo, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Sheikh, Gravitational wave signatures of black hole quasi-normal mode instability, arXiv:2105.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='03451.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [79] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Destounis, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Macedo, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Berti, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cardoso, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jaramillo, Pseudospectrum of Reissner-Nordstr¨om black holes: Quasinormal mode instability and universality, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 104 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 084091, [arXiv:2107.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='09673].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [80] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Mamani, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Masa, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Sanches, and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zanchin, Revisiting the quasinormal modes of the Schwarzschild black hole: Numerical analysis, arXiv:2206.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='03512.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [81] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cardoso, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Miranda, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Berti, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Witek, and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zanchin, Geodesic stability, Lyapunov exponents and quasinormal modes, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 79 (2009), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 6 064016, [arXiv:0812.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='1806].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [82] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wei and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, Null Geodesics, Quasinormal Modes, and Thermodynamic Phase Transition for Charged Black Holes in Asymptotically Flat and dS Spacetimes, Chin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' C 44 (2020), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 11 115103, [arXiv:1909.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='11911].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [83] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jusufi, Quasinormal Modes of Black Holes Surrounded by Dark Matter and Their Connection with the Shadow Radius, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 101 (2020), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 084055, [arXiv:1912.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='13320].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [84] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Guo, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kuang, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wang, Acoustic black hole in Schwarzschild spacetime: quasi-normal modes, analogous Hawking radiation and shadows, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 102 (2020) 124019, [arXiv:2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04197].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [85] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhu, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jusufi, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Jamil, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Azreg-A¨ınou, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wang, Shadow and quasinormal modes of a rotating loop quantum black hole, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 101 (2020), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 084001, [arXiv:2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='00477].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [Erratum: Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='D 103, 089902 (2021)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [86] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ling, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Guo, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Liu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kuang, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wang, Shadow and near-horizon characteristics of the acoustic charged black hole in curved spacetime, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 104 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 10 104003, [arXiv:2107.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='05171].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [87] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bombelli and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Calzetta, Chaos around a black hole, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 9 (1992) 2573–2599.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [88] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cornish and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Levin, Lyapunov timescales and black hole binaries, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Quant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 26 Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 20 (2003) 1649–1660, [gr-qc/0304056].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [89] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lin and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Qian, Echoes in star quasinormal modes using an alternative finite difference method, arXiv:2204.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='09531.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [90] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhang, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pellicer, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wang, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Abdalla, Stability of Reissner-Nordstr¨om black hole in de Sitter background under charged scalar perturbation, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 90 (2014), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 4 044042, [arXiv:1405.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4931].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [Addendum: Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='D 90, 049904 (2014)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [91] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Abdalla, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pellicer, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' de Oliveira, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pavan, Phase transitions and regions of stability in Reissner-Nordstr¨om holographic superconductors, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 82 (2010) 124033, [arXiv:1010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='2806].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [92] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Yang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Fu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kuang, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Wu, Instability of de-Sitter black hole with massive scalar field coupled to Gauss–Bonnet invariant and the scalarized black holes, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' C 82 (2022), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 10 868, [arXiv:2112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='15052].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [93] LIGO Scientific, Virgo Collaboration, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Abbott et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=', Observation of Gravitational Waves from a Binary Black Hole Merger, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 116 (2016), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 6 061102, [arXiv:1602.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='03837].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [94] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Konoplya and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Zhidenko, Quasinormal modes of black holes: From astrophysics to string theory, Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 83 (2011) 793–836, [arXiv:1102.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='4014].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [95] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Kokkotas and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Schmidt, Quasinormal modes of stars and black holes, Living Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 (1999) 2, [gr-qc/9909058].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [96] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gundlach, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Price, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Pullin, Late time behavior of stellar collapse and explosions: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Linearized perturbations, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 49 (1994) 883–889, [gr-qc/9307009].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [97] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Price, Nonspherical Perturbations of Relativistic Gravitational Collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Integer-Spin, Zero-Rest-Mass Fields, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 5 (1972) 2439–2454.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [98] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Price, Nonspherical perturbations of relativistic gravitational collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Scalar and gravitational perturbations, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 5 (1972) 2419–2438.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [99] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lagos, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Ferreira, and O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Tattersall, Anomalous decay rate of quasinormal modes, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 101 (2020), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 8 084018, [arXiv:2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='01897].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [100] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Arag´on, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gonz´alez, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Papantonopoulos, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' V´asquez, Anomalous decay rate of quasinormal modes in Schwarzschild-dS and Schwarzschild-AdS black holes, JHEP 08 (2020) 120, [arXiv:2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='09386].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 27 [101] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Arag´on, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B´ecar, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gonz´alez, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' V´asquez, Massive Dirac quasinormal modes in Schwarzschild–de Sitter black holes: Anomalous decay rate and fine structure, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 103 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 6 064006, [arXiv:2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='09436].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [102] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Fontana, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gonz´alez, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Papantonopoulos, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' V´asquez, Anomalous decay rate of quasinormal modes in Reissner-Nordstr¨om black holes, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 103 (2021), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 6 064005, [arXiv:2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='10620].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [103] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gonz´alez, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Papantonopoulos, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Saavedra, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' V´asquez, Quasinormal modes for massive charged scalar fields in Reissner-Nordstr¨om dS black holes: anomalous decay rate, JHEP 06 (2022) 150, [arXiv:2204.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='01570].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [104] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Gonz´alez, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Papantonopoulos, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rinc´on, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' V´asquez, Quasinormal modes of massive scalar fields in four-dimensional wormholes: Anomalous decay rate, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 106 (2022), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 2 024050, [arXiv:2205.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='06079].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [105] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='Ruffini, in Black Holes: les Astres Occlus, Gordon and Breach Science Publishers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [106] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Cardoso, Quasinormal modes and gravitational radiation in black hole spacetimes, other thesis, 12, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [107] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Chandrasekhar, The Mathematical Theory of Black Holes, Oxford University Press, New York.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [108] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Perlick, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Tsupko, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Bisnovatyi-Kogan, Influence of a plasma on the shadow of a spherically symmetric black hole, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' D 92 (2015), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 10 104031, [arXiv:1507.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04217].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [109] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='-J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Blome and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Mashhoon, Quasi-Normal Oscillations Of A Schwarzschild Black Hole, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' A110, 231.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' [110] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Churilova, Analytical quasinormal modes of spherically symmetric black holes in the eikonal regime, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' C 79 (2019), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 7 629, [arXiv:1905.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content='04536].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} +page_content=' 28' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFAT4oBgHgl3EQfERy2/content/2301.08421v1.pdf'} diff --git a/4NFKT4oBgHgl3EQf9C5Z/content/2301.11952v1.pdf b/4NFKT4oBgHgl3EQf9C5Z/content/2301.11952v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..cac86b56ed3d474d351d7b9114613ca11e3e7429 --- /dev/null +++ b/4NFKT4oBgHgl3EQf9C5Z/content/2301.11952v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cdbf45b8efa670b6cd5c9ad2af471284e1b70904496060274ba7d532704c9fb7 +size 869962 diff --git a/4NFKT4oBgHgl3EQf9C5Z/vector_store/index.faiss b/4NFKT4oBgHgl3EQf9C5Z/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..6f93c807c6c363ca0fea3873b732279cc10c4d22 --- /dev/null +++ b/4NFKT4oBgHgl3EQf9C5Z/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:22788fb4f60c9e862a3a5092a95ea02f1545a2388da7ab2f8bd125670ab72296 +size 1769517 diff --git a/5dAyT4oBgHgl3EQfpfgA/content/tmp_files/2301.00524v1.pdf.txt b/5dAyT4oBgHgl3EQfpfgA/content/tmp_files/2301.00524v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..2493f66c08b6aa7913a7c011245eb5105cc9ed4c --- /dev/null +++ b/5dAyT4oBgHgl3EQfpfgA/content/tmp_files/2301.00524v1.pdf.txt @@ -0,0 +1,4048 @@ +In Quest of Ground Truth: Learning Confident Models and Estimating +Uncertainty in the Presence of Annotator Noise +Asma Ahmed Hashmi +Artem Agafonov +Aigerim Zhumabayeva +Mohammad Yaqub +Martin Takáˇc +Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) +Masdar City, Abu Dhabi, UAE +https://mbzuai.ac.ae/ +Abstract +The performance of the Deep Learning (DL) models de- +pends on the quality of labels. In some areas, the involvement +of human annotators may lead to noise in the data. When +these corrupted labels are blindly regarded as the ground +truth (GT), DL models suffer from performance deficiency. +This paper presents a method that aims to learn a confident +model in the presence of noisy labels. This is done in conjunc- +tion with estimating the uncertainty of multiple annotators. +We robustly estimate the predictions given only the noisy +labels by adding entropy or information-based regularizer +to the classifier network. We conduct our experiments on a +noisy version of MNIST, CIFAR-10, and FMNIST datasets. +Our empirical results demonstrate the robustness of our +method as it outperforms or performs comparably to other +state-of-the-art (SOTA) methods. In addition, we evaluated +the proposed method on the curated dataset, where the noise +type and level of various annotators depend on the input +image style. We show that our approach performs well and +is adept at learning annotators’ confusion. Moreover, we +demonstrate how our model is more confident in predicting +GT than other baselines. Finally, we assess our approach for +segmentation problem and showcase its effectiveness with +experiments. +1. Introduction +Real world data is replete with noisy labels. Since the +labeling process of large-scale datasets is costly and time- +consuming, researchers often resort to less expensive options, +such as internet inquiries and crowdsourcing to circumvent +this issue [32,38]. Unfortunately, these methods are viable +in producing datasets with incorrect labels. Smaller datasets +are also vulnerable to the presence of corrupted labels. In +this case, usually the labelling process is either challenging +or the annotators have divergent opinions [3,21]. In medical +imaging, for example, it is imperative to procure annotations +from the clinical experts. However, it is not only expensive +to obtain annotated data, but it also suffers from high inter- +reader variability among domain’s experts [17,20]. +Deep Neural Networks (DNN) noticeably suffer a degen- +eration in performance when trained on noisy labels. To +combat this issue, various algorithms have been devised to +adapt to the presence of noisy labels without compromis- +ing on the performance of DNNs. Sample Selection meth- +ods [10,12,22,34,40] started to gain momentum recently; +these methods involve a two network, Student-Teacher, for +learning from noisy labels. It uses a small loss trick to sam- +ple clean instances for additional training by its peer network. +While these methods aid in selecting the clean samples, the +small loss trick does not perform well when the loss distri- +bution of true-labelled and false-labelled examples overlap +substantially. +In the instance when there is a significant level of dispute +in the labels by the annotators, conventional training meth- +ods that consider such labels as "the truth" result in models +with low predictive ability. Tanno et al [31] proposed an +algorithm that jointly estimates the annotators’ confusion +and the underlying label distribution. The annotators’ con- +fusion is represented by a stochastic transition probability +matrix. In their approach, the loss function is augmented by +adding a regularization term that is the trace of annotators’ +confusion matrix. However, the caveat is that this regular- +ization may still penalize in instances when the annotator is +not confused, therefore it will not learn the true annotator’s +noise distribution. Furthermore, there is no incentive in the +training process to enforce the classifier network to predict +the class probabilities. +Our work is inspired by [31, 41], with a motivation to +make our model confident in its predictions while also jointly +1 +arXiv:2301.00524v1 [cs.CV] 2 Jan 2023 + +estimating annotator’s confusion in the presence of noisy +labels. We explored entropy and information regularizer +techniques to encourage our classifier to make confident +predictions about each class. +Problem Statement. In this paper, we focus on supervised +learning problem with noisy labels. We assume that each +object xn, n = 1, . . . , N is assigned with a set of noisy +labels {˜y(r) +n }R +r=1, where ˜y(r) +n +is a label given to the object xn +by annotator R. Here N denotes the total number of samples +in the data, and R denotes the total number of annotators. +The main goal is to construct an algorithm that learns the +distribution of true labels p(y|x) and to make confident pre- +dictions about the classes. This is achieved in conjunction +with estimating annotator’s noise. +To achieve this, we use the classifier-annotator approach +[31]. We jointly train two neural networks: classifier and +annotator. The first network, the classifier, aims to learn +the ground truth/class true label. So it outputs the class +probability vector ˆpθ(x). The second network learns each +annotator’s confusion matrix U(x), which represents the +likelihood of the annotator being wrong in the class markup +for a given input. +However, it is not enough to minimize the loss between +matrix-vector product ˆUψ(x)ˆpθ(x) and annotator’s label ˜y +due to various reasons. First of all, there is no evidence why +annotator and classifier neural networks will learn confusion +matrix and class probabilities. There are infinite number +of pairs ( ˆUψ(x), ˆpθ(x)) that approximate ˜y well. Without +a modification of loss functions, it may turn out that they +just learn some features of inputs. Secondly, we want to be +confident in the predictions of the classifier. In evaluation +mode, this model will be used to make real-time predictions. +It is important to train the model in a such a way that it +makes confident and true predictions. +To tackle the aforementioned problems, we penalize the +classifier network for uncertainty. We propose two regular- +ization techniques based on Shannon’s entropy and infor- +mation. Our methodology for classification is summarized +in Figure 1. Moreover, we apply our methodology for seg- +mentation problem. In this case we make predictions and +estimate the confusion pixel-wise. +Contributions. The main contributions of our paper are +outlined as follows: +1. Learning the ground truth label. Our approach is capa- +ble of disentangling the GT from the annotation noise. We +distinguish the noise through the usage of the annotator- +classifier methodology. We enforce the classifier network +to learn class probabilities, not some features of the in- +put, by regularizing its output via Shannons’ entropy and +information-based regularizer. +2. Learning confident model. Our choice of regularization +technique is enforcing the classifier network to make con- +vincing predictions about the respective classes. This +CLASSIFIER +ANNOTATOR 2 +Input +Annotators' +confusion +matrices +Annotators' +class +probabilities + Class +probabilities +Negative log +likelihood loss +ANNOTATOR 1 +ANNOTATOR 3 +or +Regularization +Regularization +Figure 1. Model architecture. We consider the problem with 4 +classes and 3 annotators. Architecture consists of two neural net- +works: 1) classifier network predicts class probabilities ˆpθ(x), 2) +annotator NNs predict confusion matrix U (r)(x) for each annotator +r. Matrix-vector product U (r)(x)ˆpθ(x) estimates the annotator’s +prediction. Note, that 2nd annotator tends to confuse classes 1 and +2. To jointly train two neural networks we minimize regularized +negative log likelihood loss (NLL). We propose two options for +regularization: information-based regularizer and entropy. +has various befitting practical applications in different +domains, including medical imaging. We use our regular- +izer to push the predicted probabilities of the first network +to be closer to 1 or 0 and to make the model to distinguish +between classes better. +3. Competitive numerical experiments. +We have per- +formed extensive numerical experiments that compares +our algorithm with other SOTA baselines. We conducted +experiments on MNIST, CIFAR-10 and FMNIST datasets +to gauge the performance of our algorithm in the exis- +tence of noisy labels. The noisy labels were simulated +using pairflip and symmetric noise. +Our experiments showed that our algorithm outperforms +all the evaluated baselines for the higher noise levels such +as pairflip 45% and symmetric 50%. For smaller noise +rates, we perform at par with [10,31,34,35,40]. Moreover, +we show better results than in annotator-classifier setup +with trace regularizer proposed in [30,31]. Moreover, we +conduct experiments for segmentation, where our model +also shows better accuracy and confidence compared to +trace regularization [41]. +4. Curated dataset. We have also executed experiments for +a curated dataset, where noise type and level for various +annotators depend on input image style. The proposed +approach with the choice of our regularizer results in +more confident model compared to the one without the +regularizer. Moreover, we show that our approach is able +to learn true annotators’ confusion. +5. Open code. Our code is available online. Our implemen- +tation includes a suite that easily allows researchers to +compare their approach against all benchmarks consid- +ered in this paper. +Organization. The remainder of the paper is organized as +2 + +follows. Related works are described in Section 2. Section 3 +presents the methodology and probabilistic model behind it. +In Section 4 we describe the proposed regularizers. Numeri- +cal experiments are provided in Section 5 (additional experi- +ments are provided in Appendix C). Section 6 is dedicated +to the segmentation problem, and concluding remarks and +potential future research directions are given in Section 7. +2. Related Literature +Learning with noisy labelled training data has been an +active area of research for some time. Various algorithms +have been introduced and have shown resistance to noise +during training. We highlight the core research being done +in this domain. +2.1. Classification +Noise Transition Matrix/Loss Correction. Loss correc- +tion approach using noise transition matrix, T, is a crucial +branch that is used in deep learning systems. The goal of loss +correction is for training on noisy labels with the corrected +loss to be roughly equivalent to training on clean labels with +the original loss. The majority of the early approaches deal- +ing with noisy labels relied on estimating a noise transition +matrix to figure out how labels switch across classes. +Patrini et al. [25] introduced two different approaches for +loss correction using a stochastic matrix T that delineates +the probability of a class being flipped with another under a +certain noise. This two loss correction approaches, namely, +forward correction and backward correction. The backward +procedure corrects the loss by multiplying the loss with +inverse transition matrix T −1; while the forward procedure +corrects the network predictions by multiplying it with T. +Hendrycks et al. [11] suggested Gold Loss Correc- +tion(GLC) based on Forward Correction to address extreme +noise. The transition matrix cannot be accurately predicted +by solely noisy data when there is significant noise present. +The main driver is the assumption that a limited portion of +the training data is reliable and accessible. +Sukhbaatar et al. [30] demonstrated a method of forward +loss correction by introducing a stochastic matrix that quan- +tifies label corruption, and cannot be calculated without ac- +cessing the true labels. In order to include learning about the +label noise, forward loss correction involves adding a linear +layer to the model’s end and adjusting the loss as necessary. +Through the use of soft and hard bootstrapping, Reed +et al. added the concept of consistency to the prediction +objective [26]. The soft version is identical to softmax re- +gression with minimum entropy regularization, whereas the +hard version adjusts regression targets by employing MAP +estimation. This bootstrapping process, intuitively, gives +the learner the opportunity to contest an inconsistent train- +ing label and re-label the training data to enhance the label +quality. Whereas Goldberger et al. [9] made use of the +expectation-maximization (EM) algorithm to determine the +optimal network and noise parameters. The use of transition +matrices has been investigated further [4,7,36]. +Multi-Network Learning. +Multi-network training fre- +quently employs collaborative learning and co-training. +Therefore, the sample selection procedure is governed by +the mentor network in the case of joint learning and the +peer network in the case of co-training. These algorithms +can be defined as learning to teach methods, and they com- +prise of a student and teacher network. The responsibility +of the teacher network is to select more informative sam- +ples for enhanced student network training. Malach et al. +proposed decoupling method that simultaneously trains two +DNNs while only updating parameters on examples/samples +in cases when the two classifiers disagree [22]. +MentorNet [12] selects clean instances to guide the train- +ing of the student network after it has trained the teacher +network first. Co-teaching [10] and [40] also employ two +DNNs, but each DNN selects a certain number of small-loss +examples and feeds them to its peer DNN for additional +training. Co-teaching+ additionally utilize the disagreement +strategy of Decouple. In comparison, JoCoR [34] reduces +the diversity of two networks by means of co-regularization, +making the predictions of the two networks more similar. +Robust Regularization. Tanno et al. [31] showcased a +method for simultaneously learning the individual annotator +model and the underlying true label distribution. Each anno- +tator’s confusion is represented by a confusion matrix, which +is estimated in conjunction with the classifier predictions. +The algorithm comprised of a loss function include a trace +regularization term. Menon et al. [23] suggests a composite +loss-based gradient clipping for label noise robustness. It is +expected that clipping would provide noise robustness, given +that one does not place excessive trust in any single sample. +Robust early-learning [35] distinguishes between critical and +non-critical parameters for fitting clean and corrupted labels, +respectively. Then, only non-critical updates are penalized +with a different update rule. +Other Deep Learning/Statistical Methods. +DivideMix +[18] is a framework that splits the training data into a la- +beled set with clean samples and an unlabeled set with noisy +samples-samples that comprise of noisy labels; it trains the +model on both the labeled and unlabeled data in a semi- +supervised approach. Kun Yi et al [39] proposed a prob- +abilistic end-to-end noise correction in labels (PENCIL) +framework. This method only uses noisy labels to initialize +label distributions; the label distributions get updated by an +iterative correction of the noisy labels. Consequently, la- +bel distributions are used in the calculation of the network +loss instead of the noisy labels. Xia et al. [35] suggested a +robust early-training method to diminish the side effect of +noisy labels prior to early stopping. This helps with improv- +ing the memorization of clean labels. The parameters are +3 + +split into critical and non-critical parameters. Each of these +parameters are updated with a different update rule. +2.2. Segmentation +Several strategies have been developed to solve the is- +sue of annotator-related bias for segmentation in medical +imaging. We review some prominent work in the field. +Inter-reader variability among annotators gave promi- +nence to Simultaneous Truth and Performance level Es- +timation (STAPLE) [33] algorithm that uses expectation- +maximization method to merge segmentations from various +annotators into estimating a single ground truth. There are +several algorithms that drew their inspiration from STAPLE +framework such as [1,2,13,14,29]. These methods are reflec- +tive of generative modelling of annotator’s behaviour. Here +the latent variables are the true labels which are unobserved, +and the confidence/expertise of various annotators. +Mirikharaji et al. [24] provides a sample re-weighting +strategy that considers the expertise level of annotators. This +strategy gives greater weights in the loss function for the +samples annotated by professionals. To disengage annotator +bias, Tanno et al. [41] uses two coupled CNNs. Similar +to [31], the CNN for segmentation estimates the label distri- +bution, while the CNN for annotation is representative of the +annotator bias using a confusion matrix. +Annotation distribution learning has been another active +area that has inspired pioneer work of probabilistic U-Net +(PU-NET) [15]. This method given an input, examines the +problem of learning a distribution over segmentations. This +proposed architecture is a generative segmentation model +which is an integration of U-Net [27] and conditional varia- +tional autoencoders (VAE), and is effective in developing an +extensive number of conceivable hypotheses/segmentation +results. +3. Methodology +3.1. Probabilistic Model For Noisy Labels +Let X denote the space that contains a set of input data +X := {x1, . . . , xn}. Each of these objects x in the input +data are assigned a corresponding label y such that Y := +{y1, y2, . . . , yN} ⊆ Y, where Y is the space of labels. +We synthetically induce noise in our original label set Y +to corrupt the clean labels. There are multiple different ways +through which we create the noisy labels for our data, namely +symmetric and pairflip noise types. In Section 5.1 and in the +Appendix, we discuss in details about the mainstream noise +types that we used to create noisy labels for the datasets that +we utilized in this paper. +We denote the set of noisy labels given by annotator r that +labels objects from the set X as ˜Y (r) = {˜y(r) +1 , . . . , ˜y(r) +N }, +where r = 1, . . . , R. Our objective is to jointly estimate +annotator noise as a function of input x, as well as to esti- +mate the distribution for latent GT label from noisy dataset, +D = {X, ˜Y (1), . . . , ˜Y (R)}. In our architecture we add an +entropy/information-based regularization term with the main +loss function. The goal is to enforce our algorithm to make +confident predictions while also learning the true labels. +Following the strategy of [31, 41], we would now demon- +strate how to set up a probabilistic model for data that has +been annotated by multiple sources. +To model annotator-specific characteristics, there are +some pivotal factors that are to be considered. In modelling +multiple annotators, it is common to assume that annotators +exercise their independence according to their expertise and +experience in labelling an input data point xi. The precision +of annotator’s labeling may depend on the properties of the +data point itself. Thus, we do not assume that annotators +are equally competent (or incompetent) at labeling all the +data; rather, it depends on the input they observe. This can +be represented as a probabilistic model for random variables +x, y, and ˜y. Following the work of [31,38], we describe the +joint conditional distribution of our probabilistic model as: +P( ˜Y (r), Y |X) = �N +i=1p(yi|xi) �R +r=1 p(˜y(r) +i +|xi, yi). +Here p(yi|xi) represents the distribution for the clean +labels of the data samples. +Conditional distribution +p(˜y(r) +i +|xi, yi) signifies that the model estimates a noisy ver- +sion of clean labels , represented as ˜y(r) +i +for each annota- +tor r. This makes intuitive sense as the noisy labels are +not only conditional on true latent labels, but also on the +input data. It is likely for the annotators to label some +instances of data xi with more precision than other sam- +ples. Since the annotators’ noise is dependent on the sam- +ple x, this allows us to model noisy label distribution as +p(˜y(r) = j|y = i, x) =: u(r) +j,i (x). We denote by U(x) a +C ×C confusion matrix [U]j,i(x) = uj,i(x), where C repre- +sents the number of classes for the true labels, y ∈ [1, ..., C]. +Now using the confusion U(x), we can show the probability +that input data x, labelled as i originally, is mislabelled as j +in the set of noisy data: +p(˜y = j|x) = �C +i=1p(˜y = j|y = i, x) · p(y = i|x) += � +iuji(x) · p(y = i|x). +(1) +To represent the joint probability distribution of noisy la- +bels using the confusion matrix of each annotator r, we can +simplify (1) as: +p(˜y(1), ..., ˜y(R)|x) = +R +� +r=1 +C +� +y=1 +u(r) +˜y(r),y(x) · p(y|x). +3.2. Jointly Optimizing the two Networks to esti- +mate the Ground Truth and Confusion +We minimize negative log-likelihood (NLL) to jointly +optimize the parameters θ and ψ of classification and +annotator networks respectively. +Given the data that +4 + +comprises of training inputs and noisy labels, we would +minimize the negative log likelihood between the ob- +served noisy labels and predictions from annotator la- +bel distribution as follows: − log p(�Y (1), ..., �Y (R)|X) = +�N +i=1 +�R +r=1 NLL( ˆU (r) +ψ (xi)ˆpθ(xi), ˜y(r) +i +), where ˆpθ(xi) is +the output of the classification network and ˆU (r) +ψ (x) is the +output of annotator’s r network. Minimizing this loss func- +tion alone can cause several problems. Firstly, it does not +ensure that predictions of the classification network will be +class probabilities. It can learn some feature of inputs in +order to minimize the NLL loss between the pipeline output +ˆU (r) +ψ (x)ˆpθ(x) and corrupted labels ˜y(r). Secondly, there is +no guarantee that annotator matrices ˆU (r) +ψ (x) are correctly +learned to distinguish the noise from true labels. It can also +learn some uninterpretable features of inputs x, such that +ˆU (r) +ψ (x)ˆpθ(x) is close to ˜y(r). +To tackle these problems, we would add a regulariza- +tion term that is attached to the base classifier which helps +in estimating the true class probabilities of the predicted +ground truth. The main loss, NLL loss is then jointly op- +timized with a regularization R(ˆpθ(x)). We propose two +options for regularization: entropy regularization R(p) = +− � +i pi(x) log pi(x) and information-based regularization +R(p) = − log maxi(pi). The combined loss is then given +as: +− log p(�Y (1), ..., �Y (R)|X) = +N +� +i=1 +R +� +r=1 +NLL( ˆU (r) +ψ (x)ˆpθ(xi), ˜y(r) +i +)+λ 1 +N +N +� +i=1 +R(ˆpθ(xi)). +Our classification network helps with learning the features +of our data and gives us an estimate of the ground truth. The +outputs of this network are probabilities with dimension +B × C, where B is the batch-size and C is the number of +classes. Ideally we desire that the predictions we get from +the classifier network are forced to give us 1 for the most +probable class and 0 elsewhere. +We take the sum of this regularization term for the number +of batch samples and then multiply it with a regularization +parameter λ and then taking its average for the batch sam- +ples. +4. Confident Regularization +In this section, we will explain in detail the motivation +for the choice of our regularizer. We used entropy and infor- +mation based regularizer with the first network to enhance +the predictions of our model in learning the ground truth. +4.1. Entropy Regularizer +Entropy is regarded as a measure for gauging uncertainty. +The higher the entropy, the more disordered the state. Shan- +non et al. [28] mathematically described entropy as: +R(p) := −� +ipi log pi = E[− log p]. +where pi denotes the i-th class probability. It is to be noted +that entropy is a feasible choice as it a smooth function. So +when pi is 0, the function is still differentiable, since 0 log 0 += limpi→0 pi log pi. +4.2. Information Regularizer +We evaluated our experiments on another regularizer +which resembles the information part of entropy. The motiva- +tion behind using this regularizer is the same as the entropy +regularizer mentioned in Section 4.1. This regularizer is +expressed as : +R(p) = min +i (− log pi). +(2) +This regularizer would also push the classifier to make +confident predictions. The caveat in using this regularizer is +that it becomes undefined when pi = 0. To counter that, we +modified the regularizer function to: +R(p) = − log(max +i +pi). +Also, we would show that we achieve similar results when +we compare it with entropy regularizer. The advantage of +using entropy regularizer is that it’s a smooth function unlike +(2). +4.3. Motivation for Confident Regularizarion +As we mentioned before, it is not enough to minimize the +loss between ˆUψ(x)ˆpθ(x) and ˜y. Indeed, let U be the true +confusion of the annotator and Pθ(x) the confusion matrix +of classifier. Ideally, we want Pθ(x) = I and ˆUψ(x) = U. +However, there can be a lot of pairs ( ˆUψ(x), Pθ(x)) that +satisfy ˆUψ(x)ˆpθ(x) = U. Therefore, we add an entropy +regularizer, to enforce Pθ converge to I. +Theorem 1. Assume that classifier is confident, i.e. ˆpθ = ei +if y = i, where ei is a basis vector of i-th coordinate. Then, +minimizing NLL loss between ˆU (r) +ψ (x)ˆpθ(x) and ˜y(r) over +ˆU (r) +ψ (x) we get +[ ˆU (r) +ψ (x)]i,j = p(˜y(r) = j|y = i, x). +In Tables 1, Table 2, and Table 3, we show the perfor- +mance of our algorithm with entropy and information-based +regularizers on CIFAR-10, MNIST, and FMNIST datasets +for symmetric and pairflip noise types. The theoretical com- +parison between the two regularizers is further discussed in +Appendix ??. +5. Classification Experiments +5.1. Implementation Details +In this section we describe implementation details. We +used a convolutional neural network (CNN) as a classifier +5 + +model which estimates the ground truth. The predictions +of the classifier network are multiplied to the outputs of a +fully connected annotator network that learns the confusion +of the noisy labels. True labels are never introduced to the +model during training. In our experiments, we synthetically +introduce noise to the training data; we chose various noise +rates, such as 20%, 30%, 45% and 50%. +We evaluate the performance of our algorithm for the clas- +sifier network as this aids in estimating the GT via making +confident predictions about the true class. We are partic- +ularly interested in the performance of the classifier, as in +evaluation stage this network will be used separately to make +predictions. +Baselines. We compare our algorithm with the following ap- +proaches: (i) Co-teaching [10], which simultaneously trains +two DNN models, with each network selecting the batch +of data for the other, based on the instances with a small +loss. (ii) Co-teaching+ [40], also employs samples with +small loss, but with disagreement about predictions. This is +the selection criteria for the networks to pick data for each +other. (iii) JoCoR [34], extends on the idea of [10,40], but +uses co-regularization to minimize the diversity of the two +networks, thus bringing the predictions of the two networks +closer together. (iv) Robust Early-learning (CDR) [35], cat- +egorizes the critical and non-critical parameters for clean +and noisy label fitting, respectively. Different update rules +are applied to update these parameters. (v) Annotator Con- +fusion (Trace) [31] is a regularized approach that assumes +the existence of various annotators to simultaneously learn +the individual annotator model and the underlying true label +distribution, using only noisy observations. +Datasets. +We used the standard benchmark datasets: +MNIST [8], FMNIST [37], and CIFAR-10 [16] to demon- +strate the effectiveness of our methodology. +Types of Noise. The noise types, used in the experiments, +are described below. +1. Pairflip Noise. The pairflip noise involves swapping the +labels of two adjacent categories/classes based on a preset +ratio. [19] +2. Symmetric Noise. In symmetric noise, a portion of the +original labels are retained, while the remainder are uni- +formly reassigned to all other categories [21]. This noise +type is intended to imitate the random noise in the actual +world, which is typically the result of random web crawl- +ing or manual annotation errors. It does not consider the +similarities between classes. +5.2. Comparison with State-Of-The-Arts +Results on MNIST. We used the same backbone architec- +ture to compare our algorithm against the baselines. Table 1 +shows the performance comparison of our algorithm with +the other methods. We see that for a smaller noise rate such +as 20% and 30%, which is evidently the least challenging +case, all algorithms seem to show comparable performance +above 97% for both pairflip and symmetric noise. However, +when noise rates increases to 45% or above, there seems to +be a distinct contrast in the performance of other algorithms, +as the accuracy of some methods visibly decline to below +90% in the case of pairflip noise. Our method achieves an +accuracy of 99.10% for pairflip 45% noise using entropy +regularizer, followed closely by the Trace method with an +accuracy of 97.95%. Whereas Co-teaching, JoCoR and CDR +achieves the test accuracy of 87.63%, 85.86% and 87.04% +respectively. For symmetric-50% noise, we got test accu- +racy of 98.94% with information regularizer, with Trace and +CDR following closely behind at 98.87% and 97.72% re- +spectively. The results of the our methodology with entropy +and information-based regularizers are comparable. +Results on CIFAR-10. Table 2 shows the test accuracy +results on CIFAR-10 dataset. Our algorithm performs dis- +tinctly superior when noise gets extreme; we achieve 80.03% +accuracy for symmetric 50% noise with information regu- +larizer, surpassing all the baselines. For pairflip 45%, we +distinctly outperform all the baselines by a considerable mar- +gin. We acquired an accuracy of 83.43%, which is about 8% +better than Trace method. All the other baselines acquired +accuracy of less than 70%. Hence, our algorithm clearly +outperforms all the baselines. This reinforces that for higher +noise ratios, our algorithm consistently gives better perfor- +mance as entropy and information regularization strategy +helps the model to be more certain in its predictions. +Our algorithm still surpasses in performance when the +noise rate is small for symmetric and pairflip noise types. +For symmetric noise 20% and 30%, we achieved an accuracy +of 84.22% and 83.85% respectively. The other algorithms +contested close for symmetric 20% noise by accomplishing a +test accuracy of 82.86% for Trace, 82.82% for Co-teaching, +81.12% for JoCoR, 81.01% for CDR, and with Co-teaching+ +settling with an accuracy of 79.51%. +In pairflip noise 20% and 30%, we again outperform other +methods by accomplishing an accuracy of 84.92% and 84.5% +in the given sequence. Here, CDR and Trace follow closely +behind with an accuracy of 82.89% and 83.86% respectively +for pairflip 20% noise. For pairflip 30%, CDR attained an +accuracy of 82.08%, while Trace achieved 83.15%. +Results on FMNIST. The experimental results of our algo- +rithm compared with other baselines is shown in Table 3. +Our algorithm has shown robust performance across most +baselines. +We see comparable performance among all the algorithms +when the noise rate is 20% and 30% for both symmetric and +pairflip noise types. We see distinguishing performance +when the noise gets extreme. +At symmetric 50% noise, we perform about 12% better +than Co-teaching+ algorithm, while we outperformed CDR +6 + +Table 1. Test accuracy (%) on MNIST dataset. +Noise rate +Ours-Inf +Ours-Ent +Co-tea. +Co-tea.+ +JoCoR +Trace +CDR +symmetric 20% +99.20 +99.48 +99.01 +98.88 +98.82 +99.16 +98.97 +symmetric 30% +99.11 +99.09 +98.78 +98.38 +98.40 +99.01 +98.75 +symmetric 50% +98.94 +98.93 +92.24 +95.26 +96.83 +98.87 +97.72 +pairflip 20% +99.08 +99.55 +98.84 +98.59 +98.89 +99.13 +98.88 +pairflip 30% +98.94 +99.54 +98.57 +97.95 +98.56 +99.08 +98.50 +pairflip 45% +98.77 +99.10 +87.63 +71.36 +85.86 +97.95 +87.04 +Table 2. Test accuracy (%) on CIFAR-10 dataset +Noise rate +Ours-Inf +Ours-Ent +Co-tea +Co-tea+ +JoCoR +Trace +CDR +symmetric 20% +84.22 +84.00 +81.82 +79.51 +82.12 +82.86 +81.01 +symmetric 30% +83.85 +83.26 +80.69 +79.29 +80.95 +80.45 +78.90 +symmetric 50% +80.03 +79.64 +75.74 +73.19 +76.60 +77.82 +69.68 +pairflip 20% +84.92 +84.78 +81.17 +79.59 +81.86 +83.86 +82.89 +pairflip 30% +84.36 +84.54 +79.53 +77.83 +79.52 +83.15 +82.08 +pairflip 45% +83.43 +81.23 +59.04 +47.72 +67.59 +75.88 +58.56 +Table 3. Test accuracy (%) on FMNIST dataset. +Noise rate +Ours-Inf +Ours-Ent +Co-tea +Co-tea+ +JoCoR +Trace +CDR +symmetric 20% +90.67 +90.79 +90.48 +88.69 +91.88 +90.61 +88.69 +symmetric 30% +91.35 +90.34 +90.36 +88.50 +91.33 +89.64 +87.38 +symmetric 50% +89.51 +89.49 +89.37 +77.96 +89.21 +88.94 +85.36 +pairflip 20% +90.90 +90.77 +90.68 +89.12 +91.37 +90.40 +90.01 +pairflip 30% +90.38 +90.65 +90.11 +89.06 +89.67 +90.33 +88.78 +pairflip 45% +89.37 +89.02 +78.86 +52.61 +88.10 +89.08 +64.63 +by about 4%. We surpassed other baselines by small margins +for this instance of noise. For pairflip 45%, we performed +significantly better than Co-teaching+ and CDR algorithms +which achieved accuracy of 52.61% and 64.63% respectively. +Trace algorithm comes second in performance with 89.08% +accuracy, followed closely by JoCoR at 88.10%. +Two network architectures such as Co-teaching, Co- +teaching+, and JoCoR suffers in performance when the +noise level increase in both symmetric and pairflip noise +types. Trace comes closer in comparison with our algorithm, +but we outperform it in all experiments. Both entropy and +information-based regularizers perform at par compared to +each other. +5.3. Curated Dataset +We have assembled the dataset that is based on MNIST, +where noise level depends on input image style for vari- +ous annotators. Three type of image styles were simulated +by performing morphological transformations (in particu- +lar, thinning and thickening) on the original images, using +Morpho-MNIST software [5]. In addition to the noise types +described in Section 5.1, asymmetric and pairflip with per- +mutation where applied. In the latter, the ordered label +categories were first permuted randomly and labels of two +adjacent categories after permutation were swapped based +on a preset ratio. Asymmetric noise is a block matrix trans- +formation, where a portion of original labels are retained +and the remainder is uniformly reassigned to closest four +categories. The type and level of noises applied to original +labels are provided in Table 4. +For a dataset consisting three different type of images +(original, thin, and thick) and three different annotators (Ta- +ble 4), we compare (i) classifier model without annotators +and regularization, (ii) our approach without regularization, +Table 4. Annotator Information for three different styles (MNIST). +Annotators +Original +Thin +Thick +Annotator 1 +symmetric 80% +asymmetric 40% +pairflip 95% +Annotator 2 +pairflip with permutation 40% +symmetric 95% +asymmetric 70% +Annotator 3 +pairflip 60% +pairflip with permutation 40% +symmetric 80% +0 +2 +4 +6 +8 +10 +Epoch +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +Training Accuracy +MNIST +Model w/o annotators and =0 +Our approach ( =0) +Our approach ( =0.01, m=2) +(a) Training accuracy +0 +2 +4 +6 +8 +10 +Epoch +10 +3 +10 +2 +10 +1 +100 +Training Entropy +MNIST +Model w/o annotators and =0 +Our approach ( =0) +Our approach ( =0.01, m=2) +(b) Training entropy +Figure 2. Accuracy and entropy for Curated MNIST training data. +0 +2 +4 +6 +8 +10 +Epoch +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +Testing Accuracy +MNIST +Model w/o annotators and =0 +Our approach ( =0) +Our approach ( =0.01, m=2) +(a) Testing accuracy +0 +2 +4 +6 +8 +10 +Epoch +10 +3 +10 +2 +10 +1 +100 +Testing Entropy +MNIST +Model w/o annotators and =0 +Our approach ( =0) +Our approach ( =0.01, m=2) +(b) Testing entropy +Figure 3. Accuracy and Entropy for Curated MNIST testing data. +Image +Original +Our (λ=0.01, m=2) +Our (λ=0) +Thin +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator1 Thin +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Thin +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Thin +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +Original +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator2 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +Thick +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator3 Thick +0.000 +0.025 +0.050 +0.075 +0.100 +0.125 +0.150 +0.175 +0.200 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Thick +0.000 +0.025 +0.050 +0.075 +0.100 +0.125 +0.150 +0.175 +0.200 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Thick +0.000 +0.025 +0.050 +0.075 +0.100 +0.125 +0.150 +0.175 +0.200 +Figure 4. Original and Predicted confusion for different Annotators +using different models: our approach with regularizer (λ = 2, +m=1.5) and without it (λ = 0). (MNIST). +and (iii) our approach with information-based regularization. +Each annotator NN has similar architecture as in classifier +model and takes images as an input. Everything else is the +same as described in Section 3. +The result of experiments can be seen in Figures 2 and 3. +Our approach is more accurate and confident compared to +the classifier model. The accuracy of our approach with reg- +ularizer is higher and more confident than the model without +the regularizer. This observation can be seen for both train- +ing and testing data. The proposed approach is able to learn +the annotators’ confusion. Predicted confusion matrices for +each annotators and different image types are provided in +7 + +6Table 5. Test DICE (%) and entropy evaluation on MNIST dataset +for segmentation. +Metrics +Ours-Inf +Trace +DICE +96.97 +96.62 +Entropy +0.0453 +0.0696 +Figure 4. More results can be found in Appendix C. +6. Segmentation Experiments +We explored the performance of our algorithm with +information-based regularization for segmentation. +The +whole approach is the same as for classification, but pre- +dictions would now be pixel-wise. Holistically, we followed +the same idea in both the settings of classification and seg- +mentation. The inputs of the model are the original images +from MNIST with a Gaussian noise. Annotators (thin, thick, +fractured) were simulated using morphological transforma- +tions [5] as mentioned in Section 5.3. The details for the +MNIST segmentation dataset are provided in Appendix B.2. +For our method, we used the same model architecture as +in [41], which is implemented as U-Net [27] with multiple +output layers: the first is for prediction of true segmentation +and the second is for predictions of noisy segmentations. +We compared our method, which has information-based +regularizer, with the trace-regularized approach [41]. +6.1. Results +Table 5 shows the accuracy of the our method in com- +parison with the trace, and it also highlights the entropy +calculated for these two methods. It can be seen that our +model achieves better DICE similarity score and is more con- +fident. Furthermore, in Figure 5, we visualised the results +of the predictions for our method. It is clearly demonstrated +that for an input image with Gaussian noise, our algorithm +is able to produce excellent predictions about the true seg- +mentation, with given annotators, as it matches closely the +GT image. +7. Discussion & Conclusion +In this research, we proposed an approach of jointly train- +ing a two network model in a confident way. We improve +classification/segmentation network by attaching regulariza- +tion term (Information and Entropy) to make assured pre- +dictions. Moreover, our algorithm also learns annotators’ +noise and separate it from the true labels under extreme +noisy supervision. We evaluated our algorithm on the stan- +dard datasets such as CIFAR-10, FMNIST and MNIST. In +comparison with other state-of-the-arts, our method secured +mature robust results. In classification task, we outperformed +all baselines for extreme noise levels such as pairflip 45% +and symmetric 50%. For smaller noise levels, we achieved +comparable performance with SOTAs. In segmentation prob- +lem, we achieved better DICE similarity score than [41]. We +also show that prediction of classifier/segmentation model +are more confident compared to other baselines. This demon- +strates the effectiveness of our algorithm in making confident +robust predictions about the true class labels/ground truth. +References +[1] Andrew J Asman and Bennett A Landman. Non-local statisti- +cal label fusion for multi-atlas segmentation. Medical Image +Analysis, 17(2):194–208, 2013. 4 +[2] Landman BA Asman AJ. +Robust statistical label fusion +through consensus level, labeler accuracy, and truth estima- +tion (collate). IEEE transactions on medical imaging, pages +1779–94, 10 2011. 4 +[3] Ella Barkan, Alon Hazan, and Vadim Ratner. Reduce discrep- +ancy of human annotators in medical imaging by automatic +visual comparison to similar cases, Feb. 9 2021. US Patent +10,916,343. 1 +[4] Alan Joseph Bekker and Jacob Goldberger. Training deep +neural-networks based on unreliable labels. In 2016 IEEE +International Conference on Acoustics, Speech and Signal +Processing (ICASSP), pages 2682–2686, 2016. 3 +[5] Daniel Coelho Castro, Jeremy Tan, Bernhard Kainz, Ender +Konukoglu, and Ben Glocker. Morpho-mnist: Quantitative +assessment and diagnostics for representation learning. CoRR, +abs/1809.10780, 2018. 7, 8 +[6] Daniel C. Castro, Jeremy Tan, Bernhard Kainz, Ender +Konukoglu, and Ben Glocker. Morpho-MNIST: Quantita- +tive assessment and diagnostics for representation learning. +Journal of Machine Learning Research, 20(178), 2019. 11 +[7] Xinlei Chen and Abhinav Gupta. Webly supervised learning +of convolutional networks, 2015. 3 +[8] Li Deng. The mnist database of handwritten digit images for +machine learning research. IEEE Signal Processing Maga- +zine, 29(6):141–142, 2012. 6 +[9] Jacob Goldberger and Ehud Ben-Reuven. +Training deep +neural-networks using a noise adaptation layer. In ICLR, +2017. 3 +[10] Bo Han, Quanming Yao, Xingrui Yu, Gang Niu, Miao Xu, +Weihua Hu, Ivor W. Tsang, and Masashi Sugiyama. Co- +teaching: Robust training of deep neural networks with ex- +tremely noisy labels. Advances in Neural Information Pro- +cessing Systems, 2018-Decem(Nips):8527–8537, 2018. 1, 2, +3, 6 +[11] Dan Hendrycks, Mantas Mazeika, Duncan Wilson, and Kevin +Gimpel. Using trusted data to train deep networks on la- +bels corrupted by severe noise. Advances in Neural Infor- +mation Processing Systems, 2018-December(Nips):10456– +10465, 2018. 3 +[12] Lu Jiang, Zhengyuan Zhou, Thomas Leung, Li Jia Li, and Li +Fei-Fei. Mentornet: Learning data-driven curriculum for very +deep neural networks on corrupted labels. 35th International +Conference on Machine Learning, ICML 2018, 5:3601–3620, +2018. 1, 3 +8 + +Input +Thin +Thick +Fractured +Prediction +GT +Figure 5. Visualisation of the predictions of the true segmentation along with the predictions of multiple annotators-Thin, Thick and +Fractured using our algorithm in comparison with the test image and GT. +[13] Modat M Jorge Cardoso M, Leung K. Steps: Similarity and +truth estimation for propagated segmentations and its appli- +cation to hippocampal segmentation and brain parcelation. +Medical image analysis, 17:671–84, 02 2013. 4 +[14] Eytan Kats, Jacob Goldberger, and Hayit Greenspan. A Soft +STAPLE Algorithm Combined with Anatomical Knowledge. +Lecture Notes in Computer Science (including subseries Lec- +ture Notes in Artificial Intelligence and Lecture Notes in Bioin- +formatics), 11766 LNCS:510–517, 2019. 4 +[15] Simon A.A. Kohl, Bernardino Romera-Paredes, Clemens +Meyer, Jeffrey De Fauw, Joseph R. Ledsam, Klaus H. Maier- +Hein, S. M. Ali Eslami, Danilo Jimenez Rezende, and Olaf +Ronneberger. A probabilistic U-net for segmentation of am- +biguous images. Advances in Neural Information Processing +Systems, 2018-December(NeurIPS):6965–6975, 2018. 4 +[16] Alex Krizhevsky. Learning multiple layers of features from +tiny images. Technical report, 2009. 6 +[17] Elizabeth Lazarus, Martha B Mainiero, Barbara Schepps, Su- +san L Koelliker, and Linda S Livingston. Bi-rads lexicon for +us and mammography: interobserver variability and positive +predictive value. Radiology, 239(2):385–391, 2006. 1 +[18] Junnan Li, Richard Socher, and Steven CH Hoi. Dividemix: +Learning with noisy labels as semi-supervised learning. arXiv +preprint arXiv:2002.07394, 2020. 3 +[19] Xuefeng Liang, Xingyu Liu, and Longshan Yao. Review–A +Survey of Learning from Noisy Labels. ECS Sensors Plus, +1(2):021401, 2022. 6 +[20] Geert Litjens, Thijs Kooi, Babak Ehteshami Bejnordi, Arnaud +Arindra Adiyoso Setio, Francesco Ciompi, Mohsen Ghafoo- +rian, Jeroen A.W.M. van der Laak, Bram van Ginneken, and +Clara I. Sánchez. A survey on deep learning in medical image +analysis. Medical Image Analysis, 42(1995):60–88, 2017. 1 +[21] Kede Ma, Xuelin Liu, Yuming Fang, and Eero P. Simoncelli. +Blind image quality assessment by learning from multiple +annotators. In 2019 IEEE International Conference on Image +Processing (ICIP), pages 2344–2348, 2019. 1, 6 +[22] Eran Malach and Shai Shalev-Shwartz. Decoupling "when +to update" from "how to update". Advances in Neural Infor- +mation Processing Systems, 2017-Decem:961–971, 2017. 1, +3 +[23] Aditya Krishna Menon, Ankit Singh Rawat, Sashank J. Reddi, +and Sanjiv Kumar. Can gradient clipping mitigate label noise? +In International Conference on Learning Representations, +2020. 3 +[24] Zahra Mirikharaji, Yiqi Yan, and Ghassan Hamarneh. Learn- +ing to segment skin lesions from noisy annotations, 2019. +4 +[25] Giorgio Patrini, Alessandro Rozza, Aditya Krishna Menon, +Richard Nock, and Lizhen Qu. Making deep neural networks +robust to label noise: A loss correction approach. Proceedings +- 30th IEEE Conference on Computer Vision and Pattern +Recognition, CVPR 2017, 2017-January:2233–2241, 2017. 3 +[26] Scott E. Reed, Honglak Lee, Dragomir Anguelov, Christian +Szegedy, Dumitru Erhan, and Andrew Rabinovich. Training +deep neural networks on noisy labels with bootstrapping. 3rd +International Conference on Learning Representations, ICLR +2015 - Workshop Track Proceedings, pages 1–11, 2015. 3 +[27] Olaf Ronneberger, Philipp Fischer, and Thomas Brox. U-net: +Convolutional networks for biomedical image segmentation, +2015. 4, 8 +[28] Claude Elwood Shannon. A mathematical theory of commu- +nication. The Bell system technical journal, 27(3):379–423, +1948. 5 +[29] Ji Songbai, David W. Roberts, Hartov Alex, and Keith D. +Paulsen. Combining Multiple Ture 3D Ultrasound Image +9 + +3Volumes through Re-registration and Rasterization. +Med +Image Comut Comput Asist Interv, 23(7):903–921, 2005. 4 +[30] Sainbayar Sukhbaatar, Joan Bruna, Manohar Paluri, Lubomir +Bourdev, and Rob Fergus. Training convolutional networks +with noisy labels. 3rd International Conference on Learning +Representations, ICLR 2015 - Workshop Track Proceedings, +pages 1–11, 2015. 2, 3 +[31] Ryutaro Tanno, Ardavan Saeedi, Swami Sankaranarayanan, +Daniel C Alexander, and Nathan Silberman. Learning from +noisy labels by regularized estimation of annotator confusion. +In Proceedings of the IEEE/CVF conference on computer +vision and pattern recognition, pages 11244–11253, 2019. 1, +2, 3, 4, 6 +[32] Andreas Veit, Neil Alldrin, Gal Chechik, Ivan Krasin, Abhi- +nav Gupta, and Serge Belongie. Learning from noisy large- +scale datasets with minimal supervision. In Proceedings of the +IEEE conference on computer vision and pattern recognition, +pages 839–847, 2017. 1 +[33] Simon Warfield, Kelly Zou, and William Wells. Simultaneous +truth and performance level estimation (staple): An algorithm +for the validation of image segmentation. IEEE transactions +on medical imaging, 23:903–21, 08 2004. 4 +[34] Hongxin Wei, Lei Feng, Xiangyu Chen, and Bo An. Com- +bating Noisy Labels by Agreement: A Joint Training Method +with Co-Regularization. Proceedings of the IEEE Computer +Society Conference on Computer Vision and Pattern Recogni- +tion, pages 13723–13732, 2020. 1, 2, 3, 6 +[35] Xiaobo Xia, Tongliang Liu, Bo Han, Chen Gong, Nannan +Wang, Zongyuan Ge, and Yi Chang. Robust early-learning: +Hindering the memorization of noisy labels. In International +conference on learning representations, 2020. 2, 3, 6 +[36] Xiaobo Xia, Tongliang Liu, Nannan Wang, Bo Han, Chen +Gong, Gang Niu, and Masashi Sugiyama. Are Anchor Points +Really Indispensable in Label-Noise Learning? In H Wallach, +H Larochelle, A Beygelzimer, F d'Alché-Buc, E Fox, and R +Garnett, editors, Advances in Neural Information Processing +Systems, volume 32. Curran Associates, Inc., 2019. 3 +[37] Han Xiao, Kashif Rasul, and Roland Vollgraf. Fashion-mnist: +a novel image dataset for benchmarking machine learning +algorithms. arXiv preprint arXiv:1708.07747, 2017. 6 +[38] Yan Yan, Rómer Rosales, Glenn Fung, Ramanathan Subra- +manian, and Jennifer Dy. Learning from multiple annotators +with varying expertise. Machine Learning, 95(3):291–327, +2014. 1, 4 +[39] Kun Yi and Jianxin Wu. Probabilistic end-to-end noise cor- +rection for learning with noisy labels. Proceedings of the +IEEE Computer Society Conference on Computer Vision and +Pattern Recognition, 2019-June:7010–7018, 2019. 3 +[40] Xingrui Yu, Bo Han, Jiangchao Yao, Gang Niu, Ivor W. Tsang, +and Masashi Sugiyama. How does disagreement help gener- +alization against label corruption? 36th International Confer- +ence on Machine Learning, ICML 2019, 2019-June:12407– +12417, 2019. 1, 2, 3, 6 +[41] Le Zhang, Ryutaro Tanno, Mou Cheng Xu, Chen Jin, Joseph +Jacob, Olga Ciccarelli, Frederik Barkhof, and Daniel C. +Alexander. Disentangling human error from the ground truth +in segmentation of medical images. Advances in Neural In- +formation Processing Systems, 2020-Decem(NeurIPS):1–13, +2020. 1, 2, 4, 8, 11 +10 + +A. Proof of Theorem 1 +Proof. Given samples x, y = i we want to minimize +1 +R +R +� +r=1 +E˜y|x,y +� +l( ˆU (r) +ψ (x)pθ(x), ˜y) +� += 1 +R +R +� +r=1 +C +� +j=1 +p(˜y = j|x, y = i)l( ˆU (r) +ψ (x)ei, ˜y) += − 1 +R +R +� +r=1 +C +� +j=1 +p(˜y = j|x, y = i) log +[ ˆU (r) +ψ (x)]j,i +C +� +j=1 +[ ˆU (r) +ψ (x)]j,i +w.r.t. ˆU (r) +ψ (x), r = 1, . . . , R. Since ˆU (r) +ψ (x) is a stochastic +matrix, we have +C� +j=1 +[ ˆU (r) +ψ (x)]j,i = 1. Taking the derivative +over [ ˆU (r) +ψ (x)]j,i, we get +[ ˆU (r) +ψ (x)]j,i = p(˜y = j|x, y = i). +B. Experimental Details +B.1. Classification Datasets +MNIST: dataset comprise of 60,000 samples for training, +and 10,000 data samples reserved for testing. The number +of classes in the dataset is 10. +CIFAR-10: The CIFAR-10 dataset contains 60,000 color +images in 10 classifications, with 6000 images each class. +There are 50,000 training and 10,000 test images. The +dataset is divided into five training batches and one test +batch, each contains 10,000 images. The test batch is a col- +lection of exactly 1,000 data samples randomly selected from +each class. The training batches comprise of the remaining +images in a random order, however it’s likely that certain +training batches may have more images from one class than +another. +FMNIST: Fashion-MNIST is a dataset of article images +from Zalando. It consists of a training set of 60,000 instances +and a test set of 10,000 instances. Each instance is a 28 × 28 +grayscale image with a label from one of ten classes. +B.2. Segmentation Datasets +MNIST. +We also use the dataset used by [41]; synthetic +noisy annotations were created based on the assumed GT to +demonstrate the effectiveness of the method in a hypothetical +setting where the GT is known. We apply the morphological +alterations (such as thinning, thickening, fractures, etc.) to +the ground-truth (GT) segmentation labels using the Morpho- +MNIST software [6], we mimic a group of five annotators +with a variety of distinguishing features/transformations. In +particular, the first annotator near accurately segments the +image ("good-segmentation"), and look similar to the GT. +The second tends to over-segment ("thick-segmentation"), +the third tends to under-segment ("thin-segmentation"), the +fourth is prone to a combination of over-segmentation and +small fractures ("fracture-segmentation"). +In a multi-class scenario, we first select a target class and +then perform morphological operations on the provided GT +mask to produce 4 different types of synthetic noisy labels: +over-segmentation, under-segmentation, fracture segmenta- +tion, and good segmentation. Through the use of simulated +annotators, we derive labels to create training data. How- +ever, the good segmentation remain remain latent and are +not included during training of our algorithm. +B.3. Types of Noise +Figure 6 shows the an example of noise transition ma- +trices for pairflip 20% and symmetric 50% noise types. In +addition, Figure 7 signifies the noise labels distributions +for CIFAR-10 dataset for pairflip 45% and symmetric 50% +noise types; this distribution of the label noise is used in the +training process. +B.4. Fine-tuning/Training +In this section, we would now further elaborate on the +experimental details for each dataset that we used to validate +our algorithm against. +MNIST. +We used a LeNet model as a classifier for our +backbone network. For the annotator network, we have a +linear layer of size C × C, C denotes the number of classes. +This linear layer represents our annotator confusion matrices, +and we apply a softmax layer to it to make it a stochastic +matrix along a certain dimension. We fine-tuned our model +for a combination of learning rates, α = [0.01, 0.001, 0.0001, +0.000001, 0.0016, 0.008, 0.0064, 0.005], and about 50 dif- +ferent lambda values, λ, for our regularizer hyper-parameter. +We started with a very small value of λ = 0.001506746, and +slowly increased it exponentially (geometric progression) +per epoch with a rate, r = 1.18; we trained the model for +70 epochs and used Adam as an optimizer. In addition, the +experiments were regulated to assess the performance of the +model when the confusion matrix is initialized as an identity. +These fine-tunings are done across all 2 different types of +noise described in Section 5.1 with the respective noise rate +that is associated with each of the noise types. +CIFAR-10. +For CIFAR-10, we used ResNet-18 as our +backbone network for the classifier. The annotator network +remains unchanged (still has one linear layer that represents +the confusion matrices of class C × C that are stochas- +tic). For this dataset, we fine-tuned the model for an assort- +ment of learning rates, such as α = [0.001, 0.00064, 0.0016, +0.000001, 0.005, 0.008, 0.0016, 0.00064]. We ran the model +for 150 epochs; the hyperparameter λ for our regularizer was +slowly increased exponentially again with a rate, r= 1.11. +11 + +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 0.2 +0.2 +0 +0 +0 +0 +0 +0 +0 +0 +0.8 +Pairflip, ε = 20% +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0.8 +(a) +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.06 +0.5 +Symmetric, ε = 50% +0.10 +0.15 +0.20 +0.25 +0.30 +0.35 +0.40 +0.45 +0.50 +(b) +Figure 6. Noise Transition matrices for Pairflip and Symmetric noise. +y +y +2713 +2287 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2846 +2154 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2766 +2234 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2764 +2236 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2742 +2258 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2745 +2255 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2797 +2203 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2746 +2254 +0 +0 +0 +0 +0 +0 +0 +0 +0 +2780 +2220 +2299 +0 +0 +0 +0 +0 +0 +0 +0 +2701 + CIFAR-10, Pairflip-45% +0 +500 +1000 +1500 +2000 +2500 +(a) +y +y +2562 +282 +257 +264 +274 +292 +272 +268 +264 +265 +287 +2486 +273 +285 +271 +290 +272 +284 +271 +281 +308 +272 +2492 +285 +284 +267 +256 +308 +284 +244 +260 +238 +280 +2560 +266 +264 +270 +302 +280 +280 +264 +286 +288 +289 +2461 +275 +309 +272 +277 +279 +280 +258 +275 +285 +263 +2531 +291 +259 +275 +283 +279 +297 +273 +277 +311 +271 +2465 +270 +271 +286 +278 +245 +272 +308 +250 +306 +279 +2523 +281 +258 +266 +268 +275 +287 +287 +282 +298 +230 +2548 +259 +271 +266 +277 +252 +287 +282 +278 +273 +280 +2534 + CIFAR-10, Symmetric-50% +500 +1000 +1500 +2000 +2500 +(b) +Figure 7. Confusion matrix between clean (y) and noisy labels (˜y) of CIFAR-10 dataset for (a) Pairflip-45% and (b) Symmetric-50% noise. +However, the starting value this time is λ= 3.0517578125e- +05. We used a standard batch-size, BS=128. We used the +standard augmentations of random crop of size 32 × 32 and +horizontal random flipping. These are the standard augmen- +tations that have been used across all the baselines that we +have evaluated. The remaining settings remain the same as +described in MNIST above. +FMNIST. +We kept the same settings of CIFAR-10, such as +ResNet-18 model and batch-size of 128 for FMNIST dataset. +The model was again fine-tuned for the same set of hyperpa- +rameters. However, the starting value of λ= 6.103515625e- +05, and it was increased exponentially with a rate of r=1.12. +We also retained the same set of augmentations that we used +in CIFAR-10 dataset. +C. Additional experimental results +In our earlier experiments, we kept the same type of noise +and noise levels across all the number of annotators in the +annotator network. This is usually not representative of +the noise in the real world data, as it is possible that each +annotator would be independent in the way it is confused +about labelling and annotating the data (subject to their own +biases). Therefore, we confuse each annotator with different +types and levels of noise. Table 6 shows the test accuracy of +the classifier network on CIFAR-10, FMNIST and MNIST +datasets for different types of noise for each annotators. We +achieved comparable results with an accuracy of 84.12%, +91.12% and 98.97% for CIFAR-10, FMNIST and MNIST +respectively. It’s particularly notable that the accuracy of the +classifier network remains at par even with using high level +noise, such as pairflip 45% and symmetric 50% for two of +the three annotators. +Table 6. Test accuracy (%) with three different annotators (Annota- +tor1: Pairflip 45%, Annotator2: Symmetric 20%, Annotator3: 50%) +representing different noise types and noise levels on CIFAR-10, +FMNIST and MNIST datasets. +CIFAR-10 FMNIST MNIST +84.12 +91.62 +98.97 +12 + +0 +10 +20 +30 +40 +50 +60 +epoch +20 +40 +60 +80 +100 +test accuracy +MNIST, Pairflip 45% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(a) Pairflip-45% +0 +10 +20 +30 +40 +50 +60 +epoch +20 +40 +60 +80 +100 +test accuracy +MNIST, Symmetric 30% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(b) Symmetry-30% +0 +10 +20 +30 +40 +50 +60 +epoch +20 +40 +60 +80 +100 +test accuracy +MNIST, Symmetric 50% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(c) Symmetry-50% +Figure 8. Test accuracy (%) vs. number of epochs on MNIST dataset. +0 +20 +40 +60 +80 +100 +120 +140 +epoch +10 +20 +30 +40 +50 +60 +70 +80 +test accuracy +(CIFAR-10, Pairflip 45%) +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(a) Pairflip-45% +0 +20 +40 +60 +80 +100 +120 +140 +epoch +10 +20 +30 +40 +50 +60 +70 +80 +test accuracy +CIFAR-10, Symmetric 30% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(b) Symmetry-30% +0 +20 +40 +60 +80 +100 +120 +140 +epoch +10 +20 +30 +40 +50 +60 +70 +80 +test accuracy +CIFAR-10, Symmetric 50% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(c) Symmetry-50% +Figure 9. Test accuracy (%) vs. epochs on CIFAR-10 dataset. +MNIST +In Figure 8, we highlight the test accuracy vs. +number of epochs. We can see clearly that for symmetric +noise types, all algorithms gave comparable performance. +It can be clearly seen that for symmetric noise, our test +accuracy starts to decline a bit. This could be alleviated +with an early stopping criteria which was not incorporated in +these experiments. For pairflip 45%, the test accuracy starts +to increase and stabilize in the later epochs of the experiment +and transcends all the baselines. +CIFAR-10 +Figure 9 shows the illustrative results of test +accuracy vs. number of epochs. In all the three plots, it can +be clearly seen that our algorithm performs at par with the +other algorithms, but the performance gets robustly superior +in the extreme noise type of pairflip 45%. This shows that +our method is particularly robust again harder noise as it is +able to make confident predictions. +FMNIST +Figure 10 gives an illustrative result of test accu- +racy vs. number of epochs on FMNIST dataset. It showcases +the test performance of our algorithm in comparison with +other baselines. We can see that for all noise instances, our +algorithm performs at par with the high achieving method +like JoCoR. We perform considerably better against sample +selection methods like Co-teaching and Co-teaching+, as +well as against other method like CDR in the instance of +pairflip 45%. +In addition, Figure 11 highlights the confusion matrices +13 + +(Cifar-10. Symmetric 30%) +90 +80 +M +70 +accuracy +60 +50 +test +40 +30 +20 +10 +0 +25 +50 +75 +100 +125 +150 +epoch +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR(Cifar-10. Symmetric 30%) +90 +80 +M +70 +accuracy +60 +50 +test +40 +30 +20 +10 +0 +25 +50 +75 +100 +125 +150 +epoch +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoRof the true class and the predicted class by the classifier net- +work of our algorithm. We show the confusion matrices plots +for two extreme noise types pairflip 45% and symmetric 50% +for all the datasets used. It is clearly seen that the confu- +sion matrices are diagonally dominant thus highlighting the +robust performance of our method. +MNIST Curated Dataset +In Figure 12 we demonstrate +annotators’ confusion using our algorithm on the curated +MNIST dataset that showcases different image styles of +Original, Thin and Thick. The strength of the regularizer, +λ=0.01, is increased by the multiplicative scalar m=2 ev- +ery epoch. Figures 13, 14 and 15 highlights the original +and predicted confusion of annotator 1, annotator 2 and an- +notator 3 using our approach with the regularizer and the +non-regularized approach (that is, when λ=0). +MNIST Segmentation +In Figure 16, the results of the +annotators’ (Thin, Thick and Fractured) predictions are vi- +sualised for our algorithm. The results demonstrate that +our algorithm has produced good prediction results for the +annotators. +14 + +0 +20 +40 +60 +80 +100 +epoch +20 +40 +60 +80 +test accuracy +FMNIST, Pairflip 45% +(a) Pairflip-45% +0 +20 +40 +60 +80 +100 +epoch +20 +40 +60 +80 +test accuracy +FMNIST, Symmetric 30% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(b) Symmetry-30% +0 +20 +40 +60 +80 +100 +epoch +20 +40 +60 +80 +test accuracy +FMNIST, Symmetric 50% +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoR +(c) Symmetry-50% +Figure 10. Results of test accuracy vs. number of epochs on FMNIST dataset. +(a) +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Predicted class +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +True class +972 +2 +1 +0 +0 +0 +2 +1 +2 +0 +0 +1123 +6 +1 +0 +1 +1 +0 +3 +0 +1 +0 +1004 +21 +1 +0 +0 +4 +1 +0 +1 +0 +1 +998 +3 +3 +0 +1 +2 +1 +0 +0 +0 +1 +972 +1 +4 +0 +0 +4 +2 +0 +0 +5 +0 +879 +4 +1 +0 +1 +1 +2 +0 +1 +1 +3 +948 +1 +1 +0 +0 +3 +6 +3 +1 +0 +0 +1011 +3 +1 +2 +0 +2 +6 +2 +1 +1 +1 +951 +8 +5 +2 +0 +4 +9 +3 +0 +3 +0 +983 +MNIST, Pairflip 45% +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Predicted class +True class +975 +0 +2 +0 +0 +0 +0 +1 +2 +0 +0 +1129 +1 +1 +1 +0 +2 +1 +0 +0 +1 +0 +1026 +0 +1 +0 +0 +3 +1 +0 +1 +0 +3 +997 +0 +5 +0 +2 +2 +0 +1 +0 +0 +0 +969 +0 +4 +1 +1 +6 +1 +0 +0 +5 +0 +884 +1 +0 +0 +1 +4 +4 +0 +1 +2 +2 +943 +0 +2 +0 +0 +1 +7 +1 +0 +0 +0 +1013 +1 +5 +0 +0 +4 +1 +2 +1 +1 +2 +962 +1 +1 +2 +0 +0 +3 +3 +0 +3 +1 +996 +MNIST, Symmetric 50% +0 +200 +400 +600 +800 +1000 +0 +200 +400 +600 +800 +1000 +(b) +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Predicted class +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +True class +780 +18 +7 +27 +7 +3 +139 +15 +3 +1 +0 +935 +35 +23 +4 +0 +2 +1 +0 +0 +17 +1 +735 +46 +124 +2 +74 +1 +0 +0 +2 +2 +1 +920 +60 +3 +6 +5 +1 +0 +2 +0 +18 +13 +903 +23 +40 +1 +0 +0 +1 +0 +0 +0 +0 +982 +3 +10 +0 +4 +68 +0 +27 +27 +81 +3 +512 279 +3 +0 +0 +0 +0 +0 +0 +6 +2 +961 +1 +30 +1 +0 +0 +1 +4 +2 +1 +2 +976 +13 +44 +0 +0 +0 +0 +5 +1 +22 +2 +926 +FMNIST, Pairflip 45% +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Predicted class +True class +782 +3 +24 +17 +6 +3 +159 +0 +6 +0 +2 +976 +1 +13 +3 +0 +3 +0 +2 +0 +16 +1 +861 +7 +59 +1 +52 +0 +3 +0 +24 +6 +11 +888 +30 +0 +38 +0 +3 +0 +0 +0 +107 +25 +800 +0 +64 +0 +4 +0 +0 +0 +0 +0 +0 +967 +1 +25 +0 +7 +72 +1 +70 +27 +60 +0 +757 +0 +13 +0 +0 +0 +0 +0 +0 +18 +0 +972 +0 +10 +1 +1 +1 +3 +2 +3 +5 +2 +982 +0 +0 +0 +0 +0 +0 +10 +0 +50 +0 +940 +FMNIST, Symmetric 50% +0 +200 +400 +600 +800 +0 +200 +400 +600 +800 +(c) +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Predicted class +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +True class +891 +13 +21 +23 +5 +2 +6 +4 +20 +15 +13 +918 +5 +6 +1 +2 +7 +1 +3 +44 +28 +1 +651 208 +34 +21 +38 +10 +4 +5 +21 +1 +16 +760 +49 +86 +42 +13 +5 +7 +15 +1 +22 +66 +773 +41 +24 +48 +9 +1 +9 +2 +6 +210 +29 +691 +24 +20 +5 +4 +9 +1 +13 +49 +19 +11 +890 +3 +2 +3 +15 +3 +6 +51 +17 +39 +3 +790 +72 +4 +67 +13 +2 +18 +2 +3 +1 +0 +795 +99 +52 +62 +6 +12 +0 +2 +7 +5 +13 +841 +CIFAR-10, Pairflip 45% +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Predicted class +True class +641 +26 +45 +33 +24 +20 +18 +9 +155 +29 +20 +752 +17 +15 +10 +20 +12 +11 +82 +61 +62 +14 +551 +68 +59 +69 +43 +27 +87 +20 +35 +27 +60 +469 +57 +157 +50 +39 +88 +18 +19 +10 +42 +33 +640 +55 +44 +54 +91 +12 +22 +19 +34 +115 +30 +593 +20 +51 +95 +21 +20 +10 +30 +43 +26 +36 +756 +18 +44 +17 +27 +14 +14 +39 +34 +66 +11 +698 +88 +9 +31 +14 +15 +12 +9 +9 +4 +7 +887 +12 +43 +67 +11 +12 +10 +20 +9 +17 +89 +722 +CIFAR-10, Symmetric 50% +0 +200 +400 +600 +800 +100 +200 +300 +400 +500 +600 +700 +800 +Figure 11. Confusion matrices of true class and predicted class for our algorithm for CIFAR-10, MNIST and FMNIST datasets. +15 + +(Cifar-10. Symmetric 30%) +90 +80 +M +70 +accuracy +60 +50 +test +40 +30 +20 +10 +0 +25 +50 +75 +100 +125 +150 +epoch +Ours +Trace +Co-teaching +Co-teaching+ +CDR +JoCoROriginal +Thin +Thick +Image +Image +Image +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 1 +0.08 +0.10 +0.12 +0.14 +0.16 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 1 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 1 +0.2 +0.4 +0.6 +0.8 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 2 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0.8 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 2 +0.07 +0.08 +0.09 +0.10 +0.11 +0.12 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 2 +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 3 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 3 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator 3 +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 +0.35 +Figure 12. Learned Annotators’ confusion for different image styles using our approach with the regularizer (λ=0.01, m=2) on MNIST +dataset. +16 + +山a6Image +Original +Our (λ=0.01, m=2) +Our (λ=0) +Original +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator1 Original +0.00 +0.05 +0.10 +0.15 +0.20 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Original +0.00 +0.05 +0.10 +0.15 +0.20 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Original +0.00 +0.05 +0.10 +0.15 +0.20 +Thick +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator1 Thick +0.0 +0.2 +0.4 +0.6 +0.8 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Thick +0.0 +0.2 +0.4 +0.6 +0.8 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Thick +0.0 +0.2 +0.4 +0.6 +0.8 +Thin +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator1 Thin +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Thin +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator1 Thin +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +Figure 13. Original and Predicted confusion for Annotator 1 using different models: our approach with regularizer (λ = 0.01, m=2) and +without it (λ = 0) on MNIST dataset. +17 + +6Image +Original +Our (λ=0.01, m=2) +Our (λ=0) +Original +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator2 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +Thick +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator2 Thick +0.00 +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Thick +0.00 +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Thick +0.00 +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 +Thin +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator2 Thin +0.00 +0.02 +0.04 +0.06 +0.08 +0.10 +0.12 +0.14 +0.16 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Thin +0.00 +0.02 +0.04 +0.06 +0.08 +0.10 +0.12 +0.14 +0.16 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator2 Thin +0.00 +0.02 +0.04 +0.06 +0.08 +0.10 +0.12 +0.14 +0.16 +Figure 14. Original and Predicted confusion for Annotator 2 using different models: our approach with regularizer (λ = 0.01, m=2) and +without it (λ = 0) on MNIST dataset. +18 + +6Image +Original +Our (λ=0.01, m=2) +Our (λ=0) +Original +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator3 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0.8 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0.8 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Original +0.0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +0.7 +0.8 +Thick +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator3 Thick +0.000 +0.025 +0.050 +0.075 +0.100 +0.125 +0.150 +0.175 +0.200 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Thick +0.000 +0.025 +0.050 +0.075 +0.100 +0.125 +0.150 +0.175 +0.200 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Thick +0.000 +0.025 +0.050 +0.075 +0.100 +0.125 +0.150 +0.175 +0.200 +Thin +0 +2 +4 +6 +8 +0 +2 +4 +6 +8 +Annotator3 Thin +0.0 +0.2 +0.4 +0.6 +0.8 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Thin +0.0 +0.2 +0.4 +0.6 +0.8 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +Annotator3 Thin +0.0 +0.2 +0.4 +0.6 +0.8 +Figure 15. Original and Predicted confusion for Annotator 3 using different models: our approach with regularizer (λ = 0.01, m=2) and +without it (λ = 0) on MNIST dataset. +19 + +6Input +Thin +Thick +Fractured +Pred +GT +Figure 16. Visualisation of the predictions of the annotators’ segmentations (Thin, Thick and Fractured) together with the predictions of +the estimated true labels using our algorithm in comparison with the test image and GT. Black is true positive, White is true negative, Red +represents false positive, whilst Green is false negative. +20 + +44400006. \ No newline at end of file diff --git a/5dAyT4oBgHgl3EQfpfgA/content/tmp_files/load_file.txt b/5dAyT4oBgHgl3EQfpfgA/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..481c7c41961b774febeb7cdadc0e4311c8b22d1b --- /dev/null +++ b/5dAyT4oBgHgl3EQfpfgA/content/tmp_files/load_file.txt @@ -0,0 +1,1775 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf,len=1774 +page_content='In Quest of Ground Truth: Learning Confident Models and Estimating Uncertainty in the Presence of Annotator Noise Asma Ahmed Hashmi Artem Agafonov Aigerim Zhumabayeva Mohammad Yaqub Martin Takáˇc Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) Masdar City, Abu Dhabi, UAE https://mbzuai.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='ae/ Abstract The performance of the Deep Learning (DL) models de- pends on the quality of labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In some areas, the involvement of human annotators may lead to noise in the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' When these corrupted labels are blindly regarded as the ground truth (GT), DL models suffer from performance deficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This paper presents a method that aims to learn a confident model in the presence of noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This is done in conjunc- tion with estimating the uncertainty of multiple annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We robustly estimate the predictions given only the noisy labels by adding entropy or information-based regularizer to the classifier network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We conduct our experiments on a noisy version of MNIST, CIFAR-10, and FMNIST datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our empirical results demonstrate the robustness of our method as it outperforms or performs comparably to other state-of-the-art (SOTA) methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In addition, we evaluated the proposed method on the curated dataset, where the noise type and level of various annotators depend on the input image style.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We show that our approach performs well and is adept at learning annotators’ confusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Moreover, we demonstrate how our model is more confident in predicting GT than other baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Finally, we assess our approach for segmentation problem and showcase its effectiveness with experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Introduction Real world data is replete with noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Since the labeling process of large-scale datasets is costly and time- consuming, researchers often resort to less expensive options, such as internet inquiries and crowdsourcing to circumvent this issue [32,38].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Unfortunately, these methods are viable in producing datasets with incorrect labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Smaller datasets are also vulnerable to the presence of corrupted labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In this case, usually the labelling process is either challenging or the annotators have divergent opinions [3,21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In medical imaging, for example, it is imperative to procure annotations from the clinical experts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, it is not only expensive to obtain annotated data, but it also suffers from high inter- reader variability among domain’s experts [17,20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Deep Neural Networks (DNN) noticeably suffer a degen- eration in performance when trained on noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To combat this issue, various algorithms have been devised to adapt to the presence of noisy labels without compromis- ing on the performance of DNNs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Sample Selection meth- ods [10,12,22,34,40] started to gain momentum recently;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' these methods involve a two network, Student-Teacher, for learning from noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It uses a small loss trick to sam- ple clean instances for additional training by its peer network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' While these methods aid in selecting the clean samples, the small loss trick does not perform well when the loss distri- bution of true-labelled and false-labelled examples overlap substantially.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In the instance when there is a significant level of dispute in the labels by the annotators, conventional training meth- ods that consider such labels as "the truth" result in models with low predictive ability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Tanno et al [31] proposed an algorithm that jointly estimates the annotators’ confusion and the underlying label distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The annotators’ con- fusion is represented by a stochastic transition probability matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In their approach, the loss function is augmented by adding a regularization term that is the trace of annotators’ confusion matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, the caveat is that this regular- ization may still penalize in instances when the annotator is not confused, therefore it will not learn the true annotator’s noise distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Furthermore, there is no incentive in the training process to enforce the classifier network to predict the class probabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our work is inspired by [31, 41], with a motivation to make our model confident in its predictions while also jointly 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00524v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='CV] 2 Jan 2023 estimating annotator’s confusion in the presence of noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We explored entropy and information regularizer techniques to encourage our classifier to make confident predictions about each class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Problem Statement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In this paper, we focus on supervised learning problem with noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We assume that each object xn, n = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , N is assigned with a set of noisy labels {˜y(r) n }R r=1, where ˜y(r) n is a label given to the object xn by annotator R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Here N denotes the total number of samples in the data, and R denotes the total number of annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The main goal is to construct an algorithm that learns the distribution of true labels p(y|x) and to make confident pre- dictions about the classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This is achieved in conjunction with estimating annotator’s noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To achieve this, we use the classifier-annotator approach [31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We jointly train two neural networks: classifier and annotator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The first network, the classifier, aims to learn the ground truth/class true label.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' So it outputs the class probability vector ˆpθ(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The second network learns each annotator’s confusion matrix U(x), which represents the likelihood of the annotator being wrong in the class markup for a given input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, it is not enough to minimize the loss between matrix-vector product ˆUψ(x)ˆpθ(x) and annotator’s label ˜y due to various reasons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' First of all, there is no evidence why annotator and classifier neural networks will learn confusion matrix and class probabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' There are infinite number of pairs ( ˆUψ(x), ˆpθ(x)) that approximate ˜y well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Without a modification of loss functions, it may turn out that they just learn some features of inputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Secondly, we want to be confident in the predictions of the classifier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In evaluation mode, this model will be used to make real-time predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It is important to train the model in a such a way that it makes confident and true predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To tackle the aforementioned problems, we penalize the classifier network for uncertainty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We propose two regular- ization techniques based on Shannon’s entropy and infor- mation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our methodology for classification is summarized in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Moreover, we apply our methodology for seg- mentation problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In this case we make predictions and estimate the confusion pixel-wise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Contributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The main contributions of our paper are outlined as follows: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learning the ground truth label.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our approach is capa- ble of disentangling the GT from the annotation noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We distinguish the noise through the usage of the annotator- classifier methodology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We enforce the classifier network to learn class probabilities, not some features of the in- put, by regularizing its output via Shannons’ entropy and information-based regularizer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learning confident model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our choice of regularization technique is enforcing the classifier network to make con- vincing predictions about the respective classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=" This CLASSIFIER ANNOTATOR 2 Input Annotators' confusion matrices Annotators' class probabilities Class probabilities Negative log likelihood loss ANNOTATOR 1 ANNOTATOR 3 or Regularization Regularization Figure 1." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Model architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We consider the problem with 4 classes and 3 annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Architecture consists of two neural net- works: 1) classifier network predicts class probabilities ˆpθ(x), 2) annotator NNs predict confusion matrix U (r)(x) for each annotator r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Matrix-vector product U (r)(x)ˆpθ(x) estimates the annotator’s prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Note, that 2nd annotator tends to confuse classes 1 and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To jointly train two neural networks we minimize regularized negative log likelihood loss (NLL).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We propose two options for regularization: information-based regularizer and entropy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' has various befitting practical applications in different domains, including medical imaging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We use our regular- izer to push the predicted probabilities of the first network to be closer to 1 or 0 and to make the model to distinguish between classes better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Competitive numerical experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We have per- formed extensive numerical experiments that compares our algorithm with other SOTA baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We conducted experiments on MNIST, CIFAR-10 and FMNIST datasets to gauge the performance of our algorithm in the exis- tence of noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The noisy labels were simulated using pairflip and symmetric noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our experiments showed that our algorithm outperforms all the evaluated baselines for the higher noise levels such as pairflip 45% and symmetric 50%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For smaller noise rates, we perform at par with [10,31,34,35,40].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Moreover, we show better results than in annotator-classifier setup with trace regularizer proposed in [30,31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Moreover, we conduct experiments for segmentation, where our model also shows better accuracy and confidence compared to trace regularization [41].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Curated dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We have also executed experiments for a curated dataset, where noise type and level for various annotators depend on input image style.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The proposed approach with the choice of our regularizer results in more confident model compared to the one without the regularizer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Moreover, we show that our approach is able to learn true annotators’ confusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Open code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our code is available online.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our implemen- tation includes a suite that easily allows researchers to compare their approach against all benchmarks consid- ered in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Organization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The remainder of the paper is organized as 2 follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Related works are described in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Section 3 presents the methodology and probabilistic model behind it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In Section 4 we describe the proposed regularizers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Numeri- cal experiments are provided in Section 5 (additional experi- ments are provided in Appendix C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Section 6 is dedicated to the segmentation problem, and concluding remarks and potential future research directions are given in Section 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Related Literature Learning with noisy labelled training data has been an active area of research for some time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Various algorithms have been introduced and have shown resistance to noise during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We highlight the core research being done in this domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Classification Noise Transition Matrix/Loss Correction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Loss correc- tion approach using noise transition matrix, T, is a crucial branch that is used in deep learning systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The goal of loss correction is for training on noisy labels with the corrected loss to be roughly equivalent to training on clean labels with the original loss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The majority of the early approaches deal- ing with noisy labels relied on estimating a noise transition matrix to figure out how labels switch across classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Patrini et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [25] introduced two different approaches for loss correction using a stochastic matrix T that delineates the probability of a class being flipped with another under a certain noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This two loss correction approaches, namely, forward correction and backward correction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The backward procedure corrects the loss by multiplying the loss with inverse transition matrix T −1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' while the forward procedure corrects the network predictions by multiplying it with T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Hendrycks et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [11] suggested Gold Loss Correc- tion(GLC) based on Forward Correction to address extreme noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The transition matrix cannot be accurately predicted by solely noisy data when there is significant noise present.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The main driver is the assumption that a limited portion of the training data is reliable and accessible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Sukhbaatar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [30] demonstrated a method of forward loss correction by introducing a stochastic matrix that quan- tifies label corruption, and cannot be calculated without ac- cessing the true labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In order to include learning about the label noise, forward loss correction involves adding a linear layer to the model’s end and adjusting the loss as necessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Through the use of soft and hard bootstrapping, Reed et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' added the concept of consistency to the prediction objective [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The soft version is identical to softmax re- gression with minimum entropy regularization, whereas the hard version adjusts regression targets by employing MAP estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This bootstrapping process, intuitively, gives the learner the opportunity to contest an inconsistent train- ing label and re-label the training data to enhance the label quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Whereas Goldberger et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [9] made use of the expectation-maximization (EM) algorithm to determine the optimal network and noise parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The use of transition matrices has been investigated further [4,7,36].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Multi-Network Learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Multi-network training fre- quently employs collaborative learning and co-training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Therefore, the sample selection procedure is governed by the mentor network in the case of joint learning and the peer network in the case of co-training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' These algorithms can be defined as learning to teach methods, and they com- prise of a student and teacher network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The responsibility of the teacher network is to select more informative sam- ples for enhanced student network training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Malach et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' proposed decoupling method that simultaneously trains two DNNs while only updating parameters on examples/samples in cases when the two classifiers disagree [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' MentorNet [12] selects clean instances to guide the train- ing of the student network after it has trained the teacher network first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Co-teaching [10] and [40] also employ two DNNs, but each DNN selects a certain number of small-loss examples and feeds them to its peer DNN for additional training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Co-teaching+ additionally utilize the disagreement strategy of Decouple.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In comparison, JoCoR [34] reduces the diversity of two networks by means of co-regularization, making the predictions of the two networks more similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Robust Regularization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Tanno et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [31] showcased a method for simultaneously learning the individual annotator model and the underlying true label distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Each anno- tator’s confusion is represented by a confusion matrix, which is estimated in conjunction with the classifier predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The algorithm comprised of a loss function include a trace regularization term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Menon et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [23] suggests a composite loss-based gradient clipping for label noise robustness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It is expected that clipping would provide noise robustness, given that one does not place excessive trust in any single sample.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Robust early-learning [35] distinguishes between critical and non-critical parameters for fitting clean and corrupted labels, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Then, only non-critical updates are penalized with a different update rule.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Other Deep Learning/Statistical Methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' DivideMix [18] is a framework that splits the training data into a la- beled set with clean samples and an unlabeled set with noisy samples-samples that comprise of noisy labels;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' it trains the model on both the labeled and unlabeled data in a semi- supervised approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Kun Yi et al [39] proposed a prob- abilistic end-to-end noise correction in labels (PENCIL) framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This method only uses noisy labels to initialize label distributions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' the label distributions get updated by an iterative correction of the noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Consequently, la- bel distributions are used in the calculation of the network loss instead of the noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Xia et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [35] suggested a robust early-training method to diminish the side effect of noisy labels prior to early stopping.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This helps with improv- ing the memorization of clean labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The parameters are 3 split into critical and non-critical parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Each of these parameters are updated with a different update rule.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Segmentation Several strategies have been developed to solve the is- sue of annotator-related bias for segmentation in medical imaging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We review some prominent work in the field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Inter-reader variability among annotators gave promi- nence to Simultaneous Truth and Performance level Es- timation (STAPLE) [33] algorithm that uses expectation- maximization method to merge segmentations from various annotators into estimating a single ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' There are several algorithms that drew their inspiration from STAPLE framework such as [1,2,13,14,29].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' These methods are reflec- tive of generative modelling of annotator’s behaviour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Here the latent variables are the true labels which are unobserved, and the confidence/expertise of various annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Mirikharaji et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [24] provides a sample re-weighting strategy that considers the expertise level of annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This strategy gives greater weights in the loss function for the samples annotated by professionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To disengage annotator bias, Tanno et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [41] uses two coupled CNNs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Similar to [31], the CNN for segmentation estimates the label distri- bution, while the CNN for annotation is representative of the annotator bias using a confusion matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Annotation distribution learning has been another active area that has inspired pioneer work of probabilistic U-Net (PU-NET) [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This method given an input, examines the problem of learning a distribution over segmentations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This proposed architecture is a generative segmentation model which is an integration of U-Net [27] and conditional varia- tional autoencoders (VAE), and is effective in developing an extensive number of conceivable hypotheses/segmentation results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Methodology 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Probabilistic Model For Noisy Labels Let X denote the space that contains a set of input data X := {x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , xn}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Each of these objects x in the input data are assigned a corresponding label y such that Y := {y1, y2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , yN} ⊆ Y, where Y is the space of labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We synthetically induce noise in our original label set Y to corrupt the clean labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' There are multiple different ways through which we create the noisy labels for our data, namely symmetric and pairflip noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 and in the Appendix, we discuss in details about the mainstream noise types that we used to create noisy labels for the datasets that we utilized in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We denote the set of noisy labels given by annotator r that labels objects from the set X as ˜Y (r) = {˜y(r) 1 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , ˜y(r) N }, where r = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our objective is to jointly estimate annotator noise as a function of input x, as well as to esti- mate the distribution for latent GT label from noisy dataset, D = {X, ˜Y (1), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , ˜Y (R)}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In our architecture we add an entropy/information-based regularization term with the main loss function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The goal is to enforce our algorithm to make confident predictions while also learning the true labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Following the strategy of [31, 41], we would now demon- strate how to set up a probabilistic model for data that has been annotated by multiple sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To model annotator-specific characteristics, there are some pivotal factors that are to be considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In modelling multiple annotators, it is common to assume that annotators exercise their independence according to their expertise and experience in labelling an input data point xi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The precision of annotator’s labeling may depend on the properties of the data point itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Thus, we do not assume that annotators are equally competent (or incompetent) at labeling all the data;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' rather, it depends on the input they observe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This can be represented as a probabilistic model for random variables x, y, and ˜y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Following the work of [31,38], we describe the joint conditional distribution of our probabilistic model as: P( ˜Y (r), Y |X) = �N i=1p(yi|xi) �R r=1 p(˜y(r) i |xi, yi).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Here p(yi|xi) represents the distribution for the clean labels of the data samples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Conditional distribution p(˜y(r) i |xi, yi) signifies that the model estimates a noisy ver- sion of clean labels , represented as ˜y(r) i for each annota- tor r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This makes intuitive sense as the noisy labels are not only conditional on true latent labels, but also on the input data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It is likely for the annotators to label some instances of data xi with more precision than other sam- ples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Since the annotators’ noise is dependent on the sam- ple x, this allows us to model noisy label distribution as p(˜y(r) = j|y = i, x) =: u(r) j,i (x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We denote by U(x) a C ×C confusion matrix [U]j,i(x) = uj,i(x), where C repre- sents the number of classes for the true labels, y ∈ [1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=', C].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Now using the confusion U(x), we can show the probability that input data x, labelled as i originally, is mislabelled as j in the set of noisy data: p(˜y = j|x) = �C i=1p(˜y = j|y = i, x) · p(y = i|x) = � iuji(x) · p(y = i|x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (1) To represent the joint probability distribution of noisy la- bels using the confusion matrix of each annotator r, we can simplify (1) as: p(˜y(1), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=', ˜y(R)|x) = R � r=1 C � y=1 u(r) ˜y(r),y(x) · p(y|x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Jointly Optimizing the two Networks to esti- mate the Ground Truth and Confusion We minimize negative log-likelihood (NLL) to jointly optimize the parameters θ and ψ of classification and annotator networks respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Given the data that 4 comprises of training inputs and noisy labels, we would minimize the negative log likelihood between the ob- served noisy labels and predictions from annotator la- bel distribution as follows: − log p(�Y (1), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=', �Y (R)|X) = �N i=1 �R r=1 NLL( ˆU (r) ψ (xi)ˆpθ(xi), ˜y(r) i ), where ˆpθ(xi) is the output of the classification network and ˆU (r) ψ (x) is the output of annotator’s r network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Minimizing this loss func- tion alone can cause several problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Firstly, it does not ensure that predictions of the classification network will be class probabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It can learn some feature of inputs in order to minimize the NLL loss between the pipeline output ˆU (r) ψ (x)ˆpθ(x) and corrupted labels ˜y(r).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Secondly, there is no guarantee that annotator matrices ˆU (r) ψ (x) are correctly learned to distinguish the noise from true labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It can also learn some uninterpretable features of inputs x, such that ˆU (r) ψ (x)ˆpθ(x) is close to ˜y(r).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To tackle these problems, we would add a regulariza- tion term that is attached to the base classifier which helps in estimating the true class probabilities of the predicted ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The main loss, NLL loss is then jointly op- timized with a regularization R(ˆpθ(x)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We propose two options for regularization: entropy regularization R(p) = − � i pi(x) log pi(x) and information-based regularization R(p) = − log maxi(pi).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The combined loss is then given as: − log p(�Y (1), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=', �Y (R)|X) = N � i=1 R � r=1 NLL( ˆU (r) ψ (x)ˆpθ(xi), ˜y(r) i )+λ 1 N N � i=1 R(ˆpθ(xi)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our classification network helps with learning the features of our data and gives us an estimate of the ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The outputs of this network are probabilities with dimension B × C, where B is the batch-size and C is the number of classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Ideally we desire that the predictions we get from the classifier network are forced to give us 1 for the most probable class and 0 elsewhere.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We take the sum of this regularization term for the number of batch samples and then multiply it with a regularization parameter λ and then taking its average for the batch sam- ples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Confident Regularization In this section, we will explain in detail the motivation for the choice of our regularizer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used entropy and infor- mation based regularizer with the first network to enhance the predictions of our model in learning the ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Entropy Regularizer Entropy is regarded as a measure for gauging uncertainty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The higher the entropy, the more disordered the state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Shan- non et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [28] mathematically described entropy as: R(p) := −� ipi log pi = E[− log p].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' where pi denotes the i-th class probability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It is to be noted that entropy is a feasible choice as it a smooth function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' So when pi is 0, the function is still differentiable, since 0 log 0 = limpi→0 pi log pi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Information Regularizer We evaluated our experiments on another regularizer which resembles the information part of entropy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The motiva- tion behind using this regularizer is the same as the entropy regularizer mentioned in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This regularizer is expressed as : R(p) = min i (− log pi).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (2) This regularizer would also push the classifier to make confident predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The caveat in using this regularizer is that it becomes undefined when pi = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' To counter that, we modified the regularizer function to: R(p) = − log(max i pi).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Also, we would show that we achieve similar results when we compare it with entropy regularizer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The advantage of using entropy regularizer is that it’s a smooth function unlike (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Motivation for Confident Regularizarion As we mentioned before, it is not enough to minimize the loss between ˆUψ(x)ˆpθ(x) and ˜y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Indeed, let U be the true confusion of the annotator and Pθ(x) the confusion matrix of classifier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Ideally, we want Pθ(x) = I and ˆUψ(x) = U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, there can be a lot of pairs ( ˆUψ(x), Pθ(x)) that satisfy ˆUψ(x)ˆpθ(x) = U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Therefore, we add an entropy regularizer, to enforce Pθ converge to I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Assume that classifier is confident, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' ˆpθ = ei if y = i, where ei is a basis vector of i-th coordinate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Then, minimizing NLL loss between ˆU (r) ψ (x)ˆpθ(x) and ˜y(r) over ˆU (r) ψ (x) we get [ ˆU (r) ψ (x)]i,j = p(˜y(r) = j|y = i, x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In Tables 1, Table 2, and Table 3, we show the perfor- mance of our algorithm with entropy and information-based regularizers on CIFAR-10, MNIST, and FMNIST datasets for symmetric and pairflip noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The theoretical com- parison between the two regularizers is further discussed in Appendix ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='. 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Classification Experiments 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Implementation Details In this section we describe implementation details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used a convolutional neural network (CNN) as a classifier 5 model which estimates the ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The predictions of the classifier network are multiplied to the outputs of a fully connected annotator network that learns the confusion of the noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' True labels are never introduced to the model during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In our experiments, we synthetically introduce noise to the training data;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' we chose various noise rates, such as 20%, 30%, 45% and 50%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We evaluate the performance of our algorithm for the clas- sifier network as this aids in estimating the GT via making confident predictions about the true class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We are partic- ularly interested in the performance of the classifier, as in evaluation stage this network will be used separately to make predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We compare our algorithm with the following ap- proaches: (i) Co-teaching [10], which simultaneously trains two DNN models, with each network selecting the batch of data for the other, based on the instances with a small loss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (ii) Co-teaching+ [40], also employs samples with small loss, but with disagreement about predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This is the selection criteria for the networks to pick data for each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (iii) JoCoR [34], extends on the idea of [10,40], but uses co-regularization to minimize the diversity of the two networks, thus bringing the predictions of the two networks closer together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (iv) Robust Early-learning (CDR) [35], cat- egorizes the critical and non-critical parameters for clean and noisy label fitting, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Different update rules are applied to update these parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (v) Annotator Con- fusion (Trace) [31] is a regularized approach that assumes the existence of various annotators to simultaneously learn the individual annotator model and the underlying true label distribution, using only noisy observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used the standard benchmark datasets: MNIST [8], FMNIST [37], and CIFAR-10 [16] to demon- strate the effectiveness of our methodology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Types of Noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The noise types, used in the experiments, are described below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip Noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The pairflip noise involves swapping the labels of two adjacent categories/classes based on a preset ratio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [19] 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric Noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In symmetric noise, a portion of the original labels are retained, while the remainder are uni- formly reassigned to all other categories [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This noise type is intended to imitate the random noise in the actual world, which is typically the result of random web crawl- ing or manual annotation errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It does not consider the similarities between classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Comparison with State-Of-The-Arts Results on MNIST.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used the same backbone architec- ture to compare our algorithm against the baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Table 1 shows the performance comparison of our algorithm with the other methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We see that for a smaller noise rate such as 20% and 30%, which is evidently the least challenging case, all algorithms seem to show comparable performance above 97% for both pairflip and symmetric noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, when noise rates increases to 45% or above, there seems to be a distinct contrast in the performance of other algorithms, as the accuracy of some methods visibly decline to below 90% in the case of pairflip noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our method achieves an accuracy of 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10% for pairflip 45% noise using entropy regularizer, followed closely by the Trace method with an accuracy of 97.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='95%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Whereas Co-teaching, JoCoR and CDR achieves the test accuracy of 87.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='63%, 85.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86% and 87.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='04% respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For symmetric-50% noise, we got test accu- racy of 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='94% with information regularizer, with Trace and CDR following closely behind at 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='87% and 97.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='72% re- spectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The results of the our methodology with entropy and information-based regularizers are comparable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Results on CIFAR-10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Table 2 shows the test accuracy results on CIFAR-10 dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our algorithm performs dis- tinctly superior when noise gets extreme;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' we achieve 80.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='03% accuracy for symmetric 50% noise with information regu- larizer, surpassing all the baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For pairflip 45%, we distinctly outperform all the baselines by a considerable mar- gin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We acquired an accuracy of 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='43%, which is about 8% better than Trace method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' All the other baselines acquired accuracy of less than 70%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Hence, our algorithm clearly outperforms all the baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This reinforces that for higher noise ratios, our algorithm consistently gives better perfor- mance as entropy and information regularization strategy helps the model to be more certain in its predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our algorithm still surpasses in performance when the noise rate is small for symmetric and pairflip noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For symmetric noise 20% and 30%, we achieved an accuracy of 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='22% and 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='85% respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The other algorithms contested close for symmetric 20% noise by accomplishing a test accuracy of 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86% for Trace, 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='82% for Co-teaching, 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12% for JoCoR, 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01% for CDR, and with Co-teaching+ settling with an accuracy of 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='51%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In pairflip noise 20% and 30%, we again outperform other methods by accomplishing an accuracy of 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='92% and 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5% in the given sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Here, CDR and Trace follow closely behind with an accuracy of 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='89% and 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86% respectively for pairflip 20% noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For pairflip 30%, CDR attained an accuracy of 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08%, while Trace achieved 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Results on FMNIST.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The experimental results of our algo- rithm compared with other baselines is shown in Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our algorithm has shown robust performance across most baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We see comparable performance among all the algorithms when the noise rate is 20% and 30% for both symmetric and pairflip noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We see distinguishing performance when the noise gets extreme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' At symmetric 50% noise, we perform about 12% better than Co-teaching+ algorithm, while we outperformed CDR 6 Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test accuracy (%) on MNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Noise rate Ours-Inf Ours-Ent Co-tea.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Co-tea.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='+ JoCoR Trace CDR symmetric 20% 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='48 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='88 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='82 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='16 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='97 symmetric 30% 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='11 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='09 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='78 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='38 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='40 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='75 symmetric 50% 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='94 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='93 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='24 95.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='26 96.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='83 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='87 97.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='72 pairflip 20% 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='55 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='84 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='59 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='89 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='88 pairflip 30% 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='94 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='54 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='57 97.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='95 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='56 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='50 pairflip 45% 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='77 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 87.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='63 71.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='36 85.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86 97.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='95 87.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='04 Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test accuracy (%) on CIFAR-10 dataset Noise rate Ours-Inf Ours-Ent Co-tea Co-tea+ JoCoR Trace CDR symmetric 20% 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='22 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='82 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='51 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01 symmetric 30% 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='85 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='26 80.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='69 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='29 80.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='95 80.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='45 78.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='90 symmetric 50% 80.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='03 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='64 75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='74 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='19 76.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='60 77.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='82 69.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='68 pairflip 20% 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='92 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='78 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='17 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='59 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='89 pairflip 30% 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='36 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='54 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='53 77.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='83 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='52 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 pairflip 45% 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='43 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='23 59.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='04 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='72 67.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='59 75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='88 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='56 Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test accuracy (%) on FMNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Noise rate Ours-Inf Ours-Ent Co-tea Co-tea+ JoCoR Trace CDR symmetric 20% 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='67 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='79 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='48 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='69 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='88 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='61 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='69 symmetric 30% 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='35 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='34 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='36 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='50 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='33 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='64 87.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='38 symmetric 50% 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='51 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='49 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='37 77.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='96 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='21 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='94 85.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='36 pairflip 20% 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='90 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='77 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='68 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='37 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='40 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01 pairflip 30% 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='38 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='65 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='11 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='67 90.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='33 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='78 pairflip 45% 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='37 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='02 78.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86 52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='61 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 64.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='63 by about 4%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We surpassed other baselines by small margins for this instance of noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For pairflip 45%, we performed significantly better than Co-teaching+ and CDR algorithms which achieved accuracy of 52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='61% and 64.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='63% respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Trace algorithm comes second in performance with 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08% accuracy, followed closely by JoCoR at 88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Two network architectures such as Co-teaching, Co- teaching+, and JoCoR suffers in performance when the noise level increase in both symmetric and pairflip noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Trace comes closer in comparison with our algorithm, but we outperform it in all experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Both entropy and information-based regularizers perform at par compared to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Curated Dataset We have assembled the dataset that is based on MNIST, where noise level depends on input image style for vari- ous annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Three type of image styles were simulated by performing morphological transformations (in particu- lar, thinning and thickening) on the original images, using Morpho-MNIST software [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In addition to the noise types described in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1, asymmetric and pairflip with per- mutation where applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In the latter, the ordered label categories were first permuted randomly and labels of two adjacent categories after permutation were swapped based on a preset ratio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Asymmetric noise is a block matrix trans- formation, where a portion of original labels are retained and the remainder is uniformly reassigned to closest four categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The type and level of noises applied to original labels are provided in Table 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For a dataset consisting three different type of images (original, thin, and thick) and three different annotators (Ta- ble 4), we compare (i) classifier model without annotators and regularization, (ii) our approach without regularization, Table 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Annotator Information for three different styles (MNIST).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Annotators Original Thin Thick Annotator 1 symmetric 80% asymmetric 40% pairflip 95% Annotator 2 pairflip with permutation 40% symmetric 95% asymmetric 70% Annotator 3 pairflip 60% pairflip with permutation 40% symmetric 80% 0 2 4 6 8 10 Epoch 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 Training Accuracy MNIST Model w/o annotators and =0 Our approach ( =0) Our approach ( =0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) (a) Training accuracy 0 2 4 6 8 10 Epoch 10 3 10 2 10 1 100 Training Entropy MNIST Model w/o annotators and =0 Our approach ( =0) Our approach ( =0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) (b) Training entropy Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Accuracy and entropy for Curated MNIST training data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 0 2 4 6 8 10 Epoch 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 Testing Accuracy MNIST Model w/o annotators and =0 Our approach ( =0) Our approach ( =0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) (a) Testing accuracy 0 2 4 6 8 10 Epoch 10 3 10 2 10 1 100 Testing Entropy MNIST Model w/o annotators and =0 Our approach ( =0) Our approach ( =0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) (b) Testing entropy Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Accuracy and Entropy for Curated MNIST testing data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Image Original Our (λ=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) Our (λ=0) Thin 0 2 4 6 8 0 2 4 6 8 Annotator1 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 Original 0 2 4 6 8 0 2 4 6 8 Annotator2 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 Thick 0 2 4 6 8 0 2 4 6 8 Annotator3 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='025 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='050 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='075 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='125 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='150 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='175 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='025 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='050 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='075 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='125 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='150 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='175 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='025 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='050 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='075 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='125 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='150 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='175 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Original and Predicted confusion for different Annotators using different models: our approach with regularizer (λ = 2, m=1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5) and without it (λ = 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (MNIST).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' and (iii) our approach with information-based regularization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Each annotator NN has similar architecture as in classifier model and takes images as an input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Everything else is the same as described in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The result of experiments can be seen in Figures 2 and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Our approach is more accurate and confident compared to the classifier model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The accuracy of our approach with reg- ularizer is higher and more confident than the model without the regularizer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This observation can be seen for both train- ing and testing data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The proposed approach is able to learn the annotators’ confusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Predicted confusion matrices for each annotators and different image types are provided in 7 6Table 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test DICE (%) and entropy evaluation on MNIST dataset for segmentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Metrics Ours-Inf Trace DICE 96.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='97 96.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='62 Entropy 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0453 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0696 Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' More results can be found in Appendix C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Segmentation Experiments We explored the performance of our algorithm with information-based regularization for segmentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The whole approach is the same as for classification, but pre- dictions would now be pixel-wise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Holistically, we followed the same idea in both the settings of classification and seg- mentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The inputs of the model are the original images from MNIST with a Gaussian noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Annotators (thin, thick, fractured) were simulated using morphological transforma- tions [5] as mentioned in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The details for the MNIST segmentation dataset are provided in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For our method, we used the same model architecture as in [41], which is implemented as U-Net [27] with multiple output layers: the first is for prediction of true segmentation and the second is for predictions of noisy segmentations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We compared our method, which has information-based regularizer, with the trace-regularized approach [41].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Results Table 5 shows the accuracy of the our method in com- parison with the trace, and it also highlights the entropy calculated for these two methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It can be seen that our model achieves better DICE similarity score and is more con- fident.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Furthermore, in Figure 5, we visualised the results of the predictions for our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It is clearly demonstrated that for an input image with Gaussian noise, our algorithm is able to produce excellent predictions about the true seg- mentation, with given annotators, as it matches closely the GT image.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Discussion & Conclusion In this research, we proposed an approach of jointly train- ing a two network model in a confident way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We improve classification/segmentation network by attaching regulariza- tion term (Information and Entropy) to make assured pre- dictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Moreover, our algorithm also learns annotators’ noise and separate it from the true labels under extreme noisy supervision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We evaluated our algorithm on the stan- dard datasets such as CIFAR-10, FMNIST and MNIST.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In comparison with other state-of-the-arts, our method secured mature robust results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In classification task, we outperformed all baselines for extreme noise levels such as pairflip 45% and symmetric 50%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For smaller noise levels, we achieved comparable performance with SOTAs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In segmentation prob- lem, we achieved better DICE similarity score than [41].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We also show that prediction of classifier/segmentation model are more confident compared to other baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This demon- strates the effectiveness of our algorithm in making confident robust predictions about the true class labels/ground truth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' References [1] Andrew J Asman and Bennett A Landman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Non-local statisti- cal label fusion for multi-atlas segmentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Medical Image Analysis, 17(2):194–208, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [2] Landman BA Asman AJ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Robust statistical label fusion through consensus level, labeler accuracy, and truth estima- tion (collate).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' IEEE transactions on medical imaging, pages 1779–94, 10 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [3] Ella Barkan, Alon Hazan, and Vadim Ratner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Reduce discrep- ancy of human annotators in medical imaging by automatic visual comparison to similar cases, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 9 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' US Patent 10,916,343.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1 [4] Alan Joseph Bekker and Jacob Goldberger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Training deep neural-networks based on unreliable labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2682–2686, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [5] Daniel Coelho Castro, Jeremy Tan, Bernhard Kainz, Ender Konukoglu, and Ben Glocker.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Morpho-mnist: Quantitative assessment and diagnostics for representation learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' CoRR, abs/1809.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10780, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 7, 8 [6] Daniel C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Castro, Jeremy Tan, Bernhard Kainz, Ender Konukoglu, and Ben Glocker.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Morpho-MNIST: Quantita- tive assessment and diagnostics for representation learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Journal of Machine Learning Research, 20(178), 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 11 [7] Xinlei Chen and Abhinav Gupta.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Webly supervised learning of convolutional networks, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [8] Li Deng.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The mnist database of handwritten digit images for machine learning research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' IEEE Signal Processing Maga- zine, 29(6):141–142, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 6 [9] Jacob Goldberger and Ehud Ben-Reuven.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Training deep neural-networks using a noise adaptation layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In ICLR, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [10] Bo Han, Quanming Yao, Xingrui Yu, Gang Niu, Miao Xu, Weihua Hu, Ivor W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Tsang, and Masashi Sugiyama.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Co- teaching: Robust training of deep neural networks with ex- tremely noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Advances in Neural Information Pro- cessing Systems, 2018-Decem(Nips):8527–8537, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 2, 3, 6 [11] Dan Hendrycks, Mantas Mazeika, Duncan Wilson, and Kevin Gimpel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Using trusted data to train deep networks on la- bels corrupted by severe noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Advances in Neural Infor- mation Processing Systems, 2018-December(Nips):10456– 10465, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [12] Lu Jiang, Zhengyuan Zhou, Thomas Leung, Li Jia Li, and Li Fei-Fei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Mentornet: Learning data-driven curriculum for very deep neural networks on corrupted labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 35th International Conference on Machine Learning, ICML 2018, 5:3601–3620, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 3 8 Input Thin Thick Fractured Prediction GT Figure 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Visualisation of the predictions of the true segmentation along with the predictions of multiple annotators-Thin, Thick and Fractured using our algorithm in comparison with the test image and GT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' [13] Modat M Jorge Cardoso M, Leung K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Steps: Similarity and truth estimation for propagated segmentations and its appli- cation to hippocampal segmentation and brain parcelation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Medical image analysis, 17:671–84, 02 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [14] Eytan Kats, Jacob Goldberger, and Hayit Greenspan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' A Soft STAPLE Algorithm Combined with Anatomical Knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Lecture Notes in Computer Science (including subseries Lec- ture Notes in Artificial Intelligence and Lecture Notes in Bioin- formatics), 11766 LNCS:510–517, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [15] Simon A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Kohl, Bernardino Romera-Paredes, Clemens Meyer, Jeffrey De Fauw, Joseph R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Ledsam, Klaus H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Maier- Hein, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Ali Eslami, Danilo Jimenez Rezende, and Olaf Ronneberger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' A probabilistic U-net for segmentation of am- biguous images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Advances in Neural Information Processing Systems, 2018-December(NeurIPS):6965–6975, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [16] Alex Krizhevsky.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learning multiple layers of features from tiny images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Technical report, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 6 [17] Elizabeth Lazarus, Martha B Mainiero, Barbara Schepps, Su- san L Koelliker, and Linda S Livingston.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Bi-rads lexicon for us and mammography: interobserver variability and positive predictive value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Radiology, 239(2):385–391, 2006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1 [18] Junnan Li, Richard Socher, and Steven CH Hoi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Dividemix: Learning with noisy labels as semi-supervised learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' arXiv preprint arXiv:2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='07394, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [19] Xuefeng Liang, Xingyu Liu, and Longshan Yao.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Review–A Survey of Learning from Noisy Labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' ECS Sensors Plus, 1(2):021401, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 6 [20] Geert Litjens, Thijs Kooi, Babak Ehteshami Bejnordi, Arnaud Arindra Adiyoso Setio, Francesco Ciompi, Mohsen Ghafoo- rian, Jeroen A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' van der Laak, Bram van Ginneken, and Clara I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Sánchez.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' A survey on deep learning in medical image analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Medical Image Analysis, 42(1995):60–88, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1 [21] Kede Ma, Xuelin Liu, Yuming Fang, and Eero P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Simoncelli.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Blind image quality assessment by learning from multiple annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In 2019 IEEE International Conference on Image Processing (ICIP), pages 2344–2348, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 6 [22] Eran Malach and Shai Shalev-Shwartz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Decoupling "when to update" from "how to update".' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Advances in Neural Infor- mation Processing Systems, 2017-Decem:961–971, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 3 [23] Aditya Krishna Menon, Ankit Singh Rawat, Sashank J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Reddi, and Sanjiv Kumar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Can gradient clipping mitigate label noise?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In International Conference on Learning Representations, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [24] Zahra Mirikharaji, Yiqi Yan, and Ghassan Hamarneh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learn- ing to segment skin lesions from noisy annotations, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [25] Giorgio Patrini, Alessandro Rozza, Aditya Krishna Menon, Richard Nock, and Lizhen Qu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Making deep neural networks robust to label noise: A loss correction approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Proceedings 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, 2017-January:2233–2241, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [26] Scott E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Reed, Honglak Lee, Dragomir Anguelov, Christian Szegedy, Dumitru Erhan, and Andrew Rabinovich.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Training deep neural networks on noisy labels with bootstrapping.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3rd International Conference on Learning Representations, ICLR 2015 - Workshop Track Proceedings, pages 1–11, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [27] Olaf Ronneberger, Philipp Fischer, and Thomas Brox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' U-net: Convolutional networks for biomedical image segmentation, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4, 8 [28] Claude Elwood Shannon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' A mathematical theory of commu- nication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The Bell system technical journal, 27(3):379–423, 1948.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 5 [29] Ji Songbai, David W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Roberts, Hartov Alex, and Keith D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Paulsen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Combining Multiple Ture 3D Ultrasound Image 9 3Volumes through Re-registration and Rasterization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Med Image Comut Comput Asist Interv, 23(7):903–921, 2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [30] Sainbayar Sukhbaatar, Joan Bruna, Manohar Paluri, Lubomir Bourdev, and Rob Fergus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Training convolutional networks with noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3rd International Conference on Learning Representations, ICLR 2015 - Workshop Track Proceedings, pages 1–11, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 2, 3 [31] Ryutaro Tanno, Ardavan Saeedi, Swami Sankaranarayanan, Daniel C Alexander, and Nathan Silberman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learning from noisy labels by regularized estimation of annotator confusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 11244–11253, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 2, 3, 4, 6 [32] Andreas Veit, Neil Alldrin, Gal Chechik, Ivan Krasin, Abhi- nav Gupta, and Serge Belongie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learning from noisy large- scale datasets with minimal supervision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 839–847, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1 [33] Simon Warfield, Kelly Zou, and William Wells.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Simultaneous truth and performance level estimation (staple): An algorithm for the validation of image segmentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' IEEE transactions on medical imaging, 23:903–21, 08 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 4 [34] Hongxin Wei, Lei Feng, Xiangyu Chen, and Bo An.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Com- bating Noisy Labels by Agreement: A Joint Training Method with Co-Regularization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recogni- tion, pages 13723–13732, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 2, 3, 6 [35] Xiaobo Xia, Tongliang Liu, Bo Han, Chen Gong, Nannan Wang, Zongyuan Ge, and Yi Chang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Robust early-learning: Hindering the memorization of noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In International conference on learning representations, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 2, 3, 6 [36] Xiaobo Xia, Tongliang Liu, Nannan Wang, Bo Han, Chen Gong, Gang Niu, and Masashi Sugiyama.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Are Anchor Points Really Indispensable in Label-Noise Learning?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=" In H Wallach, H Larochelle, A Beygelzimer, F d'Alché-Buc, E Fox, and R Garnett, editors, Advances in Neural Information Processing Systems, volume 32." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Curran Associates, Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=', 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [37] Han Xiao, Kashif Rasul, and Roland Vollgraf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' arXiv preprint arXiv:1708.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='07747, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 6 [38] Yan Yan, Rómer Rosales, Glenn Fung, Ramanathan Subra- manian, and Jennifer Dy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learning from multiple annotators with varying expertise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Machine Learning, 95(3):291–327, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 4 [39] Kun Yi and Jianxin Wu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Probabilistic end-to-end noise cor- rection for learning with noisy labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2019-June:7010–7018, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 3 [40] Xingrui Yu, Bo Han, Jiangchao Yao, Gang Niu, Ivor W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Tsang, and Masashi Sugiyama.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' How does disagreement help gener- alization against label corruption?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 36th International Confer- ence on Machine Learning, ICML 2019, 2019-June:12407– 12417, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 2, 3, 6 [41] Le Zhang, Ryutaro Tanno, Mou Cheng Xu, Chen Jin, Joseph Jacob, Olga Ciccarelli, Frederik Barkhof, and Daniel C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Alexander.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Disentangling human error from the ground truth in segmentation of medical images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Advances in Neural In- formation Processing Systems, 2020-Decem(NeurIPS):1–13, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 1, 2, 4, 8, 11 10 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Proof of Theorem 1 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Given samples x, y = i we want to minimize 1 R R � r=1 E˜y|x,y � l( ˆU (r) ψ (x)pθ(x), ˜y) � = 1 R R � r=1 C � j=1 p(˜y = j|x, y = i)l( ˆU (r) ψ (x)ei, ˜y) = − 1 R R � r=1 C � j=1 p(˜y = j|x, y = i) log [ ˆU (r) ψ (x)]j,i C � j=1 [ ˆU (r) ψ (x)]j,i w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' ˆU (r) ψ (x), r = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' , R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Since ˆU (r) ψ (x) is a stochastic matrix, we have C� j=1 [ ˆU (r) ψ (x)]j,i = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Taking the derivative over [ ˆU (r) ψ (x)]j,i, we get [ ˆU (r) ψ (x)]j,i = p(˜y = j|x, y = i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Experimental Details B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Classification Datasets MNIST: dataset comprise of 60,000 samples for training, and 10,000 data samples reserved for testing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The number of classes in the dataset is 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' CIFAR-10: The CIFAR-10 dataset contains 60,000 color images in 10 classifications, with 6000 images each class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' There are 50,000 training and 10,000 test images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The dataset is divided into five training batches and one test batch, each contains 10,000 images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The test batch is a col- lection of exactly 1,000 data samples randomly selected from each class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The training batches comprise of the remaining images in a random order, however it’s likely that certain training batches may have more images from one class than another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' FMNIST: Fashion-MNIST is a dataset of article images from Zalando.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It consists of a training set of 60,000 instances and a test set of 10,000 instances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Each instance is a 28 × 28 grayscale image with a label from one of ten classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Segmentation Datasets MNIST.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We also use the dataset used by [41];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' synthetic noisy annotations were created based on the assumed GT to demonstrate the effectiveness of the method in a hypothetical setting where the GT is known.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We apply the morphological alterations (such as thinning, thickening, fractures, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=') to the ground-truth (GT) segmentation labels using the Morpho- MNIST software [6], we mimic a group of five annotators with a variety of distinguishing features/transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In particular, the first annotator near accurately segments the image ("good-segmentation"), and look similar to the GT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The second tends to over-segment ("thick-segmentation"), the third tends to under-segment ("thin-segmentation"), the fourth is prone to a combination of over-segmentation and small fractures ("fracture-segmentation").' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In a multi-class scenario, we first select a target class and then perform morphological operations on the provided GT mask to produce 4 different types of synthetic noisy labels: over-segmentation, under-segmentation, fracture segmenta- tion, and good segmentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Through the use of simulated annotators, we derive labels to create training data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' How- ever, the good segmentation remain remain latent and are not included during training of our algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Types of Noise Figure 6 shows the an example of noise transition ma- trices for pairflip 20% and symmetric 50% noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In addition, Figure 7 signifies the noise labels distributions for CIFAR-10 dataset for pairflip 45% and symmetric 50% noise types;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' this distribution of the label noise is used in the training process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Fine-tuning/Training In this section, we would now further elaborate on the experimental details for each dataset that we used to validate our algorithm against.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' MNIST.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used a LeNet model as a classifier for our backbone network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For the annotator network, we have a linear layer of size C × C, C denotes the number of classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This linear layer represents our annotator confusion matrices, and we apply a softmax layer to it to make it a stochastic matrix along a certain dimension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We fine-tuned our model for a combination of learning rates, α = [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='001, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0001, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000001, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0016, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='008, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0064, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='005], and about 50 dif- ferent lambda values, λ, for our regularizer hyper-parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We started with a very small value of λ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='001506746, and slowly increased it exponentially (geometric progression) per epoch with a rate, r = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='18;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' we trained the model for 70 epochs and used Adam as an optimizer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In addition, the experiments were regulated to assess the performance of the model when the confusion matrix is initialized as an identity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' These fine-tunings are done across all 2 different types of noise described in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 with the respective noise rate that is associated with each of the noise types.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' CIFAR-10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For CIFAR-10, we used ResNet-18 as our backbone network for the classifier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The annotator network remains unchanged (still has one linear layer that represents the confusion matrices of class C × C that are stochas- tic).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For this dataset, we fine-tuned the model for an assort- ment of learning rates, such as α = [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='001, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00064, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0016, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000001, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='005, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='008, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0016, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00064].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We ran the model for 150 epochs;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' the hyperparameter λ for our regularizer was slowly increased exponentially again with a rate, r= 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 11 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0 0 0 0 0 0 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 Pairflip, ε = 20% 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 (a) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 Symmetric, ε = 50% 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='35 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='40 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='45 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='50 (b) Figure 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Noise Transition matrices for Pairflip and Symmetric noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' y y 2713 2287 0 0 0 0 0 0 0 0 0 2846 2154 0 0 0 0 0 0 0 0 0 2766 2234 0 0 0 0 0 0 0 0 0 2764 2236 0 0 0 0 0 0 0 0 0 2742 2258 0 0 0 0 0 0 0 0 0 2745 2255 0 0 0 0 0 0 0 0 0 2797 2203 0 0 0 0 0 0 0 0 0 2746 2254 0 0 0 0 0 0 0 0 0 2780 2220 2299 0 0 0 0 0 0 0 0 2701 CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip-45% ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1000 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2000 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='(a) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='y ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='y ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2562 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='282 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='257 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='264 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='274 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='292 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='272 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='268 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='264 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='265 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='287 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2486 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='273 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='285 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='271 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='290 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='272 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='284 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='271 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='281 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='308 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='272 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2492 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='285 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='284 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='267 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='256 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='308 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='284 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='244 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='260 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='238 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='280 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2560 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='266 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='264 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='270 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='302 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='280 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='280 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='264 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='286 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='288 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='289 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2461 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='275 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='309 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='272 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='277 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='279 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='280 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='258 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='275 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='285 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='263 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2531 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='291 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='259 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='275 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='283 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='279 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='297 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='273 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='277 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='311 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='271 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2465 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='270 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='271 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='286 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='278 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='245 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='272 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='308 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='250 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='306 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='279 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2523 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='281 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='258 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='266 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='268 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='275 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='287 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='287 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='282 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='298 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='230 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2548 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='259 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='271 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='266 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='277 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='252 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='287 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='282 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='278 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='273 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='280 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2534 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric-50% 500 1000 1500 2000 2500 (b) Figure 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Confusion matrix between clean (y) and noisy labels (˜y) of CIFAR-10 dataset for (a) Pairflip-45% and (b) Symmetric-50% noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, the starting value this time is λ= 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0517578125e- 05.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used a standard batch-size, BS=128.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We used the standard augmentations of random crop of size 32 × 32 and horizontal random flipping.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' These are the standard augmen- tations that have been used across all the baselines that we have evaluated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The remaining settings remain the same as described in MNIST above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' FMNIST.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We kept the same settings of CIFAR-10, such as ResNet-18 model and batch-size of 128 for FMNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The model was again fine-tuned for the same set of hyperpa- rameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' However, the starting value of λ= 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='103515625e- 05, and it was increased exponentially with a rate of r=1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We also retained the same set of augmentations that we used in CIFAR-10 dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Additional experimental results In our earlier experiments, we kept the same type of noise and noise levels across all the number of annotators in the annotator network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This is usually not representative of the noise in the real world data, as it is possible that each annotator would be independent in the way it is confused about labelling and annotating the data (subject to their own biases).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Therefore, we confuse each annotator with different types and levels of noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Table 6 shows the test accuracy of the classifier network on CIFAR-10, FMNIST and MNIST datasets for different types of noise for each annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We achieved comparable results with an accuracy of 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12%, 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12% and 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='97% for CIFAR-10, FMNIST and MNIST respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It’s particularly notable that the accuracy of the classifier network remains at par even with using high level noise, such as pairflip 45% and symmetric 50% for two of the three annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Table 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test accuracy (%) with three different annotators (Annota- tor1: Pairflip 45%, Annotator2: Symmetric 20%, Annotator3: 50%) representing different noise types and noise levels on CIFAR-10, FMNIST and MNIST datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' CIFAR-10 FMNIST MNIST 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='62 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='97 12 0 10 20 30 40 50 60 epoch 20 40 60 80 100 test accuracy MNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip 45% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (a) Pairflip-45% 0 10 20 30 40 50 60 epoch 20 40 60 80 100 test accuracy MNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 30% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (b) Symmetry-30% 0 10 20 30 40 50 60 epoch 20 40 60 80 100 test accuracy MNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 50% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (c) Symmetry-50% Figure 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test accuracy (%) vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' number of epochs on MNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 0 20 40 60 80 100 120 140 epoch 10 20 30 40 50 60 70 80 test accuracy (CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip 45%) Ours Trace Co-teaching Co-teaching+ CDR JoCoR (a) Pairflip-45% 0 20 40 60 80 100 120 140 epoch 10 20 30 40 50 60 70 80 test accuracy CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 30% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (b) Symmetry-30% 0 20 40 60 80 100 120 140 epoch 10 20 30 40 50 60 70 80 test accuracy CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 50% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (c) Symmetry-50% Figure 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Test accuracy (%) vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' epochs on CIFAR-10 dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' MNIST In Figure 8, we highlight the test accuracy vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' number of epochs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We can see clearly that for symmetric noise types, all algorithms gave comparable performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It can be clearly seen that for symmetric noise, our test accuracy starts to decline a bit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This could be alleviated with an early stopping criteria which was not incorporated in these experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' For pairflip 45%, the test accuracy starts to increase and stabilize in the later epochs of the experiment and transcends all the baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' CIFAR-10 Figure 9 shows the illustrative results of test accuracy vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' number of epochs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In all the three plots, it can be clearly seen that our algorithm performs at par with the other algorithms, but the performance gets robustly superior in the extreme noise type of pairflip 45%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' This shows that our method is particularly robust again harder noise as it is able to make confident predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' FMNIST Figure 10 gives an illustrative result of test accu- racy vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' number of epochs on FMNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It showcases the test performance of our algorithm in comparison with other baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We can see that for all noise instances, our algorithm performs at par with the high achieving method like JoCoR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We perform considerably better against sample selection methods like Co-teaching and Co-teaching+, as well as against other method like CDR in the instance of pairflip 45%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' In addition, Figure 11 highlights the confusion matrices 13 (Cifar-10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 30%) 90 80 M 70 accuracy 60 50 test 40 30 20 10 0 25 50 75 100 125 150 epoch Ours Trace Co-teaching Co-teaching+ CDR JoCoR(Cifar-10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 30%) 90 80 M 70 accuracy 60 50 test 40 30 20 10 0 25 50 75 100 125 150 epoch Ours Trace Co-teaching Co-teaching+ CDR JoCoRof the true class and the predicted class by the classifier net- work of our algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' We show the confusion matrices plots for two extreme noise types pairflip 45% and symmetric 50% for all the datasets used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' It is clearly seen that the confu- sion matrices are diagonally dominant thus highlighting the robust performance of our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' MNIST Curated Dataset In Figure 12 we demonstrate annotators’ confusion using our algorithm on the curated MNIST dataset that showcases different image styles of Original, Thin and Thick.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The strength of the regularizer, λ=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, is increased by the multiplicative scalar m=2 ev- ery epoch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Figures 13, 14 and 15 highlights the original and predicted confusion of annotator 1, annotator 2 and an- notator 3 using our approach with the regularizer and the non-regularized approach (that is, when λ=0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' MNIST Segmentation In Figure 16, the results of the annotators’ (Thin, Thick and Fractured) predictions are vi- sualised for our algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' The results demonstrate that our algorithm has produced good prediction results for the annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 14 0 20 40 60 80 100 epoch 20 40 60 80 test accuracy FMNIST, Pairflip 45% (a) Pairflip-45% 0 20 40 60 80 100 epoch 20 40 60 80 test accuracy FMNIST, Symmetric 30% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (b) Symmetry-30% 0 20 40 60 80 100 epoch 20 40 60 80 test accuracy FMNIST, Symmetric 50% Ours Trace Co-teaching Co-teaching+ CDR JoCoR (c) Symmetry-50% Figure 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Results of test accuracy vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' number of epochs on FMNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' (a) 0 1 2 3 4 5 6 7 8 9 Predicted class 0 1 2 3 4 5 6 7 8 9 True class 972 2 1 0 0 0 2 1 2 0 0 1123 6 1 0 1 1 0 3 0 1 0 1004 21 1 0 0 4 1 0 1 0 1 998 3 3 0 1 2 1 0 0 0 1 972 1 4 0 0 4 2 0 0 5 0 879 4 1 0 1 1 2 0 1 1 3 948 1 1 0 0 3 6 3 1 0 0 1011 3 1 2 0 2 6 2 1 1 1 951 8 5 2 0 4 9 3 0 3 0 983 MNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip 45% 0 1 2 3 4 5 6 7 8 9 Predicted class True class 975 0 2 0 0 0 0 1 2 0 0 1129 1 1 1 0 2 1 0 0 1 0 1026 0 1 0 0 3 1 0 1 0 3 997 0 5 0 2 2 0 1 0 0 0 969 0 4 1 1 6 1 0 0 5 0 884 1 0 0 1 4 4 0 1 2 2 943 0 2 0 0 1 7 1 0 0 0 1013 1 5 0 0 4 1 2 1 1 2 962 1 1 2 0 0 3 3 0 3 1 996 MNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 50% ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='600 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='800 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1000 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='600 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='800 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1000 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='(b) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='Predicted class ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='True class ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='780 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='18 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='27 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='139 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='935 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='35 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='23 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='17 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='735 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='46 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='124 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='74 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='920 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='60 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='18 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='903 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='23 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='40 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='982 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='68 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='27 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='27 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='81 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='512 279 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='961 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='976 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='44 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='22 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='926 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='FMNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip 45% 0 1 2 3 4 5 6 7 8 9 Predicted class True class 782 3 24 17 6 3 159 0 6 0 2 976 1 13 3 0 3 0 2 0 16 1 861 7 59 1 52 0 3 0 24 6 11 888 30 0 38 0 3 0 0 0 107 25 800 0 64 0 4 0 0 0 0 0 0 967 1 25 0 7 72 1 70 27 60 0 757 0 13 0 0 0 0 0 0 18 0 972 0 10 1 1 1 3 2 3 5 2 982 0 0 0 0 0 0 10 0 50 0 940 FMNIST,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 50% ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='600 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='800 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='600 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='800 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='(c) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='Predicted class ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='True class ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='891 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='21 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='23 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='918 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='44 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='28 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='651 208 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='34 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='21 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='38 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='21 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='16 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='760 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='49 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='86 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='42 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='22 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='66 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='773 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='41 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='24 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='48 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='210 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='29 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='691 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='24 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='9 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='49 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='19 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='11 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='890 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='51 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='17 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='39 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='790 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='72 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='67 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='18 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='795 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='99 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='52 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='62 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='13 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='841 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Pairflip 45% 0 1 2 3 4 5 6 7 8 9 Predicted class True class 641 26 45 33 24 20 18 9 155 29 20 752 17 15 10 20 12 11 82 61 62 14 551 68 59 69 43 27 87 20 35 27 60 469 57 157 50 39 88 18 19 10 42 33 640 55 44 54 91 12 22 19 34 115 30 593 20 51 95 21 20 10 30 43 26 36 756 18 44 17 27 14 14 39 34 66 11 698 88 9 31 14 15 12 9 9 4 7 887 12 43 67 11 12 10 20 9 17 89 722 CIFAR-10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 50% 0 200 400 600 800 100 200 300 400 500 600 700 800 Figure 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Confusion matrices of true class and predicted class for our algorithm for CIFAR-10, MNIST and FMNIST datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 15 (Cifar-10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Symmetric 30%) 90 80 M 70 accuracy 60 50 test 40 30 20 10 0 25 50 75 100 125 150 epoch Ours Trace Co-teaching Co-teaching+ CDR JoCoROriginal Thin Thick Image Image Image 0 2 4 6 8 0 2 4 6 8 Annotator 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='16 0 2 4 6 8 0 2 4 6 8 Annotator 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0 2 4 6 8 0 2 4 6 8 Annotator 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 2 4 6 8 0 2 4 6 8 Annotator 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 2 4 6 8 0 2 4 6 8 Annotator 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='07 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='09 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='11 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 0 2 4 6 8 0 2 4 6 8 Annotator 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 0 2 4 6 8 0 2 4 6 8 Annotator 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 2 4 6 8 0 2 4 6 8 Annotator 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 2 4 6 8 0 2 4 6 8 Annotator 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='35 Figure 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Learned Annotators’ confusion for different image styles using our approach with the regularizer (λ=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) on MNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 16 山a6Image Original Our (λ=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) Our (λ=0) Original 0 2 4 6 8 0 2 4 6 8 Annotator1 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 Thick 0 2 4 6 8 0 2 4 6 8 Annotator1 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 Thin 0 2 4 6 8 0 2 4 6 8 Annotator1 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator1 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 Figure 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Original and Predicted confusion for Annotator 1 using different models: our approach with regularizer (λ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) and without it (λ = 0) on MNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 17 6Image Original Our (λ=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) Our (λ=0) Original 0 2 4 6 8 0 2 4 6 8 Annotator2 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 Thick 0 2 4 6 8 0 2 4 6 8 Annotator2 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='30 Thin 0 2 4 6 8 0 2 4 6 8 Annotator2 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='16 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='16 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator2 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='12 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='16 Figure 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Original and Predicted confusion for Annotator 2 using different models: our approach with regularizer (λ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) and without it (λ = 0) on MNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 18 6Image Original Our (λ=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) Our (λ=0) Original 0 2 4 6 8 0 2 4 6 8 Annotator3 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Original 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 Thick 0 2 4 6 8 0 2 4 6 8 Annotator3 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='025 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='050 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='075 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='125 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='150 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='175 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='025 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='050 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='075 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='125 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='150 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='175 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Thick 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='000 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='025 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='050 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='075 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='100 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='125 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='150 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='175 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='200 Thin 0 2 4 6 8 0 2 4 6 8 Annotator3 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Annotator3 Thin 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='8 Figure 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Original and Predicted confusion for Annotator 3 using different models: our approach with regularizer (λ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content='01, m=2) and without it (λ = 0) on MNIST dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 19 6Input Thin Thick Fractured Pred GT Figure 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Visualisation of the predictions of the annotators’ segmentations (Thin, Thick and Fractured) together with the predictions of the estimated true labels using our algorithm in comparison with the test image and GT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' Black is true positive, White is true negative, Red represents false positive, whilst Green is false negative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} +page_content=' 20 44400006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dAyT4oBgHgl3EQfpfgA/content/2301.00524v1.pdf'} diff --git a/5dE4T4oBgHgl3EQf1Q2P/content/tmp_files/2301.05289v1.pdf.txt b/5dE4T4oBgHgl3EQf1Q2P/content/tmp_files/2301.05289v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..43a4f0265eb1603ac27ecb2a917a8b029b6d7cbe --- /dev/null +++ b/5dE4T4oBgHgl3EQf1Q2P/content/tmp_files/2301.05289v1.pdf.txt @@ -0,0 +1,2874 @@ +arXiv:2301.05289v1 [math.DG] 12 Jan 2023 +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +XIAN DAI AND NIKOLAS EPTAMINITAKIS +Abstract. We prove that the Blaschke locus has the structure of a finite dimensional smooth manifold away +from the Teichm¨uller space and study its Riemannian manifold structure with respect to the covariance +metric introduced by Guillarmou, Knieper and Lefeuvre in [GKL21]. +We also identify some families of +geodesics in the Blaschke locus arising from Hitchin representations for orbifolds and show that they have +infinite length with respect to the covariance metric. +1. Introduction +Classical Teichm¨uller theory is a rich field which involves the interplay of tools from analysis, geometry +and topology. One beautiful theorem dating back to the early twentieth century states that the Teichm¨uller +space is a finite dimensional smooth contractible manifold (see for example [Tei43], [Ahl60], [Wol89]). Among +many different proofs of this fact, one approach, due to Fischer and Tromba ([FT84]), is based on global +analysis and Riemannian geometry, by viewing the Teichm¨uller space as a space of isotopy classes of hyper- +bolic metrics on a closed connected oriented surface S with genus 풢 ≥ 2. Many other interesting results can +also be obtained from this Riemannian geometrical characterization: for example, the Weil-Petersson metric +on the Teichm¨uller space is K¨ahler and has negative sectional curvature (see e.g. [Tro92, Section 5]). +In this note, we will explore properties of a finite dimensional subspace of the space of isotopy classes of +negatively curved metrics that contains the Teichm¨uller space, using this Riemannian geometrical approach. +Given a complex structure J on S and a holomorphic cubic differential with respect to J, one can lift +them to a universal cover ˜S of S and produce a parametrization f : ˜S → R3 of a hypersurface of special +type arising from affine differential geometry, called a hyperbolic affine sphere (see [Lof10], and also Section +5.1). A hyperbolic affine sphere in R3 is a surface of constant negative affine mean curvature (see Section +5.1). It comes naturally equipped with an affine invariant Riemannian metric which descends to a uniquely +determined negatively curved metric on S in the conformal class of J, called a Blaschke metric. We denote +the space of Blaschke metrics on S by MB and the space of smooth hyperbolic metrics on S by M−1. +A hyperbolic metric σ ∈ M−1 on S is a special case of a Blaschke metric: in this case, the hyperbolic +affine sphere determined by the complex structure corresponding to σ and the zero cubic differential can +be taken to be the hyperboloid model of hyperbolic space; the descended Blaschke metric is exactly the +hyperbolic metric σ. Therefore, upon taking quotients by D0, the space of smooth diffeomorphisms isotopic +to the identity, the Teichm¨uller space T (S) = M−1/D0 is contained in the space MB/D0, which we call the +Blaschke locus. +Our work is in two directions: the first goal is to understand the topology and regularity of the Blaschke +locus, which is finite dimensional. The second is to study some of its Riemannian geometric properties with +respect to a Riemannian metric constructed in [GKL21] on the space of isotopy classes of negatively curved +metrics which restricts to the Weil-Petersson metric on T (S). +1.1. Structure of the Blaschke locus and relation to higher Teichm¨uller theory. Our first result +is concerned with the topology and smooth structure of MB/D0. The proof follows the spirit of Tromba’s +proof that the Teichm¨uller space is a smooth manifold ([Tro92, Corrolary 2.4.6]). +Theorem A (Theorem 5.20, Theorem 5.17). The Blaschke locus MB/D0 is a contractible space. Moreover, +it has the structure of a smooth manifold of dimension 16풢 − 17 away from the Teichm¨uller space T (S). +To motivate our interest in the Blaschke locus and the idea behind the proof of Theorem A, we now +further explain the relation between the Blaschke locus and Teichm¨uller space, from a different point of view. +For this, we start with a brief exposition of closely relevant objects—the Hitchin components. Classically, +besides viewing the Teichm¨uller space T (S) as a space of (equivalence classes of) Riemannian metrics of +1 + +2 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +constant negative curvature (or hyperbolic structures) on S, one can also view it as a space of (equivalence +classes of) Riemann surface structures (complex structures) on S or as a connected component of the space +of (conjugacy classes of) representations of π1(S) into PGL(2, R). The Hitchin component Hn(S), as an +important example of higher rank Teichm¨uller spaces (see [Wie18] for a survey), generalizes T (S) from +the representation theory viewpoint and is a connected component of the space of (conjugacy classes of) +representations from π1(S) into PGL(n, R) for n ≥ 2. When n = 2, the Teichm¨uller space T (S) coincides +with H2(S) and embeds into all other Hitchin components Hn(S). +When n = 3, a complex analytical +counterpart of H3(S) was discovered independently by Loftin [Lof01] and Labourie [Lab07] in analogy to +the viewpoint of T (S) as spaces of Riemann surfaces. They showed that there exists a mapping class group +equivariant homeomorphism between the Hitchin component H3(S) and the vector bundle Q3(S) over the +Teichm¨uller space T (S) whose fiber over a Riemann surface is given by holomorphic cubic differentials on +the Riemann surface. One can then ask whether there is a natural Riemannian geometrical generalization +of the Teichm¨uller space T (S). As hinted previously, the Blaschke locus MB/D0 as a space of negatively +curved Riemannian metrics, even though not in bijection to H3(S), plays this role. Modulo an S1 action on +the vector bundle Q3(S) (which identifies a holomorphic cubic differential q with e2πiθq for any θ ∈ [0, 1)), +using the holomorphic data Q3(S) as a bridge, one obtains the following mapping class group equivariant +homeomorphisms +(1.1) +H3(S)/S1 homeo +≃ +Q3(S)/S1 homeo +≃ +MB/D0, +where the S1 action on H3(S) is simply obtained by pullback of the S1 action on Q3(S). +The above three objects are generalizations of T (S) from different viewpoints (representation theoretic, +complex analytic and Riemannian geometrical respectively). +A more detailed characterization of them +and their relations will be described in Section 5. In particular, the first homeomorphism is proved and +implied from [Lof01] and [Lab07]. The second bijection is first shown in [OT21]. We explain the second +homeomorphism in Proposition 5.19. These identifications will be crucial for the proof of Theorem A. +1.2. The covariance metric in the Blaschke locus. As mentioned before, we also study the Riemann- +ian geometry of the Blaschke locus MB/D0 with respect to the covariance metric G(·, ·) introduced by +Guillarmou, Knieper and Lefeuvre ([GKL21])1. This metric extends the Weil-Petersson metric from the +Teichm¨uller space (viewed as the space of isotopy classes of hyperbolic metrics) to a Riemannian metric on +the space of isotopy classes of metrics of variable negative curvature, using techniques originating from the +study of the X-ray transform on closed Anosov manifolds ([Gui17a], [GL19]). In our case, starting with the +simple observation that the extended mapping class group is a subgroup of the group of isometries for the +covariance metric (Proposition 4.12), the mapping class group equivariant homeomorphisms from H3(S)/S1 +to MB/D0 in (1.1) allow us to identify certain families of covariance metric geodesics in MB/D0 arising from +special orbifold Hitchin representations (Section 2.3). Briefly, let a two-dimensional orbifold Y be given as a +quotient of a Riemann surface XJ (with underlying smooth surface structure S) by a finite diffeomorphism +group Σ. One can then associate to Y a special one-parameter family of representations in H3(S), denoted +by H3(Y ), as a fixed point set of the group action of Σ on H3(S), with Σ understood as a subgroup of the +extended mapping class group (see Section 3.2). We show +Theorem B (Lemma 6.5, Theorem 6.7). Let Y be a non-orientable orbifold of negative Euler characteristic +with orientation double cover Y + given by a sphere with 3 cone points of respective orders m1 ≥ 3, m2 ≥ 3 +and m3 ≥ 4. Then H3(Y )/Z2 is homeomorphic to a half line and embeds as a geodesic (unparametrized) in +MB/D0 with respect to the covariance metric G(·, ·), where the Z2 action on H3(Y ) is induced from the S1 +action on H3(S). +These geodesics, which are homeomorphic to half lines, have starting points in Teichm¨uller space T (S) and +eventually leave all compact sets of MB/D0 (see Theorem 6.11). +We further proceed in Section 6.2 to +estimate their covariance metric lengths. We show in Corollary 6.5, +Theorem C (Corollary 6.5). The covariant metric geodesics in MB/D0 corresponding to H3(Y )/Z2 given +in Theorem B have infinite length. +1This Riemannian metric is referred to as the pressure metric in [GKL21]. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +3 +In fact, our proof works more generally for any curve in MB/D0 parameterized by a ray starting from T (S) +in a fixed fiber of the bundle Q3(S)/S1, using identification (1.1), +Corollary D (Theorem 6.12). Let σ be a hyperbolic metric on S and q be a nonzero cubic differential which +is holomorphic with respect to the complex structure determined by σ. Then the curve {[gt]}t≥0 ⊂ MB/D0, +where gt ⊂ MB satisfies Wang’s equation (5.4) with cubic differential +√ +tq, has infinite length with respect +to the covariance metric. +It remains as a question whether there are other candidates for finite covariance metric length paths +leaving all compact sets of MB/D0 but not in the Teichm¨uller space T (S). In general, incomplete paths +in moduli spaces indicate meaningful geometric phenomena. For instance, in the Teichm¨uller space T (S), +Wolpert exhibits some incomplete paths for the Weil-Petersson metric in [Wol75]. These are paths realizing +“pinched Riemann surfaces”. +In the Appendix A we end with some further estimates of the covariance metric in MB/D0. +An +explicit formula (Proposition A.5) for the covariance metric G(·, ·) at a point in T (S) with tangent vectors +corresponding to a direction tangential to the fiber of Q3(S)/S1 is given as a direct application of [GM17, +Lemma A.1, Remark A.2]. We hope that this formula can be further simplified in the future. +1.3. Outline of the proofs. We briefly discuss our proofs of the main theorems in the sequel. +Both +for regularity results and the study of the covariance metric in MB/D0, an important tool used in our +investigation is a single partial differential equation, called Wang’s equation (5.4). It underlies the second +identification (1.1) and has natural connection to Blaschke metrics and the theory of affine differential +geometry. +For regularity results, the ideas are as follows: +• The proof of the smoothness of the Blaschke locus MB/D0 relies on constructing smooth charts for +it away from T (S), and is modeled on the construction of charts for the Teichm¨uller space outlined +in [Tro92, Section 2.4]. There, the key observation is that the finite dimensional space of transverse +traceless (= divergence free and trace free) symmetric two tensors with respect to a fixed hyperbolic +metric can be locally identified with a slice of smooth hyperbolic metrics inside the Hilbert manifold +of hyperbolic metrics of fixed Sobolev regularity. This slice locally parametrizes T (S), thus providing +a natural local coordinate for it. For us, the coordinates for the Blaschke locus are constructed via +local identification with the vector bundle of holomorphic cubic differentials over those slices for +T (S). +• The link between local slices for the bundle of holomorphic cubic differentials and local slices for the +space of Blaschke metrics, viewed as a subset of the Banach manifold of negatively curved metrics of +Ck,α regularity, is given by Wang’s equation (5.4). It allows us to produce smooth diffeomorphisms +between those slices, by means of the implicit function theorem and the inverse function theorem for +Banach spaces. +To study the covariance metric in MB/D0, we use a mixture of global geometry concerning mapping +class groups actions and local estimates using tools from partial differential equations: +• The equivariance of the homeomorphisms in (1.1) with respect to the mapping class group action +allows one to preserve the fixed point sets of actions of certain subgroups of it on the different +spaces. By showing that the covariance metric is extended mapping class group invariant, some +one-dimensional fixed points sets arising from geometric symmetry in the Hitchin components pull +back by (1.1) to geodesics in the Blaschke locus. Then, analytical tools can be applied. +• To estimate the lengths of the geodesics above, Wang’s equation is again a key, together with some +standard techniques for partial differential equations. These include the existence of supersolutions +and subsolutions for Wang’s equation, previously obtained by Loftin (Proposition 6.9), and some +minimum principle arguments. +1.4. Structure of the article. The article is organized as follows. In Section 2, we recall some fundamental +results from Teichm¨uller theory and Weil-Petersson geometry. We then introduce Higgs bundles, Hitchin +components and Hitchin maps. We also include a short discussion on orbifolds and orbifold representations. +Section 3 is devoted to explaining the actions of the extended mapping class group on various mathematical +objects from different areas. This will play an important role in the proofs of Section 6. Section 4 contains + +4 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +an exposition on the covariance metric introduced in [GKL21] in the space of negatively curved metrics. We +also show in this section that the covariance metric is extended mapping class group invariant. In Section +5, we introduce Blaschke metrics, the Blaschke locus, and explain the identification (1.1). We also discuss +some important results concerning the regularity and topology of Blaschke locus. In Section 6, we prove +some results about geodesics in the Blaschke locus with respect to the covariance metric and estimate their +lengths. Finally, we end with some further estimates of the covariance metric in the Blaschke locus near the +Teichm¨uller space T (S) in Appendix A. +Acknowledgements. The authors would like to thank Kiril Datchev, Dan Fox, Gerhard Knieper and +Gabriele Viaggi for helpful discussions, and Alex Nolte for the reference [Ber61]. X. Dai was funded by the +Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) – Project-ID 281071066 – TRR 191 +and by the DFG under Germany’s excellence strategy exc 2181/1 - 390900948 (the Heidelberg structures +excellence cluster). +2. Preliminaries +This section develops the background material we will need in later sections. A reader familiar with +this material may skip it. We begin in Section 2.1 with an exposition on classical Teichm¨uller space and +the Weil-Petersson metric. Then in Section 2.2, we introduce some basics on Higgs bundles and Hitchin +components. We conclude with a discussion of orbifolds and orbifold representations in Section 2.3. +2.1. Teichm¨uller space and Weil-Petersson metric. In this subsection, we will discuss Teichm¨uller +space from the viewpoint of Riemannian geometry, initiated by Tromba and Fischer [FT84]. +Let S be a closed orientable smooth surface of genus 풢 ≥ 2. We denote by M the space of smooth +Riemannian metrics on S, by M− the subspace of negatively curved smooth Riemannian metrics, and by +M−1 the subspace of hyperbolic metrics on S. We also denote by D be the diffeomorphism group of S, by +D+ the group of orientation preserving diffeomorphism on S (when S is given an orientation), and by D0 +the normal subgroup of D consisting of smooth diffeomorphisms isotopic to the identity. +Definition 2.1. The Teichm¨uller space, denoted as T (S), is the quotient space M−1/D0, where the right +action of D0 on M−1 is given by +M−1 × D0 → M−1, +(σ, ψ) �→ ψ∗σ. +We denote the equivalence class of σ ∈ M−1 by [σ] ∈ M−1/D0. +Equivalently, the Teichm¨uller space T (S) is the space of (oriented) complex structures on S up to +D0-action. According to another viewpoint, the Teichm¨uller space T (S) is a connected component of the +representation space Hom(π1(S), PGL(2, R))/PGL(2, R). This will be discussed in Section 2.2. +Remark 2.2. We remark that with Definition 2.1 above, the Teichm¨uller space does not “see” the orientation +on S, in the sense that if ψ is an orientation reversing isometry for a metric σ, then [ψ∗σ] = [σ] ∈ T (S). +When T (S) is viewed as the space of oriented hyperbolic structures modulo D0, which is a point of view often +taken in the literature (see e.g. [MW02]), if ψ : S → S is an orientation reversing isometry for a hyperbolic +metric σ and G is the positively oriented hyperbolic structure that σ determines, then the hyperbolic structure +obtained by pulling back the charts of G by ψ, mod D0, is an element of the Teichm¨uller space of S, where +S has the opposite orientation from S. +Given a Riemann surface XJ with complex structure J, we denote by KJ the canonical line bundle +associated to XJ, which is the (1, 0)-part of the complexified cotangent bundle T ∗XC +J = C⊗RT ∗XJ. Further, +we denote by H0(XJ, Kd +J) the space of J-holomorphic differentials of order d, and by H0(X[J], Kd +[J]) the space +of their D0-equivalence classes. Explicitly, if ψ ∈ D0, the J-holomorphic differential q ∈ H0(XJ, Kd +J) and the +ψ∗J-holomorphic differential ψ∗q ∈ H0(Xψ∗J, Kd +ψ∗J) represent the same point in H0(X[J], Kd +[J]), denoted +as [q]. The action of the groups D and D0 on complex structures and holomorphic differentials will be +explained in detail in Section 3. It is well known that the cotangent space of the Teichm¨uller space T (S) +at [σ] can be identified with the space of quadratic differentials H0(X[J], K2 +[J]) on the Riemann surfaces +X[J] = (S, [J]) where [J] is associated to the (D0-equivalence class of) hyperbolic metrics [σ]. An extensively + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +5 +studied Riemannian metric on the Teichm¨uller space T (S), defined using holomorphic quadratic differentials, +is the following Weil-Petersson metric. +Definition 2.3. The Weil-Petersson metric is a cometric on T (S) defined by +� +[q1], [q2] +� +W P([σ]) = Re +� +XJ +q1q2 +σ2 dvσ, +where [σ] ∈ T (S) and [q1], [q2] are holomorphic quadratic differentials with respect to [J] and σ, J, q1, q2 are +representatives picked from their equivalence classes so that q1, q2 are holomorphic with respect to J. +It is well known that the Weil-Petersson metric is K¨ahler ([Ahl61]) and negatively curved ([Ahl62], +[Tro92], [Wol86]). The isometry group of the Weil-Petersson metric is the mapping class group [MW02]. +Also, although the Weil-Petersson metric is not complete ([Chu76], [Wol75]), it exhibits many nice properties +of complete negatively curved metrics (see [Wol75], [Wol87]). +In Section 4.6 we will discuss a different +interpretation of the Weil-Petersson metric (Theorem 4.16). +2.2. Hitchin components and Hitchin map. In this subsection, using Higgs bundles techniques, we +introduce the Hitchin component, which is a connected component of the representation space +Rep(π1S, PGL(n, R)) := Hom(π1S, PGL(n, R))/PGL(n, R), +for n ≥ 2, as a generalization of the classical Teichm¨uller space T (S). +2.2.1. Higgs bundles, Hitchin components and Hitchin Sections. In this subsection, n ≥ 2 is an integer. The +discussion here holds for much wider classes of groups, but for our purposes we will restrict to the group +G = PGL(n, R). +Let sl(n, R) = so(n, R) ⊕ sym0(n, R) be the Cartan decomposition of sl(n, R), where sym0(n, R) is the +set of n×n symmetric matrices of trace zero. Denote sym0(n, C) = sym0(n, R)⊗C. The following definition +is a special case of [ALS22, Definition 3.14]. +Definition 2.4. A PGL(n, R)-Higgs bundle on a Riemann surface XJ is a pair (E, ϕ), where +• E is a holomorphic Lie algebra bundle with typical fiber sl(n, C) and structure group PO(n, C), +• ϕ ∈ H0(XJ; KJ ⊗ adsym0(n,C)(E)) is a holomorphic section, called the Higgs field. +Here by adsym0(n,C)(E) we mean the bundle of symmetric adjoint endomorphisms of E, i.e. endomorphisms +of E locally of the form adξ : sl(n, C) → sl(n, C) for some ξ ∈ sym0(n, C). +The space of gauge equivalence classes of PGL(n, R)-Higgs bundles with some “good” conditions forms the +moduli space of PGL(n, R)-Higgs bundles, denoted by MHiggs(PGL(n, R)). +(The “good” conditions are +polystablity conditions for the Higgs bundles. One can find an introduction in [Bar10], for example.) +Suppose that the holomorphic vector bundle E has holomorphic structure ¯∂E and is equipped with a +Hermitian metric H. Recall that the Chern connection AH of E is the unique connection that is compatible +with H and satisfies A0,1 +H = ¯∂E. The following is important. +Theorem 2.5 (Hitchin [Hit87], Simpson [Sim88]). Let (E, ϕ) be a polystable PGL(n, R)-Higgs bundle and +let H be a Hermitian metric on E. A connection D = AH + ϕ + ϕ∗H on (E, ϕ, H) is flat if and only if the +following Hitchin equation is satisfied, +FAH + [ϕ, ϕ∗H] = 0, +(2.1) +where FAH is the curvature of the connection AH. Moreover, the holomorphic vector bundle E admits a +Hermitian metric H satisfying the Hitchin equation if and only if (E, ϕ) is polystable. +We will come back to a special case of the Hitchin equation (Eq. (5.4)), which is of central importance for +this note, in Section 5.1. +Hitchin [Hit92] further introduces the Hitchin component using Higgs bundles and the Hitchin section. +We briefly discuss the Hitchin components and the Hitchin section here and refer the reader to section 2 +of [Bar10] for a more comprehensive exposition. Let gC be sl(n, C) and let g be sl(n, R) which is a split +real form fixed by an antilinear Lie algebra involution τ of gC. Given a principal 3-dimensional subalgebra +s = span{x, e, ˜e} of sl(n, C) consisting of a semisimple element x and regular nilpotent elements e and ˜e with +commutation relations +[x, e] = e, +[x, ˜e] = −˜e, +[e, ˜e] = x, + +6 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +the Lie algebra sl(n, C) decomposes into a direct sum of irreducible subspaces under the adjoint representation +of s: +sl(n, C) = +n−1 +� +i=1 +Vi. +We take e1, · · · , en−1 as the highest weight elements of V1, · · · , Vn−1, where e1 = e. Another decomposition +is +sl(n, C) = +n−1 +� +d=−n+1 +g(d) +C , +where g(d) +C +is the subspace of sl(n, C) on which adx acts with eigenvalue d. Associated to this decomposition +is a natural Lie algebra bundle +Ecan := +n−1 +� +d=−n+1 +g(d) +C +⊗ Kd +J. +This is a common choice of the holomorphic bundle E in Definition 2.4. With this defined, we can introduce +the Hitchin section in the setting of MHiggs(PGL(n, R)). +Definition 2.6. A Hitchin section sJ is a map from +n� +i=2 +H0(XJ, Ki +J) to MHiggs(PGL(n, R)) defined as +follows: for q = (q2, q3, · · · , qn) ∈ +n +� +i=2 +H0(XJ, Ki +J), the image sJ(q) is a Higgs bundle Ecan with its Higgs +field ϕ(q) ∈ H0(X, KJ ⊗ adsym0(n,C)(Ecan)) given by +ϕ(q) = ˜e + q2e1 + q3e2 + · · · qnen−1. +Hitchin in [Hit92] shows that any Higgs bundle in the image of the Hitchin section sJ has the associated +flat connection D (Theorem 2.5) with holonomy in PGL(n, R) (See [ALS22, Section 3]). This leads to the +following important definition of the Hitchin component: +Definition 2.7 ([Hit92]). When n ≥ 2, the Higgs bundles in the image of the Hitchin section sJ are stable +and have holonomy in PGL(n, R). Moreover, the corresponding representations form a connected component +of the representation space Rep(π1S, PGL(n, R)). This connected component is homeomorphic to a Euclidean +space of dimension (2풢 − 2)(n2 − 1) and is called the Hitchin component, denoted as Hn(S). +An element in Hn(S) is a conjugacy class of representations, called a (conjugacy class of a) Hitchin +representation. Given a representation ρ, we denote its conjugacy class by [ρ]. When n = 2, the Hitchin +section exactly parametrizes the Teichm¨uller space, i.e., one has H2(S) = T (S). When n > 2, one can +choose a principal 3-dimensional subalgebra s ∼= sl(2, C) of the form s = span{x, e, ˜e} which is τ-invariant, +and it induces an inclusion sl(2, R) ֒→ sl(n, R). This induces a group homomorphism κC from PGL(2, C) ≃ +Int(sl(2, C)) to PGL(n, C) ≃ Int(sl(n, C)) (see [ALS22, Section 2.2]). By restricting the groups respectively +to PGL(2, R) and PGL(n, R), one obtains the principal representation κ : PGL(2, R) → PGL(n, R) and an +embedding of the Teichm¨uller space T (S) in the Hitchin component Hn(S). In other words, the principal +representation κ sends [ρ0] ∈ T (S) to [ρ] = [κ ◦ ρ0] ∈ Hn(S). We often call [ρ] = [κ ◦ ρ0] (a conjugacy +class of) Fuchsian representations of Hn(S) and the space of conjugacy classes of Fuchsian representations +is called the Fuchsian locus of Hn(S). +Remark 2.8. We note that in the literature, the Hitchin component is usually defined as a component +of Hom(π1S, PSL(n, R))/PSL(n, R) ([Hit92], [Lab07]). +In this note, we define Hn(S) up to PGL(n, R) +conjugacy (to work with orbifolds and orientation reversing maps). The differences between these definitions +are further discussed in Remark 2.15. +2.2.2. Hitchin map. The holonomy maps of flat connections D associated to Higgs bundles in the images +of Hitchin section sJ induce a homeomorphism HJ : +n +� +i=2 +H0(XJ, Ki +J) → Hn(S). +This map describes a +parametrization of the Hitchin component Hn(S) by holomorphic differentials and is often called the Hitchin +parametrization. However, one drawback of the Hitchin parametrization is that it depends on a specific choice + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +7 +of complex structure J. In particular, it breaks the invariance with respect to the mapping class group action, +which will be extensively discussed in Section 3. An attempt towards a mapping class equivariant construction +is the following, due to Labourie [Lab08]. Let Qn(S) denote the vector bundle over the Teichm¨uller space +T (S) whose fiber over X[J] is +Qn(S) +�� +[J] = H0(X[J], K3 +[J]) ⊕ · · · ⊕ H0(X[J], Kn +[J]). +Then consider the Hitchin map H defined as +H : Qn(S) −→ Hn(S) +([J, q3, · · · , qn]) �→ HJ(0, q3, · · · , qn). +Here J is a representative of the equivalence class [J] and qi are i-th order differentials holomorphic with +respect to J that are representatives from [qi]. The image of HJ is obtained by taking holonomy of the flat +connection D associated to the Higgs bundle sJ(0, q3, · · · qn) (Recall Definition 2.6). +Remark 2.9. The vector space H0(XJ, Ki +J) can be identified with the space H0(X[J], Ki +[J]). Via the map +HJ, the holonomy defined using the flat connection associated to ([J, q3, · · · , qn]) induces representations well +defined up to conjugation. +The Hitchin map is always a surjective mapping class group equivariant map. A natural question to ask +is whether the Hitchin map is a homeomorphism. A recent result from Sagman and Smille ([SS22]) shows +that it fails to be injective and therefore not a homeomorphism when n ≥ 4. However, in this note we will +only focus on the case n = 3, for which the homeomorphism result is well known. +Theorem 2.10 ([Lof01, Theorem 2], [Lab07, Theorem 1.0.2]). The Hitchin map +H : Q3(S) → H3(S) +is a mapping class group equivariant homeomorphism, where the mapping class group actions on Q3(S) and +on H3(S) (as outer automorphism group action) are the left actions which will be explained in Section 3. +Remark 2.11. It will be useful for later to remark that the bundle Qn(S) over T (S), with the latter viewed +as M−1/D0 and with the fiber over each [σ] consisting of holomorphic differentials with respect to the pos- +itively oriented complex structure determined by [σ], has the natural C∞ topology (which is the quotient +topology descended from the C∞ topology of objects without taking quotients by D0 action). For holomor- +phic differentials, the C∞ topology is equivalent to the compact open topology due to Weierstrass’ Theorem. +Therefore a sequence of pairs of hyperbolic metrics and holomorphic differentials {(σk, qk)}k≥0 converges to +a pair of hyperbolic metric and holomorphic differential (σ, q) if the hyperbolic metrics σk converge to σ in +C∞ topology and the lifts of holomorphic differentials qk to the universal covers D converge uniformly on +compact subsets of D to the lift of q. +2.3. Orbifolds and orbifolds representations. +2.3.1. Orbifolds. An orbifold is a space that is locally modelled on Rn modulo finite group actions. +In +the special case that all of these finite groups are trivial, we obtain a manifold. Otherwise, orbifolds have +singularities. For a general introduction on orbifolds, we refer the reader to [Thu, Chapter 13]. Much of the +presentation in this subsection follows [ALS22, Section 2]. We restrict our discussion to n = 2. Let Y be a +closed connected smooth orbifold of dimension 2. There are three types of singularities of Y : +(1) p is a cone point of order m: there is a neighborhood of p that is isomorphic to R2/Zm where Zm +acts on R2 by rotation. +(2) p is a mirror point: there is a neighborhood of R2/Z2 where Z2 acts by reflection in the y-axis. +(3) p is a corner reflector of order n: there is a neighborhood of p that is isomorphic to R2/Dn where +Dn is the dihedral group of order 2n, with presentation +⟨a, b : a2 = b2 = (ab)n = 1⟩. +For a 2-dimensional orbifold Y , we will denote by k the number of cone points (of respective orders +m1, · · · , mk) and by l the number of corner reflectors (of respective orders n1, · · · , nl). We will also de- +note by ˜Y the orbifold universal cover of Y . The orbifold fundamental group is denoted by π1(Y ), which is + +8 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +defined to be the group of deck transformations of the universal cover ˜Y . We say Y orientable if its underly- +ing topological space |Y | is orientable and if Y has only cone points as singularities. The Euler characteristic +of an orbifold Y is defined as +χ(Y ) = χ(|Y |) − +k +� +i=1 +(1 − 1 +mi +) − 1 +2 +l +� +j=1 +(1 − 1 +nj +). +We will assume in this note that Y has negative Euler characteristic: χ(Y ) < 0. We say that a 2 dimensional +orbifold is a good orbifold if it has some covering orbifold which is a surface. Every orbifold of negative +Euler characteristic is a good orbifold. It can be seen as a quotient of a closed orientable surface and has a +presentation defined as follows: +Definition 2.12. A presentation of a closed connected orbifold Y is a triple (S, Σ, ϕ), where S is a smooth +closed connected orientable surface, Σ is a finite subgroup of D and ϕ is an orbifold isomorphism ϕ : Y → +S/Σ. We then write Y ≃ [S/Σ], with ϕ ignored. +Remark 2.13. If XJ = (S, J) is a Riemann surface and Σ acts on XJ by holomorphic or anti-holomorphic +maps, then Y = YJ inherits the “complex structure” from XJ and we denote it as Y ≃ [XJ/Σ]. +For +nonorientable orbifolds, these are called orbifold dianalytic structures. +Precisely, an orbifold dianalytic +structure on Y is an orbifold complex structure on its orientable double cover Y + with Z/2Z action given by +an anti-holomorphic involution, see [ALS22, Section 5.1]. +2.3.2. Hitchin representations for orbifolds. Thurston studied the space of hyperbolic structures on a closed +2-orbifold Y of negative Euler characteristic [Thu, Chapter 13]. This is called the Teichm¨uller space of +Y , denoted as T (Y ). Similarly to the case of closed surfaces, by taking the holonomy representations of +hyperbolic structures on Y , this space of hyperbolic structures on Y is identified with a connected component +of the representation space +Rep(π1Y, PGL(2, R)) := Hom(π1Y, PGL(2, R))/PGL(2, R). +Similarly to the closed surface case, one can define Fuchsian representations and the Fuchsian locus for orb- +ifolds using the principal representation κ : PGL(2, R) → PGL(n, R). A (conjugacy class of) representations +[ρ] : π1Y → PGL(n, R) is called a (conjugacy class of) Fuchsian representations if there exists [ρ0] ∈ T (Y ) +such that [ρ] = [κ ◦ ρ0]. The space of (conjugacy class of) Fuchsian representations is called the Fuchsian +locus of Rep(π1Y, PGL(n, R)). +The Hitchin component of the orbifold Y is defined using Fuchsian representations. +Definition 2.14. The Hitchin component of Y , denoted as Hit(π1Y, PGL(n, R)), is the connected component +of Rep(π1Y, PGL(n, R)) := Hom(π1Y, PGL(n, R))/PGL(n, R) that contains the Fuchsian locus. An element +in Hit(π1Y, PGL(n, R)) is called a Hitchin representation. +Remark 2.15 ([ALS22, Remark 2.5]). If Y is orientable (for instance if Y = S is a closed orientable surface), +then any Fuchsian representation of π1(Y ) is in fact contained in Hom(π1Y, PSL(n, R)). It may happen +that there are two Hitchin components (for example, when n is even) if we consider such representations +up to PSL(n, R)-conjugacy. +These representations in two connected components are related by an inner +automorphism of PGL(n, R). Therefore PGL(n, R)-conjugacy identifies these components. On the other +hand, when Y is nonorientable, the images of Fuchsian representations of π1(Y ) are in PGL(n, R) (and may +not be able to be restricted to PSL(n, R)). +3. Mapping class group actions +We give an exposition on how the extended mapping class group acts on various mathematical objects. +3.1. Extended mapping class group action on Riemannian metrics. Let S be a closed orientable +smooth surface of genus 풢 ≥ 2 as in Section 2.1. Recall that M− denotes the space of negatively curved +smooth Riemannian metrics on S, on which the diffeomorphism groups D, D+ (when S is oriented), and D0 +act by pullback. The extended mapping class group is given by the quotient group Mod±(S) := D/D0. Two +smooth diffeomorphisms f1 and f2 represent the same point in Mod±(S) if and only if f1 is smoothly isotopic +to f2. In other words, the extended mapping class group Mod±(S) is the group of isotopy classes of elements +in D. When S is given an orientation, we also denote by Mod(S) = D+/D0 the mapping class group which + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +9 +is the group of isotopy classes of all orientation-preserving smooth diffeomorphisms of S. The mapping class +group Mod(S) is an index 2 subgroup of Mod±(S). Given ψ ∈ D, we denote by [ψ] the induced element in +Mod±(S). The action of D on M− by pullback induces an action of Mod±(S) on the quotient space M−/D0. +This space will be discussed further in Section 4.4. Note that this action of Mod±(S) is a right action on +M−/D0. To be consistent with the outer automorphism group action introduced in the next subsection, +people also often use the induced left action of Mod±(S) on M−/D0 given by [ψ] · [g] = [(ψ−1)∗g]. +3.2. Extended mapping class group action on Hitchin components. +3.2.1. Outer automorphism group. The outer automorphism group Out(π1S) is defined as the quotient +Out(π1S) = Aut(π1S)/Inn(π1S), +where Aut(π1S) is the group of automorphisms of π1S and Inn(π1S) denotes the group of all inner auto- +morphisms: for any h ∈ π1S, the associated inner automorphism is defined by +Ih : π1S → π1S +g �→ hgh−1. +By the Dehn-Nielsen-Baer Theorem [FM12, Theorem 8.1], the extended mapping class group Mod±(S) is +isomorphic to the outer automorphism group Out(π1S). There is a natural left action of Out(π1S) on Hn(S). +Given a representation ρ ∈ Hn(S) and any ψ ∈ Out(π1S), define +ψ · ρ = ρ ◦ ψ−1. +This action preserves the Hitchin component Hn(S) (see the paragraph after Lemma 2.8 in [ALS22]). As the +extended mapping class group Mod±(S) is identified with the group Out(π1S), we obtain a natural action +of Mod±(S) on the Hitchin component Hn(S). In particular, this action on H2(S) = T (S) corresponds to +the left extended mapping class group action on M−1/D0 by (inverse) pullback defined in Section 3.1. +3.2.2. Outer automorphism group and orbifolds. In Section 2.3, we presented a 2-dimensional closed con- +nected smooth orbifold Y of negative Euler characteristic as a quotient of a closed orientable surface S by a +finite subgroup Σ ≤ D. This implies the existence of a short exact sequence: +1 → π1S → π1Y → Σ → 1. +In particular, π1S is a normal subgroup of π1Y of finite index and Σ ≃ π1Y/π1S. +The finite group Σ ≤ D yields a subgroup Σ ≤ Mod±(S) which is isomorphic to a subgroup of Out(π1S) +by the Dehn-Nielsen-Baer Theorem. Because Out(π1S) acts on the Hitchin component Hn(S) from the +left by (inverse) precomposition, one obtains an action of Σ on Hn(S). +We will denote by FixΣHn(S) +the fixed locus of the action Σ. The following theorem from [ALS22] about the relation between Hitchin +representations for orbifolds and the outer automorphism group action on Hn(S) will be important later: +Theorem 3.1 ([ALS22, Theorem 2.12]). Given a closed connected 2-orbifold of negative Euler characteristic +Y and a presentation Y ≃ [S/Σ], the map ρ �→ ρ|π1S induces a homeomorphism j : Hit(π1Y, PGL(n, R)) → +FixΣHn(S) between Hit(π1Y, PGL(n, R)) and the Σ-fixed locus in Hn(S). +3.3. Extended mapping class group action on holomorphic differentials. In this subsection, we first +explain how the extended mapping class group acts on the space of sections of holomorphic differentials in +general. Then we focus on surface diffeomorphisms that are holomorphic or antiholomorphic with respect +to a certain complex structure, and discuss the extended mapping class group action they induce. This will +naturally lead to an exposition on the equivariant structure of Hitchin fibration from [ALS22, Section 4.1]. +Given a complex structure J ∈ C∞(S; End(T S)), a diffeomorphism ψ ∈ D acts on J from the right as: +(ψ∗J)x = (dψ−1)ψ(x) ◦ Jψ(x) ◦ dψx. In particular, we say ψ is holomorphic with respect to J if ψ∗J = J; We +say ψ is anti-holomorphic with respect to J if ψ∗J = −J. Upon taking a quotient by D0 action, one obtains +an action of the extended mapping class group Mod±(S) = D/D0 on isotopy classes of complex structures. +The action of ψ ∈ D naturally induces a left action of ψ on all powers of the canonical bundles Kd +J, +denoted by κψ. Let XJ = (S, J) be the Riemann surface with the complex structure J. We can define an + +10 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +action of ψ on a holomorphic section s ∈ H0(XJ, Kd +J) by ψ∗s := κψ−1 ◦ s ◦ ψ as illustrated by the following +diagram: +Kd +ψ∗J +Kd +J +(S, ψ∗J) +(S, J) +κψ +ψ +ψ∗s +s +More explicitly, for p ∈ S and v ∈ (T XC +ψ∗J)(1,0), we have +(ψ∗s)(p) +� +v, · · · , v +� += s(ψ(p)) +� +dψ(v), · · · , dψ(v) +� +. +Here dψ denotes the complexified differential dψ : TpXC +ψ∗J → Tψ(p)XC +J . The pull back ψ∗s is a holomorphic +section on H0(Xψ∗J, Kd +ψ∗J). After taking D0 quotient, we obtain a right Mod±(S) action on (D0-equivalence +classes of) holomorphic d-differentials. Often, we also use the induced left action by inverse pull back given +by [ψ] · [s] = [(ψ−1)∗s]. +Now we focus on diffeomorphisms that are either holomorphic or antiholomorphic with respect to a +fixed complex structure J and explain their actions on holomorphic differentials. Suppose that Σ is a finite +subgroup of D. +We fix an orientation for S and a Σ-invariant Riemannian metric g on S. +Denote by +J = Jg the complex structure associated to g. Then a map ψ ∈ Σ is holomorphic with respect to J if it +preserves the orientation of S; otherwise, it is anti-holomorphic. The bundle isomorphism κψ from Kψ∗J to +KJ defined before induces a bundle automorphism τψ : KJ → KJ. More explicitly, when ψ is orientation +preserving, we let τψ = κψ, which is clearly a bundle automorphism. When ψ is orientation reversing, given +ξ = (p, w) ∈ Kd +J|p, we let τψξ := κψξ. Since κψ maps the bundle Kψ∗(−J) to K−J and ψ∗(−J) = J, it is +also clear in this case that τψ : KJ → KJ is a bundle automorphism. This introduces an action of τψ on all +tensor powers Kd +J. The definition of the τψ action here then coincides with the τψ action in [ALS22, Section +4.1]. +The family τ = (τψ)ψ∈Σ forms a Σ-equivariant structure of the holomorphic bundle Kd +J in the following +sense: +(1) For all ψ ∈ Σ, the following diagram commutes (i.e. π ◦ τψ = ψ ◦ π), +Kd +J +Kd +J +(S, J) +(S, J) +τψ +π +π +s +ψ +ψA·s , +where π : Kd +J → (S, J) is the projection. (The map ψA will be explained in the next paragraph.) +(2) The bundle map τψ is fiberwise C-linear if ψ is holomorphic with respect to J and fiberwise C- +antilinear if ψ : X → X is anti-holomorphic with respect to J. +(3) τid = IdKd +J and τψ1ψ2 = τψ1τψ2. +Note that since ψ and τψ are simultaneously holomorphic or anti-holomorphic, the composition τψ ◦ s ◦ ψ−1 +is again a holomorphic section in H0(XJ, Kd +J). We will denote this (left) action by ψA · s := τψ ◦ s ◦ ψ−1 +to emphasize that this is an automorphism and distinguish it from the pull back action ψ∗s and its induced +left action ψ · s = (ψ−1)∗s by inverse pull back. +In general, suppose XJ is a Riemann surface with complex structure J so that the finite group Σ acts +on XJ by holomorphic or anti-holomorphic maps. Then ψ ∈ Σ act on H0(XJ, Kd +J) as an automorphism +ψA : H0(XJ, Kd +J) → H0(XJ, Kd +J). The following Proposition in [ALS22] will be important later. +Proposition 3.2 ([ALS22, Lemma 4.3]). Under the above assumptions, the Hitchin parametrization HJ : +n� +i=2 +H0(XJ, Ki +J) → Hn(S) is Σ-equivariant and induces a homeomorphism +FixΣ +� +n +� +i=2 +H0(XJ, Ki +J) +� +≃ FixΣHn(S) +for any integer n ≥ 2. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +11 +4. Covariance metric on the space of negatively curved Riemannian Metrics +In this section, which follows closely [GKL21, Section 2], we will define the covariance metric introduced +there on the space of negatively curved metrics. The material here works for n-dimensional Riemannian +manifolds with Anosov geodesic flows, though we only discuss it in the setting that we are interested in, +namely that of a closed orientable smooth surface S with genus 풢 at least 2. +4.1. Function Spaces. If M is a closed manifold, we will denote by D′(M) := (C∞(M))′ the space of +distributions, and by Hs(M) the Sobolev space of order s ∈ R. The latter can be defined as +Hs(M) := {u ∈ D′(M) | (1 − ∆g0)s/2u ∈ L2 +g0(M) }, +where ∆g0 denotes the negative Laplace-Beltrami operator of a fixed Riemannian metric g0 and L2 +g0(M) +is the space of square integrable functions with respect to the probability measure induced by the volume +density dvg0 of g0, i.e. with respect to +dvg0 +Vol(M,g0). An alternative useful characterization of Hk(M) for integer +k ≥ 0 is given by +Hk(M) = {u ∈ D′(M)|V1 · · · Vmu ∈ L2 +g0(M), +0 ≤ m ≤ k, +for any Vj ∈ X(M)}, +where X(M) denotes smooth vector fields on M. A choice of g0 induces an inner product +⟨u, v⟩Hsg0 (M) = ⟨(1 − ∆g0)s/2u, (1 − ∆g0)s/2v⟩L2g0 (M) = ⟨(1 − ∆g0)su, v⟩L2g0 (M), +making Hs(M) into a Hilbert space (the last equality follows by self-adjointness). In our applications, M +will typically be either S or T 1Sg, where T 1Sg is the unit tangent bundle with respect to a Riemannian +metric g on S. Whenever we write L2(T 1Sg), it will be understood that the measure used to define the +L2 inner product and norm is the Liouville measure of g normalized to have total mass 1, denoted by µL +g . +Notice that if f ∈ C∞(S) and π0 : T 1Sg → S is the natural projection we have +� +T 1Sg +π∗ +0fdµL +g = +1 +Area(S, g) +� +S +fdvg. +For k ∈ N0 and α ∈ (0, 1), we will also make use of H¨older spaces +Ck,α(M) := {u ∈ Ck(M)|V1 · · · Vku ∈ Cα(M), for any Vj ∈ X(M)} +where +Cα(M) = C0,α(M) = +� +u ∈ C0(M) | sup +x̸=y +|u(x) − u(y)| +distg0(x, y)α < ∞ +� +. +Upon fixing a norm, Ck,α(M) becomes a Banach space. Spaces of sections of smooth vector bundles with +Sobolev or H¨older regularity are defined using local trivializations. We remark that for both Sobolev and +H¨older spaces, a different choice of background metric g0 does not change the spaces themselves, and different +choices of metrics result in equivalent norms. +4.2. The Πg and Variance operators. For the rest of this discussion, fix a negatively curved metric g +on S. In [Gui17b], an operator Πg : Hs(T 1Sg) → H−s(T 1Sg) is constructed using microlocal tools. When +restricted to f ∈ C∞(T 1Sg) satisfying the mean zero property (that is, ⟨f, 1⟩L2(T 1Sg) = 0), it is given by +Πg : C∞(T 1Sg) → D′(T 1Sg), +⟨Πgf, f ′⟩ = lim +T →∞ +� T +−T +⟨f ◦ φt, f ′⟩L2(T 1Sg)dt. +Here φt is the geodesic flow of g on T 1Sg and the convergence of the integral on the right hand side is +guaranteed by exponential decay of correlations for φt (see [Liv04]). +From another perspective, Πg is related to the Variance and Covariance, arising from the Thermody- +namic formalism. + +12 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +Definition 4.1. The variance of f ∈ C∞(T 1Sg) which is of mean zero with respect to µL +g is defined as +Var(f, µL +g ) = lim +T →∞ +1 +T +� +T 1Sg +�� T +0 +f(φt(x))dt +�2 +dµL +g (x) +and the covariance of two µL +g -mean zero functions f1, f2 ∈ C∞(T 1Sg) is given by +Cov(f1, f2, µL +g ) = lim +T →∞ +1 +T +� +T 1Sg +�� T +0 +f1(φt(x))dt +� �� T +0 +f2(φt(x))dt +� +dµL +g (x). +A crucial fact is that if f ∈ C∞(T 1Sg) is of mean zero, one can use the φt-invariance of the Liouville measure +µL +g to obtain +(4.1) +⟨Πgf, f⟩ = Var(f, µL +g ); +A proof can be found in [Pol94, Proposition 4]. Note that (4.1) is always nonnegative. Similarly, one can +check that ⟨Πgf1, f2⟩ = Cov(f1, f2, µL +g ) if f1, f2 are of mean zero. +The following Theorem is proved by Guillarmou in [Gui17b]. We state it in our setting: +Theorem 4.2 ([Gui17b, Theorem 1.1], [GL21, Section 4A]). For all s > 0, the operator Πg : Hs(T 1Sg) → +H−s(T 1Sg) is bounded and self-adjoint and satisfies the following properties: +(1) Πg is positive in the sense that ⟨Πgf, f⟩ ≥ 0 for all real-valued f ∈ Hs(T 1Sg). +(2) If f and Xgf belong to Hs(T 1Sg) , then ΠgXgf = 0, where Xg is the geodesic vector field on T 1Sg. +(3) If f ∈ Hs(T 1Sg) with ⟨f, 1⟩L2(T 1Sg) = 0, then Πgf = 0 if and only if there exists a solution w ∈ +Hs(T 1Sg) to the cohomological equation Xgw = f, and w is unique modulo constants. +(4) Πg1 = 0. +(5) If f ∈ Hs(T 1Sg), then ⟨Πgf, 1⟩ = 0. +These properties of Πg are important for introducing the covariance metric from [GKL21, Section 2]. In +particular, the fact that Πg1 = 0 allows one to use (4.2) to make sense of Πg for all C∞(T 1Sg): once one +notices that Πgf = Πg(f − ⟨f, 1⟩L2(T 1Sg)), the following is immediate. +Lemma 4.3. The operator Πg : C∞(T 1Sg) → D′(T 1Sg) is given by +⟨Πgf, f ′⟩ := lim +T →∞ +� T +−T +⟨Pg(f) ◦ φt, f ′⟩L2(T 1Sg)dt, +where Pg : C∞(T 1Sg) → C∞(T 1Sg) is the projection operation defined by +Pg(f) := f − ⟨f, 1⟩L2(T 1Sg). +4.3. Symmetric tensors on a surface S. We denote by Sm(S) the space of smooth symmetric m-tensors +on S (and we use Sk,α +m (S) when we need Ck,α regularity). If f ∈ Sm(S) and m ∈ N0 = {0, 1, 2, . . .}, we +denote by π∗ +mf ∈ C∞(T S) the map π∗ +mf(x, v) := fx(v, · · · , v). So π∗ +m converts a symmetric m-tensor to +a function on the tangent bundle T S. A Riemannian metric g naturally induces a scalar product ⟨·, ·⟩ on +Sm(S) (see for example [GL21, Section 2A1]). The formal adjoint of π∗ +m is given by declaring +⟨f, πm∗h⟩L2g(S) = ⟨π∗ +mf, h⟩L2(T 1Sg), +where f ∈ Sm(S) and h ∈ C∞(T 1Sg). +Fix a smooth Riemannian metric g on S for the rest of this discussion. We denote by Dg the sym- +metrization of the covariant derivative with respect to the Levi-Civita connection ∇g. One has the following +relation [GL21, Lemma 2.3] between the geodesic vector field Xg on T 1Sg and the operator Dg, +(4.2) +Xgπ∗ +m = π∗ +m+1Dg. +The formal adjoint of Dg is the negative of the divergence operator on symmetric m-tensors, i.e. D∗ +g := +− trg ◦∇g : Sm(S) → Sm−1(S). Note that the negative Laplace-Beltrami operator on functions is given by +∆g = −D∗ +gDg. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +13 +We will be mostly interested in symmetric 2-tensors, either smooth or of H¨older regularity, and for those, +the following L2-orthogonal decompositions will be useful. +Any tensor f ∈ Sk,α +2 +(S) can be decomposed +uniquely as a sum +(4.3) +f = Dgχ + v, +where χ ∈ Sk+1,α +1 +(S) and v ∈ Sk,α +2 +(S) satisfies D∗ +gv = 0. The component Dgχ is often called the potential +part of f, whereas the divergence free component v is called solenoidal. Another helpful decomposition of +f ∈ Sk,α +2 +(S) is the one into a conformal and a trace free part with respect to g: +f = f1 + f2, +where f1 = 1 +2(trg f)g is conformal to g and f2 = f − 1 +2(trg f)g is trace free. +4.4. The space M−/D0. Here we summarize some useful facts found in [GKL21, Section 2.3]. Recall that in +Section 2.1, we defined M as the space of smooth Riemannian metrics on a closed orientable smooth surface +S of genus 풢 ≥ 2 and M− as the open subspace (in the C∞ topology) of negatively curved Riemannian +metrics. +The space M is a smooth Fr´echet manifold whose tangent space at g ∈ M can be naturally +identified with the space S2(S) of smooth symmetric 2-tensors. Since M− is an open subset of M in the C∞ +topology, it has the same tangent space. The group D0 of smooth diffeomorphisms isotopic to the identity is +a Fr´echet Lie group ([Ham82, Section 4.6]) and acts on M on the right by pull back. This action is smooth +and proper on M ([Ebi68], [Ebi70]). Moreover, for negatively curved metrics, this action is free [Fra66]. By +Ebin’s slice theorem (see [Ebi70], [CK21]), for any g0 ∈ M−, there exists a neighborhood U of g0 in M−, a +neighborhood V of Id ∈ D0, and a Fr´echet submanifold W of M− containing g0 such that +(4.4) +W × V → U +(g, ψ) �→ ψ∗g +is a diffeomorphism of smooth Fr´echet manifolds and such that +(4.5) +Tg0W = {v ∈ S2(S)|D∗ +g0v = 0}. +Because the tangent space of the orbit space g · D0 ⊂ M− at g consists of elements of the form LY g for +Y ∈ X(S), the fact 1 +2LY g = Dg(Y ♭) implies that it consists exactly of the potential symmetric 2-tensors. +Therefore, Tg0W and Tg0(g · D0) are mutually orthogonal with respect to the L2 +g0 inner product. For g near +g0, one has TgW ∩ Tg(g · D0) = {0}. Since the action of D0 on M− is proper and free, together with the +diffeomorphism property of (4.4), a neighborhood of [g] in M−/D0 can be identified with a neighborhood +of g in W. The set M−/D0 therefore inherits from W the structure of a Fr´echet manifold with its tangent +space at [g0] identified with (4.5). +We will also make use of the space Mk,α +− +of Ck,α negatively curved metrics, where k ∈ N is large and +α ∈ (0, 1), which is a Banach manifold with TgMk,α +− += Sk,α +2 +(S) at each g. The group Dk+1,α +0 +of Ck+1,α +diffeomorphisms isotopic to the identity acts continuously, freely and properly on Mk,α +− , but not smoothly +(see [Tro92]). Thus we cannot use the quotient manifold theorem to give Mk,α +− /Dk+1,α +0 +the structure of a +smooth manifold. However, we note that the Dk+1,α +0 +orbit through any C∞ metric in Mk,α +− +is a smooth +submanifold of the latter with tangent space at g0 consisting of the Ck,α potential symmetric 2-tensors with +respect to g0. +With all these understood, we can proceed to introduce the covariance metric on the space of negatively +curved metrics in the next subsection. +4.5. The covariance metric on M−/D0. To construct the covariance metric ([GKL21]) on M−/D0, we +first produce a bilinear form G on M− and on Mk,α +− . It might be tempting to think that π2∗ ◦ Πg ◦ π∗ +2 +induces a positive definite symmetric bilinear form on Tg(M−/D0) by Theorem 4.2. However, even though +Πg is positive (Theorem 4.2), positive definiteness of the bilinear form associated with π2∗ ◦ Πg ◦ π∗ +2 does not +follow (see Remark 4.11). To tackle this problem, the authors in [GKL21] consider the operator +Πg +m :Sm(S) → S−∞ +m (S), +Πg +m : = πm∗(Πg + 1 ⊗ 1)π∗ +m, +where the operator 1 ⊗ 1 : C∞(T 1Sg) → C∞(T 1Sg) projects a function f ∈ C∞(T 1Sg) onto its mean +⟨f, 1⟩L2(T 1Sg) and S−∞ +m (S) := (Sm(S))′. The operator Πg +m can be thought of as an analog of the normal + +14 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +operator of the X-ray transform, defined on a compact manifold with boundary having sufficiently good +geometric properties, which averages the X-ray transform of a tensor field over all geodesics passing through +a point (see for example [SU04]). On the closed surface (S, g), the X-ray transform is defined as +(4.6) +Ig +m : Sm(S) → ℓ∞(C), +f �→ Ig +mf(c) = +1 +L(c) +� L(c) +0 +π∗ +mf(φt(z))dt, +where C denotes the set of closed orbits of the geodesic flow and in (4.6) a closed orbit c of primitive length +L(c) is parametrized as φt(z), where t ∈ [0, L(c)] and z ∈ c. The fact that on S the space of all geodesics +does not have a manifold structure necessitates the more complicated construction of Πg +m, compared to the +normal operator. +Now one can define a bilinear form on TgM− as follows: +Definition 4.4. Define a bilinear form Gg(·, ·) on TgM− by +Gg(h1, h2) := ⟨Πg +2h1, h2⟩L2g(S) +for hj ∈ TgM− ≃ S2(S) and j = 1, 2. +Lemma 4.5. The bilinear form Gg(·, ·) satisfies +Gg(h, h) = Var(Pg(π∗ +2h), µL +g ) + ⟨π∗ +2h, 1⟩2 +L2(T 1Sg), +for g ∈ M− and h ∈ TgM−, where Var is the variance defined in Definition 4.1. +Proof. We have +Gg(h, h) = ⟨Πg +2h, h⟩L2g(S) += ⟨Πgπ∗ +2h, π∗ +2h⟩ + ⟨π∗ +2h, 1⟩L2(T 1Sg)⟨π∗ +2h, 1⟩L2(T 1Sg) += ⟨Πg� +Pg(π∗ +2h) +� +, π∗ +2h⟩ + ⟨π∗ +2h, 1⟩L2(T 1Sg)⟨π∗ +2h, 1⟩L2(T 1Sg) +by Definition 4.3 += ⟨Πg� +Pg(π∗ +2h) +� +, Pg(π∗ +2h)⟩ + ⟨π∗ +2h, 1⟩L2(T 1Sg)⟨π∗ +2h, 1⟩L2(T 1Sg). +by Theorem 4.2 (5) +The result follows immediately because the first term coincides with Var(Pg(π∗ +2h), µL +g ). +□ +Corollary 4.6. The bilinear form Gg(·, ·) also satisfies +Gg(h1, h2) = Cov(Pg(π∗ +2h1), Pg(π∗ +2h2), µL +g ) + ⟨π∗ +2h1, 1⟩L2(T 1Sg)⟨π∗ +2h2, 1⟩L2(T 1Sg) += Cov(Pg(π∗ +2h1), π∗ +2h2, µL +g ) + ⟨π∗ +2h1, 1⟩L2(T 1Sg)⟨π∗ +2h2, 1⟩L2(T 1Sg). +Proof. For a proof, see [Dai19, Corollary 2.21 and Definition 2.22]. +□ +Proposition 4.7. The bilinear form Gg(·, ·) is defined on the Banach manifold Mk,α +− +for fixed large k and +α ∈ (0, 1) and is Ck−3 there, in the sense that for any smooth local sections h1, h2 ∈ C∞(U; Sk,α +2 +(S)), where +U ⊂ Mk,α +− +is an open neighborhood of a metric g0, the function +(4.7) +U → R, +g �→ Gg(h1(g), h2(g)) +is Ck−3. Similarly, if U ⊂ M− and h1, h2 ∈ C∞(U; S2(S)) with h1, h2 : Mk,α +− +→ Sk,α +2 +(S) smooth for all k, +then (4.7) is smooth on U. +Proof. We will use the expression in Corollary 4.6 which also makes sense on Mk,α +− , as the following proof +shows. For U ⊂ Mk,α +− +and for i = 1, 2, consider the map (see [GKL21, Section 1.2] for the last equality) +Fi(g) : U → R, +g �→ ⟨π∗ +2hi(g), 1⟩L2(T 1Sg) = +� +T 1Sg +π∗ +2hi(g)dµL +g = +1 +Area(S, g) +� +S +trghi(g)dvg. +The integral factor can be written locally in coordinates x1, x2 as +� +2 +� +s,t=1 +gst(hi(g))st +� +det(g)dx. Since for +all s, t = 1, 2, the maps g �→ gst and g �→ +� +det(g) are smooth into Ck,α(S), so is the integrand. Then the +integral defines a bounded linear map from Ck,α(S) (actually even from C0(S)) into R, so the composition +is smooth. The area is given locally by +� � +det(g)dx, so it is also smooth in g. So the maps Fi and their +product are smooth. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +15 +Then we show that g �→ Cov(Pg(π∗ +2h1(g)), Pg(π∗ +2h2(g)), µL +g ) is Ck−3. From the thermodynamic formal- +ism, we know (see e.g. [Dai19, Remark 2.25]), +(4.8) +Cov(Pg(π∗ +2h1(g)), Pg(π∗ +2h2(g)), µL +g ) = ∂2P(sπ∗ +2h1(g) + tπ∗ +2h2(g), Xg) +∂t∂s +���� +s=t=0 +. +Here P(·, Xg) is the pressure function with respect to the geodesic flow of g (see e.g. [PP90]), which is +determined by the geodesic vector field Xg ∈ Xk−1,α(T S) ⊂ Xk−1(T S) (note that this inclusion is smooth). +The pressure is real analytic in the first component (see [PP90, Proposition 4.8], [McM08, page 377]). By +(4.8) and polarization, to show that g �→ ∂2 +1P(0, Xg)(π∗ +2h1(g), π∗ +2h2(g)) is Ck−3, it suffices to show that +f(t, g) := P(tπ∗ +2h2(g), Xg) : R × Mk,α +− +→ R +is Ck−1. Since we know +U ∋ g �→ π∗ +2hj(g) ∈ Ck,α(T S) +and +U ∋ g �→ Xg ∈ Xk−1(T S) +are smooth, from [Con92, Theorem C(a)] one knows that upon fixing t = t0, the map P(t0π∗ +2h2(g), Xg) +is Ck−1 respect to g. Since varying t does not change the background flows and corresponding subshifts +of finite type [Con92, Lemma 5.1], the proof of [Con92, Theorem C] (page 110) can be adjusted to show +that P(tπ∗ +2h2(g), Xg) is jointly Ck−1 for both parameters t and g from the real analytic dependence of the +pressure on the first component. +□ +It is important for our purposes that the bilinear form Gg(·, ·) is positive definite on TgM− ∩ kerD∗ +g: +Lemma 4.8 ([GKL21, Lemma 2.1]). Given h ∈ TgM− ∩ kerD∗ +g, then +Gg(h, h) ≥ 0. +Moreover, Gg(h, h) = 0 if and only if h = 0. +Another important criterion for the bilinear form G(·, ·) to descend to M−/D0 is the following Lemma +Lemma 4.9. Suppose h1 = Dgp ∈ TgM− is a potential tensor with p ∈ S1(S). Then +Gg(h1, h2) = 0 +for any h2 ∈ S2(S). +Proof. We write ⟨Πg +2h1, h2⟩L2g(S) = ⟨Πgπ∗ +2(Dgp), π∗ +2h2⟩ + ⟨π∗ +2(Dgp), 1⟩L2(T 1Sg)⟨π∗ +2h2, 1⟩L2(T 1Sg). By equation +(4.2) and Theorem 4.2, we know that π∗ +2Dgp = Xgπ∗ +1p and that Xgπ∗ +1p is in the kernel of the Πg operator. +Also ⟨π∗ +2Dgp, 1⟩L2(T 1Sg) = ⟨p, D∗ +gπ2∗1⟩L2 +g(S), so since π2∗1 = +1 +2g and D∗ +g = −Trg∇g, we conclude that +Gg(h1, h2) = 0. +□ +Now we are able to introduce the Riemannian metric from [GKL21]. +Proposition 4.10 ([GKL21, Proposition 3.9]). The bilinear form G produces a Riemannian metric on the +quotient space M−/D0, called the covariance metric. Given [g] ∈ M−/D0, we denote the covariance metric +at [g] by G[g](·, ·). +Proof. The proof of this Proposition can be found in [GKL21, Proposition 3.9] and we only repeat it for +its importance. For a fixed g0 ∈ M−, we identify a neighborhood of [g0] ∈ M−/D0 with a slice W ⊂ M− +(a Fr´echet submanifold) passing through g0. +We verify positive definiteness. +For g ∈ W near g0, let +h ∈ TgW. Since we can decompose h = LY g + h′, where Y ∈ X(S) and D∗ +gh′ = 0, by Lemma 4.9 we +obtain Gg(h, h) = Gg(h′, h′) ≥ 0 with equality exactly when h′ = 0, by Lemma 4.8. If h′ = 0, the fact that +TgW ∩{LY g|Y ∈ X(S)} = {0} yields h = 0. We notice that the argument does not depend on which slice W +we use to identify M−/D0 by Lemma 4.9. So G[g](·, ·) is a well-defined Riemannian metric on the quotient +space M−/D0. +□ +Remark 4.11. From the proof of Lemma 4.9, we notice that ⟨Πgπ∗ +2h, π∗ +2h⟩ = Var(Pg(π∗ +2h), µL +g ) also descends +to a bilinear form on M−/D0. However it is not positive definite and therefore does not give a Riemannian +metric on M−/D0. For example, consider a family of conformal metrics {gt}t∈R ∈ M− given by gt = tg +for some g ∈ M−. Since h = ˙g0 = g is divergence free (and therefore not a potential tensor), we have +dπM−h = dπM−g ∈ T[g0](M−/D0) is nonzero (where πM− : M− → M−/D0 is the quotient map). But +Pg(π∗ +2h) = Pg(π∗ +2g) = 0, so ⟨Πgπ∗ +2h, π∗ +2h⟩ = 0. + +16 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +Next we show that the extended mapping class group is an isometry subgroup of the covariant metric. +Recall that the action of D on M− by pullback induces a right action of the extended mapping class group +Mod±(S) on the space M−/D0. In the following proposition, if [ψ] ∈ Mod±(S), we write this action as +θ[ψ] : M−/D0 → M−/D0, [g] �→ θ[ψ]([g]) = [ψ∗g]. Then θ[ψ] is smooth with smooth inverse (note that +Mod±(S) is discrete and [g] �→ [ψ∗g] is smooth, as one can see by writing [g] and [ψ∗g] in terms of slices W +and ψ∗W as in (4.4)). It is actually an isometry with respect to the covariance metric G[g](·, ·). +Proposition 4.12 (Isometry subgroup). The covariance metric is invariant under the extended mapping +class group action on M−/D0. In other words, the extended mapping class group is an isometry subgroup of +the covariant metric. Explicitly, given [g] ∈ M−/D0 and �hj ∈ T[g](M−/D0), for j = 1, 2, and an element +[ψ] ∈ Mod±(S), we have +Gθ[ψ]([g])(dθ[ψ]�h1, dθ[ψ]�h2) = G[g](�h1,�h2). +Proof. First observe that if �h ∈ T[g](M−/D0) and h ∈ TgM− satisfies dπM−h = �h for some g ∈ [g], +then dθ[ψ]�h = dπM−(ψ∗h), for any ψ ∈ [ψ]. Indeed, let gt ∈ M− be a curve with h = +d +dtgt +�� +t=0, so that +d +dt[gt] +�� +t=0 = �h. Then +dθ[ψ]�h = d +dt +� +θ[ψ]([gt]) +��� +t=0 = d +dtπM−(ψ∗gt) +�� +t=0 = dπM−(ψ∗h). +This and the definition of the covariance metric imply that it suffices to show +(4.9) +Gψ∗g(ψ∗h1, ψ∗h2) = Gg(h1, h2) +for hj ∈ TgM− satisfying dπM−hj = �hj and ψ ∈ D, since in that case we have +(4.10) +G[g](�h1,�h2) = Gg(h1, h2) = Gψ∗g(ψ∗h1, ψ∗h2) = Gθ[ψ]([g])(dθ[ψ]�h1, dθ[ψ]�h2). +Note here that the hj are determined by �hj up to the addition of a tensor field which is vertical with respect +to the quotient map, that is, a potential tensor. The validity of (4.10) is independent of the choice of hj by +Lemma 4.9. +To show (4.9), recall that +Gg(h1, h2) = lim +T →∞ +1 +T +� T +−T +⟨Pg(π∗ +2h1) ◦ φt, π∗ +2h2⟩L2(T 1Sg)dt + ⟨π∗ +2h1, 1⟩L2(T 1Sg)⟨π∗ +2h2, 1⟩L2(T 1Sg), +where Pg(π∗ +2h1)(x) = π∗ +2h1(x) − ⟨π∗ +2h1, 1⟩L2(T 1Sg). The Liouville probability measures of g and ψ∗g are +related by pushforward, i.e., µL +ψ∗g = (ψ−1 +∗ )∗µL +g , where ψ−1 +∗ +: T 1Sg → T 1Sψ∗g is the induced diffeomorphism +by ψ. Also, by the naturality of the Levi-Civita connection, the geodesic flows φg +t and φψ∗g +t +of g and ψ∗g +respectively are related by conjugation by ψ, that is, φψ∗g +t += ψ−1 +∗ +◦ φg +t ◦ ψ∗ : T 1Sψ∗g → T 1Sψ∗g. A simple +change of variable then yields (4.9). +□ +Remark 4.13. Although we have only shown the above theorem for the right pull back action of the extended +mapping class group on M−/D0, it naturally also holds for its induced left action introduced in Section 3.1. +4.6. The special case of T (S). Fischer and Tromba [FT84], using Riemannian geometry and non-linear +analysis, reprove the classical result that T (S) = M−1/D0 is a C∞ finite dimensional contractible manifold. +Its tangent space at [σ] ∈ M−1/D0 is isomorphic to +(4.11) +Sσ,T T +2 +(S) = {h ∈ S2(S)| trσ h = 0, D∗ +σh = 0}, +where σ ∈ [σ]. +More specifically, given σ0 ∈ M−1 and k ≫ 1, α ∈ (0, 1), one can construct a local +slice S ⊂ M−1 ⊂ Mk,α +−1 passing through σ0, identified with a neighborhood of [σ0] ∈ M−1/D0, so that +Tσ0S = Sσ0,T T +2 +(S) (see [Tro92, Theorem 2.4.2] and Section 5.3)2. Moreover, for h ∈ TσS the decomposition +(4.3) holds with v ∈ Sσ,T T +2 +(S). The space Sσ,T T +2 +(S) is related to holomorphic data on the Riemann surface +XJ, where J is the complex structure determined by σ and a choice of orientation: +2In [Tro92], the slice S is a submanifold of the Hilbert manifold Ms +−1 of hyperbolic metrics with fixed Sobolev regularity, +though the proofs work similarly in the H¨older case. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +17 +Theorem 4.14 ([FT84, Theorem 8.9]). For σ ∈ M−1, there is a canonical isomorphism between the spaces +H0(XJ, K2 +J) and Sσ,T T +2 +(S), given by q �→ Re(q). Thus by the Riemann-Roch theorem, the space Sσ,T T +2 +(S) is +of real dimension 6풢 − 6. +One can then simplify the formula of the covariance metric when restricting to the Teichm¨uller space T (S) = +M−1/D0 and show that it restricts to a scale of the Weil-Petersson metric there. +Corollary 4.15. On Teichm¨uller space T (S), the covariance metric at [σ] ∈ T (S) satisfies +G[σ](�h,�h) = Var(π∗ +2h, µL +σ), +where �h ∈ T[σ]T (S), σ ∈ [σ] and h is the lift of �h in Sσ,T T +2 +(S). +Proof. We have ⟨π∗ +2h, 1⟩L2(T 1Sσ) = Area(S, σ)−1 � +S trσ h dvσ = 0 (see [GKL21, Section 1.2]). Since h ∈ +Sσ,T T +2 +(S), one concludes π∗ +2h is of mean zero. +□ +Combining the above discussions, we obtain: +Theorem 4.16 ([McM08, Theorem 1.5], [BT08], [LW18, Theorem 6.3.1]). Given �h ∈ T[σ]T (S), consider the +lift h ∈ Sσ,T T +2 +(S) given by the real part of a holomorphic quadratic differential q (Theorem 4.14). Then +G[σ](�h,�h) = Var(R(q), µL +σ) = C⟨[q], [q]⟩W P([σ]) +Here R(q) := π∗ +2(Re(q)) ∈ C∞(T 1Sσ, R). The constant C only depends on the topology of S. +5. The Blaschke locus in M−/D0 +This section discusses the Blaschke locus MB/D0. In Subsection 5.1, we introduce some basic concepts +from affine differential geometry. Then in Subsection 5.2, we introduce the Blaschke locus and discuss its +relation with the holomorphic vector bundle Q3(S) (Subsection 2.2). We then investigate regularity of the +Blaschke locus MB/D0 in Subsection 5.3 in the spirit of Tromba [Tro92], finishing with a discussion on the +topology of the Blaschke locus in Subsection 5.4. Wang’s equation (5.4) will be the key for our study in this +and the next sections. +5.1. Affine differential geometry and Blaschke metrics. In this subsection we give a brief introduction +on affine spheres and Blaschke metrics. Those are objects arising from affine differential geometry, which +is the study of affine differential invariants, namely differential properties of hypersurfaces of Rn+1 which +are invariant under all volume preserving affine transformations. Standard references for affine differential +geometry are [Lof10] and [NS94]. The space of Blaschke metrics, which include hyperbolic metrics as special +examples, will be the object of study in what follows. +A basic construction in affine differential geometry associates to a hypersurface L of Rn+1 a transverse +vector field ξ ⋔ L, the affine normal vector field, which is an affine differential invariant. An affine sphere +is a hypersurface L whose affine normal lines are concurrent at a point, the center. We outline here the +construction of an affine sphere in the special case of R3 and its associated affine differential invariants. +Let L be a hypersurface in R3. A choice of a transverse vector field ξ : L → R3 yields a decomposition +R3 = TpL ⊕ ⟨ξ(p)⟩ for any p ∈ L, where ⟨ξ(p)⟩ stands for the line spanned by ξ(p). This allows one to +decompose the standard flat affine connection D on R3 into tangential part ∇ and normal part as follows, +(5.1) +DXY = ∇XY + g(X, Y )ξ, +(5.2) +DXξ = −B(X) + τ(X)ξ, +where X and Y are tangent vector fields to L and B = Bξ is an endomorphism of T L. Observe that ∇ +is a torsion-free connection on T L, so g is a symmetric 2 tensor. By restricting to the case where L is +strictly convex and ξ points towards the convex side of the surface L, we can assume g is positive definite. +Further, by imposing the conditions τ ≡ 0 and det(ξ, X1, X2)2 ≡ 1 for any g-orthonormal frame (X1, X2), +one determines a unique transversal vector field ξ on L, which is an affine differential invariant and is called +the affine normal of L. The endomorphism B is then called the affine shape operator. Moreover, one can +check that the vector field ξ being concurrent to a point is equivalent to the affine shape operator B being + +18 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +a nonzero multiple of identity: B = HI for some constant H ∈ R \ {0}, the affine mean curvature. We will +focus on the case where H = −1, in which case L is a hyperbolic affine sphere3. +We will need two other affine differential invariants associated to the affine sphere L. One of them is +the affine second fundamental form g, which is symmetric and positive definite. It yields a Riemannian +metric which is an affine differential invariant on L, called the Blaschke metric. +The second is a cubic +form A on T L known as the Pick form: it is given by taking the difference ∇ − ∇g, where ∇g denotes the +Levi-Civita connection of the Blaschke metric, and lowering an index via g. If we use the conformal class +of the Blaschke metric to regard L as a Riemann surface, then the Pick form A is the real part of a cubic +differential q = ˜q(z)dz3 on L, which is called the Pick differential. +The map f = ξ : L → R3 provides an immersion of L into R3 if the integrability conditions for the +structure equations (5.1) and (5.2) are satisfied4. +Written in complex coordinates z determined by the +conformal class of the Blaschke metric g, the integrability conditions (see [Lof10, Section 5]) for f are the +following partial differential equations, +˜q¯z = 0, +(5.3) +K(g) = −1 + 2|q|2 +g. +(5.4) +The first equation (5.3) simply requires the Pick differential q to be holomorphic. The second equation (5.4) +is an second order partial differential equation in g, where K(g) denotes the Gaussian curvature of g and +|q|2 +g = |q|2 +g3 is the pointwise g norm of the holomorphic cubic differential q. It is called Wang’s equation in +the affine sphere literature [Wan91]. This equation is of key importance in this note. +Proposition 5.1 ([Lof99]). Wang’s equation (5.4) admits a unique smooth solution given a holomorphic +cubic differential q on a compact Riemann surface. +An interesting aspect of affine sphere theory is its connection with Higgs bundle theory introduced in Section +2.2. Wang’s equation can be viewed as a special case of the Hitchin equation for a PGL(3, R) Higgs bundle: +let J be a complex structure on S and denote by σ the hyperbolic metric associated to J. +Let q be a +holomorphic cubic differential with respect to the complex structure J. The Hitchin equation (2.1) for the +Higgs bundle sJ(0, 2q) in fact reduces to a single scalar equation, which is Wang’s equation (5.4) on S +associated to (J, q) (see for example [Lab07, Section 9] and [Li19, Section 6.2]). +Returning to the closed oriented surface S with genus 풢 ≥ 2 we started with, we denote ˜S its universal +cover. The punchline of the whole discussion is the following important Theorem. +Theorem 5.2 ([Wan91, Theorem 3.1, Theorem 3.5]). Given a complex structure J on S, any holomorphic +cubic differential q on XJ = (S, J) determines a complete hyperbolic affine sphere f : ˜S → R3 that admits +discrete and properly discontinuous subgroup action in SL(3, R) so that the quotient topologically is S. Its +Blaschke metric is given by the solution of Wang’s equation on ˜S which descends to S. Conversely, any +complete hyperbolic affine sphere f : ˜S → R3 that admits a discrete and properly discontinuous subgroup +action in SL(3, R) with quotient topologically given by S defines a complex structure J given by the conformal +class of its Blaschke metric and a holomorphic cubic differential q with respect to this complex structure on +S. +Remark 5.3. A last remark that we want to make about the affine sphere theory is its relation with hyperbolic +geometry and Teichm¨uller theory. In the special case in which the holomorphic cubic differential q ≡ 0, +Wang’s equation reduces to the classical curvature equations for metrics of constant curvature −1. Therefore +a hyperbolic metric is a special example of a Blaschke metric. In these cases, the affine spheres obtained are +universal covers of hyperbolic surfaces viewed in the hyperboloid model as mentioned in the introduction. +5.2. The Blaschke locus MB/D0. In this section, we define the Blaschke locus first as a set and then +study its manifold structure. +Definition 5.4. We define MB to be the space of Blaschke metrics on S. The quotient space of MB up to +D0-action is denoted by MB/D0, called the Blaschke locus. +3By applying a translation, one can always assume that the center of the hyperbolic affine sphere is the origin. +4While f(L) is the immersed affine sphere we obtain through this construction, we often abuse notation and call L the affine +sphere. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +19 +The Blaschke locus MB/D0 is a subset of the space M−/D0 due to the following Proposition: +Proposition 5.5 ([DW15, Theorem 5.1], [OT21, Lemma 3.3]). Any Blaschke metric g is strictly negatively +curved, i.e. K(g) < 0. +Fix a choice of orientation on S. +Denote by J(σ) the complex structure determined by σ and the +orientation. Let +(5.5) +˜Q3(S) := +� +σ∈M−1 +H0(XJ(σ), K3 +J(σ)), +viewed as a subset of M−1×S3(S)C, where the superscript C denotes complexification and XJ(σ) = (S, J(σ)) +is the Riemann surface with the complex structure J(σ). Let +(5.6) +�g : ˜Q3(S) → MB ⊂ M− +be the map that assigns to a pair (σ, q) the solution of Wang’s equation (5.4) on the Riemann surface XJ(σ). +Now D0 (or D+) act on ˜Q3(S) and M−1 in a natural way from the right by pullback (and similarly from the +left by inverse pullback). Consider the equivalence relation on ˜Q3(S) given by (σ, q) ∼ (σ′, q′) if and only if +for some ψ ∈ D0, one has σ′ = ψ∗σ and q′ = ψ∗q. We henceforth identify Q3(S) with ˜Q3(S)/D0 by viewing +Q3(S) as a bundle over M−1/D0, for a fixed choice of orientation. With some abuse of notation we denote +elements in ˜Q3(S) by either (σ, q) or (J, q) = (J(σ), q). This is allowed because positively oriented complex +structures are in one-to-one correspondence with hyperbolic metrics. +Proposition 5.6. The map �g is equivariant with respect to the action of ψ ∈ D+ by pullback: ψ∗(�g(J, q)) = +�g +� +ψ∗(J, q) +� +. Similarly, it is equivariant with respect to the left action of D+ on ˜Q3(S) and MB by inverse +pullback. +Thus after taking a quotient by the D0 action, we obtain a well defined mapping class group +equivariant map +g : Q3(S) → MB/D0. +Proof. Denoting g = �g(J, q), we need to verify that K(ψ∗g) = −1+2|ψ∗q|2 +ψ∗g. By uniqueness, this will imply +that ψ∗g is the solution of Wang’s equation (5.4) associated to the pair ψ∗(J, q). Since ψ is an isometry +between ψ∗g and g, we know +K(ψ∗g) = ψ∗K(g) = ψ∗(−1 + 2|q|2 +g). +It now suffices to show that |ψ∗q|2 +ψ∗g = ψ∗|q|2 +g on S. Let z be conformal coordinates with respect to J and +write z = ψ(w), with w conformal coordinates with respect to ψ∗J. Then if g = eu(z)dzd¯z and q = f(z)dz3, +we have ψ∗g = eu(ψ(w))|dz/dw|2dwd ¯w and ψ∗q = f(ψ(w))(dz/dw)3dw3, so that locally +|ψ∗q|2 +ψ∗g = |f(ψ(w))|2/e3u(ψ(w)) = ψ∗|q|2 +g. +This is a local computation but we have invariantly defined global objects on both sides, so we have the +claim. +□ +Remark 5.7. Since the solution of Wang’s equation corresponding to (J, q) is the same as the one cor- +responding to (−J, ¯q), the proof of Proposition 5.6 shows that if one views �g as a map from the bundle of +holomorphic cubic differentials over all complex structures (not necessarily positively oriented), then it is also +equivariant with respect to the action of D by pullback and inverse pullback, so it descends to an extended +mapping class group equivariant map when taking D0 quotients. This point of view will not be needed or +used in the sequel, except briefly in the proof of Lemma 6.6. +Besides the D0 action on ˜Q3(S), there is also a natural action of S1 on ˜Q3(S) which is given by +e2πiθ · (σ, q) = (σ, e2πiθq). From now on, we will write elements in ˜Q3(S)/S1 as (σ, ⟨q⟩) for the class of +(σ, q) ∈ ˜Q3(S). Because the S1 action on ˜Q3(S) commutes with the D0 action on ˜Q3(S), it descends to an +action on Q3(S). Moreover, the map �g is constant on the orbits of this action as seen from (5.4). Thus by +Proposition 5.6, the maps �g and g descend to a map +g0 : Q3(S)/S1 → MB/D0. +The following proposition, whose proof we include for its importance, shows that the map g0 is bijective. + +20 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +Proposition 5.8 ([OT21, Proposition 4.1]). Suppose that [(σj, qj)] ∈ Q3(S), for j = 1, 2, and that [gj] = +g([(σj, qj)]) are the associated Blaschke metrics. Then [g2] = [g1] if and only if [(σ2, q2)] = [(σ1, e2πiθq1)] for +some θ ∈ [0, 1). +Proof. The “if” direction follows from Propositions 5.1 and 5.6. For the converse, suppose that [g1] = [g2], +which implies that g1 = ψ∗g2 for some ψ ∈ D0. For j = 1, 2, write gj = eujσj for suitable smooth functions +uj. Then +eu1σ1 = ψ∗(eu2σ2) = eψ∗u2ψ∗σ2, +which shows that σ1 and ψ∗σ2 are hyperbolic metrics in the same conformal class and thus equal. We now +show that q1 = e2πiθψ∗q2 for some θ ∈ [0, 1), which will imply the claim. Since g1 = ψ∗g2, from Wang’s +equation we have +|q1|2 +g1 = ψ∗(|q2|2 +g2) = |ψ∗q2|2 +ψ∗g2 = |ψ∗q2|2 +g1. +Therefore, if we write q1 = f1(z)dz3 and ψ∗q2 = f2(z)dz3 in conformal coordinates with respect to the +complex structure J(g1), where fj is holomorphic for j = 1, 2, we see that |f1| = |f2| pointwise. If f1 or +f2 is identically zero then they both are and we are done. Else, writing f2 = λf1 where λ : S → S1 is a +meromorphic function, we conclude that λ ∈ S1 must be a constant. Thus q1 = e2πiθψ∗q2 for some θ ∈ [0, 1) +and we obtain the claim. +□ +5.3. Smoothness of the Blaschke locus MB/D0. Our goal in this subsection is to prove Theorem 5.17, +namely that the Blaschke locus MB/D0 has the structure of a finite dimensional smooth manifold away +from the Teichm¨uller space T (S) = M−1/D0. Our strategy is based on the construction of smooth charts +for T (S) as outlined in [Tro92] (see also Subsection 4.6). Briefly, one can construct local compatible smooth +charts for the Blaschke locus MB/D0 using the smooth manifold structure of Q3(S). +Throughout, k is a large integer and α ∈ (0, 1). The superscript k, α will indicate that the relevant space +of functions or sections of a bundle have H¨older regularity of this order. The following theorem collects the +results in [Tro92, Chapter 2] regarding the smooth manifold structure of Teichm¨uller space. It is stated in +terms of Ck,α instead of Sobolev regularity, with the proof being the same as in the Sobolev case. +Theorem 5.9. Let σ0 ∈ M−1. There exists a smooth local submanifold S of Mk,α +−1 of dimension 6풢 − 6 +passing through σ0 which contains only C∞ metrics and satisfies Tσ0S = Sσ0,T T +2 +(S) (see (4.11)). Moreover, +when S is sufficiently small, the map +(5.7) +ΘS : S × Dk+1,α +0 +→ Mk,α +−1 , +(σ, ψ) �→ ψ∗σ, +is a diffeomorphism onto its image. The slices S locally parametrize T (S) = M−1/D0 (that is, each S does +not contain two distinct metrics in the same D0 orbit) and define smoothly compatible charts, giving T (S) +the structure of a smooth manifold of dimension 6풢 − 6, homeomorphic to R6풢−6. +A local slice for T (S) through a metric σ0 ∈ M−1 in Theorem 5.9 is constructed via the Poincar´e map +λ : Mk,α +− +→ Mk,α +−1 , +which takes a metric to the unique hyperbolic metric in its conformal class. More specifically, λ defines a +smooth diffeomorphism between a neighborhood of 0 in Sσ0,T T +2 +(S) and S, given by writing S ∋ σ = λ(σ0+h), +where h ∈ Sσ0,T T +2 +(S) is sufficiently small. Since Sσ0,T T +2 +(S) is a 6풢 − 6 dimensional vector space consisting +of smooth tensor fields, we can write h in terms of a basis {hj}6풢−6 +j=1 . Smallness of h = �6풢−6 +j=1 +ajhj means +exactly smallness of the coefficients aj. +Remark 5.10. We remark that different choices of k, α (for k sufficiently large) result in equivalent +topologies underlying the smooth structures induced by the slices in Theorem 5.9. +To see this, one can +express σ ∈ S in terms of a basis for Sσ0,T T +2 +(S) via the Poincar´e map. +Explicitly, if in S we have +σk = λ(σ0 + �6풢−6 +j=1 aj +khj) → σ = λ(σ0 + �6풢−6 +j=1 ajhj) in the Ck,α topology, we have aj +k → aj for all j, +therefore σk → σ in C∞ topology as well. Moreover, since T (S) is homeomorphic to R6풢−6 with respect to +the topology induced from any Mk,α +−1 and there exist no exotic smooth structures on Rn for n ̸= 4, the smooth +structures obtained for T (S) by means of Theorem 5.9 are equivalent for all values of k, α. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +21 +Recall that we defined the space ˜Q3(S) in (5.5) as a space of holomorphic cubic differentials with respect +to varying Riemann surfaces. Since the projection ˜Q3(S) → M−1 is D0-equivariant, we obtain a well defined +surjective map +p : Q3(S) → T (S). +Each fiber of p naturally carries the structure of a complex vector space of dimension 5(풢 − 1). It is known +that Q3(S) is a smooth vector bundle (it is actually holomorphic, see for example [Ber61]) over a contractible +space, so it is globally trivial. Its topology was discussed in Remark 2.11. Below we discuss an identification +of Q3(S) with slices in ˜Q3(S). +Lemma 5.11. Let σ0 ∈ M−1 and let S be a slice in Mk,α +−1 passing through σ0 as in Theorem 5.9. We can +identify Q3(S) locally near a point [(σ0, q)] with a slice +(5.8) +SQ := +� +σ∈S +H0(XJ(σ), Km +J(σ)) +over S. +Proof. Given [(σ, q)] ∈ Q3(S) near [(σ0, q0)] and the unique σ ∈ [σ] lying in S, there exists a unique +q ∈ H0(XJ(σ), Km +J(σ)) such that (σ, q) ∈ [(σ, q)]. Indeed, if (σ, q) = ψ∗(σ, q′) for ψ ∈ D0, then because the +D0-action is free on M−1, we have that σ = ψ∗σ implies ψ = id. +□ +Using the identification described in Lemma 5.11 we can obtain trivializations for SQ via a smooth +global trivialization φ0 of Q3(S), thus giving each slice SQ a smooth bundle structure so that the projection +(σ, q) �→ σ is smooth. That is, if we let +(5.9) +πSQ : SQ → πSQ(SQ) ⊂ Q3(S) +and +πS : S → πS(S) ⊂ T (S) +be the respective D0 quotient maps and φ0 : Q3(S) → T (S) × C5풢−5 be a smooth global trivialization for +Q3(S), then +˜φS = (π−1 +S +× id) ◦ φ0 ◦ πSQ : SQ → S × C5풢−5 +is a (global) smooth trivialization for SQ. Using it, we can write a smooth local frame {(σ, qℓ(σ))}5풢−5 +ℓ=1 +for +the fiber of ˜Q3(S) over σ ∈ S, by choosing a frame {[(σ, qℓ(σ))]}5풢−5 +ℓ=1 +for the bundle Q3(S) and considering +the unique representatives of [(σ, qℓ(σ))] over the slice S. +Then we can express an element q(σ) of SQ +as q(σ) = �5풢−5 +ℓ=1 +bℓqℓ(σ), bℓ ∈ C. Moreover, such a section q(σ) is smooth when viewed as a map into +Sk +3(S)C, for any k ≥ 0. This follows from the construction in [Ber61, Theorem II], where it is shown that +for each element f(z)dz3 ∈ Q3(S) +�� +τ0 lifted to the universal cover D (the unit disk), where τ0 ∈ T (S), one +has f(z) = F(z, τ0) for some jointly holomorphic function F(z, τ), with respect to the complex structure on +D × T (S), and the fact that S is a smooth chart for T (S). +It follows by Theorem 5.9 that for two slices S and S′ with U := πS(S) ∩ πS′(S′) ̸= ∅, there exists a +smooth map ΨS,S′ : π−1 +S (U) → π−1 +S′ (U) which maps σ ∈ S to the unique σ′ ∈ S′ such that [σ] = [σ′]. One +has ΨS,S′(σ) = ψ∗ +σσ, where ψσ = π2 ◦ Θ−1 +S′ (σ) with ΘS′ as in (5.7) and π2 the projection onto the second +factor. (A priori, ψσ ∈ Dk+1,α +0 +, but because the slices S, S′ consist of smooth metrics, it is actually smooth, +see the proof of [Tro92, Theorem 2.3.1].) Thus we similarly obtain a map +(5.10) +˜ΨS,S′ : SQ → S′Q, +(σ, q) �→ (ψ∗ +σσ, ψ∗ +σq), +and one checks that ˜φS′ ◦ ˜ΨS,S′ ◦ ˜φ−1 +S (σ, b) = (ΨS,S′(σ), b) and therefore ˜ΨS,S′ is smooth. +In what follows we construct charts for the Blaschke locus MB/D0, away from the Teichm¨uller space +T (S), using the map �g in (5.6). Similarly to the approach in [Tro92], we will use the Ck,α topology for +MB/D0 to give it a smooth structure, although the metrics we are interested in are actually smooth. The +key for the construction is Wang’s equation (5.4). +We will now write this equation slightly differently. +Consider the logarithmic density u of a Blaschke metric g given by g = �g(σ, q) = eu(σ,q)σ. Then Wang’s +equation (5.4) is equivalent to the following semilinear elliptic partial differential equation for u: +(5.11) +∆σu = 2eu − 4e−2u |q|2 +σ3 − 2. +Equation (5.11) has a unique smooth solution u for any given (σ, q) ∈ ˜Q3(S) (Recall Propsition 5.1). + +22 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +Lemma 5.12. Let SQ ⊂ ˜Q3(S) be a slice as in (5.8). Then the map �g +�� +SQ : SQ → Mk,α +− +is smooth. +Proof. Writing g = euσ, where u satisfies (5.11), it suffices to show that the map (σ, q) �→ u(σ, q) ∈ Ck,α(S) +is smooth on SQ. Define a map F : SQ × Ck,α(S) → Ck−2,α(S) by +F((σ, q), u) = ∆σu − 2eu + 4e−2u |q|2 +σ3 + 2. +Then u(σ, q) is given implicitly by F((σ, q), u(σ, q)) = 0 +We claim that the map F is smooth. The smoothness of the map S × Ck,α(S) ∋ (σ, u) �→ ∆σu ∈ +Ck−2,α(S) follows from the coordinate expression (with summation convention) +∆σu = σkℓ∂2 +kℓu + ∂kσkℓ∂ℓu + +σkℓ +2 det σ ∂k(det σ)∂ℓu. +The map Ck,α(S) ∋ u �→ eu ∈ Ck,α(S) is smooth because the exponential map is smooth. Finally, the map +(σ, q) �→ |q|2 +σ3 is seen to be smooth by expressing q(σ) = �5풢−5 +k=1 bkqk(σ) in terms of an orthonormal frame, +where bk ∈ C, and noting that |q|2 +σ3 = +� +k,ℓ +bk¯bℓ qk(σ)qℓ(σ) +σ3 +. +We then show the partial derivative ∂uF +�� +((σ,q),u) : Ck,α(S) → Ck−2,α(S) is an isomorphism. Computing +the derivative of F with respect to u at a fixed (σ, q) gives +∂uF +�� +((σ,q),u)v = ∆σv − 2euv − 8e−2u |q|2 +σ3 v = (∆σ − 2eu − 8e−2u |q|2 +σ3 )v. +We observe that P := ∂uF +�� +((σ,q),u) = ∆σ − 2eu − 8e−2u |q|2 +σ3 +: Ck,α(S) → Ck−2,α(S) is a bounded linear +operator. It has trivial kernel: if v ∈ Ck,α(S) satisfies Pv = 0 we have, by the divergence theorem, +0 = ⟨Pv, v⟩L2σ(S) = −∥dv∥2 +L2σ(S) − +��� +2eu + 8e−2u |q|2 +σ3 +�1/2v +��2 +L2σ(S), +implying that v = 0. To see that it is surjective, consider w ∈ Ck−2,α(S) ⊂ Hk−2(S). Since P is self- +adjoint with respect to the L2 +σ inner product, it has index 0 as an operator P : Hk(S) → Hk−2(S) (see +[SA01, Theorem 8.1]) and thus it is surjective since it is injective. +So there exists v ∈ Hk(S) so that +Pv = w ∈ Ck−2,α(S), and by elliptic regularity we see that v ∈ Ck,α(S). +Since ∂uF +�� +((σ,q),u) = P : +Ck,α(S) �→ Ck−2,α(S) is a continuous bijection between Banach spaces, it is an isomorphism by the open +mapping theorem. Since SQ is a finite dimensional manifold, by the Banach manifold implicit function +theorem (see, e.g. [Lan12, Theorem I.5.9]), the function u = u(σ, q) is smooth and therefore �g(σ, q) = eu(σ,q)σ +is smooth. +□ +We now continue our discussion involving the S1 action on ˜Q3(S) and Q3(S) mentioned in Section 5.2. +The S1 action on ˜Q3(S) restricts to an action on each slice SQ, and the identification map πSQ is equivariant +with respect to it. Moreover it is smooth, proper and free on SQ∗ = SQ \ O and on Q∗ +3(S) := Q3(S) \ O +(where O is the zero section, which is canonically identified with T (S)). We obtain +Corollary 5.13. The respective quotients Q∗ +3(S)/S1 and SQ∗/S1 are smooth manifolds of real dimension +16풢 − 17. +The following viewpoint of Q∗ +3(S)/S1 will be used in later proofs. +Remark 5.14. Since the D0 and S1 actions on ˜Q3(S) commute with each other, we can identify Q∗ +3(S)/S1 ∼= +(( ˜Q3(S) \ O)/S1)/D0, that is, with the S1 quotient taken before the D0 quotient. +Next we show in Lemma 5.15 below that �g +�� +SQ∗ descends to a map on SQ∗/S1 which is an immersion into +Mk,α +− . Recall that, as in the finite dimensional case, a Ck map f : E1 → E2 between Ck Banach manifolds +is an immersion if for all z ∈ E1 there exists an open neighborhood Z of z such that f +�� +Z induces a Ck +diffeomorphism of Z onto a submanifold of E2; equivalently, if for every z ∈ E1 it has injective differential +with image that splits (see [Lan12]). The latter condition means that df +�� +z has closed range Ran(df +�� +z) and +there exists a closed Banach space B ⊂ Tf(z)E2 which is complementary to Ran(df +�� +z); this condition is +satisfied automatically when E1 is finite dimensional. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +23 +We remind our reader of our different notations �g, g, �g0, g0: the tilde refers to maps before the D0 +quotient and the subscript 0 refers to maps after taking S1 quotient. +Lemma 5.15 (Injective differential). Let (σ0, q0) ∈ ˜Q∗ +3(S) = ˜Q3(S) \ O and consider a slice SQ∗ := +SQ ∩ ˜Q∗ +3(S) containing it, where SQ is as in (5.8) with S a slice around σ0 as in Theorem 5.9. Suppose that +for X ∈ T(σ0,q0)SQ∗ one has +d�g +�� +(σ0,q0)X = Dg0χ, +χ ∈ Sk+1,α +1 +(S), +g0 := �g(σ0, q0) +where �g is viewed as a map into Mk,α +− +and Dg0 is the symmetric differential (see Section 4.3). Then X +is tangent to the S1 orbit through (σ0, q0) in SQ∗ and so it projects under the quotient map to the zero +vector in T(σ0,⟨q0⟩)(SQ∗/S1). Therefore, the descended map �g0 : SQ∗/S1 → Mk,α +− +has injective differential +at (σ0, ⟨q0⟩) whose image splits. The map �g0 is an immersion from a sufficiently small neighborhood U of +(σ0, ⟨q0⟩) ∈ SQ∗/S1 into Mk,α +− . The image V := �g0(U) is a 16풢 − 17 dimensional submanifold of Mk,α +− +consisting of smooth Blaschke metrics and satisfying TgV ∩ TgOk+1,α +g += {0} for g ∈ V, where Ok+1,α +g +is the +Dk+1,α +0 +-orbit through g. +Proof. By means of a trivialization for SQ we can identify X ∈ T(σ0,q0)SQ with a pair (hT T , v), where +hT T ∈ Tσ0S = Sσ0,T T +2 +(S) and v ∈ R10풢−10. Consider a curve αt = (σt, qt) : (−ǫ, ǫ) → SQ∗ with α0 = (σ0, q0) +and ˙α0 = (hT T , v). We write u(σ, q) for the smooth solution of (5.11) for given (σ, q) ∈ SQ∗, and we also +write ut = u(αt), ˙ut = d +dtut, so that g0 = �g(σ0, q0) = eu0σ0. By our hypothesis, +(5.12) +Dg0χ = d +dt�g(σt, qt) +�� +t=0 = d +dt(eu(σt,qt)σt) +�� +t=0 = eu0hT T + eu0 ˙u0σ0. +Taking the L2 +g0(S) inner product of equation (5.12) with hT T , +(5.13) +1 +Area(S, g0) +� +S +eu0|hT T |2 +g0dvg0 + ⟨g0 ˙u0, hT T ⟩L2g0 (S) − ⟨Dg0χ, hT T ⟩L2g0 (S) = 0. +Since we are in dimension two, the tensor hT T is trace free and divergence free with respect to any metric +that is conformal to σ0, in particular with respect to g0. So the second and third term of (5.13) vanish. We +conclude that hT T = 0 and so ˙u0g0 = Dg0χ. +We now apply the X-ray transform Ig0 +2 on both sides of the equation ˙u0g0 = Dg0χ. Since Ig0 +2 (Dg0χ)(c) = +0 for every χ ∈ Sk+1,α +1 +(S) and for every closed orbit c of the geodesic flow of g0 (see [GKL21]), we have +0 = +1 +L(c) +� L(c) +0 +˙u0(γ(s))g(˙γ(s), ˙γ(s))ds = +1 +L(c) +� L(c) +0 +˙u0(γ(s))ds = Ig0 +0 ( ˙u0)(c), +where the orbit c is parametrized as (γ(t), ˙γ(t)) : [0, L(c)] → T 1 +g0S. Since Ig0 +0 +is injective for g0 ∈ M− (see +[DS03]), we conclude ˙u0 = 0. +In summary, (hT T , v) = (0, v) and du +�� +(σ0,q0)(hT T , v) = du +�� +(σ0,q0)(0, v) = 0. So ˙α0 = ˙˜α0, where ˜αt is of +the form ˜αt = (σ0, ˜qt), and +d +dtu +� +˜αt +��� +t=0 = 0. Differentiating Wang’s equation (5.4) along ˜αt and using that +˙u0 = 0, we find that +0 = d +dt|˜qt|2 +g0 +�� +t=0 = ˜qt∂t˜qt + ˜qt∂t˜qt +g3 +0 +�� +t=0 = |˜q0|2 +g0 +�∂t˜qt +˜qt ++ ∂t˜qt +˜qt +� �� +t=0. +Note that ˜qt are all holomorphic cubic differentials with respect to J = J(σ0), so ˜qt +˜q0 is a family of meromorphic +functions with respect to J. So the above equation implies that the meromorphic function ∂t( ˜qt +˜q0 ) +�� +t=0 on +S is purely imaginary, and therefore constant. We conclude that ∂t˜qt|t=0 = λi˜q0, λ ∈ R, which precisely +characterizes elements in the tangent space of the S1 orbit through ˜q0 = q0. Thus we have the claim. It is +immediate now that d�g0 +�� +T(σ0,q0)(SQ∗/S1) is injective. Moreover, its image splits because T(σ0,q0)(SQ∗/S1) is +finite dimensional. Thus �g0 is an immersion at (σ0, ⟨q0⟩), and thus also in a sufficiently small neighborhood +of it by definition of an immersion, with its image being a submanifold of Mk,α +− +which consists of smooth +Blaschke metrics. +For the last statement, recall that TgOk+1,α +g +consists exactly of potential symmetric 2-tensors. So +(5.14) +Tg0V ∩ Tg0Ok+1,α +g0 += {0}, + +24 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +by the first statement of the lemma. This implies that the same holds for a sufficiently small neighborhood +of g0. To see this, consider a smooth nonvanishing section Y (g) of T V ⊂ T Mk,α +− += Sk,α +2 +(S). Then by +(5.14) we have ∥πkerD∗g0 Y (g0)∥Ck,α > 0, where πkerD∗g denotes the orthogonal projection with respect to the +decomposition (4.3). This is because the potential tensor fields are precisely those which are annihilated +by πkerD∗g0 . The operator πkerD∗g is a bounded operator on Sk,α +2 +(S) as a pseudodifferential operator of order +0, and it depends continuously on the metric g in a C∞ neighborhood of g0 (see for example the proof of +[GKL21, Lemma 2.2]). Therefore, ∥πkerD∗g Y (g)∥Ck,α is nonzero for g in a neighborhood of g0, which implies +TgV ∩ TgOk+1,α +g += {0} near g0. +□ +Recall that our final goal is to construct smooth charts for the Blaschke locus MB/D0 away from T (S). +In Lemma 5.15 we constructed slices V in MB ⊂ Mk,α +− . In the following lemma, we show that if V are taken +sufficiently small, then they locally parametrize MB/D0. +Lemma 5.16. If the slice V in Lemma 5.15 is taken to be sufficiently small, then each point of V corresponds +to exactly one orbit of D0. +Proof. Let gi = eu(σi,⟨qi⟩))σi ∈ V, i = 1, 2, be two metrics in the same D0 orbit, that is, g2 = ψ∗g1 for some +ψ ∈ D0. From eu(σ2,⟨q2⟩)σ2 = ψ∗(eu(σ1,⟨q1⟩)σ1), it follows that both σ2 and ψ∗σ1 are hyperbolic metrics in +the same conformal class, so it must be the case that σ2 = ψ∗σ1. Since σ1, σ2 ∈ S and both are in the +same D0 orbit, we conclude that σ1 = σ2 by Theorem 5.9. So ψ = id by freeness of the D0 action. Thus +g1 = g2. +□ +We now state our main theorem in this section. +Theorem 5.17. Away from the Teichm¨uller space T (S) = M−1/D0, the Blaschke locus MB/D0 has +the structure of a smooth manifold of real dimension 16풢 − 17. +Moreover, the map g0 : Q∗ +3(S)/S1 → +(MB/D0) \ T (S) is a diffeomorphism. +Proof. At this point, for each metric g0 ∈ MB we have constructed a local slice V containing it and +consisting of smooth Blaschke metrics. A slice corresponding to g0 is constructed as the image under �g0 of +a neighborhood U ⊂ SQ∗/S1 of �g−1 +0 (g0), and via a trivialization of SQ∗ we have U ∼= S × R10풢−11. We have +also shown that if V is sufficiently small, it is in bijective correspondence with the D0 orbits passing through +it. So V parametrizes MB/D0 near [g0]. To show that the slices V together with the corresponding maps +�g−1 +0 +: V → U define smooth charts, we have to show that they are smoothly compatible. +Write πB : MB → MB/D0 for the natural projection with respect to the D0 quotient. Note that this +map is a bijection onto its image when restricting to each slice V. So we can set +FV : πB(V) → U ∼= S × R10풢−11, +[g] �→ �g−1 +0 (g), +where g is the unique element in V with g ∈ [g]. We want to show that if V = �g0(U) and V′ = �g0(U′) are +different slices whose images πB(V), πB(V′) have nonempty overlap, then the change of charts FV′ ◦ F−1 +V +: +U → U′ is smooth where it is defined. Here U′ ⊂ (S′)Q∗/S1 is a chart over a different slice S′. To this end, +write +FV′ ◦ F−1 +V (σ, ⟨q⟩) = FV′([eu(σ,⟨q⟩)σ]). +Now because [g] = [eu(σ,⟨q⟩)σ] ∈ πB(V) ∩ πB(V′), there exists a unique element eu(σ′,⟨q′⟩)σ′ ∈ V′ such that +[eu(σ′,⟨q′⟩)σ′] = [eu(σ,⟨q⟩)σ]. Therefore, there exists an element ψ = ψ(V, V′, [g]) ∈ D0 such that eu(σ′,⟨q′⟩)σ′ = +ψ∗(eu(σ,⟨q⟩)σ). So we have +(σ′, ⟨q′⟩) = FV′ ◦ F−1 +V (σ, ⟨q⟩) = �g−1 +0 +� +eu(σ′,⟨q′⟩)σ′� += �g−1 +0 +� +ψ∗(eu(σ,⟨q⟩)σ) +� +∈ U′. +In other words, (σ′, ⟨q′⟩) is the unique element in U′ such that +eu(σ′,⟨q′⟩)σ′ = ψ∗(eu(σ,⟨q⟩)σ) = eψ∗(u(σ,⟨q⟩))ψ∗σ. +Now σ′ and ψ∗σ are both hyperbolic metrics in the same conformal class. Therefore σ′ = ψ∗σ. So by the +freeness of the D0 action on M−1 we see that ψ = ψσ is unique and is determined only by the pair σ and +σ′. In other words, it does not depend on ⟨q⟩. This implies that +u(σ′, ⟨q′⟩) = ψ∗ +σ +� +u(σ, ⟨q⟩) +� +=⇒ u(σ′, ⟨q′⟩) = u(ψ∗ +σ(σ, ⟨q)⟩) = u(σ′, ψ∗ +σ⟨q⟩) =⇒ ⟨q′⟩ = ψ∗ +σ⟨q⟩ + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +25 +by injectivity of the map ⟨q⟩ �→ u(σ, ⟨q⟩) for each σ. Therefore by (5.10), +(σ′, ⟨q′⟩) = FV′ ◦ F−1 +V (σ, ⟨q⟩) = ψ∗ +σ(σ, ⟨q⟩) = (ψ∗ +σσ, ⟨ψ∗ +σq⟩) = ⟨˜ΨS,S′(σ, q)⟩, +Hence FV′ ◦ F−1 +V +is smooth. +The second statement is a consequence of Lemmas 5.12 and 5.15 by taking U ⊂ SQ∗/S1 as a chart for +Q∗ +3(S)/S1 near [(σ0, ⟨q0⟩)] and V = �g0(U) as a chart for MB/D0 near [g0] = [eu0σ0] = g0([(σ0, ⟨q0⟩)]). Then +since �g0 is an immersion at (σ0, ⟨q0⟩), it is a diffeomorphism onto its image upon shrinking U if necessary. +Thus g0 : Q∗ +3(S)/S1 → (MB/D0) \ T (S) is a local diffeomorphism. Because it is bijective (Proposition 5.8), +it is in fact a global diffeormorphism from Q∗ +3(S)/S1 to (MB/D0) \ T (S). +□ +Corollary 5.18. The quadratic form Gg(·, ·) defined in Section 4 defines a C∞ Riemannian metric on +(MB/D0) \ T (S). +Proof. We saw in Proposition 4.10 that G[g](·, ·) defines a Riemannian metric on M−/D0, so in particular +on the Blaschke locus. Since the slices V we constructed are smooth charts for MB/D0 and they are also +finite dimensional smooth submanifolds of Mk,α +− , we conclude by Proposition 4.7 that Gg restricts to a +Ck−3 quadratic form on each slice. Thus it is a Ck−3 metric on MB/D0 away from T (S). Notice however +that since by Theorem 5.17 the map g0 : Q∗ +3(S)/S1 → (MB/D0) \ T (S) is a diffeomorphism regardless of +the space Mk,α +− +of which MB was viewed as a subset, we see that we can choose the k arbitrarily large, +concluding that the metric Gg(·, ·) on MB/D0 is smooth away from T (S). +□ +5.4. Topology of the Blaschke locus. The results of the previous section allow us to elaborate on the +topological structure of the Blaschke locus. +Proposition 5.19. The quotient space Q3(S)/S1 is homeomorphic to MB/D0, when the two spaces are +endowed with quotient topologies resulting from C∞ topologies. +Proof. The map g0 : Q3(S)/S1 → MB/D0 is bijective by Proposition 5.8, and we will first show that it +is continuous. Each slice SQ parametrizing Q3(S) carries the smooth structure (and topological structure) +of Q3(S), see Remark 2.11, and we showed in Lemma 5.12 that the map �g : SQ → Mk,α +− +is smooth, so in +particular continuous (note that the smoothness also works at the zero section). This is true for any k, α, +so �g : SQ → M− is continuous. Therefore, writing g locally as +g = πB ◦ �g ◦ π−1 +SQ : πSQ(SQ) ⊂ Q3(S) → MB/D0 ⊂ M−/D0 +(see (5.9)), we see that it is continuous. Since g is constant on the orbits of the S1 action on Q3(S), the +descended map g0 : Q3(S)/S1 → MB/D0 is continuous. +We then show that g−1 +0 +: MB/D0 → Q3(S)/S1 is continuous. Suppose that [gj] +j→∞ +→ +[g] ∈ MB/D0 +with the quotient topology of M−/D0. Then we can consider lifts gj = eujσj of [gj] to a slice W ⊂ M− +about a lift g = euσ ∈ M− of [g] as in Section 4.4, which converge to g in C∞. Here σj, σ ∈ M−1. Then +we have that σj = λ(gj) +j→∞ +→ λ(g) = σ in C∞, where λ is the Poincar´e map. Now fix a large integer k, and +α ∈ (0, 1). The σj do not necessarily lie in a slice S ⊂ Mk,α +−1 through σ as in Theorem 5.9, but for such a +slice there exist diffeomorphisms ψσj ∈ D0 such that5 ψ∗ +σjσj ∈ S. Moreover, ψσj depend continuously on σj +in the Ck+1,α topology. So since σj → σ ∈ S, it follows that ψσj → id in Ck+1,α. Therefore, ψ∗ +σjgj → g in +Ck,α, and we have λ(ψ∗ +σjgj) = ψ∗ +σjλ(gj) ∈ S and +g−1 +0 ([gj]) = [�g−1 +0 (gj)] = [ψ∗ +σj �g−1 +0 (gj)] = [�g−1 +0 (ψ∗ +σjgj)]. +Thus we may replace our assumption that gj → g in C∞ with the assumption gj → g in Ck,α, where +σj = λ(gj) ∈ S converge to σ = λ(σ) in Ck,α, and we want to show that [�g−1 +0 (gj)] → [�g−1 +0 (g)] =: [(σ, ⟨q⟩)]. +As already mentioned in Remark 5.10, S ∋ σj → σ in Ck,α actually implies that σj → σ in C∞. +So now we would like to show that ⟨qj⟩ → ⟨q⟩ in SQ/S1. Notice that by Wang’s equation (5.4), for any +qj, q such that gj = �g(σj, qj), g = �g(σ, q), one has |qj|2 +gj → |q|2 +g in Ck−2,α and therefore in particular in +5A priori, ψσj are only Ck+1,α, but because σj are all smooth and the slice S consists of smooth metrics, they are actually +smooth, see the proof of [Tro92, Theorem 2.3.1]. + +26 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +C0. Moreover, since gj = eujσj → g = euσ and σj → σ in C0 we conclude that uj → u in C0. Therefore, +|qj|2 +σj = e3uj|qj|2 +gj → |q|2 +σ = e3u|q|2 +g in C0. In particular, +� +S |qj|2 +σjdvσj → +� +S |q|2 +σdvσ. Now +(5.15) +(q, q′) �→ +� +S +qq′ +σ3 dvσ +is a continuous Hermitian inner product on the fibers of SQ, so we can choose a local orthonormal frame +{ˆqℓ(σ)}5풢−5 +ℓ=1 +with respect to it and write qj = � +ℓ bℓ +j ˆqℓ(σj), q = � +ℓ bℓˆqℓ(σ) for bℓ, bℓ +j ∈ C. Then +� +ℓ +|bℓ +j|2 = +� +S +|qj|2 +σjdvσj +j→∞ +→ +� +S +|q|2 +σdvσ = +� +ℓ +|bℓ|2. +In particular, the sequence bj = (b1 +j, . . . , b5풢−5 +j +) ∈ C5풢−5 is bounded, and for any limit point ˜b ∈ C5풢−5 of it, +the cubic differential ˜q(σ) = � +ℓ ˜bℓˆqℓ(σ) is holomorphic with respect to the conformal structure determined +by σ and satisfies |˜q|2 +σ = |q|2 +σ. If q ≡ 0, then we have ˜b = 0, and thus qj → q. If q ̸≡ 0, then the ratio +˜q/q defines a meromorphic function on (S, J(σ)), and since |˜q/q|2 = |˜q|2 +σ/|q|2 +σ = 1, it has values in S1. This +implies that it is constant, and therefore ˜q = e2πiθq, θ ∈ [0, 1). We conclude that ⟨qj⟩ → ⟨q⟩ in SQ in the +S1 quotient topology originating from C0, which is equivalent to the one originating from C∞. Therefore, +[(σj, ⟨qj⟩)] converges to [(σ, ⟨q⟩)] in Q3(S)/S1. +□ +Using Proposition 5.19, we now have: +Theorem 5.20. MB/D0 is a 16풢 − 17 dimensional connected contractible space. +Proof. Each fiber of Q3(S)/S1 is isomorphic to Cn/S1, where n = 5풢 − 5, by the Riemann-Roch Theorem. +Taking away 0 from Cn, we have the following homeomorphism (actually diffeomorphism), +(Cn \ {0})/S1 −→ (0, ∞) × CP n−1, +� +(z1, · · · , zn) +� +�−→ ( +��(z1, · · · , zn) +��, +� +z1, · · · , zn +� +). +Here +� +· +� +denotes the equivalence class for the S1 action that identifies (z1, z2, · · · , zn) with e2πiθ(z1, z2, · · · , zn) +for any θ ∈ [0, 1) and +� +· +� +denotes the equivalence class for projective lines in Cn. +Therefore Cn/S1 is homeomorphic to the cone given by +� +[0, ∞) × CP n−1� +/ ∼. The relation “ ∼ ” glues +{0} × CP n−1 to a single point and is trivial otherwise. A deformation retraction of +� +[0, ∞) × CP n−1� +/ ∼ to +a point is given by ft({(r, x)}) = {((1 − t)r, x)} ∈ +� +[0, ∞) × CP n−1� +/ ∼. Here r ∈ [0, ∞), x ∈ CP n−1 and +{(r, x)} denotes the equivalence class of (r, x) in +� +[0, ∞) × CP n−1� +/ ∼. Since MB/D0 is homeomorphic to +Q3(S)/S1 and Q3(S) is a trivial vector bundle over the contractible space T (S), we conclude that MB/D0 +is homeomorphic to the product space of T (S) and ([0, ∞) × CP n−1)/ ∼. The result follows. +□ +We conclude with the relation between the Blaschke locus MB/D0 and the Hitchin component H3(S). +The following corollary is an immediate consequence of Theorem 2.10 and Proposition 5.19. +Corollary 5.21. The S1 action on Q3(S) induces a S1 action on H3(S) by the Hitchin map H : Q3(S) → +H3(S). Denote the quotient space by H3(S)/S1 and the descending map by H0 : Q3(S)/S1 → H3(S)/S1. +Then the composition +Φ := g0 ◦ H−1 +0 +: H3(S)/S1 → MB/D0 +is a mapping class group equivariant homeomorphism, where the mapping class group actions on H3(S)/S1 +(as outer automorphism group action) and on MB/D0 are the left actions introduced in Section 3. +6. Geodesics in MB/D0 +We will study some families of geodesics with respect to the covariance metric in the Blaschke MB/D0. +In Section 6.1, we identify some geodesics in MB/D0 leaving all compacts sets, using the Hitchin orbifold +representations introduced in Section 2.3, and we estimate their lengths with respect to covariance metric +in Subsection 6.2. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +27 +6.1. Geodesics in the locus MB/D0. Throughout this section, we fix a presentation Y ≃ [S/Σ] of +an orbifold Y . +Moreover, we assume that Y = YJ descends from a Riemann surface XJ = (S, J) so +that Y ≃ [XJ/Σ]. In [ALS22], the orbifolds of negative Euler characteristic with 1-dimensional Hitchin +components are classified. These are non-orientable orbifolds. In particular, for Hit(π1Y, PGL(3, R)), one +has +Proposition 6.1 ([ALS22, Theorem 6.5]). Let Y be a non-orientable orbifold of negative Euler characteristic. +Then we have dim Hit(π1Y, PGL(3, R)) = 1 if and only if the orientable double cover Y + of Y satisfies one +of the following: +(1) Y + is a sphere with 4 cone points of respective orders m1 = m2 = m3 = 2 and m4 ≥ 4. +(2) Y + is a sphere with 3 cone points of respective orders m1 ≥ 3, m2 ≥ 3 and m3 ≥ 4. +By Theorem 3.1, the space Hit(π1Y, PGL(3, R)) is homeomorphic to the one dimensional space H3(Y ) := +FixΣH3(S). Among the examples of orbifolds Y ≃ [XJ/Σ] given in Proposition 6.1, there are examples of +H3(Y ) ⊂ H3(S) which are parametrized by a single holomorphic cubic differential. These are +Proposition 6.2 ([ALS22, Theorem 5.5, Theorem 6.6]). Suppose dim H3(Y )=1 and H3(Y ) is parametrized +by a single non-vanishing cubic differential, then Y + must be a sphere with 3 cone points of respective orders +m1 ≥ 3, m2 ≥ 3 and m3 ≥ 4. +Remark 6.3. The Teichm¨uller space T (Y +) for the orbifolds Y + in Proposition 6.2 (spheres with 3 cone +points) is of dimension 0 (see [Thu, Corollary 13.3.7]). Therefore Y +, which is the orientable double cover +of Y , has a unique complex structure and Y also inherits a unique “complex structure”, presented as Y = +YJ ≃ [XJ/Σ] (see Remark 2.13). +From now on, we restrict our interest to orbifolds Y = YJ for which H3(Y ) is one dimensional and is +parametrized by a single non-vanishing holomorphic cubic differential. Recall that elements in Σ act on XJ +as holomorphic or anti-holomorphic maps and Y ≃ [XJ/Σ]. For Y arising from Proposition 6.2, the vector +space FixΣH0(XJ, K2 +J) is trivial. So in these cases, we have a homeomorphism FixΣH0(XJ, K3 +J) +HJ +≃ H3(Y ) +given by the Hitchin parametrization (recall Proposition 3.2). Because H3(Y ) is a real one dimensional +subspace of H3(S), the vector space FixΣH0(XJ, K3 +J) = {q ∈ H0(XJ, K3 +J) | ψA · q = q, ∀ψ ∈ Σ} is also real +one-dimensional. It is formed by the real span of a single holomorphic cubic differential q. +To further consider the counterpart of H3(Y ) in MB/D0, we need to discuss the S1 action on H3(Y ) +and FixΣH0(XJ, K3 +J) ⊂ +3� +i=2 +H0(XJ, Ki +J) (recall Section 5.2). We first need the following lemma which allows +us to identify the Hitchin parametrization HJ and the Hitchin map H on some special fibers: +Lemma 6.4. For any complex structure J, when restricting to H0(XJ, K3 +J), the composition of the inverse +of the Hitchin map H−1 and the Hitchin parametrization HJ +H−1 ◦ HJ : +3 +� +i=2 +H0(XJ, Ki +J) → H3(S) → Q3(S) +satisfies +H−1 ◦ HJ|H0(XJ,K3 +J) = Id|H0(XJ ,K3 +J), +where H0(XJ, K3 +J) is identified with H0(X[J], K3 +[J]). +Proof. The Hitchin map H : Q3(S) → H3(S) is a homeomorphism and H([(J, q)]) = HJ(0, q) for any +representative (J, q) in [(J, q)] ∈ Q3(S). Equivalently, one has that H−1 ◦HJ(0, q) = [(J, q)] ∈ H0(X[J], K3 +[J]) +is the identity map. +□ +Regarding to the S1 action on H3(Y ) with Y = YJ arising from Proposition 6.2, we have +Lemma 6.5. The S1 action on H3(S) induces a two-to-one identification on H3(Y ) except at HJ(0). The +quotient of H3(Y ) by the Z2 action induced from the S1 action, denoted by H3(Y )/Z2, is homeomorphic to +R+ = [0, ∞). + +28 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +Proof. The Hitchin parametrization HJ is Σ-equivariant and is a homeomorphism between FixΣH0(XJ, K3 +J) +and H3(Y ) by Proposition 3.2. After identifying FixΣH0(XJ, K3 +J) with FixΣH0(X[J], K3 +[J]) and HJ with +H by the previous lemma, the S1 action on Q3(S) induces a Z2 action on FixΣH0(XJ, K3 +J) = spanR(q) ⊂ +3� +i=2 +H0(XJ, Ki +J). Moreover, this Z2 action identifies tq with −tq for any t ∈ R/{0}. The identification is +trivial when t = 0. We obtain that the quotient H3(Y )/Z2 is homeomorphic to the half line R+ = [0, ∞). +□ +With what we have obtained, we are able to show the following lemma. It suggests that the half line +given by H3(Y )/Z2 provides a (unparametrized) geodesic in MB/D0 via the map Φ : H3(S)/S1 → MB/D0 +defined in Corollary 5.21. +Lemma 6.6. The set Φ(H3(Y )/Z2) ⊂ MB/D0 is a fixed point set of the group action of Σ, where Σ ≤ D +is identified with a finite subgroup of Mod±(S). +Proof. If ψ ∈ Σ is orientation-preserving, then the fact that every point in Φ(H3(Y )/Z2) is fixed by [ψ] follows +from Corollary 5.21 and the definition of H3(Y ). Otherwise, if ψ ∈ Σ is orientation-reversing, then it is an +anti-holomorphic map with respect to XJ. We have ψ∗q ∈ H0(X−J, K3 +−J) for q ∈ H0(XJ, K3 +J). Notice that +Φ(H3(Y )/Z2) = g0◦H−1 +0 +� +H3(Y )/Z2 +� += g0 +� +FixΣH0(XJ, K3 +J)/Z2 +� +by Lemma 6.4. For q ∈ FixΣH0(XJ, K3 +J), +the fact that ψA · q = q implies, by the discussion in Subsection 3.3, +ψ∗q = κ−1 +ψ ◦ q ◦ ψ = τψ−1 ◦ q ◦ ψ = (ψA)−1 · q = q. +Together with the observation that the solution of equation (5.4) is invariant under the complex conjugation +z → z and q → q, we obtain [ψ]∗g0([(J, ⟨q⟩)]) = g0([(−J, ⟨q⟩)]) = g0([(J, ⟨q⟩)]). Here we made use of Remark +5.7. So [ψ]·g0([(J, ⟨q⟩)]) = [ψ−1]∗g0([(J, ⟨q⟩)]) = g0([(J, ⟨q⟩)]) and g0([(J, ⟨q⟩)]) is a fixed point of the induced +left action of Σ. +□ +We further have +Theorem 6.7. Let Y be a non-orientable orbifold of negative Euler characteristic with orientation double +cover Y + given by the cases in Proposition 6.2. Then H3(Y )/Z2 embeds as a (unparametrized) geodesic in +MB/D0 with respect to the covariance metric G(·, ·). +Proof. By Proposition 6.2 and Lemma 6.5, the set Φ(H3(Y )/Z2) is homeomorphic to a half line R+ in +MB/D0. By Lemma 6.6, the set Φ(H3(Y )/Z2) is pointwise fixed by the action of the group Σ ≤ Out(π1S) ∼= +Mod±(S). Because Mod±(S) is a subgroup of isometries of the covariance metric G(·, ·) on MB/D0 and +a one dimensional connected subset pointwise fixed by a subgroup of isometries must be a geodesic (see +[Kob95, Theorem 5.1]), we conclude that H3(Y )/Z2 embeds as a (unparametrized) geodesic in MB/D0. +□ +6.2. Infinite length geodesics. In this subsection, we estimate lengths of certain families of curves in the +Blaschke locus MB/D0 with respect to the covariance metric; some of them are geodesics, as mentioned +in the last part of Section 6.1. +Specifically, fix a complex structure J on S and let σ ∈ M−1 be the +corresponding hyperbolic metric. Let q be a holomorphic cubic differential with respect to J and consider +the curve {gt = eutσ : t ≥ 0} ⊂ MB, where, as in (5.11), for each t ≥ 0 the logarithmic density ut satisfies +(6.1) +∆σut = 2eut − 4te−2ut |q|2 +σ3 − 2. +With gt = eutσ, (6.1) is equivalent to Wang’s equation (5.4) given by Kgt = −1 + 2| +√ +t q|2 +gt. Our goal is to +estimate the pressure length of the curve {[gt]}t≥0 ⊂ MB/D0. We start with some preliminaries. +6.2.1. Some Estimates of Blaschke metrics. The following Lemma benefits from communication with Michael +Wolf. +Lemma 6.8. The logarithmic density ut of the Baschke metric gt is monotone non-decreasing with respect +to the parameter t when t ≥ 0. Moreover, for a fixed t ≥ 0, if ˙ut(p) = 0 for some p ∈ S, then p must be a +zero of the holomorphic cubic differential q. + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +29 +Proof. Take a time derivative of (6.1). We find that +(6.2) +∆σ ˙ut = 2 +� +eut + 4e−2ut t|q|2 +σ3 +� +˙ut − 4e−2ut |q|2 +σ3 . +We first prove that ˙ut ≥ 0. Suppose that this is not the case and ˙ut(p) < 0 for some p on S. By elliptic +regularity, equation (6.2) implies that ˙ut ∈ C∞(S). Then the right hand side of equation (6.2) is strictly +negative at the minimum ˙ut(p), and the minimum principle yields a contradiction. For the second statement, +if ˙ut(p) = 0 and |q(p)|2 +σ > 0, then again the right hand side of equation (6.2) is strictly negative at p, which +contradicts the minimum principle. +□ +We will need the following result, due to Loftin: +Proposition 6.9 ([Lof01, Proposition 4.02]). If ut satisfies equation (6.1) with respect to the hyperbolic +metric σ and the holomorphic cubic differential q for t ≥ 0, then +0 ≤ ut ≤ log +� +R +� +max +S +�t|q|2 +σ3 +��� +, +where R(a) is the largest positive root of the polynomial pa(x) = 2x3 − 2x2 − 4a. +Lemma 6.10. The polynomial pa(x) = 2x3 − 2x2 − 4a has a unique positive root provided a ≥ 0, and if we +set xt as the positive root of x3 − x2 − 2 max +S +� +t|q|2 +σ3 +� +, we have +lim +t→∞ +xt +t1/3 = +� +2 max +S +�|q|2 +σ3 +��1/3 +. +Proof. The fact that the polynomial pa(x) has a unique positive root for a ≥ 0 is clear if a = 0. If a > 0, +we know that a real root exists and any real root xa satisfies x2 +a(xa − 1) = 2a. Thus a real root xa satisfies +xa > 1. Taking the derivative, we find that p′ +a(xa) > 0. Therefore there cannot be more than one positive +real root, because between any two roots for which p′ +a > 0 there has to be at least one more root and pa has +at most three real roots in total. Write b = 2 max +S +�|q|2 +σ3 +� +> 0; we look for x > 0 satisfying x3 − x2 − bt = 0, +for t > 0 large. Set z = x/t1/3 and s = t−1/3. Notice that (x, t) �→ (z, s) is a bijection on (0, ∞) × (0, ∞), so +x3 − x2 − bt = 0 with x, t > 0 exactly when +F(z, s) := z3 − z2s − b = 0, +z, s > 0. +The function F satisfies F(b1/3, 0) = 0 and is smooth near (z, s) = (b1/3, 0). Since ∂zF(b1/3, 0) = 3b2/3, by +the implicit function theorem we conclude that in a neighborhood of (b1/3, 0), the equation F(z, s) = 0 holds +if and only if z = f(s) for a smooth function f defined in a neighborhood of s = 0. Denoting by xt the +positive solution of x3 − x2 − bt = 0, +lim +t→∞ +xt +t1/3 = lim +t→∞ f(t−1/3) = lim +s→0 f(s) = b1/3. +□ +Loftin proves the following result regarding the asymptotic behavior of the Blaschke metrics gt when +t → ∞ (see also [Tho17, Theorem 3.8]). +Theorem 6.11 ([Lof07, Proposition 1]). The family of Blaschke metrics gt given by equation (6.1) degener- +ates to the singular flat metric |q| +2 +3 associated to the cubic differential q (up to some scaling) in the following +sense: when t → ∞, we have +t− 1 +3 gt → 2 +1 +3 |q| +2 +3 , +uniformly on every compact subset of the complement of the zeros of q in S. + +30 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +6.2.2. Length estimates. The following proposition shows that any curve in the space MB/D0 corresponding +to a ray in a fixed fiber of the bundle Q3(S) has infinite length with respect to the covariance metric. +Theorem 6.12. Let σ be a hyperbolic metric on S and q be a nonzero cubic differential which is holomorphic +with respect to the complex structure determined by σ and an orientation. Then the projection {[gt]}t≥0 ⊂ +MB/D0 of the curve gt = {eutσ}t≥0 ⊂ MB, where ut satisfies equation (6.1), has infinite length with respect +to the covariance metric. +Proof. By Lemma 4.9, for given class [g] ∈ M−/D0, the norm of an element ˆh ∈ T[g](M−/D0) with +respect to the covariance metric is given by Gg(h, h)1/2, where g is a representative in [g], h ∈ TgM− +is a lift of ˆh, and Gg(·, ·) is the bilinear form defined in Definition 4.4. Thus the length of the segment +γT := {[gt] : t ∈ [0, T ]} ⊂ MB/D0 is given by +L(γT ) = +� T +0 +� +Ggt +� +∂t(gt), ∂t(gt) +� +dt. +We will show that +lim +T →∞ L(γT ) = ∞. +To simplify notation, we denote ht := ∂t(gt). We have, according to Definition 4.4, +Ggt(ht, ht) = ⟨Πgt +2 ht, ht⟩L2(T 1Sgt) = ⟨Πgtπ∗ +2ht, π∗ +2ht⟩ + |⟨1, π∗ +2ht⟩L2(T 1Sgt)|2 +Note that ht = ˙utgt. Since π∗ +2ht(v) = π∗ +2( ˙utgt)(v) = π∗ +0( ˙ut)(v) for v ∈ T 1Sgt, we have6 +Ggt(ht, ht) =⟨Πgtπ∗ +0 ˙ut, π∗ +0 ˙ut⟩ + |⟨1, π∗ +0 ˙ut⟩L2(T 1Sgt)|2 +≥ |⟨1, π∗ +0 ˙ut⟩L2(T 1Sgt)|2 = +|⟨1, ˙ut⟩L2(S,dvgt)|2 +Area(S, gt)2 +, +where the inequality follows by Theorem 4.2. Note that above we wrote ⟨·, ·⟩L2(S,dvgt) = Area(S, gt)⟨·, ·⟩L2gt(S). +We now examine ˙ut in more detail. Since our manifold is two dimensional, we have ∆σ = eut∆gt, thus +from (6.2) it follows that +(6.3) +∆gt ˙ut = +� +2 + 8t|q|2 +g3 +t +� +˙ut − 4|q|2 +g3 +t +. +Now integrate (6.3) over S with respect to the gt area form: by the divergence theorem, +� +S ∆gt ˙utdvgt = 0 +and therefore +�� +2 + 8t|q|2 +g3 +t +� +˙ut, 1 +� +L2(S,dvgt) += 4 +�|q|2 +g3 +t +, 1 +� +L2(S,dvgt) +. +The curvature of gt is given by Kgt = 2t |q|2 +g3 +t − 1 (recall equation (5.4)), therefore +⟨(6 + 4Kgt) ˙ut, 1⟩L2(S,dvgt) = 4 +�|q|2 +g3 +t +, 1 +� +L2(S,dvgt) +. +Using the fact that ˙ut ≥ 0 (by Lemma 6.8) and that Kgt < 0 (by Proposition 5.5), we find +(6.4) +⟨ ˙ut, 1⟩L2(S,dvgt) ≥ ⟨(1 + 2 +3Kgt) ˙ut, 1⟩L2(S,dvgt) = 2 +3 +�|q|2 +g3 +t +, 1 +� +L2(S,dvgt) +. +We now seek for a lower bound for the right hand side. Since dvgt = eutdvσ, we have +�|q|2 +g3 +t +, 1 +� +L2(S,dvgt) += +� +S +e−2ut |q|2 +σ3 dvσ ≥ 1 +x2 +t +� +S +|q|2 +σ3 dvσ; +6Recall that the Liouville measure is of total mass 1, so locally dµL +g = +dθdvg +2πArea(S,g) . + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +31 +the inequality is by Proposition 6.9, where xt is the positive root of the polynomial x3 − x2 − 2 max +S +� +t|q|2 +σ3 +� +. +Thus by Lemma 6.10, there exists a positive constant Cq,σ and T0 > 0 depending on Cq,σ such that for +t ≥ T0 one has +�|q|2 +g3 +t +, 1 +� +L2(S,dvgt) +≥ Cq,σt−2/3. +On the other hand, we have Area(S, gt) ≤ Dqt +1 +3 + 2π|χ(S)| (see [OT21, Lemma 3.4]) where Dq is +a positive constant depending only on q and χ(S) is the Euler characteristic of S. Combining this with +equation (6.2.2) and equation (6.4), and adjusting T0 if necessary, we can find a positive constant C′ +q,σ so +that for t ≫ T0, +� +Ggt(ht, ht) ≥ C′ +q,σt−1. +Hence we obtain, for T ≥ T0, +L(γT ) ≥ L(γT0) + C′ +q,σ +� T +T0 +t−1dt +T →∞ +→ +∞. +□ +Corollary 6.13. The geodesics H3(Y ) given in Theorem 6.7 have infinite length with respect to the covari- +ance metric. +Appendix A. Some further estimates for the covariance metric in MB/D0 +We collect in this appendix some estimates for the covariance metric in the Blaschke locus MB/D0. +One first interesting question is to characterize this covariance metric G(·, ·) at the Fuchsian locus T (S) ⊂ +MB/D0. Given [σ] ∈ T (S), we know that this metric restricts to a scalar of the Weil-Petersson metric on +T[σ]T (S); However, the behavior of the covariance metric G(·, ·) at [σ] on directions that are transverse to +Fuchsian locus T (S) in MB/D0 remains unclear. +Our first estimate is along directions tangential to the family of equivalence classes of Blaschke metrics +{[gt]}t≥0 ⊂ MB/D0 that lifts to the curve given by {gt = eutσ : t ≥ 0} ⊂ MB described by equation (6.1), +so that σ is a representative in the class [σ]. These represent vectors tangential to fiber directions of the +bundle Q3(S)/S1. +Proposition A.1. Let σ be a hyperbolic metric on S. Fix a holomorphic cubic differential q with respect +to the complex structure corresponding to σ. +Suppose �h0 ∈ T[g0]M−/D0 is a vector that lifts to h0 := +∂t(gt)|t=0 ∈ TσM−, where {gt}t≥0 are solutions of equation (6.1) with g0 = σ. Then +G[σ] +��h0,�h0 +� +≥ +1 +π2|χ(S)|2 ∥q∥4 +σ. +where ∥q∥σ is the L2 norm of q with respect to inner product (5.15) and χ(S) is the Euler characteristic. +Proof. By Lemma 4.9, the computation can be lifted to MB, and we just need to estimate Gσ(h0, h0). Recall +that +Gσ(h0, h0) = Var(Pσ(π∗ +2h0), µL +σ) + ⟨π∗ +2h0, 1⟩2 +L2(T 1Sσ). +The first part, which equals ⟨Πσπ∗ +2h0, π∗ +2h0⟩, is nonnegative (Theorem 4.2). We estimate the second part. +Note gt = eutσ and h0 = ˙u0σ. From equation 6.3, we have +(∆σ − 2) ˙u0 = −4|q|2 +σ, +so +⟨π∗ +2h0, 1⟩L2(T 1Sσ) = +� +T 1Sσ +π∗ +0 +� +− 4(∆σ − 2)−1� +|q|2 +σ +�� +π∗ +2σdµL +σ = +� +T 1Sσ +π∗ +0 +� +− 4(∆σ − 2)−1� +|q|2 +σ +�� +dµL +σ +Since −(∆σ − 2)−1 is a self-adjoint positive operator and −(∆σ − 2)−1(1) = 1 +2, we obtain +⟨π∗ +2h0, 1⟩L2(T 1Sσ) = +1 +Area(S, σ) +� +S +4|q|2 +σ +� +− (∆σ − 2)−1(1) +� +dvσ = +1 +π|χ(S)| +� +S +|q|2 +σdvσ = +1 +π|χ(S)|∥q∥2 +σ, +using the Gauß-Bonnet theorem. This gives the conclusion. +□ + +32 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +The inequality can be strengthened to strict inequality because of the following two lemmas. +Lemma A.2. Suppose g ∈ M− and h ∈ S2(S) is conformal to g, then +⟨Πgπ∗ +2h, π∗ +2h⟩ = 0 +if and only if h = Cg, where C is a constant. +Proof. Let’s assume h = fg, with f ∈ C∞(S). If suffices to show that +⟨Πgπ∗ +0f, π∗ +0f⟩ = 0 +is equivalent to f being a constant function. The proof for this is similar to the proof for [GL21, Lemma +4.6]. Let Λ = (1 − ∆G)1/2, where ∆G is the (negative) Laplace-Beltrami operator with respect to the Sasaki +metric on T 1Sg; then for any m, s ∈ R, Λs : Hm(T 1Sg) → Hm−s(T 1Sg) is an invertible bounded self-adjoint +operator. So by Theorem 4.2, the composition Λ−2sΠg : Hs(T 1Sg) → Hs(T 1Sg) is bounded for s > 0. +Moreover, we know from equation (4.1) and Theorem 4.2, +⟨Λ−2sΠgπ∗ +0f ′, π∗ +0f ′⟩Hs(T 1Sg) = ⟨Πgπ∗ +0f ′, π∗ +0f ′⟩L2(T 1Sg) ≥ 0 +for all f ′ ∈ Hs(S), +so Λ−2sΠg is also positive on Hs(T 1Sg). It follows that Λ−2sΠg is self-adjoint on Hs(T 1Sg), and as such +it has a self-adjoint square root R which is bounded on Hs(T 1Sg), with the property Λ2sΠg = R2 = R∗R. +Thus, +0 = ⟨Πgπ∗ +0f, π∗ +0f⟩L2(T 1Sg) = ⟨Λ−2sΠgπ∗ +0f, π∗ +0f⟩Hs(T 1Sg) = ∥Rπ∗ +0f∥2 +Hs(T 1Sg) +Thus our hypothesis implies that Πgπ∗ +0f = Πg(Pg(π∗ +0f)) = 0 (recall that Πg1 = 0 and Pg(π∗ +0f) = π∗ +0f − +⟨π∗ +0f, 1⟩L2(T 1Sg)). Then by Theorem 4.2, there exists w ∈ Hs(T 1Sg) such that Xgw = Pg(π∗ +0f), where Xg +is the geodesic vector field on T 1Sg. Therefore, for every closed orbit c of the flow of Xg, parametrized as +φ·(z) : [0, L(c)] → T 1Sg, +0 = +1 +L(c) +� L(c) +0 +(Pg(π∗ +0f))(φt(z))dt = +1 +L(c) +� L(c) +0 +π∗ +0 +� +f − ⟨f, 1⟩L2g(S) +� +(φt(z) +� +dt = Ig +0 +� +f − ⟨f, 1⟩L2g(S) +� +(c). +By the injectivity of the X-ray transform for negatively curved metrics ([DS03, Theorem 1.1]), f = ⟨f, 1⟩L2g(S), +i.e., a constant. +□ +Lemma A.3. The solution ˙ut of the equation (6.2) +∆σ ˙ut = +� +2eut + 8e−2ut t|q|2 +σ3 +� +˙ut − 4e−2ut |q|2 +σ3 +cannot be constant for any t ≥ 0 unless q ≡ 0. +Proof. We prove the claim by contradiction. Suppose ˙ut = ct and q ̸≡ 0. Recall that gt = eutσ satisfies +∆gt ˙ut = +� +2 + 8t|q|2 +g3 +t +� +˙ut − 4|q|2 +g3 +t +. +This yields: +(4 − 8tct)|q|2 +g3 +t += 2ct =⇒ |q|2 +g3 +t += +2ct +(4 − 8tct). +This is impossible for any t ≥ 0, because q is nonzero and the left hand side only vanishes at the finite zeros +of q, while the right hand side is constant. This yields the claim. +□ +Corollary A.4. Fix a holomorphic cubic differential q with respect to the complex structure corresponding +to the hyperbolic metric σ. Suppose [gt] ∈ MB/D0 lifts to the solutions {gt} of equation (6.1) and �ht ∈ +T[gt]MB/D0 lifts to ht = ∂t(gt). Then +⟨Πgtπ∗ +2ht, π∗ +2ht⟩ > 0. +In particular, this implies +G[σ](�h0,�h0) > +1 +π2|χ(S)|2 ∥q∥4 +σ. +Proof. Since gt = eutσ and ht = ˙utgt, the first statement follows from Lemma A.2 and Lemma A.3. The +second statement is a special case at t = 0 combined with Proposition A.1. +□ + +THE COVARIANCE METRIC IN THE BLASCHKE LOCUS +33 +It would be desirable to obtain a concise explicit formula for G[σ] +��h0,�h0 +� +mentioned above. We conclude +with a partial answer to this question following from [GM17]. It would be of interest to know whether the +formula below can be further simplified. +Proposition A.5. Under the same assumptions of Proposition A.1, we have +G[σ](�h0,�h0) = +� +4Γ(1/4 − S)Γ(1/4 + S) +Γ(3/4 − S)Γ(3/4 + S)(−∆σ + 2)−14|q|2 +σ3 , (−∆σ + 2)−14|q|2 +σ3 +� +L2σ(S) ++ +1 +π2|χ(S)|2 ∥q∥4 +σ, +where Γ(·, ·) is the Euler Gamma function and S = +i +2 +� +−∆σ(1 − P0) − 1/4, where P0 is the orthogonal +projector onto ker ∆σ. +Proof. The proof is a direct application of [GM17, Lemma A.1, Remark A.2] combined with Proposition +A.1. +□ +References +[Ahl60] Lars V. Ahlfors. The complex analytic structure of the space of closed Riemann surfaces. In Analytic functions, pages +45–66. Princeton Univ. Press, Princeton, N.J., 1960. +[Ahl61] Lars V. Ahlfors. Some remarks on Teichm¨uller’s space of Riemann surfaces. Ann. of Math. (2), 74:171–191, 1961. +[Ahl62] Lars V. Ahlfors. Curvature properties of Teichm¨uller’s space. J. Analyse Math., 9:161–176, 1961/62. +[ALS22] Daniele Alessandrini, Gye-Seon Lee, and Florent Schaffhauser. Hitchin components for orbifolds. J. Eur. Math. Soc., +2022. +[Bar10] David Baraglia. G2 geometry and integrable systems. arXiv e-prints, page arXiv:1002.1767, Feb 2010. +[Ber61] Lipman Bers. Holomorphic differentials as functions of moduli. Bull. Amer. Math. Soc., 67:206–210, 1961. +[BT08] Martin J. Bridgeman and Edward C. Taylor. An extension of the Weil-Petersson metric to quasi-Fuchsian space. Math. +Ann., 341(4):927–943, 2008. +[Chu76] Tienchen Chu. The Weil-Petersson metric in the moduli space. Chinese J. Math., 4(2):29–51, 1976. +[CK21] Diego Corro and Jan-Bernhard Kordaß. Short survey on the existence of slices for the space of Riemannian metrics. In +Mexican mathematicians in the world—trends and recent contributions, volume 775 of Contemp. Math., pages 65–84. +Amer. Math. Soc., [Providence], RI, [2021] ©2021. +[Con92] Gonzalo Contreras. Regularity of topological and metric entropy of hyperbolic flows. Math. Z., 210(1):97–111, 1992. +[Dai19] Xian Dai. Geodesic coordinates for the pressure metric at the fuchsian locus, 2019. +[DS03] +Nurlan S. Dairbekov and Vladimir A. Sharafutdinov. Some problems of integral geometry on Anosov manifolds. Ergodic +Theory Dynam. Systems, 23(1):59–74, 2003. +[DW15] David Dumas and Michael Wolf. Polynomial cubic differentials and convex polygons in the projective plane. Geom. +Funct. Anal., 25(6):1734–1798, 2015. +[Ebi68] David G. Ebin. On the space of Riemannian metrics. Bull. Amer. Math. Soc., 74:1001–1003, 1968. +[Ebi70] David G. Ebin. The manifold of Riemannian metrics. In Global Analysis (Proc. Sympos. Pure Math., Vol. XV, Berkeley, +Calif., 1968), pages 11–40. Amer. Math. Soc., Providence, R.I., 1970. +[FM12] Benson Farb and Dan Margalit. A primer on mapping class groups, volume 49 of Princeton Mathematical Series. +Princeton University Press, Princeton, NJ, 2012. +[Fra66] T. Frankel. On theorems of Hurwitz and Bochner. J. Math. Mech., 15:373–377, 1966. +[FT84] Arthur E. Fischer and Anthony J. Tromba. On a purely “Riemannian” proof of the structure and dimension of the +unramified moduli space of a compact Riemann surface. Math. Ann., 267(3):311–345, 1984. +[GKL21] Colin Guillarmou, Gerhard Knieper, and Thibault Lefeuvre. Geodesic stretch, pressure metric and marked length +spectrum rigidity. Ergodic Theory and Dynamical Systems, page 1–49, 2021. +[GL19] Colin Guillarmou and Thibault Lefeuvre. The marked length spectrum of Anosov manifolds. Ann. of Math. (2), +190(1):321–344, 2019. +[GL21] S´ebastien Gou¨ezel and Thibault Lefeuvre. Classical and microlocal analysis of the x-ray transform on Anosov manifolds. +Anal. PDE, 14(1):301–322, 2021. +[GM17] Colin Guillarmou and Fran¸cois Monard. Reconstruction formulas for X-ray transforms in negative curvature. Ann. +Inst. Fourier (Grenoble), 67(4):1353–1392, 2017. +[Gui17a] Colin Guillarmou. Invariant distributions and X-ray transform for Anosov flows. J. Differential Geom., 105(2):177–208, +2017. +[Gui17b] Colin Guillarmou. Invariant distributions and X-ray transform for Anosov flows. J. Differential Geom., 105(2):177– +208, 2017. +[Ham82] Richard S. Hamilton. The inverse function theorem of Nash and Moser. Bull. Amer. Math. Soc. (N.S.), 7(1):65–222, +1982. +[Hit87] Nigel J. Hitchin. The self-duality equations on a Riemann surface. Proc. London Math. Soc. (3), 55(1):59–126, 1987. +[Hit92] Nigel J. Hitchin. Lie groups and Teichm¨uller space. Topology, 31(3):449–473, 1992. +[Kob95] Shoshichi Kobayashi. Transformation groups in differential geometry. Classics in Mathematics. Springer-Verlag, Berlin, +1995. Reprint of the 1972 edition. +[Lab07] Fran¸cois Labourie. Flat projective structures on surfaces and cubic holomorphic differentials. Pure Appl. Math. Q., +3(4, Special Issue: In honor of Grigory Margulis. Part 1):1057–1099, 2007. + +34 +XIAN DAI AND NIKOLAS EPTAMINITAKIS +[Lab08] Fran¸cois Labourie. Cross ratios, Anosov representations and the energy functional on Teichm¨uller space. Ann. Sci. ´Ec. +Norm. Sup´er. (4), 41(3):437–469, 2008. +[Lan12] Serge Lang. Fundamentals of Differential Geometry, volume 191 of Graduate Texts in Mathematics. Springer, 2012. +[Li19] +Qiongling Li. An introduction to Higgs bundles via harmonic maps. SIGMA Symmetry Integrability Geom. Methods +Appl., 15:Paper No. 035, 30, 2019. +[Liv04] Carlangelo Liverani. On contact Anosov flows. Ann. of Math. (2), 159(3):1275–1312, 2004. +[Lof99] John C. Loftin. Applications of affine differential geometry to RP(2) surfaces. ProQuest LLC, Ann Arbor, MI, 1999. +Thesis (Ph.D.)–Harvard University. +[Lof01] John C. Loftin. Affine spheres and convex RPn-manifolds. Amer. J. Math., 123(2):255–274, 2001. +[Lof07] John C. Loftin. Flat metrics, cubic differentials and limits of projective holonomies. Geom. Dedicata, 128:97–106, 2007. +[Lof10] John C. Loftin. Survey on affine spheres. In Handbook of geometric analysis, No. 2, volume 13 of Adv. Lect. Math. +(ALM), pages 161–191. Int. Press, Somerville, MA, 2010. +[LW18] Fran¸cois Labourie and Richard Wentworth. Variations along the Fuchsian locus. Ann. Sci. ´Ec. Norm. Sup´er. (4), +51(2):487–547, 2018. +[McM08] Curtis T. McMullen. Thermodynamics, dimension and the Weil-Petersson metric. Invent. Math., 173(2):365–425, +2008. +[MW02] Howard Masur and Michael Wolf. The Weil-Petersson isometry group. Geom. Dedicata, 93:177–190, 2002. +[NS94] +Katsumi Nomizu and Takeshi Sasaki. Affine differential geometry, volume 111 of Cambridge Tracts in Mathematics. +Cambridge University Press, Cambridge, 1994. Geometry of affine immersions. +[OT21] Charles Ouyang and Andrea Tamburelli. Limits of Blaschke metrics. Duke Math. J., 170(8):1683–1722, 2021. +[Pol94] Mark Pollicott. Derivatives of topological entropy for Anosov and geodesic flows. J. Differential Geom., 39(3):457–489, +1994. +[PP90] William Parry and Mark Pollicott. Zeta functions and the periodic orbit structure of hyperbolic dynamics. Ast´erisque, +(187-188):268, 1990. +[SA01] +M.A. Shubin and S.I. Andersson. Pseudodifferential Operators and Spectral Theory. Pseudodifferential Operators and +Spectral Theory. Springer Berlin Heidelberg, 2001. +[Sim88] Carlos T. Simpson. Constructing variations of Hodge structure using Yang-Mills theory and applications to uniformiza- +tion. J. Amer. Math. Soc., 1(4):867–918, 1988. +[SS22] +Nathaniel Sagman and Peter Smillie. Unstable minimal surfaces in symmetric spaces of non-compact type. arXiv +e-prints, page arXiv:2208.04885, August 2022. +[SU04] +Plamen Stefanov and Gunther Uhlmann. Stability estimates for the X-ray transform of tensor fields and boundary +rigidity. Duke Math. J., 123(3):445–467, 2004. +[Tei43] Oswald Teichm¨uller. Bestimmung der extremalen quasikonformen Abbildungen bei geschlossenen orientierten Rie- +mannschen Fl¨achen. Abh. Preuss. Akad. Wiss. Math.-Nat. Kl., 1943(4):42, 1943. +[Tho17] Nicolas Tholozan. Volume entropy of Hilbert metrics and length spectrum of Hitchin representations into PSL(3, R). +Duke Math. J., 166(7):1377–1403, 2017. +[Thu] +William P. Thurston. Geometry and topology of three-manifolds. +[Tro92] Anthony J. Tromba. Teichm¨uller theory in Riemannian geometry. Lectures in Mathematics ETH Z¨urich. Birkh¨auser +Verlag, Basel, 1992. Lecture notes prepared by Jochen Denzler. +[Wan91] Chang Ping Wang. Some examples of complete hyperbolic affine 2-spheres in R3. In Global differential geometry and +global analysis (Berlin, 1990), volume 1481 of Lecture Notes in Math., pages 271–280. Springer, Berlin, 1991. +[Wie18] Anna Wienhard. An invitation to higher Teichm¨uller theory. In Proceedings of the International Congress of +Mathematicians—Rio de Janeiro 2018. Vol. II. Invited lectures, pages 1013–1039. World Sci. Publ., Hackensack, +NJ, 2018. +[Wol75] Scott Wolpert. Noncompleteness of the Weil-Petersson metric for Teichm¨uller space. Pacific J. Math., 61(2):573–577, +1975. +[Wol86] Scott A. Wolpert. Chern forms and the Riemann tensor for the moduli space of curves. Invent. Math., 85(1):119–145, +1986. +[Wol87] Scott A. Wolpert. Geodesic length functions and the Nielsen problem. J. Differential Geom., 25(2):275–296, 1987. +[Wol89] Michael Wolf. The Teichm¨uller theory of harmonic maps. J. Differential Geom., 29(2):449–479, 1989. +Xian Dai +Ruhr-Universit¨at Bochum +Fakult¨at f¨ur Mathematik +e-mail: xian.dai@ruhr-uni-bochum.de +Nikolas Eptaminitakis +Institut f¨ur Differentialgeometrie +Leibniz Universit¨at Hannover +Welfengarten 1, 30167 Hannover, Germany +e-mail: nikolaos.eptaminitakis@math.uni-hannover.de + diff --git a/5dE4T4oBgHgl3EQf1Q2P/content/tmp_files/load_file.txt b/5dE4T4oBgHgl3EQf1Q2P/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..3bebf320ac7e3b6909c905d08526f8b5da6d3fdf --- /dev/null +++ b/5dE4T4oBgHgl3EQf1Q2P/content/tmp_files/load_file.txt @@ -0,0 +1,1854 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf,len=1853 +page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='05289v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='DG] 12 Jan 2023 THE COVARIANCE METRIC IN THE BLASCHKE LOCUS XIAN DAI AND NIKOLAS EPTAMINITAKIS Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We prove that the Blaschke locus has the structure of a finite dimensional smooth manifold away from the Teichm¨uller space and study its Riemannian manifold structure with respect to the covariance metric introduced by Guillarmou, Knieper and Lefeuvre in [GKL21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We also identify some families of geodesics in the Blaschke locus arising from Hitchin representations for orbifolds and show that they have infinite length with respect to the covariance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Introduction Classical Teichm¨uller theory is a rich field which involves the interplay of tools from analysis, geometry and topology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One beautiful theorem dating back to the early twentieth century states that the Teichm¨uller space is a finite dimensional smooth contractible manifold (see for example [Tei43], [Ahl60], [Wol89]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Among many different proofs of this fact, one approach, due to Fischer and Tromba ([FT84]), is based on global analysis and Riemannian geometry, by viewing the Teichm¨uller space as a space of isotopy classes of hyper- bolic metrics on a closed connected oriented surface S with genus 풢 ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Many other interesting results can also be obtained from this Riemannian geometrical characterization: for example, the Weil-Petersson metric on the Teichm¨uller space is K¨ahler and has negative sectional curvature (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Tro92, Section 5]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this note, we will explore properties of a finite dimensional subspace of the space of isotopy classes of negatively curved metrics that contains the Teichm¨uller space, using this Riemannian geometrical approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a complex structure J on S and a holomorphic cubic differential with respect to J, one can lift them to a universal cover ˜S of S and produce a parametrization f : ˜S → R3 of a hypersurface of special type arising from affine differential geometry, called a hyperbolic affine sphere (see [Lof10], and also Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A hyperbolic affine sphere in R3 is a surface of constant negative affine mean curvature (see Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It comes naturally equipped with an affine invariant Riemannian metric which descends to a uniquely determined negatively curved metric on S in the conformal class of J, called a Blaschke metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We denote the space of Blaschke metrics on S by MB and the space of smooth hyperbolic metrics on S by M−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A hyperbolic metric σ ∈ M−1 on S is a special case of a Blaschke metric: in this case, the hyperbolic affine sphere determined by the complex structure corresponding to σ and the zero cubic differential can be taken to be the hyperboloid model of hyperbolic space;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' the descended Blaschke metric is exactly the hyperbolic metric σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, upon taking quotients by D0, the space of smooth diffeomorphisms isotopic to the identity, the Teichm¨uller space T (S) = M−1/D0 is contained in the space MB/D0, which we call the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Our work is in two directions: the first goal is to understand the topology and regularity of the Blaschke locus, which is finite dimensional.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The second is to study some of its Riemannian geometric properties with respect to a Riemannian metric constructed in [GKL21] on the space of isotopy classes of negatively curved metrics which restricts to the Weil-Petersson metric on T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Structure of the Blaschke locus and relation to higher Teichm¨uller theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Our first result is concerned with the topology and smooth structure of MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The proof follows the spirit of Tromba’s proof that the Teichm¨uller space is a smooth manifold ([Tro92, Corrolary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem A (Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='20, Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='17).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Blaschke locus MB/D0 is a contractible space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, it has the structure of a smooth manifold of dimension 16풢 − 17 away from the Teichm¨uller space T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To motivate our interest in the Blaschke locus and the idea behind the proof of Theorem A, we now further explain the relation between the Blaschke locus and Teichm¨uller space, from a different point of view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For this, we start with a brief exposition of closely relevant objects—the Hitchin components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Classically, besides viewing the Teichm¨uller space T (S) as a space of (equivalence classes of) Riemannian metrics of 1 2 XIAN DAI AND NIKOLAS EPTAMINITAKIS constant negative curvature (or hyperbolic structures) on S, one can also view it as a space of (equivalence classes of) Riemann surface structures (complex structures) on S or as a connected component of the space of (conjugacy classes of) representations of π1(S) into PGL(2, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin component Hn(S), as an important example of higher rank Teichm¨uller spaces (see [Wie18] for a survey), generalizes T (S) from the representation theory viewpoint and is a connected component of the space of (conjugacy classes of) representations from π1(S) into PGL(n, R) for n ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When n = 2, the Teichm¨uller space T (S) coincides with H2(S) and embeds into all other Hitchin components Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When n = 3, a complex analytical counterpart of H3(S) was discovered independently by Loftin [Lof01] and Labourie [Lab07] in analogy to the viewpoint of T (S) as spaces of Riemann surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' They showed that there exists a mapping class group equivariant homeomorphism between the Hitchin component H3(S) and the vector bundle Q3(S) over the Teichm¨uller space T (S) whose fiber over a Riemann surface is given by holomorphic cubic differentials on the Riemann surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One can then ask whether there is a natural Riemannian geometrical generalization of the Teichm¨uller space T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' As hinted previously, the Blaschke locus MB/D0 as a space of negatively curved Riemannian metrics, even though not in bijection to H3(S), plays this role.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Modulo an S1 action on the vector bundle Q3(S) (which identifies a holomorphic cubic differential q with e2πiθq for any θ ∈ [0, 1)), using the holomorphic data Q3(S) as a bridge, one obtains the following mapping class group equivariant homeomorphisms (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) H3(S)/S1 homeo ≃ Q3(S)/S1 homeo ≃ MB/D0, where the S1 action on H3(S) is simply obtained by pullback of the S1 action on Q3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The above three objects are generalizations of T (S) from different viewpoints (representation theoretic, complex analytic and Riemannian geometrical respectively).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A more detailed characterization of them and their relations will be described in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, the first homeomorphism is proved and implied from [Lof01] and [Lab07].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The second bijection is first shown in [OT21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We explain the second homeomorphism in Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These identifications will be crucial for the proof of Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The covariance metric in the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' As mentioned before, we also study the Riemann- ian geometry of the Blaschke locus MB/D0 with respect to the covariance metric G(·, ·) introduced by Guillarmou, Knieper and Lefeuvre ([GKL21])1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This metric extends the Weil-Petersson metric from the Teichm¨uller space (viewed as the space of isotopy classes of hyperbolic metrics) to a Riemannian metric on the space of isotopy classes of metrics of variable negative curvature, using techniques originating from the study of the X-ray transform on closed Anosov manifolds ([Gui17a], [GL19]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In our case, starting with the simple observation that the extended mapping class group is a subgroup of the group of isometries for the covariance metric (Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12), the mapping class group equivariant homeomorphisms from H3(S)/S1 to MB/D0 in (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) allow us to identify certain families of covariance metric geodesics in MB/D0 arising from special orbifold Hitchin representations (Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Briefly, let a two-dimensional orbifold Y be given as a quotient of a Riemann surface XJ (with underlying smooth surface structure S) by a finite diffeomorphism group Σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One can then associate to Y a special one-parameter family of representations in H3(S), denoted by H3(Y ), as a fixed point set of the group action of Σ on H3(S), with Σ understood as a subgroup of the extended mapping class group (see Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We show Theorem B (Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5, Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let Y be a non-orientable orbifold of negative Euler characteristic with orientation double cover Y + given by a sphere with 3 cone points of respective orders m1 ≥ 3, m2 ≥ 3 and m3 ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then H3(Y )/Z2 is homeomorphic to a half line and embeds as a geodesic (unparametrized) in MB/D0 with respect to the covariance metric G(·, ·), where the Z2 action on H3(Y ) is induced from the S1 action on H3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These geodesics, which are homeomorphic to half lines, have starting points in Teichm¨uller space T (S) and eventually leave all compact sets of MB/D0 (see Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We further proceed in Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 to estimate their covariance metric lengths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We show in Corollary 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5, Theorem C (Corollary 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The covariant metric geodesics in MB/D0 corresponding to H3(Y )/Z2 given in Theorem B have infinite length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 1This Riemannian metric is referred to as the pressure metric in [GKL21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 3 In fact, our proof works more generally for any curve in MB/D0 parameterized by a ray starting from T (S) in a fixed fiber of the bundle Q3(S)/S1, using identification (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1), Corollary D (Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let σ be a hyperbolic metric on S and q be a nonzero cubic differential which is holomorphic with respect to the complex structure determined by σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then the curve {[gt]}t≥0 ⊂ MB/D0, where gt ⊂ MB satisfies Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) with cubic differential √ tq, has infinite length with respect to the covariance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It remains as a question whether there are other candidates for finite covariance metric length paths leaving all compact sets of MB/D0 but not in the Teichm¨uller space T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In general, incomplete paths in moduli spaces indicate meaningful geometric phenomena.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For instance, in the Teichm¨uller space T (S), Wolpert exhibits some incomplete paths for the Weil-Petersson metric in [Wol75].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These are paths realizing “pinched Riemann surfaces”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In the Appendix A we end with some further estimates of the covariance metric in MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An explicit formula (Proposition A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5) for the covariance metric G(·, ·) at a point in T (S) with tangent vectors corresponding to a direction tangential to the fiber of Q3(S)/S1 is given as a direct application of [GM17, Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, Remark A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We hope that this formula can be further simplified in the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Outline of the proofs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We briefly discuss our proofs of the main theorems in the sequel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Both for regularity results and the study of the covariance metric in MB/D0, an important tool used in our investigation is a single partial differential equation, called Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It underlies the second identification (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) and has natural connection to Blaschke metrics and the theory of affine differential geometry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For regularity results, the ideas are as follows: The proof of the smoothness of the Blaschke locus MB/D0 relies on constructing smooth charts for it away from T (S), and is modeled on the construction of charts for the Teichm¨uller space outlined in [Tro92, Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' There, the key observation is that the finite dimensional space of transverse traceless (= divergence free and trace free) symmetric two tensors with respect to a fixed hyperbolic metric can be locally identified with a slice of smooth hyperbolic metrics inside the Hilbert manifold of hyperbolic metrics of fixed Sobolev regularity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This slice locally parametrizes T (S), thus providing a natural local coordinate for it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For us, the coordinates for the Blaschke locus are constructed via local identification with the vector bundle of holomorphic cubic differentials over those slices for T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The link between local slices for the bundle of holomorphic cubic differentials and local slices for the space of Blaschke metrics, viewed as a subset of the Banach manifold of negatively curved metrics of Ck,α regularity, is given by Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It allows us to produce smooth diffeomorphisms between those slices, by means of the implicit function theorem and the inverse function theorem for Banach spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To study the covariance metric in MB/D0, we use a mixture of global geometry concerning mapping class groups actions and local estimates using tools from partial differential equations: The equivariance of the homeomorphisms in (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) with respect to the mapping class group action allows one to preserve the fixed point sets of actions of certain subgroups of it on the different spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By showing that the covariance metric is extended mapping class group invariant, some one-dimensional fixed points sets arising from geometric symmetry in the Hitchin components pull back by (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) to geodesics in the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then, analytical tools can be applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To estimate the lengths of the geodesics above, Wang’s equation is again a key, together with some standard techniques for partial differential equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These include the existence of supersolutions and subsolutions for Wang’s equation, previously obtained by Loftin (Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9), and some minimum principle arguments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Structure of the article.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The article is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Section 2, we recall some fundamental results from Teichm¨uller theory and Weil-Petersson geometry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We then introduce Higgs bundles, Hitchin components and Hitchin maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We also include a short discussion on orbifolds and orbifold representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Section 3 is devoted to explaining the actions of the extended mapping class group on various mathematical objects from different areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This will play an important role in the proofs of Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Section 4 contains 4 XIAN DAI AND NIKOLAS EPTAMINITAKIS an exposition on the covariance metric introduced in [GKL21] in the space of negatively curved metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We also show in this section that the covariance metric is extended mapping class group invariant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Section 5, we introduce Blaschke metrics, the Blaschke locus, and explain the identification (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We also discuss some important results concerning the regularity and topology of Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Section 6, we prove some results about geodesics in the Blaschke locus with respect to the covariance metric and estimate their lengths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Finally, we end with some further estimates of the covariance metric in the Blaschke locus near the Teichm¨uller space T (S) in Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Acknowledgements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The authors would like to thank Kiril Datchev, Dan Fox, Gerhard Knieper and Gabriele Viaggi for helpful discussions, and Alex Nolte for the reference [Ber61].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Dai was funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) – Project-ID 281071066 – TRR 191 and by the DFG under Germany’s excellence strategy exc 2181/1 - 390900948 (the Heidelberg structures excellence cluster).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Preliminaries This section develops the background material we will need in later sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A reader familiar with this material may skip it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We begin in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1 with an exposition on classical Teichm¨uller space and the Weil-Petersson metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, we introduce some basics on Higgs bundles and Hitchin components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We conclude with a discussion of orbifolds and orbifold representations in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Teichm¨uller space and Weil-Petersson metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this subsection, we will discuss Teichm¨uller space from the viewpoint of Riemannian geometry, initiated by Tromba and Fischer [FT84].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let S be a closed orientable smooth surface of genus 풢 ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We denote by M the space of smooth Riemannian metrics on S, by M− the subspace of negatively curved smooth Riemannian metrics, and by M−1 the subspace of hyperbolic metrics on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We also denote by D be the diffeomorphism group of S, by D+ the group of orientation preserving diffeomorphism on S (when S is given an orientation), and by D0 the normal subgroup of D consisting of smooth diffeomorphisms isotopic to the identity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Teichm¨uller space, denoted as T (S), is the quotient space M−1/D0, where the right action of D0 on M−1 is given by M−1 × D0 → M−1, (σ, ψ) �→ ψ∗σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We denote the equivalence class of σ ∈ M−1 by [σ] ∈ M−1/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Equivalently, the Teichm¨uller space T (S) is the space of (oriented) complex structures on S up to D0-action.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' According to another viewpoint, the Teichm¨uller space T (S) is a connected component of the representation space Hom(π1(S), PGL(2, R))/PGL(2, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This will be discussed in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We remark that with Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1 above, the Teichm¨uller space does not “see” the orientation on S, in the sense that if ψ is an orientation reversing isometry for a metric σ, then [ψ∗σ] = [σ] ∈ T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When T (S) is viewed as the space of oriented hyperbolic structures modulo D0, which is a point of view often taken in the literature (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [MW02]), if ψ : S → S is an orientation reversing isometry for a hyperbolic metric σ and G is the positively oriented hyperbolic structure that σ determines, then the hyperbolic structure obtained by pulling back the charts of G by ψ, mod D0, is an element of the Teichm¨uller space of S, where S has the opposite orientation from S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a Riemann surface XJ with complex structure J, we denote by KJ the canonical line bundle associated to XJ, which is the (1, 0)-part of the complexified cotangent bundle T ∗XC J = C⊗RT ∗XJ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Further, we denote by H0(XJ, Kd J) the space of J-holomorphic differentials of order d, and by H0(X[J], Kd [J]) the space of their D0-equivalence classes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Explicitly, if ψ ∈ D0, the J-holomorphic differential q ∈ H0(XJ, Kd J) and the ψ∗J-holomorphic differential ψ∗q ∈ H0(Xψ∗J, Kd ψ∗J) represent the same point in H0(X[J], Kd [J]), denoted as [q].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The action of the groups D and D0 on complex structures and holomorphic differentials will be explained in detail in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is well known that the cotangent space of the Teichm¨uller space T (S) at [σ] can be identified with the space of quadratic differentials H0(X[J], K2 [J]) on the Riemann surfaces X[J] = (S, [J]) where [J] is associated to the (D0-equivalence class of) hyperbolic metrics [σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An extensively THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 5 studied Riemannian metric on the Teichm¨uller space T (S), defined using holomorphic quadratic differentials, is the following Weil-Petersson metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Weil-Petersson metric is a cometric on T (S) defined by � [q1], [q2] � W P([σ]) = Re � XJ q1q2 σ2 dvσ, where [σ] ∈ T (S) and [q1], [q2] are holomorphic quadratic differentials with respect to [J] and σ, J, q1, q2 are representatives picked from their equivalence classes so that q1, q2 are holomorphic with respect to J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is well known that the Weil-Petersson metric is K¨ahler ([Ahl61]) and negatively curved ([Ahl62], [Tro92], [Wol86]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The isometry group of the Weil-Petersson metric is the mapping class group [MW02].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Also, although the Weil-Petersson metric is not complete ([Chu76], [Wol75]), it exhibits many nice properties of complete negatively curved metrics (see [Wol75], [Wol87]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6 we will discuss a different interpretation of the Weil-Petersson metric (Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='16).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin components and Hitchin map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this subsection, using Higgs bundles techniques, we introduce the Hitchin component, which is a connected component of the representation space Rep(π1S, PGL(n, R)) := Hom(π1S, PGL(n, R))/PGL(n, R), for n ≥ 2, as a generalization of the classical Teichm¨uller space T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Higgs bundles, Hitchin components and Hitchin Sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this subsection, n ≥ 2 is an integer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The discussion here holds for much wider classes of groups, but for our purposes we will restrict to the group G = PGL(n, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let sl(n, R) = so(n, R) ⊕ sym0(n, R) be the Cartan decomposition of sl(n, R), where sym0(n, R) is the set of n×n symmetric matrices of trace zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Denote sym0(n, C) = sym0(n, R)⊗C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following definition is a special case of [ALS22, Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A PGL(n, R)-Higgs bundle on a Riemann surface XJ is a pair (E, ϕ), where E is a holomorphic Lie algebra bundle with typical fiber sl(n, C) and structure group PO(n, C), ϕ ∈ H0(XJ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' KJ ⊗ adsym0(n,C)(E)) is a holomorphic section, called the Higgs field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here by adsym0(n,C)(E) we mean the bundle of symmetric adjoint endomorphisms of E, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' endomorphisms of E locally of the form adξ : sl(n, C) → sl(n, C) for some ξ ∈ sym0(n, C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The space of gauge equivalence classes of PGL(n, R)-Higgs bundles with some “good” conditions forms the moduli space of PGL(n, R)-Higgs bundles, denoted by MHiggs(PGL(n, R)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (The “good” conditions are polystablity conditions for the Higgs bundles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One can find an introduction in [Bar10], for example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=') Suppose that the holomorphic vector bundle E has holomorphic structure ¯∂E and is equipped with a Hermitian metric H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that the Chern connection AH of E is the unique connection that is compatible with H and satisfies A0,1 H = ¯∂E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following is important.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5 (Hitchin [Hit87], Simpson [Sim88]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let (E, ϕ) be a polystable PGL(n, R)-Higgs bundle and let H be a Hermitian metric on E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A connection D = AH + ϕ + ϕ∗H on (E, ϕ, H) is flat if and only if the following Hitchin equation is satisfied, FAH + [ϕ, ϕ∗H] = 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) where FAH is the curvature of the connection AH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, the holomorphic vector bundle E admits a Hermitian metric H satisfying the Hitchin equation if and only if (E, ϕ) is polystable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will come back to a special case of the Hitchin equation (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4)), which is of central importance for this note, in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin [Hit92] further introduces the Hitchin component using Higgs bundles and the Hitchin section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We briefly discuss the Hitchin components and the Hitchin section here and refer the reader to section 2 of [Bar10] for a more comprehensive exposition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let gC be sl(n, C) and let g be sl(n, R) which is a split real form fixed by an antilinear Lie algebra involution τ of gC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a principal 3-dimensional subalgebra s = span{x, e, ˜e} of sl(n, C) consisting of a semisimple element x and regular nilpotent elements e and ˜e with commutation relations [x, e] = e, [x, ˜e] = −˜e, [e, ˜e] = x, 6 XIAN DAI AND NIKOLAS EPTAMINITAKIS the Lie algebra sl(n, C) decomposes into a direct sum of irreducible subspaces under the adjoint representation of s: sl(n, C) = n−1 � i=1 Vi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We take e1, · · · , en−1 as the highest weight elements of V1, · · · , Vn−1, where e1 = e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Another decomposition is sl(n, C) = n−1 � d=−n+1 g(d) C , where g(d) C is the subspace of sl(n, C) on which adx acts with eigenvalue d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Associated to this decomposition is a natural Lie algebra bundle Ecan := n−1 � d=−n+1 g(d) C ⊗ Kd J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is a common choice of the holomorphic bundle E in Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' With this defined, we can introduce the Hitchin section in the setting of MHiggs(PGL(n, R)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A Hitchin section sJ is a map from n� i=2 H0(XJ, Ki J) to MHiggs(PGL(n, R)) defined as follows: for q = (q2, q3, · · · , qn) ∈ n � i=2 H0(XJ, Ki J), the image sJ(q) is a Higgs bundle Ecan with its Higgs field ϕ(q) ∈ H0(X, KJ ⊗ adsym0(n,C)(Ecan)) given by ϕ(q) = ˜e + q2e1 + q3e2 + · · · qnen−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin in [Hit92] shows that any Higgs bundle in the image of the Hitchin section sJ has the associated flat connection D (Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5) with holonomy in PGL(n, R) (See [ALS22, Section 3]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This leads to the following important definition of the Hitchin component: Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7 ([Hit92]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When n ≥ 2, the Higgs bundles in the image of the Hitchin section sJ are stable and have holonomy in PGL(n, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, the corresponding representations form a connected component of the representation space Rep(π1S, PGL(n, R)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This connected component is homeomorphic to a Euclidean space of dimension (2풢 − 2)(n2 − 1) and is called the Hitchin component, denoted as Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An element in Hn(S) is a conjugacy class of representations, called a (conjugacy class of a) Hitchin representation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a representation ρ, we denote its conjugacy class by [ρ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When n = 2, the Hitchin section exactly parametrizes the Teichm¨uller space, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', one has H2(S) = T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When n > 2, one can choose a principal 3-dimensional subalgebra s ∼= sl(2, C) of the form s = span{x, e, ˜e} which is τ-invariant, and it induces an inclusion sl(2, R) ֒→ sl(n, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This induces a group homomorphism κC from PGL(2, C) ≃ Int(sl(2, C)) to PGL(n, C) ≃ Int(sl(n, C)) (see [ALS22, Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By restricting the groups respectively to PGL(2, R) and PGL(n, R), one obtains the principal representation κ : PGL(2, R) → PGL(n, R) and an embedding of the Teichm¨uller space T (S) in the Hitchin component Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In other words, the principal representation κ sends [ρ0] ∈ T (S) to [ρ] = [κ ◦ ρ0] ∈ Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We often call [ρ] = [κ ◦ ρ0] (a conjugacy class of) Fuchsian representations of Hn(S) and the space of conjugacy classes of Fuchsian representations is called the Fuchsian locus of Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We note that in the literature, the Hitchin component is usually defined as a component of Hom(π1S, PSL(n, R))/PSL(n, R) ([Hit92], [Lab07]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this note, we define Hn(S) up to PGL(n, R) conjugacy (to work with orbifolds and orientation reversing maps).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The differences between these definitions are further discussed in Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The holonomy maps of flat connections D associated to Higgs bundles in the images of Hitchin section sJ induce a homeomorphism HJ : n � i=2 H0(XJ, Ki J) → Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This map describes a parametrization of the Hitchin component Hn(S) by holomorphic differentials and is often called the Hitchin parametrization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' However, one drawback of the Hitchin parametrization is that it depends on a specific choice THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 7 of complex structure J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, it breaks the invariance with respect to the mapping class group action, which will be extensively discussed in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An attempt towards a mapping class equivariant construction is the following, due to Labourie [Lab08].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let Qn(S) denote the vector bundle over the Teichm¨uller space T (S) whose fiber over X[J] is Qn(S) �� [J] = H0(X[J], K3 [J]) ⊕ · · · ⊕ H0(X[J], Kn [J]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then consider the Hitchin map H defined as H : Qn(S) −→ Hn(S) ([J, q3, · · · , qn]) �→ HJ(0, q3, · · · , qn).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here J is a representative of the equivalence class [J] and qi are i-th order differentials holomorphic with respect to J that are representatives from [qi].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The image of HJ is obtained by taking holonomy of the flat connection D associated to the Higgs bundle sJ(0, q3, · · · qn) (Recall Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The vector space H0(XJ, Ki J) can be identified with the space H0(X[J], Ki [J]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Via the map HJ, the holonomy defined using the flat connection associated to ([J, q3, · · · , qn]) induces representations well defined up to conjugation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin map is always a surjective mapping class group equivariant map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A natural question to ask is whether the Hitchin map is a homeomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A recent result from Sagman and Smille ([SS22]) shows that it fails to be injective and therefore not a homeomorphism when n ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' However, in this note we will only focus on the case n = 3, for which the homeomorphism result is well known.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10 ([Lof01, Theorem 2], [Lab07, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin map H : Q3(S) → H3(S) is a mapping class group equivariant homeomorphism, where the mapping class group actions on Q3(S) and on H3(S) (as outer automorphism group action) are the left actions which will be explained in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It will be useful for later to remark that the bundle Qn(S) over T (S), with the latter viewed as M−1/D0 and with the fiber over each [σ] consisting of holomorphic differentials with respect to the pos- itively oriented complex structure determined by [σ], has the natural C∞ topology (which is the quotient topology descended from the C∞ topology of objects without taking quotients by D0 action).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For holomor- phic differentials, the C∞ topology is equivalent to the compact open topology due to Weierstrass’ Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore a sequence of pairs of hyperbolic metrics and holomorphic differentials {(σk, qk)}k≥0 converges to a pair of hyperbolic metric and holomorphic differential (σ, q) if the hyperbolic metrics σk converge to σ in C∞ topology and the lifts of holomorphic differentials qk to the universal covers D converge uniformly on compact subsets of D to the lift of q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Orbifolds and orbifolds representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Orbifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An orbifold is a space that is locally modelled on Rn modulo finite group actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In the special case that all of these finite groups are trivial, we obtain a manifold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Otherwise, orbifolds have singularities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For a general introduction on orbifolds, we refer the reader to [Thu, Chapter 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Much of the presentation in this subsection follows [ALS22, Section 2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We restrict our discussion to n = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let Y be a closed connected smooth orbifold of dimension 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' There are three types of singularities of Y : (1) p is a cone point of order m: there is a neighborhood of p that is isomorphic to R2/Zm where Zm acts on R2 by rotation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (2) p is a mirror point: there is a neighborhood of R2/Z2 where Z2 acts by reflection in the y-axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (3) p is a corner reflector of order n: there is a neighborhood of p that is isomorphic to R2/Dn where Dn is the dihedral group of order 2n, with presentation ⟨a, b : a2 = b2 = (ab)n = 1⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For a 2-dimensional orbifold Y , we will denote by k the number of cone points (of respective orders m1, · · · , mk) and by l the number of corner reflectors (of respective orders n1, · · · , nl).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will also de- note by ˜Y the orbifold universal cover of Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The orbifold fundamental group is denoted by π1(Y ), which is 8 XIAN DAI AND NIKOLAS EPTAMINITAKIS defined to be the group of deck transformations of the universal cover ˜Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We say Y orientable if its underly- ing topological space |Y | is orientable and if Y has only cone points as singularities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Euler characteristic of an orbifold Y is defined as χ(Y ) = χ(|Y |) − k � i=1 (1 − 1 mi ) − 1 2 l � j=1 (1 − 1 nj ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will assume in this note that Y has negative Euler characteristic: χ(Y ) < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We say that a 2 dimensional orbifold is a good orbifold if it has some covering orbifold which is a surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Every orbifold of negative Euler characteristic is a good orbifold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It can be seen as a quotient of a closed orientable surface and has a presentation defined as follows: Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A presentation of a closed connected orbifold Y is a triple (S, Σ, ϕ), where S is a smooth closed connected orientable surface, Σ is a finite subgroup of D and ϕ is an orbifold isomorphism ϕ : Y → S/Σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We then write Y ≃ [S/Σ], with ϕ ignored.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If XJ = (S, J) is a Riemann surface and Σ acts on XJ by holomorphic or anti-holomorphic maps, then Y = YJ inherits the “complex structure” from XJ and we denote it as Y ≃ [XJ/Σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For nonorientable orbifolds, these are called orbifold dianalytic structures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Precisely, an orbifold dianalytic structure on Y is an orbifold complex structure on its orientable double cover Y + with Z/2Z action given by an anti-holomorphic involution, see [ALS22, Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin representations for orbifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thurston studied the space of hyperbolic structures on a closed 2-orbifold Y of negative Euler characteristic [Thu, Chapter 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is called the Teichm¨uller space of Y , denoted as T (Y ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Similarly to the case of closed surfaces, by taking the holonomy representations of hyperbolic structures on Y , this space of hyperbolic structures on Y is identified with a connected component of the representation space Rep(π1Y, PGL(2, R)) := Hom(π1Y, PGL(2, R))/PGL(2, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Similarly to the closed surface case, one can define Fuchsian representations and the Fuchsian locus for orb- ifolds using the principal representation κ : PGL(2, R) → PGL(n, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A (conjugacy class of) representations [ρ] : π1Y → PGL(n, R) is called a (conjugacy class of) Fuchsian representations if there exists [ρ0] ∈ T (Y ) such that [ρ] = [κ ◦ ρ0].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The space of (conjugacy class of) Fuchsian representations is called the Fuchsian locus of Rep(π1Y, PGL(n, R)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin component of the orbifold Y is defined using Fuchsian representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin component of Y , denoted as Hit(π1Y, PGL(n, R)), is the connected component of Rep(π1Y, PGL(n, R)) := Hom(π1Y, PGL(n, R))/PGL(n, R) that contains the Fuchsian locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An element in Hit(π1Y, PGL(n, R)) is called a Hitchin representation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15 ([ALS22, Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If Y is orientable (for instance if Y = S is a closed orientable surface), then any Fuchsian representation of π1(Y ) is in fact contained in Hom(π1Y, PSL(n, R)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It may happen that there are two Hitchin components (for example, when n is even) if we consider such representations up to PSL(n, R)-conjugacy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These representations in two connected components are related by an inner automorphism of PGL(n, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore PGL(n, R)-conjugacy identifies these components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On the other hand, when Y is nonorientable, the images of Fuchsian representations of π1(Y ) are in PGL(n, R) (and may not be able to be restricted to PSL(n, R)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Mapping class group actions We give an exposition on how the extended mapping class group acts on various mathematical objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Extended mapping class group action on Riemannian metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let S be a closed orientable smooth surface of genus 풢 ≥ 2 as in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that M− denotes the space of negatively curved smooth Riemannian metrics on S, on which the diffeomorphism groups D, D+ (when S is oriented), and D0 act by pullback.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The extended mapping class group is given by the quotient group Mod±(S) := D/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Two smooth diffeomorphisms f1 and f2 represent the same point in Mod±(S) if and only if f1 is smoothly isotopic to f2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In other words, the extended mapping class group Mod±(S) is the group of isotopy classes of elements in D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When S is given an orientation, we also denote by Mod(S) = D+/D0 the mapping class group which THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 9 is the group of isotopy classes of all orientation-preserving smooth diffeomorphisms of S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The mapping class group Mod(S) is an index 2 subgroup of Mod±(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given ψ ∈ D, we denote by [ψ] the induced element in Mod±(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The action of D on M− by pullback induces an action of Mod±(S) on the quotient space M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This space will be discussed further in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that this action of Mod±(S) is a right action on M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To be consistent with the outer automorphism group action introduced in the next subsection, people also often use the induced left action of Mod±(S) on M−/D0 given by [ψ] · [g] = [(ψ−1)∗g].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Extended mapping class group action on Hitchin components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Outer automorphism group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The outer automorphism group Out(π1S) is defined as the quotient Out(π1S) = Aut(π1S)/Inn(π1S), where Aut(π1S) is the group of automorphisms of π1S and Inn(π1S) denotes the group of all inner auto- morphisms: for any h ∈ π1S, the associated inner automorphism is defined by Ih : π1S → π1S g �→ hgh−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By the Dehn-Nielsen-Baer Theorem [FM12, Theorem 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1], the extended mapping class group Mod±(S) is isomorphic to the outer automorphism group Out(π1S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' There is a natural left action of Out(π1S) on Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a representation ρ ∈ Hn(S) and any ψ ∈ Out(π1S), define ψ · ρ = ρ ◦ ψ−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This action preserves the Hitchin component Hn(S) (see the paragraph after Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8 in [ALS22]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' As the extended mapping class group Mod±(S) is identified with the group Out(π1S), we obtain a natural action of Mod±(S) on the Hitchin component Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, this action on H2(S) = T (S) corresponds to the left extended mapping class group action on M−1/D0 by (inverse) pullback defined in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Outer automorphism group and orbifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3, we presented a 2-dimensional closed con- nected smooth orbifold Y of negative Euler characteristic as a quotient of a closed orientable surface S by a finite subgroup Σ ≤ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This implies the existence of a short exact sequence: 1 → π1S → π1Y → Σ → 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, π1S is a normal subgroup of π1Y of finite index and Σ ≃ π1Y/π1S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The finite group Σ ≤ D yields a subgroup Σ ≤ Mod±(S) which is isomorphic to a subgroup of Out(π1S) by the Dehn-Nielsen-Baer Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Because Out(π1S) acts on the Hitchin component Hn(S) from the left by (inverse) precomposition, one obtains an action of Σ on Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will denote by FixΣHn(S) the fixed locus of the action Σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following theorem from [ALS22] about the relation between Hitchin representations for orbifolds and the outer automorphism group action on Hn(S) will be important later: Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1 ([ALS22, Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a closed connected 2-orbifold of negative Euler characteristic Y and a presentation Y ≃ [S/Σ], the map ρ �→ ρ|π1S induces a homeomorphism j : Hit(π1Y, PGL(n, R)) → FixΣHn(S) between Hit(π1Y, PGL(n, R)) and the Σ-fixed locus in Hn(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Extended mapping class group action on holomorphic differentials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this subsection, we first explain how the extended mapping class group acts on the space of sections of holomorphic differentials in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then we focus on surface diffeomorphisms that are holomorphic or antiholomorphic with respect to a certain complex structure, and discuss the extended mapping class group action they induce.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This will naturally lead to an exposition on the equivariant structure of Hitchin fibration from [ALS22, Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a complex structure J ∈ C∞(S;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' End(T S)), a diffeomorphism ψ ∈ D acts on J from the right as: (ψ∗J)x = (dψ−1)ψ(x) ◦ Jψ(x) ◦ dψx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, we say ψ is holomorphic with respect to J if ψ∗J = J;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We say ψ is anti-holomorphic with respect to J if ψ∗J = −J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Upon taking a quotient by D0 action, one obtains an action of the extended mapping class group Mod±(S) = D/D0 on isotopy classes of complex structures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The action of ψ ∈ D naturally induces a left action of ψ on all powers of the canonical bundles Kd J, denoted by κψ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let XJ = (S, J) be the Riemann surface with the complex structure J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We can define an 10 XIAN DAI AND NIKOLAS EPTAMINITAKIS action of ψ on a holomorphic section s ∈ H0(XJ, Kd J) by ψ∗s := κψ−1 ◦ s ◦ ψ as illustrated by the following diagram: Kd ψ∗J Kd J (S, ψ∗J) (S, J) κψ ψ ψ∗s s More explicitly, for p ∈ S and v ∈ (T XC ψ∗J)(1,0), we have (ψ∗s)(p) � v, · · · , v � = s(ψ(p)) � dψ(v), · · · , dψ(v) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here dψ denotes the complexified differential dψ : TpXC ψ∗J → Tψ(p)XC J .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The pull back ψ∗s is a holomorphic section on H0(Xψ∗J, Kd ψ∗J).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' After taking D0 quotient, we obtain a right Mod±(S) action on (D0-equivalence classes of) holomorphic d-differentials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Often, we also use the induced left action by inverse pull back given by [ψ] · [s] = [(ψ−1)∗s].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now we focus on diffeomorphisms that are either holomorphic or antiholomorphic with respect to a fixed complex structure J and explain their actions on holomorphic differentials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose that Σ is a finite subgroup of D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We fix an orientation for S and a Σ-invariant Riemannian metric g on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Denote by J = Jg the complex structure associated to g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then a map ψ ∈ Σ is holomorphic with respect to J if it preserves the orientation of S;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' otherwise, it is anti-holomorphic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The bundle isomorphism κψ from Kψ∗J to KJ defined before induces a bundle automorphism τψ : KJ → KJ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' More explicitly, when ψ is orientation preserving, we let τψ = κψ, which is clearly a bundle automorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When ψ is orientation reversing, given ξ = (p, w) ∈ Kd J|p, we let τψξ := κψξ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since κψ maps the bundle Kψ∗(−J) to K−J and ψ∗(−J) = J, it is also clear in this case that τψ : KJ → KJ is a bundle automorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This introduces an action of τψ on all tensor powers Kd J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The definition of the τψ action here then coincides with the τψ action in [ALS22, Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The family τ = (τψ)ψ∈Σ forms a Σ-equivariant structure of the holomorphic bundle Kd J in the following sense: (1) For all ψ ∈ Σ, the following diagram commutes (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' π ◦ τψ = ψ ◦ π), Kd J Kd J (S, J) (S, J) τψ π π s ψ ψA·s , where π : Kd J → (S, J) is the projection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (The map ψA will be explained in the next paragraph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=') (2) The bundle map τψ is fiberwise C-linear if ψ is holomorphic with respect to J and fiberwise C- antilinear if ψ : X → X is anti-holomorphic with respect to J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (3) τid = IdKd J and τψ1ψ2 = τψ1τψ2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that since ψ and τψ are simultaneously holomorphic or anti-holomorphic, the composition τψ ◦ s ◦ ψ−1 is again a holomorphic section in H0(XJ, Kd J).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will denote this (left) action by ψA · s := τψ ◦ s ◦ ψ−1 to emphasize that this is an automorphism and distinguish it from the pull back action ψ∗s and its induced left action ψ · s = (ψ−1)∗s by inverse pull back.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In general, suppose XJ is a Riemann surface with complex structure J so that the finite group Σ acts on XJ by holomorphic or anti-holomorphic maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then ψ ∈ Σ act on H0(XJ, Kd J) as an automorphism ψA : H0(XJ, Kd J) → H0(XJ, Kd J).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following Proposition in [ALS22] will be important later.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 ([ALS22, Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Under the above assumptions, the Hitchin parametrization HJ : n� i=2 H0(XJ, Ki J) → Hn(S) is Σ-equivariant and induces a homeomorphism FixΣ � n � i=2 H0(XJ, Ki J) � ≃ FixΣHn(S) for any integer n ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 11 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Covariance metric on the space of negatively curved Riemannian Metrics In this section, which follows closely [GKL21, Section 2], we will define the covariance metric introduced there on the space of negatively curved metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The material here works for n-dimensional Riemannian manifolds with Anosov geodesic flows, though we only discuss it in the setting that we are interested in, namely that of a closed orientable smooth surface S with genus 풢 at least 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Function Spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If M is a closed manifold, we will denote by D′(M) := (C∞(M))′ the space of distributions, and by Hs(M) the Sobolev space of order s ∈ R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The latter can be defined as Hs(M) := {u ∈ D′(M) | (1 − ∆g0)s/2u ∈ L2 g0(M) }, where ∆g0 denotes the negative Laplace-Beltrami operator of a fixed Riemannian metric g0 and L2 g0(M) is the space of square integrable functions with respect to the probability measure induced by the volume density dvg0 of g0, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' with respect to dvg0 Vol(M,g0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An alternative useful characterization of Hk(M) for integer k ≥ 0 is given by Hk(M) = {u ∈ D′(M)|V1 · · · Vmu ∈ L2 g0(M), 0 ≤ m ≤ k, for any Vj ∈ X(M)}, where X(M) denotes smooth vector fields on M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A choice of g0 induces an inner product ⟨u, v⟩Hsg0 (M) = ⟨(1 − ∆g0)s/2u, (1 − ∆g0)s/2v⟩L2g0 (M) = ⟨(1 − ∆g0)su, v⟩L2g0 (M), making Hs(M) into a Hilbert space (the last equality follows by self-adjointness).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In our applications, M will typically be either S or T 1Sg, where T 1Sg is the unit tangent bundle with respect to a Riemannian metric g on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Whenever we write L2(T 1Sg), it will be understood that the measure used to define the L2 inner product and norm is the Liouville measure of g normalized to have total mass 1, denoted by µL g .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Notice that if f ∈ C∞(S) and π0 : T 1Sg → S is the natural projection we have � T 1Sg π∗ 0fdµL g = 1 Area(S, g) � S fdvg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For k ∈ N0 and α ∈ (0, 1), we will also make use of H¨older spaces Ck,α(M) := {u ∈ Ck(M)|V1 · · · Vku ∈ Cα(M), for any Vj ∈ X(M)} where Cα(M) = C0,α(M) = � u ∈ C0(M) | sup x̸=y |u(x) − u(y)| distg0(x, y)α < ∞ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Upon fixing a norm, Ck,α(M) becomes a Banach space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Spaces of sections of smooth vector bundles with Sobolev or H¨older regularity are defined using local trivializations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We remark that for both Sobolev and H¨older spaces, a different choice of background metric g0 does not change the spaces themselves, and different choices of metrics result in equivalent norms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Πg and Variance operators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For the rest of this discussion, fix a negatively curved metric g on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In [Gui17b], an operator Πg : Hs(T 1Sg) → H−s(T 1Sg) is constructed using microlocal tools.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' When restricted to f ∈ C∞(T 1Sg) satisfying the mean zero property (that is, ⟨f, 1⟩L2(T 1Sg) = 0), it is given by Πg : C∞(T 1Sg) → D′(T 1Sg), ⟨Πgf, f ′⟩ = lim T →∞ � T −T ⟨f ◦ φt, f ′⟩L2(T 1Sg)dt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here φt is the geodesic flow of g on T 1Sg and the convergence of the integral on the right hand side is guaranteed by exponential decay of correlations for φt (see [Liv04]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From another perspective, Πg is related to the Variance and Covariance, arising from the Thermody- namic formalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 12 XIAN DAI AND NIKOLAS EPTAMINITAKIS Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The variance of f ∈ C∞(T 1Sg) which is of mean zero with respect to µL g is defined as Var(f, µL g ) = lim T →∞ 1 T � T 1Sg �� T 0 f(φt(x))dt �2 dµL g (x) and the covariance of two µL g -mean zero functions f1, f2 ∈ C∞(T 1Sg) is given by Cov(f1, f2, µL g ) = lim T →∞ 1 T � T 1Sg �� T 0 f1(φt(x))dt � �� T 0 f2(φt(x))dt � dµL g (x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A crucial fact is that if f ∈ C∞(T 1Sg) is of mean zero, one can use the φt-invariance of the Liouville measure µL g to obtain (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) ⟨Πgf, f⟩ = Var(f, µL g );' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A proof can be found in [Pol94, Proposition 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) is always nonnegative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Similarly, one can check that ⟨Πgf1, f2⟩ = Cov(f1, f2, µL g ) if f1, f2 are of mean zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following Theorem is proved by Guillarmou in [Gui17b].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We state it in our setting: Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 ([Gui17b, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1], [GL21, Section 4A]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For all s > 0, the operator Πg : Hs(T 1Sg) → H−s(T 1Sg) is bounded and self-adjoint and satisfies the following properties: (1) Πg is positive in the sense that ⟨Πgf, f⟩ ≥ 0 for all real-valued f ∈ Hs(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (2) If f and Xgf belong to Hs(T 1Sg) , then ΠgXgf = 0, where Xg is the geodesic vector field on T 1Sg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (3) If f ∈ Hs(T 1Sg) with ⟨f, 1⟩L2(T 1Sg) = 0, then Πgf = 0 if and only if there exists a solution w ∈ Hs(T 1Sg) to the cohomological equation Xgw = f, and w is unique modulo constants.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (4) Πg1 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (5) If f ∈ Hs(T 1Sg), then ⟨Πgf, 1⟩ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These properties of Πg are important for introducing the covariance metric from [GKL21, Section 2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, the fact that Πg1 = 0 allows one to use (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) to make sense of Πg for all C∞(T 1Sg): once one notices that Πgf = Πg(f − ⟨f, 1⟩L2(T 1Sg)), the following is immediate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The operator Πg : C∞(T 1Sg) → D′(T 1Sg) is given by ⟨Πgf, f ′⟩ := lim T →∞ � T −T ⟨Pg(f) ◦ φt, f ′⟩L2(T 1Sg)dt, where Pg : C∞(T 1Sg) → C∞(T 1Sg) is the projection operation defined by Pg(f) := f − ⟨f, 1⟩L2(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Symmetric tensors on a surface S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We denote by Sm(S) the space of smooth symmetric m-tensors on S (and we use Sk,α m (S) when we need Ck,α regularity).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If f ∈ Sm(S) and m ∈ N0 = {0, 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' }, we denote by π∗ mf ∈ C∞(T S) the map π∗ mf(x, v) := fx(v, · · · , v).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So π∗ m converts a symmetric m-tensor to a function on the tangent bundle T S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A Riemannian metric g naturally induces a scalar product ⟨·, ·⟩ on Sm(S) (see for example [GL21, Section 2A1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The formal adjoint of π∗ m is given by declaring ⟨f, πm∗h⟩L2g(S) = ⟨π∗ mf, h⟩L2(T 1Sg), where f ∈ Sm(S) and h ∈ C∞(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fix a smooth Riemannian metric g on S for the rest of this discussion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We denote by Dg the sym- metrization of the covariant derivative with respect to the Levi-Civita connection ∇g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One has the following relation [GL21, Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3] between the geodesic vector field Xg on T 1Sg and the operator Dg, (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) Xgπ∗ m = π∗ m+1Dg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The formal adjoint of Dg is the negative of the divergence operator on symmetric m-tensors, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' D∗ g := − trg ◦∇g : Sm(S) → Sm−1(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that the negative Laplace-Beltrami operator on functions is given by ∆g = −D∗ gDg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 13 We will be mostly interested in symmetric 2-tensors, either smooth or of H¨older regularity, and for those, the following L2-orthogonal decompositions will be useful.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Any tensor f ∈ Sk,α 2 (S) can be decomposed uniquely as a sum (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3) f = Dgχ + v, where χ ∈ Sk+1,α 1 (S) and v ∈ Sk,α 2 (S) satisfies D∗ gv = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The component Dgχ is often called the potential part of f, whereas the divergence free component v is called solenoidal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Another helpful decomposition of f ∈ Sk,α 2 (S) is the one into a conformal and a trace free part with respect to g: f = f1 + f2, where f1 = 1 2(trg f)g is conformal to g and f2 = f − 1 2(trg f)g is trace free.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The space M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here we summarize some useful facts found in [GKL21, Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, we defined M as the space of smooth Riemannian metrics on a closed orientable smooth surface S of genus 풢 ≥ 2 and M− as the open subspace (in the C∞ topology) of negatively curved Riemannian metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The space M is a smooth Fr´echet manifold whose tangent space at g ∈ M can be naturally identified with the space S2(S) of smooth symmetric 2-tensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since M− is an open subset of M in the C∞ topology, it has the same tangent space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The group D0 of smooth diffeomorphisms isotopic to the identity is a Fr´echet Lie group ([Ham82, Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6]) and acts on M on the right by pull back.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This action is smooth and proper on M ([Ebi68], [Ebi70]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, for negatively curved metrics, this action is free [Fra66].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By Ebin’s slice theorem (see [Ebi70], [CK21]), for any g0 ∈ M−, there exists a neighborhood U of g0 in M−, a neighborhood V of Id ∈ D0, and a Fr´echet submanifold W of M− containing g0 such that (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) W × V → U (g, ψ) �→ ψ∗g is a diffeomorphism of smooth Fr´echet manifolds and such that (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5) Tg0W = {v ∈ S2(S)|D∗ g0v = 0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Because the tangent space of the orbit space g · D0 ⊂ M− at g consists of elements of the form LY g for Y ∈ X(S), the fact 1 2LY g = Dg(Y ♭) implies that it consists exactly of the potential symmetric 2-tensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, Tg0W and Tg0(g · D0) are mutually orthogonal with respect to the L2 g0 inner product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For g near g0, one has TgW ∩ Tg(g · D0) = {0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since the action of D0 on M− is proper and free, together with the diffeomorphism property of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4), a neighborhood of [g] in M−/D0 can be identified with a neighborhood of g in W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The set M−/D0 therefore inherits from W the structure of a Fr´echet manifold with its tangent space at [g0] identified with (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will also make use of the space Mk,α − of Ck,α negatively curved metrics, where k ∈ N is large and α ∈ (0, 1), which is a Banach manifold with TgMk,α − = Sk,α 2 (S) at each g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The group Dk+1,α 0 of Ck+1,α diffeomorphisms isotopic to the identity acts continuously, freely and properly on Mk,α − , but not smoothly (see [Tro92]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus we cannot use the quotient manifold theorem to give Mk,α − /Dk+1,α 0 the structure of a smooth manifold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' However, we note that the Dk+1,α 0 orbit through any C∞ metric in Mk,α − is a smooth submanifold of the latter with tangent space at g0 consisting of the Ck,α potential symmetric 2-tensors with respect to g0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' With all these understood, we can proceed to introduce the covariance metric on the space of negatively curved metrics in the next subsection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The covariance metric on M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To construct the covariance metric ([GKL21]) on M−/D0, we first produce a bilinear form G on M− and on Mk,α − .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It might be tempting to think that π2∗ ◦ Πg ◦ π∗ 2 induces a positive definite symmetric bilinear form on Tg(M−/D0) by Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' However, even though Πg is positive (Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2), positive definiteness of the bilinear form associated with π2∗ ◦ Πg ◦ π∗ 2 does not follow (see Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To tackle this problem, the authors in [GKL21] consider the operator Πg m :Sm(S) → S−∞ m (S), Πg m : = πm∗(Πg + 1 ⊗ 1)π∗ m, where the operator 1 ⊗ 1 : C∞(T 1Sg) → C∞(T 1Sg) projects a function f ∈ C∞(T 1Sg) onto its mean ⟨f, 1⟩L2(T 1Sg) and S−∞ m (S) := (Sm(S))′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The operator Πg m can be thought of as an analog of the normal 14 XIAN DAI AND NIKOLAS EPTAMINITAKIS operator of the X-ray transform, defined on a compact manifold with boundary having sufficiently good geometric properties, which averages the X-ray transform of a tensor field over all geodesics passing through a point (see for example [SU04]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On the closed surface (S, g), the X-ray transform is defined as (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6) Ig m : Sm(S) → ℓ∞(C), f �→ Ig mf(c) = 1 L(c) � L(c) 0 π∗ mf(φt(z))dt, where C denotes the set of closed orbits of the geodesic flow and in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6) a closed orbit c of primitive length L(c) is parametrized as φt(z), where t ∈ [0, L(c)] and z ∈ c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The fact that on S the space of all geodesics does not have a manifold structure necessitates the more complicated construction of Πg m, compared to the normal operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now one can define a bilinear form on TgM− as follows: Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Define a bilinear form Gg(·, ·) on TgM− by Gg(h1, h2) := ⟨Πg 2h1, h2⟩L2g(S) for hj ∈ TgM− ≃ S2(S) and j = 1, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The bilinear form Gg(·, ·) satisfies Gg(h, h) = Var(Pg(π∗ 2h), µL g ) + ⟨π∗ 2h, 1⟩2 L2(T 1Sg), for g ∈ M− and h ∈ TgM−, where Var is the variance defined in Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We have Gg(h, h) = ⟨Πg 2h, h⟩L2g(S) = ⟨Πgπ∗ 2h, π∗ 2h⟩ + ⟨π∗ 2h, 1⟩L2(T 1Sg)⟨π∗ 2h, 1⟩L2(T 1Sg) = ⟨Πg� Pg(π∗ 2h) � , π∗ 2h⟩ + ⟨π∗ 2h, 1⟩L2(T 1Sg)⟨π∗ 2h, 1⟩L2(T 1Sg) by Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3 = ⟨Πg� Pg(π∗ 2h) � , Pg(π∗ 2h)⟩ + ⟨π∗ 2h, 1⟩L2(T 1Sg)⟨π∗ 2h, 1⟩L2(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' by Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 (5) The result follows immediately because the first term coincides with Var(Pg(π∗ 2h), µL g ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Corollary 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The bilinear form Gg(·, ·) also satisfies Gg(h1, h2) = Cov(Pg(π∗ 2h1), Pg(π∗ 2h2), µL g ) + ⟨π∗ 2h1, 1⟩L2(T 1Sg)⟨π∗ 2h2, 1⟩L2(T 1Sg) = Cov(Pg(π∗ 2h1), π∗ 2h2, µL g ) + ⟨π∗ 2h1, 1⟩L2(T 1Sg)⟨π∗ 2h2, 1⟩L2(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For a proof, see [Dai19, Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='21 and Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The bilinear form Gg(·, ·) is defined on the Banach manifold Mk,α − for fixed large k and α ∈ (0, 1) and is Ck−3 there, in the sense that for any smooth local sections h1, h2 ∈ C∞(U;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sk,α 2 (S)), where U ⊂ Mk,α − is an open neighborhood of a metric g0, the function (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7) U → R, g �→ Gg(h1(g), h2(g)) is Ck−3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Similarly, if U ⊂ M− and h1, h2 ∈ C∞(U;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' S2(S)) with h1, h2 : Mk,α − → Sk,α 2 (S) smooth for all k, then (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7) is smooth on U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will use the expression in Corollary 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6 which also makes sense on Mk,α − , as the following proof shows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For U ⊂ Mk,α − and for i = 1, 2, consider the map (see [GKL21, Section 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2] for the last equality) Fi(g) : U → R, g �→ ⟨π∗ 2hi(g), 1⟩L2(T 1Sg) = � T 1Sg π∗ 2hi(g)dµL g = 1 Area(S, g) � S trghi(g)dvg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The integral factor can be written locally in coordinates x1, x2 as � 2 � s,t=1 gst(hi(g))st � det(g)dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since for all s, t = 1, 2, the maps g �→ gst and g �→ � det(g) are smooth into Ck,α(S), so is the integrand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then the integral defines a bounded linear map from Ck,α(S) (actually even from C0(S)) into R, so the composition is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The area is given locally by � � det(g)dx, so it is also smooth in g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So the maps Fi and their product are smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 15 Then we show that g �→ Cov(Pg(π∗ 2h1(g)), Pg(π∗ 2h2(g)), µL g ) is Ck−3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From the thermodynamic formal- ism, we know (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Dai19, Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='25]), (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8) Cov(Pg(π∗ 2h1(g)), Pg(π∗ 2h2(g)), µL g ) = ∂2P(sπ∗ 2h1(g) + tπ∗ 2h2(g), Xg) ∂t∂s ���� s=t=0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here P(·, Xg) is the pressure function with respect to the geodesic flow of g (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [PP90]), which is determined by the geodesic vector field Xg ∈ Xk−1,α(T S) ⊂ Xk−1(T S) (note that this inclusion is smooth).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The pressure is real analytic in the first component (see [PP90, Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8], [McM08, page 377]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8) and polarization, to show that g �→ ∂2 1P(0, Xg)(π∗ 2h1(g), π∗ 2h2(g)) is Ck−3, it suffices to show that f(t, g) := P(tπ∗ 2h2(g), Xg) : R × Mk,α − → R is Ck−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since we know U ∋ g �→ π∗ 2hj(g) ∈ Ck,α(T S) and U ∋ g �→ Xg ∈ Xk−1(T S) are smooth, from [Con92, Theorem C(a)] one knows that upon fixing t = t0, the map P(t0π∗ 2h2(g), Xg) is Ck−1 respect to g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since varying t does not change the background flows and corresponding subshifts of finite type [Con92, Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1], the proof of [Con92, Theorem C] (page 110) can be adjusted to show that P(tπ∗ 2h2(g), Xg) is jointly Ck−1 for both parameters t and g from the real analytic dependence of the pressure on the first component.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ It is important for our purposes that the bilinear form Gg(·, ·) is positive definite on TgM− ∩ kerD∗ g: Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8 ([GKL21, Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given h ∈ TgM− ∩ kerD∗ g, then Gg(h, h) ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, Gg(h, h) = 0 if and only if h = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Another important criterion for the bilinear form G(·, ·) to descend to M−/D0 is the following Lemma Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose h1 = Dgp ∈ TgM− is a potential tensor with p ∈ S1(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then Gg(h1, h2) = 0 for any h2 ∈ S2(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We write ⟨Πg 2h1, h2⟩L2g(S) = ⟨Πgπ∗ 2(Dgp), π∗ 2h2⟩ + ⟨π∗ 2(Dgp), 1⟩L2(T 1Sg)⟨π∗ 2h2, 1⟩L2(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) and Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, we know that π∗ 2Dgp = Xgπ∗ 1p and that Xgπ∗ 1p is in the kernel of the Πg operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Also ⟨π∗ 2Dgp, 1⟩L2(T 1Sg) = ⟨p, D∗ gπ2∗1⟩L2 g(S), so since π2∗1 = 1 2g and D∗ g = −Trg∇g, we conclude that Gg(h1, h2) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Now we are able to introduce the Riemannian metric from [GKL21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10 ([GKL21, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The bilinear form G produces a Riemannian metric on the quotient space M−/D0, called the covariance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given [g] ∈ M−/D0, we denote the covariance metric at [g] by G[g](·, ·).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The proof of this Proposition can be found in [GKL21, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9] and we only repeat it for its importance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For a fixed g0 ∈ M−, we identify a neighborhood of [g0] ∈ M−/D0 with a slice W ⊂ M− (a Fr´echet submanifold) passing through g0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We verify positive definiteness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For g ∈ W near g0, let h ∈ TgW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since we can decompose h = LY g + h′, where Y ∈ X(S) and D∗ gh′ = 0, by Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9 we obtain Gg(h, h) = Gg(h′, h′) ≥ 0 with equality exactly when h′ = 0, by Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If h′ = 0, the fact that TgW ∩{LY g|Y ∈ X(S)} = {0} yields h = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We notice that the argument does not depend on which slice W we use to identify M−/D0 by Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So G[g](·, ·) is a well-defined Riemannian metric on the quotient space M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From the proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9, we notice that ⟨Πgπ∗ 2h, π∗ 2h⟩ = Var(Pg(π∗ 2h), µL g ) also descends to a bilinear form on M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' However it is not positive definite and therefore does not give a Riemannian metric on M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For example, consider a family of conformal metrics {gt}t∈R ∈ M− given by gt = tg for some g ∈ M−.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since h = ˙g0 = g is divergence free (and therefore not a potential tensor), we have dπM−h = dπM−g ∈ T[g0](M−/D0) is nonzero (where πM− : M− → M−/D0 is the quotient map).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' But Pg(π∗ 2h) = Pg(π∗ 2g) = 0, so ⟨Πgπ∗ 2h, π∗ 2h⟩ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 16 XIAN DAI AND NIKOLAS EPTAMINITAKIS Next we show that the extended mapping class group is an isometry subgroup of the covariant metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that the action of D on M− by pullback induces a right action of the extended mapping class group Mod±(S) on the space M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In the following proposition, if [ψ] ∈ Mod±(S), we write this action as θ[ψ] : M−/D0 → M−/D0, [g] �→ θ[ψ]([g]) = [ψ∗g].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then θ[ψ] is smooth with smooth inverse (note that Mod±(S) is discrete and [g] �→ [ψ∗g] is smooth, as one can see by writing [g] and [ψ∗g] in terms of slices W and ψ∗W as in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is actually an isometry with respect to the covariance metric G[g](·, ·).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12 (Isometry subgroup).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The covariance metric is invariant under the extended mapping class group action on M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In other words, the extended mapping class group is an isometry subgroup of the covariant metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Explicitly, given [g] ∈ M−/D0 and �hj ∈ T[g](M−/D0), for j = 1, 2, and an element [ψ] ∈ Mod±(S), we have Gθ[ψ]([g])(dθ[ψ]�h1, dθ[ψ]�h2) = G[g](�h1,�h2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' First observe that if �h ∈ T[g](M−/D0) and h ∈ TgM− satisfies dπM−h = �h for some g ∈ [g], then dθ[ψ]�h = dπM−(ψ∗h), for any ψ ∈ [ψ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Indeed, let gt ∈ M− be a curve with h = d dtgt �� t=0, so that d dt[gt] �� t=0 = �h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then dθ[ψ]�h = d dt � θ[ψ]([gt]) ��� t=0 = d dtπM−(ψ∗gt) �� t=0 = dπM−(ψ∗h).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This and the definition of the covariance metric imply that it suffices to show (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9) Gψ∗g(ψ∗h1, ψ∗h2) = Gg(h1, h2) for hj ∈ TgM− satisfying dπM−hj = �hj and ψ ∈ D, since in that case we have (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10) G[g](�h1,�h2) = Gg(h1, h2) = Gψ∗g(ψ∗h1, ψ∗h2) = Gθ[ψ]([g])(dθ[ψ]�h1, dθ[ψ]�h2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note here that the hj are determined by �hj up to the addition of a tensor field which is vertical with respect to the quotient map, that is, a potential tensor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The validity of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10) is independent of the choice of hj by Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To show (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9), recall that Gg(h1, h2) = lim T →∞ 1 T � T −T ⟨Pg(π∗ 2h1) ◦ φt, π∗ 2h2⟩L2(T 1Sg)dt + ⟨π∗ 2h1, 1⟩L2(T 1Sg)⟨π∗ 2h2, 1⟩L2(T 1Sg), where Pg(π∗ 2h1)(x) = π∗ 2h1(x) − ⟨π∗ 2h1, 1⟩L2(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Liouville probability measures of g and ψ∗g are related by pushforward, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', µL ψ∗g = (ψ−1 ∗ )∗µL g , where ψ−1 ∗ : T 1Sg → T 1Sψ∗g is the induced diffeomorphism by ψ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Also, by the naturality of the Levi-Civita connection, the geodesic flows φg t and φψ∗g t of g and ψ∗g respectively are related by conjugation by ψ, that is, φψ∗g t = ψ−1 ∗ φg t ◦ ψ∗ : T 1Sψ∗g → T 1Sψ∗g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A simple change of variable then yields (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Although we have only shown the above theorem for the right pull back action of the extended mapping class group on M−/D0, it naturally also holds for its induced left action introduced in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The special case of T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fischer and Tromba [FT84], using Riemannian geometry and non-linear analysis, reprove the classical result that T (S) = M−1/D0 is a C∞ finite dimensional contractible manifold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Its tangent space at [σ] ∈ M−1/D0 is isomorphic to (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11) Sσ,T T 2 (S) = {h ∈ S2(S)| trσ h = 0, D∗ σh = 0}, where σ ∈ [σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' More specifically, given σ0 ∈ M−1 and k ≫ 1, α ∈ (0, 1), one can construct a local slice S ⊂ M−1 ⊂ Mk,α −1 passing through σ0, identified with a neighborhood of [σ0] ∈ M−1/D0, so that Tσ0S = Sσ0,T T 2 (S) (see [Tro92, Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2] and Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3)2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, for h ∈ TσS the decomposition (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3) holds with v ∈ Sσ,T T 2 (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The space Sσ,T T 2 (S) is related to holomorphic data on the Riemann surface XJ, where J is the complex structure determined by σ and a choice of orientation: 2In [Tro92], the slice S is a submanifold of the Hilbert manifold Ms −1 of hyperbolic metrics with fixed Sobolev regularity, though the proofs work similarly in the H¨older case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 17 Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14 ([FT84, Theorem 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For σ ∈ M−1, there is a canonical isomorphism between the spaces H0(XJ, K2 J) and Sσ,T T 2 (S), given by q �→ Re(q).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus by the Riemann-Roch theorem, the space Sσ,T T 2 (S) is of real dimension 6풢 − 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One can then simplify the formula of the covariance metric when restricting to the Teichm¨uller space T (S) = M−1/D0 and show that it restricts to a scale of the Weil-Petersson metric there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Corollary 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On Teichm¨uller space T (S), the covariance metric at [σ] ∈ T (S) satisfies G[σ](�h,�h) = Var(π∗ 2h, µL σ), where �h ∈ T[σ]T (S), σ ∈ [σ] and h is the lift of �h in Sσ,T T 2 (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We have ⟨π∗ 2h, 1⟩L2(T 1Sσ) = Area(S, σ)−1 � S trσ h dvσ = 0 (see [GKL21, Section 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since h ∈ Sσ,T T 2 (S), one concludes π∗ 2h is of mean zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Combining the above discussions, we obtain: Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='16 ([McM08, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5], [BT08], [LW18, Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given �h ∈ T[σ]T (S), consider the lift h ∈ Sσ,T T 2 (S) given by the real part of a holomorphic quadratic differential q (Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then G[σ](�h,�h) = Var(R(q), µL σ) = C⟨[q], [q]⟩W P([σ]) Here R(q) := π∗ 2(Re(q)) ∈ C∞(T 1Sσ, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The constant C only depends on the topology of S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Blaschke locus in M−/D0 This section discusses the Blaschke locus MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Subsection 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, we introduce some basic concepts from affine differential geometry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then in Subsection 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, we introduce the Blaschke locus and discuss its relation with the holomorphic vector bundle Q3(S) (Subsection 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We then investigate regularity of the Blaschke locus MB/D0 in Subsection 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3 in the spirit of Tromba [Tro92], finishing with a discussion on the topology of the Blaschke locus in Subsection 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) will be the key for our study in this and the next sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Affine differential geometry and Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this subsection we give a brief introduction on affine spheres and Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Those are objects arising from affine differential geometry, which is the study of affine differential invariants, namely differential properties of hypersurfaces of Rn+1 which are invariant under all volume preserving affine transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Standard references for affine differential geometry are [Lof10] and [NS94].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The space of Blaschke metrics, which include hyperbolic metrics as special examples, will be the object of study in what follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A basic construction in affine differential geometry associates to a hypersurface L of Rn+1 a transverse vector field ξ ⋔ L, the affine normal vector field, which is an affine differential invariant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An affine sphere is a hypersurface L whose affine normal lines are concurrent at a point, the center.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We outline here the construction of an affine sphere in the special case of R3 and its associated affine differential invariants.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let L be a hypersurface in R3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A choice of a transverse vector field ξ : L → R3 yields a decomposition R3 = TpL ⊕ ⟨ξ(p)⟩ for any p ∈ L, where ⟨ξ(p)⟩ stands for the line spanned by ξ(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This allows one to decompose the standard flat affine connection D on R3 into tangential part ∇ and normal part as follows, (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) DXY = ∇XY + g(X, Y )ξ, (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) DXξ = −B(X) + τ(X)ξ, where X and Y are tangent vector fields to L and B = Bξ is an endomorphism of T L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Observe that ∇ is a torsion-free connection on T L, so g is a symmetric 2 tensor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By restricting to the case where L is strictly convex and ξ points towards the convex side of the surface L, we can assume g is positive definite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Further, by imposing the conditions τ ≡ 0 and det(ξ, X1, X2)2 ≡ 1 for any g-orthonormal frame (X1, X2), one determines a unique transversal vector field ξ on L, which is an affine differential invariant and is called the affine normal of L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The endomorphism B is then called the affine shape operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, one can check that the vector field ξ being concurrent to a point is equivalent to the affine shape operator B being 18 XIAN DAI AND NIKOLAS EPTAMINITAKIS a nonzero multiple of identity: B = HI for some constant H ∈ R \\ {0}, the affine mean curvature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will focus on the case where H = −1, in which case L is a hyperbolic affine sphere3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will need two other affine differential invariants associated to the affine sphere L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One of them is the affine second fundamental form g, which is symmetric and positive definite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It yields a Riemannian metric which is an affine differential invariant on L, called the Blaschke metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The second is a cubic form A on T L known as the Pick form: it is given by taking the difference ∇ − ∇g, where ∇g denotes the Levi-Civita connection of the Blaschke metric, and lowering an index via g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If we use the conformal class of the Blaschke metric to regard L as a Riemann surface, then the Pick form A is the real part of a cubic differential q = ˜q(z)dz3 on L, which is called the Pick differential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The map f = ξ : L → R3 provides an immersion of L into R3 if the integrability conditions for the structure equations (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) are satisfied4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Written in complex coordinates z determined by the conformal class of the Blaschke metric g, the integrability conditions (see [Lof10, Section 5]) for f are the following partial differential equations, ˜q¯z = 0, (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3) K(g) = −1 + 2|q|2 g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) The first equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3) simply requires the Pick differential q to be holomorphic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The second equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) is an second order partial differential equation in g, where K(g) denotes the Gaussian curvature of g and |q|2 g = |q|2 g3 is the pointwise g norm of the holomorphic cubic differential q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is called Wang’s equation in the affine sphere literature [Wan91].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This equation is of key importance in this note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1 ([Lof99]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) admits a unique smooth solution given a holomorphic cubic differential q on a compact Riemann surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An interesting aspect of affine sphere theory is its connection with Higgs bundle theory introduced in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Wang’s equation can be viewed as a special case of the Hitchin equation for a PGL(3, R) Higgs bundle: let J be a complex structure on S and denote by σ the hyperbolic metric associated to J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let q be a holomorphic cubic differential with respect to the complex structure J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin equation (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) for the Higgs bundle sJ(0, 2q) in fact reduces to a single scalar equation, which is Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) on S associated to (J, q) (see for example [Lab07, Section 9] and [Li19, Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Returning to the closed oriented surface S with genus 풢 ≥ 2 we started with, we denote ˜S its universal cover.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The punchline of the whole discussion is the following important Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 ([Wan91, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given a complex structure J on S, any holomorphic cubic differential q on XJ = (S, J) determines a complete hyperbolic affine sphere f : ˜S → R3 that admits discrete and properly discontinuous subgroup action in SL(3, R) so that the quotient topologically is S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Its Blaschke metric is given by the solution of Wang’s equation on ˜S which descends to S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Conversely, any complete hyperbolic affine sphere f : ˜S → R3 that admits a discrete and properly discontinuous subgroup action in SL(3, R) with quotient topologically given by S defines a complex structure J given by the conformal class of its Blaschke metric and a holomorphic cubic differential q with respect to this complex structure on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A last remark that we want to make about the affine sphere theory is its relation with hyperbolic geometry and Teichm¨uller theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In the special case in which the holomorphic cubic differential q ≡ 0, Wang’s equation reduces to the classical curvature equations for metrics of constant curvature −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore a hyperbolic metric is a special example of a Blaschke metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In these cases, the affine spheres obtained are universal covers of hyperbolic surfaces viewed in the hyperboloid model as mentioned in the introduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Blaschke locus MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this section, we define the Blaschke locus first as a set and then study its manifold structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We define MB to be the space of Blaschke metrics on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The quotient space of MB up to D0-action is denoted by MB/D0, called the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 3By applying a translation, one can always assume that the center of the hyperbolic affine sphere is the origin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 4While f(L) is the immersed affine sphere we obtain through this construction, we often abuse notation and call L the affine sphere.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 19 The Blaschke locus MB/D0 is a subset of the space M−/D0 due to the following Proposition: Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5 ([DW15, Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1], [OT21, Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Any Blaschke metric g is strictly negatively curved, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' K(g) < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fix a choice of orientation on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Denote by J(σ) the complex structure determined by σ and the orientation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5) ˜Q3(S) := � σ∈M−1 H0(XJ(σ), K3 J(σ)), viewed as a subset of M−1×S3(S)C, where the superscript C denotes complexification and XJ(σ) = (S, J(σ)) is the Riemann surface with the complex structure J(σ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6) �g : ˜Q3(S) → MB ⊂ M− be the map that assigns to a pair (σ, q) the solution of Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) on the Riemann surface XJ(σ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now D0 (or D+) act on ˜Q3(S) and M−1 in a natural way from the right by pullback (and similarly from the left by inverse pullback).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Consider the equivalence relation on ˜Q3(S) given by (σ, q) ∼ (σ′, q′) if and only if for some ψ ∈ D0, one has σ′ = ψ∗σ and q′ = ψ∗q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We henceforth identify Q3(S) with ˜Q3(S)/D0 by viewing Q3(S) as a bundle over M−1/D0, for a fixed choice of orientation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' With some abuse of notation we denote elements in ˜Q3(S) by either (σ, q) or (J, q) = (J(σ), q).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is allowed because positively oriented complex structures are in one-to-one correspondence with hyperbolic metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The map �g is equivariant with respect to the action of ψ ∈ D+ by pullback: ψ∗(�g(J, q)) = �g � ψ∗(J, q) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Similarly, it is equivariant with respect to the left action of D+ on ˜Q3(S) and MB by inverse pullback.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus after taking a quotient by the D0 action, we obtain a well defined mapping class group equivariant map g : Q3(S) → MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Denoting g = �g(J, q), we need to verify that K(ψ∗g) = −1+2|ψ∗q|2 ψ∗g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By uniqueness, this will imply that ψ∗g is the solution of Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) associated to the pair ψ∗(J, q).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since ψ is an isometry between ψ∗g and g, we know K(ψ∗g) = ψ∗K(g) = ψ∗(−1 + 2|q|2 g).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It now suffices to show that |ψ∗q|2 ψ∗g = ψ∗|q|2 g on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let z be conformal coordinates with respect to J and write z = ψ(w), with w conformal coordinates with respect to ψ∗J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then if g = eu(z)dzd¯z and q = f(z)dz3, we have ψ∗g = eu(ψ(w))|dz/dw|2dwd ¯w and ψ∗q = f(ψ(w))(dz/dw)3dw3, so that locally |ψ∗q|2 ψ∗g = |f(ψ(w))|2/e3u(ψ(w)) = ψ∗|q|2 g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is a local computation but we have invariantly defined global objects on both sides, so we have the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since the solution of Wang’s equation corresponding to (J, q) is the same as the one cor- responding to (−J, ¯q), the proof of Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6 shows that if one views �g as a map from the bundle of holomorphic cubic differentials over all complex structures (not necessarily positively oriented), then it is also equivariant with respect to the action of D by pullback and inverse pullback, so it descends to an extended mapping class group equivariant map when taking D0 quotients.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This point of view will not be needed or used in the sequel, except briefly in the proof of Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Besides the D0 action on ˜Q3(S), there is also a natural action of S1 on ˜Q3(S) which is given by e2πiθ · (σ, q) = (σ, e2πiθq).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From now on, we will write elements in ˜Q3(S)/S1 as (σ, ⟨q⟩) for the class of (σ, q) ∈ ˜Q3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Because the S1 action on ˜Q3(S) commutes with the D0 action on ˜Q3(S), it descends to an action on Q3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, the map �g is constant on the orbits of this action as seen from (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus by Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6, the maps �g and g descend to a map g0 : Q3(S)/S1 → MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following proposition, whose proof we include for its importance, shows that the map g0 is bijective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 20 XIAN DAI AND NIKOLAS EPTAMINITAKIS Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8 ([OT21, Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose that [(σj, qj)] ∈ Q3(S), for j = 1, 2, and that [gj] = g([(σj, qj)]) are the associated Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then [g2] = [g1] if and only if [(σ2, q2)] = [(σ1, e2πiθq1)] for some θ ∈ [0, 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The “if” direction follows from Propositions 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1 and 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For the converse, suppose that [g1] = [g2], which implies that g1 = ψ∗g2 for some ψ ∈ D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For j = 1, 2, write gj = eujσj for suitable smooth functions uj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then eu1σ1 = ψ∗(eu2σ2) = eψ∗u2ψ∗σ2, which shows that σ1 and ψ∗σ2 are hyperbolic metrics in the same conformal class and thus equal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We now show that q1 = e2πiθψ∗q2 for some θ ∈ [0, 1), which will imply the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since g1 = ψ∗g2, from Wang’s equation we have |q1|2 g1 = ψ∗(|q2|2 g2) = |ψ∗q2|2 ψ∗g2 = |ψ∗q2|2 g1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, if we write q1 = f1(z)dz3 and ψ∗q2 = f2(z)dz3 in conformal coordinates with respect to the complex structure J(g1), where fj is holomorphic for j = 1, 2, we see that |f1| = |f2| pointwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If f1 or f2 is identically zero then they both are and we are done.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Else, writing f2 = λf1 where λ : S → S1 is a meromorphic function, we conclude that λ ∈ S1 must be a constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus q1 = e2πiθψ∗q2 for some θ ∈ [0, 1) and we obtain the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Smoothness of the Blaschke locus MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Our goal in this subsection is to prove Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='17, namely that the Blaschke locus MB/D0 has the structure of a finite dimensional smooth manifold away from the Teichm¨uller space T (S) = M−1/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Our strategy is based on the construction of smooth charts for T (S) as outlined in [Tro92] (see also Subsection 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Briefly, one can construct local compatible smooth charts for the Blaschke locus MB/D0 using the smooth manifold structure of Q3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Throughout, k is a large integer and α ∈ (0, 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The superscript k, α will indicate that the relevant space of functions or sections of a bundle have H¨older regularity of this order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following theorem collects the results in [Tro92, Chapter 2] regarding the smooth manifold structure of Teichm¨uller space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is stated in terms of Ck,α instead of Sobolev regularity, with the proof being the same as in the Sobolev case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let σ0 ∈ M−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' There exists a smooth local submanifold S of Mk,α −1 of dimension 6풢 − 6 passing through σ0 which contains only C∞ metrics and satisfies Tσ0S = Sσ0,T T 2 (S) (see (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, when S is sufficiently small, the map (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7) ΘS : S × Dk+1,α 0 → Mk,α −1 , (σ, ψ) �→ ψ∗σ, is a diffeomorphism onto its image.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The slices S locally parametrize T (S) = M−1/D0 (that is, each S does not contain two distinct metrics in the same D0 orbit) and define smoothly compatible charts, giving T (S) the structure of a smooth manifold of dimension 6풢 − 6, homeomorphic to R6풢−6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A local slice for T (S) through a metric σ0 ∈ M−1 in Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9 is constructed via the Poincar´e map λ : Mk,α − → Mk,α −1 , which takes a metric to the unique hyperbolic metric in its conformal class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' More specifically, λ defines a smooth diffeomorphism between a neighborhood of 0 in Sσ0,T T 2 (S) and S, given by writing S ∋ σ = λ(σ0+h), where h ∈ Sσ0,T T 2 (S) is sufficiently small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since Sσ0,T T 2 (S) is a 6풢 − 6 dimensional vector space consisting of smooth tensor fields, we can write h in terms of a basis {hj}6풢−6 j=1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Smallness of h = �6풢−6 j=1 ajhj means exactly smallness of the coefficients aj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We remark that different choices of k, α (for k sufficiently large) result in equivalent topologies underlying the smooth structures induced by the slices in Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To see this, one can express σ ∈ S in terms of a basis for Sσ0,T T 2 (S) via the Poincar´e map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Explicitly, if in S we have σk = λ(σ0 + �6풢−6 j=1 aj khj) → σ = λ(σ0 + �6풢−6 j=1 ajhj) in the Ck,α topology, we have aj k → aj for all j, therefore σk → σ in C∞ topology as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, since T (S) is homeomorphic to R6풢−6 with respect to the topology induced from any Mk,α −1 and there exist no exotic smooth structures on Rn for n ̸= 4, the smooth structures obtained for T (S) by means of Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9 are equivalent for all values of k, α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 21 Recall that we defined the space ˜Q3(S) in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5) as a space of holomorphic cubic differentials with respect to varying Riemann surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since the projection ˜Q3(S) → M−1 is D0-equivariant, we obtain a well defined surjective map p : Q3(S) → T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Each fiber of p naturally carries the structure of a complex vector space of dimension 5(풢 − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is known that Q3(S) is a smooth vector bundle (it is actually holomorphic, see for example [Ber61]) over a contractible space, so it is globally trivial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Its topology was discussed in Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Below we discuss an identification of Q3(S) with slices in ˜Q3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let σ0 ∈ M−1 and let S be a slice in Mk,α −1 passing through σ0 as in Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We can identify Q3(S) locally near a point [(σ0, q)] with a slice (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8) SQ := � σ∈S H0(XJ(σ), Km J(σ)) over S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given [(σ, q)] ∈ Q3(S) near [(σ0, q0)] and the unique σ ∈ [σ] lying in S, there exists a unique q ∈ H0(XJ(σ), Km J(σ)) such that (σ, q) ∈ [(σ, q)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Indeed, if (σ, q) = ψ∗(σ, q′) for ψ ∈ D0, then because the D0-action is free on M−1, we have that σ = ψ∗σ implies ψ = id.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Using the identification described in Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11 we can obtain trivializations for SQ via a smooth global trivialization φ0 of Q3(S), thus giving each slice SQ a smooth bundle structure so that the projection (σ, q) �→ σ is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' That is, if we let (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9) πSQ : SQ → πSQ(SQ) ⊂ Q3(S) and πS : S → πS(S) ⊂ T (S) be the respective D0 quotient maps and φ0 : Q3(S) → T (S) × C5풢−5 be a smooth global trivialization for Q3(S), then ˜φS = (π−1 S × id) ◦ φ0 ◦ πSQ : SQ → S × C5풢−5 is a (global) smooth trivialization for SQ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Using it, we can write a smooth local frame {(σ, qℓ(σ))}5풢−5 ℓ=1 for the fiber of ˜Q3(S) over σ ∈ S, by choosing a frame {[(σ, qℓ(σ))]}5풢−5 ℓ=1 for the bundle Q3(S) and considering the unique representatives of [(σ, qℓ(σ))] over the slice S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then we can express an element q(σ) of SQ as q(σ) = �5풢−5 ℓ=1 bℓqℓ(σ), bℓ ∈ C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, such a section q(σ) is smooth when viewed as a map into Sk 3(S)C, for any k ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This follows from the construction in [Ber61, Theorem II], where it is shown that for each element f(z)dz3 ∈ Q3(S) �� τ0 lifted to the universal cover D (the unit disk), where τ0 ∈ T (S), one has f(z) = F(z, τ0) for some jointly holomorphic function F(z, τ), with respect to the complex structure on D × T (S), and the fact that S is a smooth chart for T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It follows by Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9 that for two slices S and S′ with U := πS(S) ∩ πS′(S′) ̸= ∅, there exists a smooth map ΨS,S′ : π−1 S (U) → π−1 S′ (U) which maps σ ∈ S to the unique σ′ ∈ S′ such that [σ] = [σ′].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One has ΨS,S′(σ) = ψ∗ σσ, where ψσ = π2 ◦ Θ−1 S′ (σ) with ΘS′ as in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7) and π2 the projection onto the second factor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (A priori, ψσ ∈ Dk+1,α 0 , but because the slices S, S′ consist of smooth metrics, it is actually smooth, see the proof of [Tro92, Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=') Thus we similarly obtain a map (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10) ˜ΨS,S′ : SQ → S′Q, (σ, q) �→ (ψ∗ σσ, ψ∗ σq), and one checks that ˜φS′ ◦ ˜ΨS,S′ ◦ ˜φ−1 S (σ, b) = (ΨS,S′(σ), b) and therefore ˜ΨS,S′ is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In what follows we construct charts for the Blaschke locus MB/D0, away from the Teichm¨uller space T (S), using the map �g in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Similarly to the approach in [Tro92], we will use the Ck,α topology for MB/D0 to give it a smooth structure, although the metrics we are interested in are actually smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The key for the construction is Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will now write this equation slightly differently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Consider the logarithmic density u of a Blaschke metric g given by g = �g(σ, q) = eu(σ,q)σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) is equivalent to the following semilinear elliptic partial differential equation for u: (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11) ∆σu = 2eu − 4e−2u |q|2 σ3 − 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11) has a unique smooth solution u for any given (σ, q) ∈ ˜Q3(S) (Recall Propsition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 22 XIAN DAI AND NIKOLAS EPTAMINITAKIS Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let SQ ⊂ ˜Q3(S) be a slice as in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then the map �g �� SQ : SQ → Mk,α − is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Writing g = euσ, where u satisfies (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11), it suffices to show that the map (σ, q) �→ u(σ, q) ∈ Ck,α(S) is smooth on SQ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Define a map F : SQ × Ck,α(S) → Ck−2,α(S) by F((σ, q), u) = ∆σu − 2eu + 4e−2u |q|2 σ3 + 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then u(σ, q) is given implicitly by F((σ, q), u(σ, q)) = 0 We claim that the map F is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The smoothness of the map S × Ck,α(S) ∋ (σ, u) �→ ∆σu ∈ Ck−2,α(S) follows from the coordinate expression (with summation convention) ∆σu = σkℓ∂2 kℓu + ∂kσkℓ∂ℓu + σkℓ 2 det σ ∂k(det σ)∂ℓu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The map Ck,α(S) ∋ u �→ eu ∈ Ck,α(S) is smooth because the exponential map is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Finally, the map (σ, q) �→ |q|2 σ3 is seen to be smooth by expressing q(σ) = �5풢−5 k=1 bkqk(σ) in terms of an orthonormal frame, where bk ∈ C, and noting that |q|2 σ3 = � k,ℓ bk¯bℓ qk(σ)qℓ(σ) σ3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We then show the partial derivative ∂uF �� ((σ,q),u) : Ck,α(S) → Ck−2,α(S) is an isomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Computing the derivative of F with respect to u at a fixed (σ, q) gives ∂uF �� ((σ,q),u)v = ∆σv − 2euv − 8e−2u |q|2 σ3 v = (∆σ − 2eu − 8e−2u |q|2 σ3 )v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We observe that P := ∂uF �� ((σ,q),u) = ∆σ − 2eu − 8e−2u |q|2 σ3 : Ck,α(S) → Ck−2,α(S) is a bounded linear operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It has trivial kernel: if v ∈ Ck,α(S) satisfies Pv = 0 we have, by the divergence theorem, 0 = ⟨Pv, v⟩L2σ(S) = −∥dv∥2 L2σ(S) − ��� 2eu + 8e−2u |q|2 σ3 �1/2v ��2 L2σ(S), implying that v = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To see that it is surjective, consider w ∈ Ck−2,α(S) ⊂ Hk−2(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since P is self- adjoint with respect to the L2 σ inner product, it has index 0 as an operator P : Hk(S) → Hk−2(S) (see [SA01, Theorem 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1]) and thus it is surjective since it is injective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So there exists v ∈ Hk(S) so that Pv = w ∈ Ck−2,α(S), and by elliptic regularity we see that v ∈ Ck,α(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since ∂uF �� ((σ,q),u) = P : Ck,α(S) �→ Ck−2,α(S) is a continuous bijection between Banach spaces, it is an isomorphism by the open mapping theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since SQ is a finite dimensional manifold, by the Banach manifold implicit function theorem (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lan12, Theorem I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9]), the function u = u(σ, q) is smooth and therefore �g(σ, q) = eu(σ,q)σ is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ We now continue our discussion involving the S1 action on ˜Q3(S) and Q3(S) mentioned in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The S1 action on ˜Q3(S) restricts to an action on each slice SQ, and the identification map πSQ is equivariant with respect to it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover it is smooth, proper and free on SQ∗ = SQ \\ O and on Q∗ 3(S) := Q3(S) \\ O (where O is the zero section, which is canonically identified with T (S)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We obtain Corollary 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The respective quotients Q∗ 3(S)/S1 and SQ∗/S1 are smooth manifolds of real dimension 16풢 − 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following viewpoint of Q∗ 3(S)/S1 will be used in later proofs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since the D0 and S1 actions on ˜Q3(S) commute with each other, we can identify Q∗ 3(S)/S1 ∼= (( ˜Q3(S) \\ O)/S1)/D0, that is, with the S1 quotient taken before the D0 quotient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Next we show in Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15 below that �g �� SQ∗ descends to a map on SQ∗/S1 which is an immersion into Mk,α − .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that, as in the finite dimensional case, a Ck map f : E1 → E2 between Ck Banach manifolds is an immersion if for all z ∈ E1 there exists an open neighborhood Z of z such that f �� Z induces a Ck diffeomorphism of Z onto a submanifold of E2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' equivalently, if for every z ∈ E1 it has injective differential with image that splits (see [Lan12]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The latter condition means that df �� z has closed range Ran(df �� z) and there exists a closed Banach space B ⊂ Tf(z)E2 which is complementary to Ran(df �� z);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' this condition is satisfied automatically when E1 is finite dimensional.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 23 We remind our reader of our different notations �g, g, �g0, g0: the tilde refers to maps before the D0 quotient and the subscript 0 refers to maps after taking S1 quotient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15 (Injective differential).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let (σ0, q0) ∈ ˜Q∗ 3(S) = ˜Q3(S) \\ O and consider a slice SQ∗ := SQ ∩ ˜Q∗ 3(S) containing it, where SQ is as in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8) with S a slice around σ0 as in Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose that for X ∈ T(σ0,q0)SQ∗ one has d�g �� (σ0,q0)X = Dg0χ, χ ∈ Sk+1,α 1 (S), g0 := �g(σ0, q0) where �g is viewed as a map into Mk,α − and Dg0 is the symmetric differential (see Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then X is tangent to the S1 orbit through (σ0, q0) in SQ∗ and so it projects under the quotient map to the zero vector in T(σ0,⟨q0⟩)(SQ∗/S1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, the descended map �g0 : SQ∗/S1 → Mk,α − has injective differential at (σ0, ⟨q0⟩) whose image splits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The map �g0 is an immersion from a sufficiently small neighborhood U of (σ0, ⟨q0⟩) ∈ SQ∗/S1 into Mk,α − .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The image V := �g0(U) is a 16풢 − 17 dimensional submanifold of Mk,α − consisting of smooth Blaschke metrics and satisfying TgV ∩ TgOk+1,α g = {0} for g ∈ V, where Ok+1,α g is the Dk+1,α 0 orbit through g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By means of a trivialization for SQ we can identify X ∈ T(σ0,q0)SQ with a pair (hT T , v), where hT T ∈ Tσ0S = Sσ0,T T 2 (S) and v ∈ R10풢−10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Consider a curve αt = (σt, qt) : (−ǫ, ǫ) → SQ∗ with α0 = (σ0, q0) and ˙α0 = (hT T , v).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We write u(σ, q) for the smooth solution of (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11) for given (σ, q) ∈ SQ∗, and we also write ut = u(αt), ˙ut = d dtut, so that g0 = �g(σ0, q0) = eu0σ0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By our hypothesis, (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12) Dg0χ = d dt�g(σt, qt) �� t=0 = d dt(eu(σt,qt)σt) �� t=0 = eu0hT T + eu0 ˙u0σ0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Taking the L2 g0(S) inner product of equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12) with hT T , (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13) 1 Area(S, g0) � S eu0|hT T |2 g0dvg0 + ⟨g0 ˙u0, hT T ⟩L2g0 (S) − ⟨Dg0χ, hT T ⟩L2g0 (S) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since we are in dimension two, the tensor hT T is trace free and divergence free with respect to any metric that is conformal to σ0, in particular with respect to g0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So the second and third term of (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13) vanish.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We conclude that hT T = 0 and so ˙u0g0 = Dg0χ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We now apply the X-ray transform Ig0 2 on both sides of the equation ˙u0g0 = Dg0χ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since Ig0 2 (Dg0χ)(c) = 0 for every χ ∈ Sk+1,α 1 (S) and for every closed orbit c of the geodesic flow of g0 (see [GKL21]), we have 0 = 1 L(c) � L(c) 0 ˙u0(γ(s))g(˙γ(s), ˙γ(s))ds = 1 L(c) � L(c) 0 ˙u0(γ(s))ds = Ig0 0 ( ˙u0)(c), where the orbit c is parametrized as (γ(t), ˙γ(t)) : [0, L(c)] → T 1 g0S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since Ig0 0 is injective for g0 ∈ M− (see [DS03]), we conclude ˙u0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In summary, (hT T , v) = (0, v) and du �� (σ0,q0)(hT T , v) = du �� (σ0,q0)(0, v) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So ˙α0 = ˙˜α0, where ˜αt is of the form ˜αt = (σ0, ˜qt), and d dtu � ˜αt ��� t=0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Differentiating Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) along ˜αt and using that ˙u0 = 0, we find that 0 = d dt|˜qt|2 g0 �� t=0 = ˜qt∂t˜qt + ˜qt∂t˜qt g3 0 �� t=0 = |˜q0|2 g0 �∂t˜qt ˜qt + ∂t˜qt ˜qt � �� t=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that ˜qt are all holomorphic cubic differentials with respect to J = J(σ0), so ˜qt ˜q0 is a family of meromorphic functions with respect to J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So the above equation implies that the meromorphic function ∂t( ˜qt ˜q0 ) �� t=0 on S is purely imaginary, and therefore constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We conclude that ∂t˜qt|t=0 = λi˜q0, λ ∈ R, which precisely characterizes elements in the tangent space of the S1 orbit through ˜q0 = q0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus we have the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is immediate now that d�g0 �� T(σ0,q0)(SQ∗/S1) is injective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, its image splits because T(σ0,q0)(SQ∗/S1) is finite dimensional.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus �g0 is an immersion at (σ0, ⟨q0⟩), and thus also in a sufficiently small neighborhood of it by definition of an immersion, with its image being a submanifold of Mk,α − which consists of smooth Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For the last statement, recall that TgOk+1,α g consists exactly of potential symmetric 2-tensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14) Tg0V ∩ Tg0Ok+1,α g0 = {0}, 24 XIAN DAI AND NIKOLAS EPTAMINITAKIS by the first statement of the lemma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This implies that the same holds for a sufficiently small neighborhood of g0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To see this, consider a smooth nonvanishing section Y (g) of T V ⊂ T Mk,α − = Sk,α 2 (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then by (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='14) we have ∥πkerD∗g0 Y (g0)∥Ck,α > 0, where πkerD∗g denotes the orthogonal projection with respect to the decomposition (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is because the potential tensor fields are precisely those which are annihilated by πkerD∗g0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The operator πkerD∗g is a bounded operator on Sk,α 2 (S) as a pseudodifferential operator of order 0, and it depends continuously on the metric g in a C∞ neighborhood of g0 (see for example the proof of [GKL21, Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, ∥πkerD∗g Y (g)∥Ck,α is nonzero for g in a neighborhood of g0, which implies TgV ∩ TgOk+1,α g = {0} near g0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Recall that our final goal is to construct smooth charts for the Blaschke locus MB/D0 away from T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15 we constructed slices V in MB ⊂ Mk,α − .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In the following lemma, we show that if V are taken sufficiently small, then they locally parametrize MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If the slice V in Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15 is taken to be sufficiently small, then each point of V corresponds to exactly one orbit of D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let gi = eu(σi,⟨qi⟩))σi ∈ V, i = 1, 2, be two metrics in the same D0 orbit, that is, g2 = ψ∗g1 for some ψ ∈ D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From eu(σ2,⟨q2⟩)σ2 = ψ∗(eu(σ1,⟨q1⟩)σ1), it follows that both σ2 and ψ∗σ1 are hyperbolic metrics in the same conformal class, so it must be the case that σ2 = ψ∗σ1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since σ1, σ2 ∈ S and both are in the same D0 orbit, we conclude that σ1 = σ2 by Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So ψ = id by freeness of the D0 action.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus g1 = g2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ We now state our main theorem in this section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Away from the Teichm¨uller space T (S) = M−1/D0, the Blaschke locus MB/D0 has the structure of a smooth manifold of real dimension 16풢 − 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, the map g0 : Q∗ 3(S)/S1 → (MB/D0) \\ T (S) is a diffeomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' At this point, for each metric g0 ∈ MB we have constructed a local slice V containing it and consisting of smooth Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A slice corresponding to g0 is constructed as the image under �g0 of a neighborhood U ⊂ SQ∗/S1 of �g−1 0 (g0), and via a trivialization of SQ∗ we have U ∼= S × R10풢−11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We have also shown that if V is sufficiently small, it is in bijective correspondence with the D0 orbits passing through it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So V parametrizes MB/D0 near [g0].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To show that the slices V together with the corresponding maps �g−1 0 : V → U define smooth charts, we have to show that they are smoothly compatible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Write πB : MB → MB/D0 for the natural projection with respect to the D0 quotient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that this map is a bijection onto its image when restricting to each slice V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So we can set FV : πB(V) → U ∼= S × R10풢−11, [g] �→ �g−1 0 (g), where g is the unique element in V with g ∈ [g].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We want to show that if V = �g0(U) and V′ = �g0(U′) are different slices whose images πB(V), πB(V′) have nonempty overlap, then the change of charts FV′ ◦ F−1 V : U → U′ is smooth where it is defined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here U′ ⊂ (S′)Q∗/S1 is a chart over a different slice S′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To this end, write FV′ ◦ F−1 V (σ, ⟨q⟩) = FV′([eu(σ,⟨q⟩)σ]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now because [g] = [eu(σ,⟨q⟩)σ] ∈ πB(V) ∩ πB(V′), there exists a unique element eu(σ′,⟨q′⟩)σ′ ∈ V′ such that [eu(σ′,⟨q′⟩)σ′] = [eu(σ,⟨q⟩)σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, there exists an element ψ = ψ(V, V′, [g]) ∈ D0 such that eu(σ′,⟨q′⟩)σ′ = ψ∗(eu(σ,⟨q⟩)σ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So we have (σ′, ⟨q′⟩) = FV′ ◦ F−1 V (σ, ⟨q⟩) = �g−1 0 � eu(σ′,⟨q′⟩)σ′� = �g−1 0 � ψ∗(eu(σ,⟨q⟩)σ) � ∈ U′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In other words, (σ′, ⟨q′⟩) is the unique element in U′ such that eu(σ′,⟨q′⟩)σ′ = ψ∗(eu(σ,⟨q⟩)σ) = eψ∗(u(σ,⟨q⟩))ψ∗σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now σ′ and ψ∗σ are both hyperbolic metrics in the same conformal class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore σ′ = ψ∗σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So by the freeness of the D0 action on M−1 we see that ψ = ψσ is unique and is determined only by the pair σ and σ′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In other words, it does not depend on ⟨q⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This implies that u(σ′, ⟨q′⟩) = ψ∗ σ � u(σ, ⟨q⟩) � =⇒ u(σ′, ⟨q′⟩) = u(ψ∗ σ(σ, ⟨q)⟩) = u(σ′, ψ∗ σ⟨q⟩) =⇒ ⟨q′⟩ = ψ∗ σ⟨q⟩ THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 25 by injectivity of the map ⟨q⟩ �→ u(σ, ⟨q⟩) for each σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore by (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10), (σ′, ⟨q′⟩) = FV′ ◦ F−1 V (σ, ⟨q⟩) = ψ∗ σ(σ, ⟨q⟩) = (ψ∗ σσ, ⟨ψ∗ σq⟩) = ⟨˜ΨS,S′(σ, q)⟩, Hence FV′ ◦ F−1 V is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The second statement is a consequence of Lemmas 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12 and 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15 by taking U ⊂ SQ∗/S1 as a chart for Q∗ 3(S)/S1 near [(σ0, ⟨q0⟩)] and V = �g0(U) as a chart for MB/D0 near [g0] = [eu0σ0] = g0([(σ0, ⟨q0⟩)]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then since �g0 is an immersion at (σ0, ⟨q0⟩), it is a diffeomorphism onto its image upon shrinking U if necessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus g0 : Q∗ 3(S)/S1 → (MB/D0) \\ T (S) is a local diffeomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Because it is bijective (Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8), it is in fact a global diffeormorphism from Q∗ 3(S)/S1 to (MB/D0) \\ T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Corollary 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The quadratic form Gg(·, ·) defined in Section 4 defines a C∞ Riemannian metric on (MB/D0) \\ T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We saw in Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10 that G[g](·, ·) defines a Riemannian metric on M−/D0, so in particular on the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since the slices V we constructed are smooth charts for MB/D0 and they are also finite dimensional smooth submanifolds of Mk,α − , we conclude by Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7 that Gg restricts to a Ck−3 quadratic form on each slice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus it is a Ck−3 metric on MB/D0 away from T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Notice however that since by Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='17 the map g0 : Q∗ 3(S)/S1 → (MB/D0) \\ T (S) is a diffeomorphism regardless of the space Mk,α − of which MB was viewed as a subset, we see that we can choose the k arbitrarily large, concluding that the metric Gg(·, ·) on MB/D0 is smooth away from T (S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Topology of the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The results of the previous section allow us to elaborate on the topological structure of the Blaschke locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The quotient space Q3(S)/S1 is homeomorphic to MB/D0, when the two spaces are endowed with quotient topologies resulting from C∞ topologies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The map g0 : Q3(S)/S1 → MB/D0 is bijective by Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8, and we will first show that it is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Each slice SQ parametrizing Q3(S) carries the smooth structure (and topological structure) of Q3(S), see Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11, and we showed in Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12 that the map �g : SQ → Mk,α − is smooth, so in particular continuous (note that the smoothness also works at the zero section).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is true for any k, α, so �g : SQ → M− is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, writing g locally as g = πB ◦ �g ◦ π−1 SQ : πSQ(SQ) ⊂ Q3(S) → MB/D0 ⊂ M−/D0 (see (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9)), we see that it is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since g is constant on the orbits of the S1 action on Q3(S), the descended map g0 : Q3(S)/S1 → MB/D0 is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We then show that g−1 0 : MB/D0 → Q3(S)/S1 is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose that [gj] j→∞ → [g] ∈ MB/D0 with the quotient topology of M−/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then we can consider lifts gj = eujσj of [gj] to a slice W ⊂ M− about a lift g = euσ ∈ M− of [g] as in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4, which converge to g in C∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here σj, σ ∈ M−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then we have that σj = λ(gj) j→∞ → λ(g) = σ in C∞, where λ is the Poincar´e map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now fix a large integer k, and α ∈ (0, 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The σj do not necessarily lie in a slice S ⊂ Mk,α −1 through σ as in Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9, but for such a slice there exist diffeomorphisms ψσj ∈ D0 such that5 ψ∗ σjσj ∈ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, ψσj depend continuously on σj in the Ck+1,α topology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So since σj → σ ∈ S, it follows that ψσj → id in Ck+1,α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, ψ∗ σjgj → g in Ck,α, and we have λ(ψ∗ σjgj) = ψ∗ σjλ(gj) ∈ S and g−1 0 ([gj]) = [�g−1 0 (gj)] = [ψ∗ σj �g−1 0 (gj)] = [�g−1 0 (ψ∗ σjgj)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus we may replace our assumption that gj → g in C∞ with the assumption gj → g in Ck,α, where σj = λ(gj) ∈ S converge to σ = λ(σ) in Ck,α, and we want to show that [�g−1 0 (gj)] → [�g−1 0 (g)] =: [(σ, ⟨q⟩)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' As already mentioned in Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10, S ∋ σj → σ in Ck,α actually implies that σj → σ in C∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So now we would like to show that ⟨qj⟩ → ⟨q⟩ in SQ/S1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Notice that by Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4), for any qj, q such that gj = �g(σj, qj), g = �g(σ, q), one has |qj|2 gj → |q|2 g in Ck−2,α and therefore in particular in 5A priori, ψσj are only Ck+1,α, but because σj are all smooth and the slice S consists of smooth metrics, they are actually smooth, see the proof of [Tro92, Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 26 XIAN DAI AND NIKOLAS EPTAMINITAKIS C0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, since gj = eujσj → g = euσ and σj → σ in C0 we conclude that uj → u in C0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, |qj|2 σj = e3uj|qj|2 gj → |q|2 σ = e3u|q|2 g in C0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, � S |qj|2 σjdvσj → � S |q|2 σdvσ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15) (q, q′) �→ � S qq′ σ3 dvσ is a continuous Hermitian inner product on the fibers of SQ, so we can choose a local orthonormal frame {ˆqℓ(σ)}5풢−5 ℓ=1 with respect to it and write qj = � ℓ bℓ j ˆqℓ(σj), q = � ℓ bℓˆqℓ(σ) for bℓ, bℓ j ∈ C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then � ℓ |bℓ j|2 = � S |qj|2 σjdvσj j→∞ → � S |q|2 σdvσ = � ℓ |bℓ|2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, the sequence bj = (b1 j, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' , b5풢−5 j ) ∈ C5풢−5 is bounded, and for any limit point ˜b ∈ C5풢−5 of it, the cubic differential ˜q(σ) = � ℓ ˜bℓˆqℓ(σ) is holomorphic with respect to the conformal structure determined by σ and satisfies |˜q|2 σ = |q|2 σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If q ≡ 0, then we have ˜b = 0, and thus qj → q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If q ̸≡ 0, then the ratio ˜q/q defines a meromorphic function on (S, J(σ)), and since |˜q/q|2 = |˜q|2 σ/|q|2 σ = 1, it has values in S1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This implies that it is constant, and therefore ˜q = e2πiθq, θ ∈ [0, 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We conclude that ⟨qj⟩ → ⟨q⟩ in SQ in the S1 quotient topology originating from C0, which is equivalent to the one originating from C∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, [(σj, ⟨qj⟩)] converges to [(σ, ⟨q⟩)] in Q3(S)/S1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Using Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='19, we now have: Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' MB/D0 is a 16풢 − 17 dimensional connected contractible space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Each fiber of Q3(S)/S1 is isomorphic to Cn/S1, where n = 5풢 − 5, by the Riemann-Roch Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Taking away 0 from Cn, we have the following homeomorphism (actually diffeomorphism), (Cn \\ {0})/S1 −→ (0, ∞) × CP n−1, � (z1, · · · , zn) � �−→ ( ��(z1, · · · , zn) ��, � z1, · · · , zn � ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here � � denotes the equivalence class for the S1 action that identifies (z1, z2, · · · , zn) with e2πiθ(z1, z2, · · · , zn) for any θ ∈ [0, 1) and � � denotes the equivalence class for projective lines in Cn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore Cn/S1 is homeomorphic to the cone given by � [0, ∞) × CP n−1� / ∼.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The relation “ ∼ ” glues {0} × CP n−1 to a single point and is trivial otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A deformation retraction of � [0, ∞) × CP n−1� / ∼ to a point is given by ft({(r, x)}) = {((1 − t)r, x)} ∈ � [0, ∞) × CP n−1� / ∼.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here r ∈ [0, ∞), x ∈ CP n−1 and {(r, x)} denotes the equivalence class of (r, x) in � [0, ∞) × CP n−1� / ∼.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since MB/D0 is homeomorphic to Q3(S)/S1 and Q3(S) is a trivial vector bundle over the contractible space T (S), we conclude that MB/D0 is homeomorphic to the product space of T (S) and ([0, ∞) × CP n−1)/ ∼.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The result follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ We conclude with the relation between the Blaschke locus MB/D0 and the Hitchin component H3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following corollary is an immediate consequence of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10 and Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Corollary 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The S1 action on Q3(S) induces a S1 action on H3(S) by the Hitchin map H : Q3(S) → H3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Denote the quotient space by H3(S)/S1 and the descending map by H0 : Q3(S)/S1 → H3(S)/S1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then the composition Φ := g0 ◦ H−1 0 : H3(S)/S1 → MB/D0 is a mapping class group equivariant homeomorphism, where the mapping class group actions on H3(S)/S1 (as outer automorphism group action) and on MB/D0 are the left actions introduced in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geodesics in MB/D0 We will study some families of geodesics with respect to the covariance metric in the Blaschke MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, we identify some geodesics in MB/D0 leaving all compacts sets, using the Hitchin orbifold representations introduced in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3, and we estimate their lengths with respect to covariance metric in Subsection 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 27 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geodesics in the locus MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Throughout this section, we fix a presentation Y ≃ [S/Σ] of an orbifold Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, we assume that Y = YJ descends from a Riemann surface XJ = (S, J) so that Y ≃ [XJ/Σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In [ALS22], the orbifolds of negative Euler characteristic with 1-dimensional Hitchin components are classified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These are non-orientable orbifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, for Hit(π1Y, PGL(3, R)), one has Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1 ([ALS22, Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let Y be a non-orientable orbifold of negative Euler characteristic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then we have dim Hit(π1Y, PGL(3, R)) = 1 if and only if the orientable double cover Y + of Y satisfies one of the following: (1) Y + is a sphere with 4 cone points of respective orders m1 = m2 = m3 = 2 and m4 ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (2) Y + is a sphere with 3 cone points of respective orders m1 ≥ 3, m2 ≥ 3 and m3 ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, the space Hit(π1Y, PGL(3, R)) is homeomorphic to the one dimensional space H3(Y ) := FixΣH3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Among the examples of orbifolds Y ≃ [XJ/Σ] given in Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, there are examples of H3(Y ) ⊂ H3(S) which are parametrized by a single holomorphic cubic differential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These are Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 ([ALS22, Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5, Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose dim H3(Y )=1 and H3(Y ) is parametrized by a single non-vanishing cubic differential, then Y + must be a sphere with 3 cone points of respective orders m1 ≥ 3, m2 ≥ 3 and m3 ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Remark 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Teichm¨uller space T (Y +) for the orbifolds Y + in Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 (spheres with 3 cone points) is of dimension 0 (see [Thu, Corollary 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore Y +, which is the orientable double cover of Y , has a unique complex structure and Y also inherits a unique “complex structure”, presented as Y = YJ ≃ [XJ/Σ] (see Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From now on, we restrict our interest to orbifolds Y = YJ for which H3(Y ) is one dimensional and is parametrized by a single non-vanishing holomorphic cubic differential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that elements in Σ act on XJ as holomorphic or anti-holomorphic maps and Y ≃ [XJ/Σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For Y arising from Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, the vector space FixΣH0(XJ, K2 J) is trivial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So in these cases, we have a homeomorphism FixΣH0(XJ, K3 J) HJ ≃ H3(Y ) given by the Hitchin parametrization (recall Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Because H3(Y ) is a real one dimensional subspace of H3(S), the vector space FixΣH0(XJ, K3 J) = {q ∈ H0(XJ, K3 J) | ψA · q = q, ∀ψ ∈ Σ} is also real one-dimensional.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It is formed by the real span of a single holomorphic cubic differential q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To further consider the counterpart of H3(Y ) in MB/D0, we need to discuss the S1 action on H3(Y ) and FixΣH0(XJ, K3 J) ⊂ 3� i=2 H0(XJ, Ki J) (recall Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We first need the following lemma which allows us to identify the Hitchin parametrization HJ and the Hitchin map H on some special fibers: Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For any complex structure J, when restricting to H0(XJ, K3 J), the composition of the inverse of the Hitchin map H−1 and the Hitchin parametrization HJ H−1 ◦ HJ : 3 � i=2 H0(XJ, Ki J) → H3(S) → Q3(S) satisfies H−1 ◦ HJ|H0(XJ,K3 J) = Id|H0(XJ ,K3 J), where H0(XJ, K3 J) is identified with H0(X[J], K3 [J]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin map H : Q3(S) → H3(S) is a homeomorphism and H([(J, q)]) = HJ(0, q) for any representative (J, q) in [(J, q)] ∈ Q3(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Equivalently, one has that H−1 ◦HJ(0, q) = [(J, q)] ∈ H0(X[J], K3 [J]) is the identity map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Regarding to the S1 action on H3(Y ) with Y = YJ arising from Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, we have Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The S1 action on H3(S) induces a two-to-one identification on H3(Y ) except at HJ(0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The quotient of H3(Y ) by the Z2 action induced from the S1 action, denoted by H3(Y )/Z2, is homeomorphic to R+ = [0, ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 28 XIAN DAI AND NIKOLAS EPTAMINITAKIS Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Hitchin parametrization HJ is Σ-equivariant and is a homeomorphism between FixΣH0(XJ, K3 J) and H3(Y ) by Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' After identifying FixΣH0(XJ, K3 J) with FixΣH0(X[J], K3 [J]) and HJ with H by the previous lemma, the S1 action on Q3(S) induces a Z2 action on FixΣH0(XJ, K3 J) = spanR(q) ⊂ 3� i=2 H0(XJ, Ki J).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, this Z2 action identifies tq with −tq for any t ∈ R/{0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The identification is trivial when t = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We obtain that the quotient H3(Y )/Z2 is homeomorphic to the half line R+ = [0, ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ With what we have obtained, we are able to show the following lemma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It suggests that the half line given by H3(Y )/Z2 provides a (unparametrized) geodesic in MB/D0 via the map Φ : H3(S)/S1 → MB/D0 defined in Corollary 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The set Φ(H3(Y )/Z2) ⊂ MB/D0 is a fixed point set of the group action of Σ, where Σ ≤ D is identified with a finite subgroup of Mod±(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If ψ ∈ Σ is orientation-preserving, then the fact that every point in Φ(H3(Y )/Z2) is fixed by [ψ] follows from Corollary 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='21 and the definition of H3(Y ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Otherwise, if ψ ∈ Σ is orientation-reversing, then it is an anti-holomorphic map with respect to XJ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We have ψ∗q ∈ H0(X−J, K3 −J) for q ∈ H0(XJ, K3 J).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Notice that Φ(H3(Y )/Z2) = g0◦H−1 0 � H3(Y )/Z2 � = g0 � FixΣH0(XJ, K3 J)/Z2 � by Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For q ∈ FixΣH0(XJ, K3 J), the fact that ψA · q = q implies, by the discussion in Subsection 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3, ψ∗q = κ−1 ψ ◦ q ◦ ψ = τψ−1 ◦ q ◦ ψ = (ψA)−1 · q = q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Together with the observation that the solution of equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) is invariant under the complex conjugation z → z and q → q, we obtain [ψ]∗g0([(J, ⟨q⟩)]) = g0([(−J, ⟨q⟩)]) = g0([(J, ⟨q⟩)]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Here we made use of Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So [ψ]·g0([(J, ⟨q⟩)]) = [ψ−1]∗g0([(J, ⟨q⟩)]) = g0([(J, ⟨q⟩)]) and g0([(J, ⟨q⟩)]) is a fixed point of the induced left action of Σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ We further have Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let Y be a non-orientable orbifold of negative Euler characteristic with orientation double cover Y + given by the cases in Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then H3(Y )/Z2 embeds as a (unparametrized) geodesic in MB/D0 with respect to the covariance metric G(·, ·).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 and Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5, the set Φ(H3(Y )/Z2) is homeomorphic to a half line R+ in MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6, the set Φ(H3(Y )/Z2) is pointwise fixed by the action of the group Σ ≤ Out(π1S) ∼= Mod±(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Because Mod±(S) is a subgroup of isometries of the covariance metric G(·, ·) on MB/D0 and a one dimensional connected subset pointwise fixed by a subgroup of isometries must be a geodesic (see [Kob95, Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1]), we conclude that H3(Y )/Z2 embeds as a (unparametrized) geodesic in MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Infinite length geodesics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In this subsection, we estimate lengths of certain families of curves in the Blaschke locus MB/D0 with respect to the covariance metric;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' some of them are geodesics, as mentioned in the last part of Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Specifically, fix a complex structure J on S and let σ ∈ M−1 be the corresponding hyperbolic metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let q be a holomorphic cubic differential with respect to J and consider the curve {gt = eutσ : t ≥ 0} ⊂ MB, where, as in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11), for each t ≥ 0 the logarithmic density ut satisfies (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) ∆σut = 2eut − 4te−2ut |q|2 σ3 − 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' With gt = eutσ, (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) is equivalent to Wang’s equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) given by Kgt = −1 + 2| √ t q|2 gt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Our goal is to estimate the pressure length of the curve {[gt]}t≥0 ⊂ MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We start with some preliminaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Some Estimates of Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following Lemma benefits from communication with Michael Wolf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The logarithmic density ut of the Baschke metric gt is monotone non-decreasing with respect to the parameter t when t ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, for a fixed t ≥ 0, if ˙ut(p) = 0 for some p ∈ S, then p must be a zero of the holomorphic cubic differential q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 29 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Take a time derivative of (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We find that (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) ∆σ ˙ut = 2 � eut + 4e−2ut t|q|2 σ3 � ˙ut − 4e−2ut |q|2 σ3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We first prove that ˙ut ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose that this is not the case and ˙ut(p) < 0 for some p on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By elliptic regularity, equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) implies that ˙ut ∈ C∞(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then the right hand side of equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) is strictly negative at the minimum ˙ut(p), and the minimum principle yields a contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' For the second statement, if ˙ut(p) = 0 and |q(p)|2 σ > 0, then again the right hand side of equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) is strictly negative at p, which contradicts the minimum principle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ We will need the following result, due to Loftin: Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9 ([Lof01, Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='02]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If ut satisfies equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) with respect to the hyperbolic metric σ and the holomorphic cubic differential q for t ≥ 0, then 0 ≤ ut ≤ log � R � max S �t|q|2 σ3 ��� , where R(a) is the largest positive root of the polynomial pa(x) = 2x3 − 2x2 − 4a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The polynomial pa(x) = 2x3 − 2x2 − 4a has a unique positive root provided a ≥ 0, and if we set xt as the positive root of x3 − x2 − 2 max S � t|q|2 σ3 � , we have lim t→∞ xt t1/3 = � 2 max S �|q|2 σ3 ��1/3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The fact that the polynomial pa(x) has a unique positive root for a ≥ 0 is clear if a = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If a > 0, we know that a real root exists and any real root xa satisfies x2 a(xa − 1) = 2a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus a real root xa satisfies xa > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Taking the derivative, we find that p′ a(xa) > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore there cannot be more than one positive real root, because between any two roots for which p′ a > 0 there has to be at least one more root and pa has at most three real roots in total.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Write b = 2 max S �|q|2 σ3 � > 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' we look for x > 0 satisfying x3 − x2 − bt = 0, for t > 0 large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Set z = x/t1/3 and s = t−1/3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Notice that (x, t) �→ (z, s) is a bijection on (0, ∞) × (0, ∞), so x3 − x2 − bt = 0 with x, t > 0 exactly when F(z, s) := z3 − z2s − b = 0, z, s > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The function F satisfies F(b1/3, 0) = 0 and is smooth near (z, s) = (b1/3, 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since ∂zF(b1/3, 0) = 3b2/3, by the implicit function theorem we conclude that in a neighborhood of (b1/3, 0), the equation F(z, s) = 0 holds if and only if z = f(s) for a smooth function f defined in a neighborhood of s = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Denoting by xt the positive solution of x3 − x2 − bt = 0, lim t→∞ xt t1/3 = lim t→∞ f(t−1/3) = lim s→0 f(s) = b1/3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Loftin proves the following result regarding the asymptotic behavior of the Blaschke metrics gt when t → ∞ (see also [Tho17, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='11 ([Lof07, Proposition 1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The family of Blaschke metrics gt given by equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) degener- ates to the singular flat metric |q| 2 3 associated to the cubic differential q (up to some scaling) in the following sense: when t → ∞, we have t− 1 3 gt → 2 1 3 |q| 2 3 , uniformly on every compact subset of the complement of the zeros of q in S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 30 XIAN DAI AND NIKOLAS EPTAMINITAKIS 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Length estimates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The following proposition shows that any curve in the space MB/D0 corresponding to a ray in a fixed fiber of the bundle Q3(S) has infinite length with respect to the covariance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let σ be a hyperbolic metric on S and q be a nonzero cubic differential which is holomorphic with respect to the complex structure determined by σ and an orientation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then the projection {[gt]}t≥0 ⊂ MB/D0 of the curve gt = {eutσ}t≥0 ⊂ MB, where ut satisfies equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1), has infinite length with respect to the covariance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9, for given class [g] ∈ M−/D0, the norm of an element ˆh ∈ T[g](M−/D0) with respect to the covariance metric is given by Gg(h, h)1/2, where g is a representative in [g], h ∈ TgM− is a lift of ˆh, and Gg(·, ·) is the bilinear form defined in Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus the length of the segment γT := {[gt] : t ∈ [0, T ]} ⊂ MB/D0 is given by L(γT ) = � T 0 � Ggt � ∂t(gt), ∂t(gt) � dt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We will show that lim T →∞ L(γT ) = ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' To simplify notation, we denote ht := ∂t(gt).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We have, according to Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4, Ggt(ht, ht) = ⟨Πgt 2 ht, ht⟩L2(T 1Sgt) = ⟨Πgtπ∗ 2ht, π∗ 2ht⟩ + |⟨1, π∗ 2ht⟩L2(T 1Sgt)|2 Note that ht = ˙utgt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since π∗ 2ht(v) = π∗ 2( ˙utgt)(v) = π∗ 0( ˙ut)(v) for v ∈ T 1Sgt, we have6 Ggt(ht, ht) =⟨Πgtπ∗ 0 ˙ut, π∗ 0 ˙ut⟩ + |⟨1, π∗ 0 ˙ut⟩L2(T 1Sgt)|2 ≥ |⟨1, π∗ 0 ˙ut⟩L2(T 1Sgt)|2 = |⟨1, ˙ut⟩L2(S,dvgt)|2 Area(S, gt)2 , where the inequality follows by Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note that above we wrote ⟨·, ·⟩L2(S,dvgt) = Area(S, gt)⟨·, ·⟩L2gt(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We now examine ˙ut in more detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since our manifold is two dimensional, we have ∆σ = eut∆gt, thus from (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) it follows that (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3) ∆gt ˙ut = � 2 + 8t|q|2 g3 t � ˙ut − 4|q|2 g3 t .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Now integrate (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3) over S with respect to the gt area form: by the divergence theorem, � S ∆gt ˙utdvgt = 0 and therefore �� 2 + 8t|q|2 g3 t � ˙ut, 1 � L2(S,dvgt) = 4 �|q|2 g3 t , 1 � L2(S,dvgt) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The curvature of gt is given by Kgt = 2t |q|2 g3 t − 1 (recall equation (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4)), therefore ⟨(6 + 4Kgt) ˙ut, 1⟩L2(S,dvgt) = 4 �|q|2 g3 t , 1 � L2(S,dvgt) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Using the fact that ˙ut ≥ 0 (by Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='8) and that Kgt < 0 (by Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5), we find (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4) ⟨ ˙ut, 1⟩L2(S,dvgt) ≥ ⟨(1 + 2 3Kgt) ˙ut, 1⟩L2(S,dvgt) = 2 3 �|q|2 g3 t , 1 � L2(S,dvgt) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We now seek for a lower bound for the right hand side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since dvgt = eutdvσ, we have �|q|2 g3 t , 1 � L2(S,dvgt) = � S e−2ut |q|2 σ3 dvσ ≥ 1 x2 t � S |q|2 σ3 dvσ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 6Recall that the Liouville measure is of total mass 1, so locally dµL g = dθdvg 2πArea(S,g) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 31 the inequality is by Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9, where xt is the positive root of the polynomial x3 − x2 − 2 max S � t|q|2 σ3 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus by Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='10, there exists a positive constant Cq,σ and T0 > 0 depending on Cq,σ such that for t ≥ T0 one has �|q|2 g3 t , 1 � L2(S,dvgt) ≥ Cq,σt−2/3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On the other hand, we have Area(S, gt) ≤ Dqt 1 3 + 2π|χ(S)| (see [OT21, Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4]) where Dq is a positive constant depending only on q and χ(S) is the Euler characteristic of S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Combining this with equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) and equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4), and adjusting T0 if necessary, we can find a positive constant C′ q,σ so that for t ≫ T0, � Ggt(ht, ht) ≥ C′ q,σt−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hence we obtain, for T ≥ T0, L(γT ) ≥ L(γT0) + C′ q,σ � T T0 t−1dt T →∞ → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Corollary 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The geodesics H3(Y ) given in Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='7 have infinite length with respect to the covari- ance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Some further estimates for the covariance metric in MB/D0 We collect in this appendix some estimates for the covariance metric in the Blaschke locus MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' One first interesting question is to characterize this covariance metric G(·, ·) at the Fuchsian locus T (S) ⊂ MB/D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Given [σ] ∈ T (S), we know that this metric restricts to a scalar of the Weil-Petersson metric on T[σ]T (S);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' However, the behavior of the covariance metric G(·, ·) at [σ] on directions that are transverse to Fuchsian locus T (S) in MB/D0 remains unclear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Our first estimate is along directions tangential to the family of equivalence classes of Blaschke metrics {[gt]}t≥0 ⊂ MB/D0 that lifts to the curve given by {gt = eutσ : t ≥ 0} ⊂ MB described by equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1), so that σ is a representative in the class [σ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' These represent vectors tangential to fiber directions of the bundle Q3(S)/S1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let σ be a hyperbolic metric on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fix a holomorphic cubic differential q with respect to the complex structure corresponding to σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose �h0 ∈ T[g0]M−/D0 is a vector that lifts to h0 := ∂t(gt)|t=0 ∈ TσM−, where {gt}t≥0 are solutions of equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) with g0 = σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then G[σ] ��h0,�h0 � ≥ 1 π2|χ(S)|2 ∥q∥4 σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' where ∥q∥σ is the L2 norm of q with respect to inner product (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='15) and χ(S) is the Euler characteristic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='9, the computation can be lifted to MB, and we just need to estimate Gσ(h0, h0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that Gσ(h0, h0) = Var(Pσ(π∗ 2h0), µL σ) + ⟨π∗ 2h0, 1⟩2 L2(T 1Sσ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The first part, which equals ⟨Πσπ∗ 2h0, π∗ 2h0⟩, is nonnegative (Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We estimate the second part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Note gt = eutσ and h0 = ˙u0σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' From equation 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3, we have (∆σ − 2) ˙u0 = −4|q|2 σ, so ⟨π∗ 2h0, 1⟩L2(T 1Sσ) = � T 1Sσ π∗ 0 � − 4(∆σ − 2)−1� |q|2 σ �� π∗ 2σdµL σ = � T 1Sσ π∗ 0 � − 4(∆σ − 2)−1� |q|2 σ �� dµL σ Since −(∆σ − 2)−1 is a self-adjoint positive operator and −(∆σ − 2)−1(1) = 1 2, we obtain ⟨π∗ 2h0, 1⟩L2(T 1Sσ) = 1 Area(S, σ) � S 4|q|2 σ � − (∆σ − 2)−1(1) � dvσ = 1 π|χ(S)| � S |q|2 σdvσ = 1 π|χ(S)|∥q∥2 σ, using the Gauß-Bonnet theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This gives the conclusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ 32 XIAN DAI AND NIKOLAS EPTAMINITAKIS The inequality can be strengthened to strict inequality because of the following two lemmas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose g ∈ M− and h ∈ S2(S) is conformal to g, then ⟨Πgπ∗ 2h, π∗ 2h⟩ = 0 if and only if h = Cg, where C is a constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let’s assume h = fg, with f ∈ C∞(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' If suffices to show that ⟨Πgπ∗ 0f, π∗ 0f⟩ = 0 is equivalent to f being a constant function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The proof for this is similar to the proof for [GL21, Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Let Λ = (1 − ∆G)1/2, where ∆G is the (negative) Laplace-Beltrami operator with respect to the Sasaki metric on T 1Sg;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' then for any m, s ∈ R, Λs : Hm(T 1Sg) → Hm−s(T 1Sg) is an invertible bounded self-adjoint operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' So by Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, the composition Λ−2sΠg : Hs(T 1Sg) → Hs(T 1Sg) is bounded for s > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Moreover, we know from equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) and Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, ⟨Λ−2sΠgπ∗ 0f ′, π∗ 0f ′⟩Hs(T 1Sg) = ⟨Πgπ∗ 0f ′, π∗ 0f ′⟩L2(T 1Sg) ≥ 0 for all f ′ ∈ Hs(S), so Λ−2sΠg is also positive on Hs(T 1Sg).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It follows that Λ−2sΠg is self-adjoint on Hs(T 1Sg), and as such it has a self-adjoint square root R which is bounded on Hs(T 1Sg), with the property Λ2sΠg = R2 = R∗R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thus, 0 = ⟨Πgπ∗ 0f, π∗ 0f⟩L2(T 1Sg) = ⟨Λ−2sΠgπ∗ 0f, π∗ 0f⟩Hs(T 1Sg) = ∥Rπ∗ 0f∥2 Hs(T 1Sg) Thus our hypothesis implies that Πgπ∗ 0f = Πg(Pg(π∗ 0f)) = 0 (recall that Πg1 = 0 and Pg(π∗ 0f) = π∗ 0f − ⟨π∗ 0f, 1⟩L2(T 1Sg)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then by Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2, there exists w ∈ Hs(T 1Sg) such that Xgw = Pg(π∗ 0f), where Xg is the geodesic vector field on T 1Sg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Therefore, for every closed orbit c of the flow of Xg, parametrized as φ·(z) : [0, L(c)] → T 1Sg, 0 = 1 L(c) � L(c) 0 (Pg(π∗ 0f))(φt(z))dt = 1 L(c) � L(c) 0 π∗ 0 � f − ⟨f, 1⟩L2g(S) � (φt(z) � dt = Ig 0 � f − ⟨f, 1⟩L2g(S) � (c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' By the injectivity of the X-ray transform for negatively curved metrics ([DS03, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1]), f = ⟨f, 1⟩L2g(S), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', a constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The solution ˙ut of the equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2) ∆σ ˙ut = � 2eut + 8e−2ut t|q|2 σ3 � ˙ut − 4e−2ut |q|2 σ3 cannot be constant for any t ≥ 0 unless q ≡ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We prove the claim by contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose ˙ut = ct and q ̸≡ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Recall that gt = eutσ satisfies ∆gt ˙ut = � 2 + 8t|q|2 g3 t � ˙ut − 4|q|2 g3 t .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This yields: (4 − 8tct)|q|2 g3 t = 2ct =⇒ |q|2 g3 t = 2ct (4 − 8tct).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This is impossible for any t ≥ 0, because q is nonzero and the left hand side only vanishes at the finite zeros of q, while the right hand side is constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' This yields the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ Corollary A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fix a holomorphic cubic differential q with respect to the complex structure corresponding to the hyperbolic metric σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Suppose [gt] ∈ MB/D0 lifts to the solutions {gt} of equation (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1) and �ht ∈ T[gt]MB/D0 lifts to ht = ∂t(gt).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Then ⟨Πgtπ∗ 2ht, π∗ 2ht⟩ > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In particular, this implies G[σ](�h0,�h0) > 1 π2|χ(S)|2 ∥q∥4 σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Since gt = eutσ and ht = ˙utgt, the first statement follows from Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2 and Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The second statement is a special case at t = 0 combined with Proposition A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ THE COVARIANCE METRIC IN THE BLASCHKE LOCUS 33 It would be desirable to obtain a concise explicit formula for G[σ] ��h0,�h0 � mentioned above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' We conclude with a partial answer to this question following from [GM17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' It would be of interest to know whether the formula below can be further simplified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proposition A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Under the same assumptions of Proposition A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, we have G[σ](�h0,�h0) = � 4Γ(1/4 − S)Γ(1/4 + S) Γ(3/4 − S)Γ(3/4 + S)(−∆σ + 2)−14|q|2 σ3 , (−∆σ + 2)−14|q|2 σ3 � L2σ(S) + 1 π2|χ(S)|2 ∥q∥4 σ, where Γ(·, ·) is the Euler Gamma function and S = i 2 � −∆σ(1 − P0) − 1/4, where P0 is the orthogonal projector onto ker ∆σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The proof is a direct application of [GM17, Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1, Remark A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='2] combined with Proposition A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' □ References [Ahl60] Lars V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ahlfors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The complex analytic structure of the space of closed Riemann surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Analytic functions, pages 45–66.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Princeton Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Press, Princeton, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 1960.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Ahl61] Lars V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ahlfors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Some remarks on Teichm¨uller’s space of Riemann surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' of Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (2), 74:171–191, 1961.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Ahl62] Lars V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ahlfors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Curvature properties of Teichm¨uller’s space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Analyse Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 9:161–176, 1961/62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [ALS22] Daniele Alessandrini, Gye-Seon Lee, and Florent Schaffhauser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin components for orbifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Bar10] David Baraglia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' G2 geometry and integrable systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' arXiv e-prints, page arXiv:1002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='1767, Feb 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Ber61] Lipman Bers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Holomorphic differentials as functions of moduli.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 67:206–210, 1961.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [BT08] Martin J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Bridgeman and Edward C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Taylor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An extension of the Weil-Petersson metric to quasi-Fuchsian space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 341(4):927–943, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Chu76] Tienchen Chu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Weil-Petersson metric in the moduli space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Chinese J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 4(2):29–51, 1976.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [CK21] Diego Corro and Jan-Bernhard Kordaß.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Short survey on the existence of slices for the space of Riemannian metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Mexican mathematicians in the world—trends and recent contributions, volume 775 of Contemp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', pages 65–84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', [Providence], RI, [2021] ©2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Con92] Gonzalo Contreras.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Regularity of topological and metric entropy of hyperbolic flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 210(1):97–111, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Dai19] Xian Dai.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geodesic coordinates for the pressure metric at the fuchsian locus, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [DS03] Nurlan S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Dairbekov and Vladimir A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sharafutdinov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Some problems of integral geometry on Anosov manifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ergodic Theory Dynam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Systems, 23(1):59–74, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [DW15] David Dumas and Michael Wolf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Polynomial cubic differentials and convex polygons in the projective plane.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Funct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 25(6):1734–1798, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Ebi68] David G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ebin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On the space of Riemannian metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 74:1001–1003, 1968.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Ebi70] David G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ebin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The manifold of Riemannian metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Global Analysis (Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sympos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Pure Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' XV, Berkeley, Calif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 1968), pages 11–40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', Providence, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 1970.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [FM12] Benson Farb and Dan Margalit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' A primer on mapping class groups, volume 49 of Princeton Mathematical Series.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Princeton University Press, Princeton, NJ, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Fra66] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Frankel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On theorems of Hurwitz and Bochner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Mech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 15:373–377, 1966.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [FT84] Arthur E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fischer and Anthony J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Tromba.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On a purely “Riemannian” proof of the structure and dimension of the unramified moduli space of a compact Riemann surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 267(3):311–345, 1984.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [GKL21] Colin Guillarmou, Gerhard Knieper, and Thibault Lefeuvre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geodesic stretch, pressure metric and marked length spectrum rigidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ergodic Theory and Dynamical Systems, page 1–49, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [GL19] Colin Guillarmou and Thibault Lefeuvre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The marked length spectrum of Anosov manifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' of Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (2), 190(1):321–344, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [GL21] S´ebastien Gou¨ezel and Thibault Lefeuvre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Classical and microlocal analysis of the x-ray transform on Anosov manifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' PDE, 14(1):301–322, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [GM17] Colin Guillarmou and Fran¸cois Monard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Reconstruction formulas for X-ray transforms in negative curvature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fourier (Grenoble), 67(4):1353–1392, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Gui17a] Colin Guillarmou.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Invariant distributions and X-ray transform for Anosov flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Differential Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 105(2):177–208, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Gui17b] Colin Guillarmou.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Invariant distributions and X-ray transform for Anosov flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Differential Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 105(2):177– 208, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Ham82] Richard S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hamilton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The inverse function theorem of Nash and Moser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' ), 7(1):65–222, 1982.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Hit87] Nigel J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The self-duality equations on a Riemann surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (3), 55(1):59–126, 1987.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Hit92] Nigel J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Hitchin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lie groups and Teichm¨uller space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Topology, 31(3):449–473, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Kob95] Shoshichi Kobayashi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Transformation groups in differential geometry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Classics in Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Springer-Verlag, Berlin, 1995.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Reprint of the 1972 edition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lab07] Fran¸cois Labourie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Flat projective structures on surfaces and cubic holomorphic differentials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Pure Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 3(4, Special Issue: In honor of Grigory Margulis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Part 1):1057–1099, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 34 XIAN DAI AND NIKOLAS EPTAMINITAKIS [Lab08] Fran¸cois Labourie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Cross ratios, Anosov representations and the energy functional on Teichm¨uller space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' ´Ec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sup´er.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (4), 41(3):437–469, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lan12] Serge Lang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Fundamentals of Differential Geometry, volume 191 of Graduate Texts in Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Springer, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Li19] Qiongling Li.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An introduction to Higgs bundles via harmonic maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' SIGMA Symmetry Integrability Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Methods Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 15:Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 035, 30, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Liv04] Carlangelo Liverani.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' On contact Anosov flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' of Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (2), 159(3):1275–1312, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lof99] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Loftin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Applications of affine differential geometry to RP(2) surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' ProQuest LLC, Ann Arbor, MI, 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thesis (Ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=')–Harvard University.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lof01] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Loftin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Affine spheres and convex RPn-manifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 123(2):255–274, 2001.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lof07] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Loftin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Flat metrics, cubic differentials and limits of projective holonomies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Dedicata, 128:97–106, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Lof10] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Loftin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Survey on affine spheres.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Handbook of geometric analysis, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' 2, volume 13 of Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (ALM), pages 161–191.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Press, Somerville, MA, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [LW18] Fran¸cois Labourie and Richard Wentworth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Variations along the Fuchsian locus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' ´Ec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Sup´er.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' (4), 51(2):487–547, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [McM08] Curtis T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' McMullen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thermodynamics, dimension and the Weil-Petersson metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Invent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 173(2):365–425, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [MW02] Howard Masur and Michael Wolf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Weil-Petersson isometry group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Dedicata, 93:177–190, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [NS94] Katsumi Nomizu and Takeshi Sasaki.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Affine differential geometry, volume 111 of Cambridge Tracts in Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Cambridge University Press, Cambridge, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geometry of affine immersions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [OT21] Charles Ouyang and Andrea Tamburelli.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Limits of Blaschke metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Duke Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 170(8):1683–1722, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Pol94] Mark Pollicott.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Derivatives of topological entropy for Anosov and geodesic flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Differential Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 39(3):457–489, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [PP90] William Parry and Mark Pollicott.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Zeta functions and the periodic orbit structure of hyperbolic dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Ast´erisque, (187-188):268, 1990.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [SA01] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Shubin and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Andersson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Pseudodifferential Operators and Spectral Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Pseudodifferential Operators and Spectral Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Springer Berlin Heidelberg, 2001.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Sim88] Carlos T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Simpson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Constructing variations of Hodge structure using Yang-Mills theory and applications to uniformiza- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 1(4):867–918, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [SS22] Nathaniel Sagman and Peter Smillie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Unstable minimal surfaces in symmetric spaces of non-compact type.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' arXiv e-prints, page arXiv:2208.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='04885, August 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [SU04] Plamen Stefanov and Gunther Uhlmann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Stability estimates for the X-ray transform of tensor fields and boundary rigidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Duke Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 123(3):445–467, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Tei43] Oswald Teichm¨uller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Bestimmung der extremalen quasikonformen Abbildungen bei geschlossenen orientierten Rie- mannschen Fl¨achen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Abh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Preuss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Akad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Wiss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='-Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Kl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 1943(4):42, 1943.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Tho17] Nicolas Tholozan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Volume entropy of Hilbert metrics and length spectrum of Hitchin representations into PSL(3, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Duke Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 166(7):1377–1403, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Thu] William P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Thurston.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geometry and topology of three-manifolds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Tro92] Anthony J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Tromba.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Teichm¨uller theory in Riemannian geometry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lectures in Mathematics ETH Z¨urich.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Birkh¨auser Verlag, Basel, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Lecture notes prepared by Jochen Denzler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Wan91] Chang Ping Wang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Some examples of complete hyperbolic affine 2-spheres in R3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Global differential geometry and global analysis (Berlin, 1990), volume 1481 of Lecture Notes in Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', pages 271–280.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Springer, Berlin, 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Wie18] Anna Wienhard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' An invitation to higher Teichm¨uller theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' In Proceedings of the International Congress of Mathematicians—Rio de Janeiro 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Invited lectures, pages 1013–1039.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' World Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Publ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', Hackensack, NJ, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Wol75] Scott Wolpert.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Noncompleteness of the Weil-Petersson metric for Teichm¨uller space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Pacific J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 61(2):573–577, 1975.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Wol86] Scott A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Wolpert.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Chern forms and the Riemann tensor for the moduli space of curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Invent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 85(1):119–145, 1986.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Wol87] Scott A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Wolpert.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Geodesic length functions and the Nielsen problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Differential Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 25(2):275–296, 1987.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' [Wol89] Michael Wolf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' The Teichm¨uller theory of harmonic maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Differential Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=', 29(2):449–479, 1989.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content=' Xian Dai Ruhr-Universit¨at Bochum Fakult¨at f¨ur Mathematik e-mail: xian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='dai@ruhr-uni-bochum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='de Nikolas Eptaminitakis Institut f¨ur Differentialgeometrie Leibniz Universit¨at Hannover Welfengarten 1, 30167 Hannover, Germany e-mail: nikolaos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='eptaminitakis@math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='uni-hannover.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} +page_content='de' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE4T4oBgHgl3EQf1Q2P/content/2301.05289v1.pdf'} diff --git a/5tE1T4oBgHgl3EQfBAK1/content/2301.02847v1.pdf b/5tE1T4oBgHgl3EQfBAK1/content/2301.02847v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..b29dafb7c61726af11372644aba59f076c2f6849 --- /dev/null +++ b/5tE1T4oBgHgl3EQfBAK1/content/2301.02847v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e685d637f7b520b2b2bb93615bcb8c1690b0103d118df1f70fb8524c37283372 +size 574361 diff --git a/5tE1T4oBgHgl3EQfBAK1/vector_store/index.pkl b/5tE1T4oBgHgl3EQfBAK1/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..9708484a840503bb0eec2c0f566d5ef3d2791963 --- /dev/null +++ b/5tE1T4oBgHgl3EQfBAK1/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:94d7f9fd698a013f492aa18b4e3b8796039c1c568366a5b25570b32c860bfbe4 +size 164922 diff --git a/69E1T4oBgHgl3EQf7AXC/content/tmp_files/2301.03530v1.pdf.txt b/69E1T4oBgHgl3EQf7AXC/content/tmp_files/2301.03530v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..249330515fa8011a6f5538dfaeb96e899a3d8939 --- /dev/null +++ b/69E1T4oBgHgl3EQf7AXC/content/tmp_files/2301.03530v1.pdf.txt @@ -0,0 +1,1375 @@ +Exciton dissociation mediated by phonons in organic photovoltaics +Stepan Fomichev,1, 2, ∗ Leonard Ruocco,1, 2, ∗ Alexandra Tully,1, 2 and Mona Berciu1, 2, 3 +1Department of Physics and Astronomy, University of British Columbia, Vancouver, British Columbia, V6T 1Z1 Canada +2Stewart Blusson Quantum Matter Institute, University of British Columbia, Vancouver, British Columbia, V6T 1Z4 Canada +3Leibniz Institute for Solid State and Materials Research (IFW) Dresden, Helmholtzstrasse 20, 01069 Dresden, Germany +(Dated: January 10, 2023) +It is well known that phonons can overscreen the bare Coulomb electron-electron repulsion, turning +it into the effective attraction that binds the Cooper pairs responsible for BCS superconductivity. +Here, we use a simple lattice model to prove that the counterpart of this is also possible, whereby +phonons overscreen the bare electron-hole attraction and may turn it repulsive at short distances, +driving exciton dissociation in certain regions of the parameter space. We argue that this phonon- +mediated short-range screening plays an important role in the physics of organic solar cell materials +(and other materials with strong electron-phonon coupling) and could point the way to new strategies +for optimizing their efficiencies. +I. +INTRODUCTION +Organic solar cells (OSCs) have been heralded as a rev- +olutionary technology in the renewable energy sector due +to their flexible and light-weight nature and low produc- +tion cost.1–4 While power conversion efficiencies of OSC +devices have been improving,5 they have not yet reached +levels high enough for OSCs to realize their promise; this +is largely due to the challenge of efficiently extracting free +charge carriers without detrimental losses.6,7 +All light-harvesting devices start by capturing a pho- +ton to excite a bound electron-hole pair – an exciton. +Voltage is ultimately produced through the generation +of free charge carriers, requiring the dissociation of the +exciton through some internal mechanism. +Conventional (inorganic) solar cells, such as those +based on Si or GaAs, have highly effective charge screen- +ing. Because the screened Coulomb attraction is weak, +the Wannier excitons it creates are highly extended and +have small binding energies (few tens of meV). A combi- +nation of thermal fluctuations and external electric fields +is therefore sufficient to drive dissociation. +By contrast, OSC materials have poor charge screen- +ing, resulting in small Frenkel excitons with large binding +energies of a hundred meV or more.8,9 These are stable +against thermal fluctuations and fairly long-lived, lead- +ing to high recombination losses and reduced efficiencies. +This is why understanding and engineering exciton dis- +sociation in OSCs remains a foundational challenge. +To date, the most investigated approach to engi- +neering dissociation is to use bulk-heterojunction inter- +faces combining donor and acceptor materials, chosen so +that the potential gradient at their interface helps over- +come the high binding energies. This setup was shown +to produce higher yields, which was attributed to en- +hanced dissociation of so-called charge-transfer states at +the donor/acceptor (D/A) interface.10,11 Charge-transfer +states are believed to be relatively short-lived excitons +∗ These authors contributed equally. +FIG. 1. +Lattice distortion from an exciton. +Left panel: +when the electron and the hole are far apart (red and blue +circles, respectively) their excess charge induces local lattice +distortions, giving rise to polarons. +Right panel: A small +Frenkel exciton produces a much weaker electric potential and +thus a much smaller lattice distortion. +composed of an electron and a hole that span neigh- +bouring molecular sites. While such excitons are quite +commonly generated in the bulk,12 they delocalize more +easily when they span a D/A interface.13–15 However, +more work is needed to understand both the nature of +these states, and how they can be engineered to optimize +exciton dissociation. +Alongside charge screening, the vibrational character- +istics (phonon modes) of OSCs are also relevant to disso- +ciation – and even less well-understood. Phonons couple +strongly to molecular orbitals, as evidenced by photoe- +mission experiments,16 and thus may be playing a role +in the exciton dynamics.17 Most of the studies to date +have focused on the role of phonons in the formation of +charge transfer states,18,19 and how electron-phonon cou- +pling affects the yield across the D/A interface.20–25 +Here we present a fundamentally different way whereby +electron-phonon coupling can influence exciton dissocia- +tion, even in the absence of a D/A interface. We show +that sufficiently strong electron-phonon coupling can be +directly responsible for exciton dissociation, despite the +presence of significant Coulomb attraction between the +electron and the hole. +The basic idea is sketched out in Fig. +1, where we +arXiv:2301.03530v1 [cond-mat.str-el] 9 Jan 2023 + +2 +compare the effects of electron-phonon coupling when the +hole and electron are far apart (left panel) versus when +bound in a small exciton (right panel). The addition of +an excess carrier results in a local lattice distortion that +dresses that carrier into a polaron. Because the electron +and the hole have opposite charges, in a polar material +they create opposite lattice distortions in their vicinity. +However, when they are bound into a small exciton, their +clouds essentially cancel each other out, and locally there +is no distortion. Another way to say this is that there is +no excess local charge in the presence of a small exciton +– hence no local lattice distortion is expected. +In this picture, electron-phonon coupling is seen to +lower the energy of the dissociated state through polaron +formation, while having little effect on the exciton bind- +ing energy. For large enough electron-phonon coupling +this leads to outright dissociation, as we show next. Even +when that is not the case, our work shows that one must +take polaron formation into consideration when choosing +the donor/acceptor materials, because the polaronic con- +tribution to the energetic landscape can be considerable. +It is important to acknowledge that the idea of exci- +ton dissociation driven by electron-phonon coupling was +proposed previously by Sumi in Ref. 26, where he used a +variational approximation to study the effect of Fr¨ohlich +coupling on an exciton. His prediction of a sharp transi- +tion between bound (exciton) and unbound (free electron +and hole polarons) states was later discredited by Ger- +lach and L¨owen,27 who proved that sharp transitions are +forbidden in this class of Hamiltonians and concluded +that overscreening is impossible in this context. We find +a smooth crossover between the two types of states, fully +consistent with the mathematical proof of Ref. 27. Our +work shows that the contradiction between Refs. 26 and +27 is not because overscreening is impossible, but be- +cause the predicted sharp transition was an artifact of +the variational approximation28 used by Sumi. +The article is organized as follows: Sec. II introduces +the model we use to study this problem, and Sec. III +explains our formalism and approach. Key results are +shown in Sec. IV, while Sec. V contains an extended dis- +cussion of the various approximations made in the model +and the relevance of this phenomenology in the context +of OSCs. +II. +THE MODEL +We consider a single electron-hole pair in a one- +dimensional (1D) ionic chain, where each site supports a +single on-site orbital and a dispersionless Einstein phonon +mode. The single electron-hole pair assumption is reason- +able if, for example, the concentration of photo-generated +electron-hole pairs in the material is very low. We focus +on the 1D chain because here it is known that Coulomb +attraction always results in the formation of strongly +bound excitons, unlike in higher dimensions where ex- +citons can be either exponentially weakly bound (in 2D) +or unstable unless the attraction is sufficiently strong (in +3D).29 Thus, demonstrating dissociation in 1D would im- +ply similar behaviour in higher dimensions, given that the +exciton is even more loosely bound there. +Our Hamiltonian reads: +ˆH = ˆTe + ˆVe−h + ˆHph + ˆVe−ph + ˆVh−ph. +(1) +Here, ˆTe = � +kσ ϵkc† +kσckσ is the kinetic energy of free +electrons in the conduction band, described by a tight- +binding model with a dispersion ϵk = −2t cos k defined +by the hopping t and momentum k ∈ (−π, π] of the bare +electron (the lattice constant is set to a = 1, also ℏ = 1). +The creation operator c† +kσ adds an electron with momen- +tum k and spin σ in this band. Its real space counterpart +is c† +nσ, where n = 1 . . . N indexes the sites of the chain, +with N → ∞. Hole creation operators in real space are +denoted by h† +nσ. For simplicity, we assume that holes are +localized (we reflect on this assumption in Sec. V). +The electron-hole interaction ˆVe−h is modeled as an +on-site Coulomb attraction +ˆVe−h = −U +� +n,σ,σ′ +h† +nσhnσc† +nσ′cnσ′, +(2) +characterized by U > 0. Longer (but finite) range attrac- +tions can be treated similarly and lead to quantitative +changes only, at the cost of adding more parameters. +Optical phonons are described with an Einstein model: +ˆHph = Ω +� +n +b† +nbn +where b† +n creates a phonon with energy Ω at site n. +Finally, the Holstein carrier-lattice couplings are: +ˆVe−ph =Me +� +nσ +c† +nσcnσ(bn + b† +n) +(3) +ˆVh−ph =Mh +� +nσ +h† +nσhnσ(bn + b† +n) +(4) +with electron/hole-phonon couplings Me and Mh, respec- +tively. +Even after all these simplifications, there are four di- +mensionless parameters: U/t, Ω/t, Me/t, Mh/t. To avoid +further complications, we set the temperature T = 0. +This is justified because we are interested in cases where +all energy scales (including the exciton binding energy) +are much larger than the thermal energy, as is typically +the case in organic photovoltaics. +III. +METHODS +Finite Coulomb attraction in 1D always leads to a +ground-state with a stable, bound exciton. Our aim is to +investigate the influence of the carrier-phonon couplings +on the stability of the exciton. To do this, we calculate +the Green’s function +Gij(z) ≡ ⟨0| cihi ˆG(z)h† +ic† +j |0⟩ +(5) + +3 +where we reserve the index i to label the site hosting +the immobile hole (the spin degree of freedom is irrele- +vant for this calculation and we ignore them from now). +The electron can move and the propagator above is the +Fourier transform (at energy z = ω + iη) of the am- +plitude of probability that if the hole is at site i, the +electron moves from site j to site i within a given time +interval, with both the initial and the final states having +no phonons bn|0⟩ = 0. The broadening η → 0 introduces +an artificial lifetime ∝ 1/η for the pair to recombine, and +ˆG(z) = (z − ˆH)−1 is the resolvent. The associated local +density of states (LDOS), plotted in the figures, is de- +fined as A(ω) = −ImGii(z)/π; invariance to translations +ensures that the LDOS is the same at all sites i. +The propagator of Eq. +(5) for the full interacting +Hamiltonian is calculated using a novel, generalized ver- +sion of the Momentum Average approximation (MA) – a +method well established and validated for studying sin- +gle polarons30–33 and bipolarons.34–36 This generalization +allows, for the first time, to include into the variational +space configurations with two phonon clouds located ar- +bitrarily far apart: a hole cloud at site i, and an electron +cloud elsewhere in the chain. +We now briefly describe this method, before moving to +discuss the results. +A. +Non-interacting spectrum +The first step is to obtain the Green’s function in the +absence of carrier-phonon coupling (Me = Mh = 0). The +Green’s function G(i,0) +ij +(z) corresponding to ˆH0 = ˆTe + +ˆVe−h + ˆHph, i.e. for the system without carrier-phonon +coupling, can be calculated analytically (see Appendix +A for details). The spectrum extracted from the poles +of this Green’s function has a discrete eigenstate at ω = +− +√ +4t2 + U 2 and a continuum for ω ∈ [−2t, 2t]. +The +continuum describes the electron unbound to the hole, +i.e. free to move throughout the system. The discrete +eigenstate is the energy of the bound exciton, lying below +this continuum for any value of U > 0. All these features +would be shifted by nΩ if there were n phonons in the +system, but for the propagator of interest to us n = 0. +B. +Turning on interactions: Lang-Firsov +transformation +In the presence of carrier-phonon couplings (finite +Me, Mh), if the carriers are not bound then they each cre- +ate phonon clouds in their vicinity, turning into polarons. +In the bound state their clouds combine, resulting in an +exciton-polaron. +Because the hole cannot move in our simplified model, +and because its coupling to the lattice is local, its phonon +cloud is definitely located at hole site i. +We then use +the Lang-Firsov transformation Ui = exp[ Mf +Ω (bi − b† +i)] to +integrate out the hole-phonon coupling: +˜Hi = U† +i ˆHUi = ˆTe − +� +U + 2MeMh +Ω +� +c† +ici − M 2 +h +Ω + ++ Ω +� +l +b† +l bl + Me +� +l +c† +l cl(b† +l + bl) +(6) +after noting that U† +i blUi = bl − δi,l +Mh +Ω . This transforma- +tion is exact and shows the hole-polaron formation en- +ergy −M 2 +h/Ω but also a change of the effective Coulomb +attraction experienced by the electron when at site i, +U → ˜U = U+ 2MeMh +Ω +, arising from the electron’s coupling +to the hole’s cloud in addition to the Coulomb interac- +tion with the hole. The propagator for the electron-hole +pair +Gij(z) ≡ ⟨0| cihi ˆG(z)h† +ic† +j |0⟩ +(7) +is then rewritten in terms of the transformed Hamilto- +nian: +Gij(z) = e− +M2 +h +2Ω2 +∞ +� +n=0 +1 +n! +�Mh +Ω +�n +Hij(n, ˜z) +(8) +where the new propagators +Hij(n, ˜z) = ⟨0| hiciUi ˜G(˜z)h† +ic† +jb†n +i |0⟩ +(9) +describe the propagation of the electron in the presence +of phonons created by the hole. To obtain Eq. (8) we +used the Baker–Campbell–Hausdorff formula to rewrite +U† +i |0⟩ = e−M 2 +h/2Ω2 �∞ +n=0 +1 +n! +� +b† +i +Mh +Ω +�n +|0⟩, and we intro- +duced ˜z = z + M 2 +h/Ω and the transformed resolvent +U† +i ˆG(z)Ui ≡ ˜G(˜z) = (˜z − ˆhi)−1 +where +ˆhi = ˜Hi + M 2 +h +Ω += ˆTe − ˜Uc† +ici + ˆHph + ˆVe−ph +describes the electron’s kinetic energy, effective interac- +tion with the hole located at i, and coupling to the lattice. +So far, everything is exact. +C. +Analogy to the disorder MA +Note that ˆhi obtained above is formally equivalent to +the Hamiltonian for an electron with Holstein coupling +in the presence of an on-site ‘disorder’ at site i. In pre- +vious work, we have already demonstrated that for such +problems, even the simplest version of the variational mo- +mentum average (MA) approximation, namely the one- +site MA(0) version, is quantitatively accurate if t/Ω is +not too large.37,38 We use the same approximation here, +straightforwardly generalized to include the presence of +phonons created by the hole at site i. Specifically, we im- +plement an MA where the variational space allows for the + +4 +presence of two phonon clouds: one at site i due primar- +ily to the hole, and one at any other site of the system, +created by the electron. We note that the electron cloud +can be allowed to spread over more sites,39 increasing the +accuracy of the approximation: however, the resulting +improvements are quantitatively small and do not affect +the physics. For our purposes it suffices to proceed with +the one-site cloud approximation, which predicts energies +to within an accuracy of a few percent.30,37,38,40 +Proceeding by analogy with the disorder MA calcula- +tion, the equations-of-motion (EOMs) for the propaga- +tors in this two-cloud generalization of MA are obtained +by repeated use of the Dyson identity ˆG = ˆG0 + ˆG ˆV ˆG0 +with ˆV = ˆVe−ph. The resulting system of equations (B1- +B3) and its derivation are shown for completeness in Ap- +pendix B. This linear system that emerges turns out to +be amenable to further simplifications driven by the in- +tuition that not all propagators contribute equally: in- +deed, we find that about half the propagators may be +set to zero (halving the size of the system) with no no- +ticeable changes to the resulting spectrum. More details +on this further approximation and the intuition behind it +are given in C, and in Appendix D we show some results +that justify the validity of this futher approximation. +D. +Exciton wavefunction and the phonon cloud +Once the Green’s functions Gij are obtained by solv- +ing the linear system, to further elucidate the nature +of the ground-state properties of our model we char- +acterize the spatial extent of the exciton wavefunction, +as well as calculate the size of its phonon cloud. +To +obtain the former, we use the Lehmann decomposition +Gij(z) = � +n ⟨0|hici|ψn⟩ ⟨ψn|c† +jh† +i|0⟩/(z − En), where +ˆH|ψn⟩ = En|ψn⟩ are the eigenstates with one electron +and one hole. +At the exciton energy E0, and if η is +much smaller than the gap to the continuum, there is +only one dominant contribution to the Lehmann sum: +Gij(z = E0 + iη) ≈ ⟨0|hici|ψ0⟩ ⟨ψ0|c† +jh† +i|0⟩/iη. Therefore +we can use +ρij(E0) = |⟨0|hicj|ψ0⟩|2 +|⟨0|hici|ψ0⟩|2 ≈ |Gij(E0)|2 +|Gii(E0)|2 +(10) +to characterize the probability that the electron is at a +distance |j −i| from the hole in the exciton ground-state, +scaled such that ρii(E0) = 1. +To calculate the average number of phonons Nph +in the exciton cloud, we use the Hellmann-Feynman +theorem:41,42 +Nph = ⟨ψ0| +� +l +b† +l bl|ψ0⟩ = ∂E0 +∂Ω . +(11) +The derivative is computed numerically with the finite- +difference approach. +Both of these metrics give addi- +tional glimpses at the impact of phonons on the dissoci- +ation process. +IV. +RESULTS +A. +Exciton dissociation driven by electron-phonon +coupling +Armed with the methods from the previous section, +we calculate the spectrum of a system with one electron +and one hole, in the presence of short range (on-site) +Coulomb attraction of magnitude U > 0, and of Hol- +stein carrier-phonon couplings Me and Mh, respectively, +to an optical dispersionless phonon mode of energy Ω. +As stated previously, we focus on 1D chains, where the +carriers’ tendency to bind into an exciton is enhanced. +The electron’s nearest neighbor hopping is t = 1; mean- +while the hole is localized, modeling either a valence band +with a very large effective mass or a hole trapped by an +acceptor impurity. +Exciton dissociation driven by the electron-phonon +coupling is demonstrated graphically in Fig. +2. +The +panels show the contour plot of the LDOS A(ω) at the +hole site versus energy and coupling Me, when U = 1, +Ω = 0.5 and Me = −Mh (panel a); Me = −0.5Mh (panel +b); Me = −2Mh (panel c); and Me = Mh (panel d). +At Me = Mh = 0, the lowest energy feature in the +electron+hole spectrum is a discrete peak marking the +existence of the exciton, just as discussed in Sec. III A. If +MeMh < 0, the discrete peak merges smoothly with the +continuum at M (c) +e +and the exciton dissociates into un- +bound electron- and hole-polarons for Me > M (c) +e . There +is no discontinuity in the LDOS at M (c) +e : thus, there is +no contradiction between our result and Ref. +27. +By +contrast, if MeMh > 0 (panel d), the exciton is further +stabilized by increasing coupling.29 +The carrier-phonon coupling M is set by the gradient +of the carrier-lattice potential with respect to a small +lattice displacement. Because the hole and the electron +have opposite charge, their respective carrier-lattice po- +tentials have opposite signs and thus Me and Mh have +opposite signs. Physically, this is because a lattice dis- +tortion that is energetically favorable for an electron is +generically unfavorable for a hole (left panel of Fig. 1). +Moreover, a very small Frenkel exciton, with the electron +and hole at the same site, creates no local charge imbal- +ance so no lattice distortion is expected (right panel of +Fig. 1). In the atomic limit (t = 0), a vanishing exciton- +polaron binding energy −(Me+Mh)2/Ω ≈ 0 implies that +Me ≈ −Mh. Of course, one can envision more complex +situations where |Me| ̸= |Mh|, however panels (b) and (c) +of Fig. 2 show the same dissociation phenomenology for +different ratios Mh/Me < 0, demonstrating that exciton +dissociation does not require fine-tuning: it is guaranteed +to happen at large enough couplings. On the other hand, +the exciton is always stable if Mh/Me > 0 (see panel (d) +of Fig. 2), because in this case the cloud created by the +exciton is larger than the sum of the individual clouds +created by the two unbound carriers, further stabilizing +the exciton.27,29 + +5 +FIG. 2. Contour plots of the LDOS A(ω) at the hole site when Ω = 0.5 and U = 1. The electron-phonon coupling Me is shown +on the x axis (the corresponding Mh is indicated on the figure). The dashed red line shows where we expect the lower edge of the +continuum of eigenstates describing unbound electron- and hole-polarons, based on their individually calculated MA energies. +Its good agreement with the calculated spectral weight provides a validation of the generalized MA we developed. The fast +oscillations in the continuum weight are finite size effects, due to the cutoff |l − i|m = 50 for the maximum distance between +the two clouds; the maximum numbers of phonons in the two clouds are set to nm = km = 20, sufficient for convergence. The +discrete peak appearing below the continuum at small Me is the exciton bound state, broadened into a Lorentzian by the finite +η = 0.01. With increasing coupling, the exciton approaches the continuum and eventually merges smoothly with it, marking +its dissociation into a pair of unbound electron and hole polarons. This behaviour is robust so long as the couplings are of +opposite sign, so that MeMh < 0, see panels (a)-(c). In contrast, when MeMh > 0, the exciton is always stable, see panel (d). +B. +Exciton dissociation phase diagram +Figure 3 traces the crossover (blue line) between the +ground-states with an exciton-polaron and those with +unbound electron- and hole-polarons. The dashed line +shows the perturbation theory prediction (details in Ap- +pendix E). The agreement is excellent at small U, as +expected, while at larger U perturbation theory overes- +timates the critical coupling needed for dissociation. +C. +Exciton-polaron characteristics +Next, we calculate the average number of phonons Nph +in the exciton cloud, and also the probability ρij that the +electron is at a distance |j−i| from the hole in the exciton +ground-state, scaled such that ρii = 1 (see Sec. III D for +details). +Representative results are shown in Fig. 4. For com- +pleteness, panel (a) shows the LDOS versus ω and Me, +with dissociation occurring slightly above Me = 0.6. +Panel (b) shows Nph of the exciton-polaron (solid yel- +low line), compared to the sum of the ground-state av- +erage numbers of phonons in the electron-polaron and +the hole-polaron clouds (red dashed line); the latter are +calculated individually and then summed. As expected, +when tightly bound by an attractive U, the electron and +the hole largely cancel each other’s lattice distortions, re- +sulting in many fewer phonons than for the free polarons. +Panels (c)-(e) show ρij vs. j − i for Me = 0.4, 0.5, 0.6, +respectively (see vertical dotted lines in panels (a) and +(b)). At small couplings, ρij is sharply peaked at the hole + +-1.0 +1.0 +(a) +Me= Mh +0.8 +-1.5 +tanh(Aoo(w) +0.6 +-2.0 +0.4 +-2.5 +0.2 +-3.0, +0.0 +0 +0.2 +0.4 +0.6 +0.8 +1.0 +Me-1.0 +1.0 +(b) +Me = - 0.5Mh +0.8 +-1.5 +tanh(Aoo(w) +0.6 +-2.0 +0.4 +-2.5 +0.2 +-3.0, +0.0 +0 +0.2 +0.4 +0.6 +0.8 +1.0 +Me-1.0 +1.0 +(c) + 2Mh +0.8 +-1.5 +tanh(Aoo(w) +0.6 +1/m +-2.0 +0.4 +-2.5 +0.2 +-3.0, +0.0 +0 +0.2 +0.4 +0.6 +0.8 +1.0 +Me-1.0 +1.0 +(d) +Me +Mr +0.8 +-1.5 +tanh(Aoo(w) +0.6 +-2.0 +0.4 +-2.5 +0.2 +-3.0, +0.0 +0 +0.2 +0.4 +0.6 +0.8 +1.0 +Me6 +FIG. 3. +Exciton dissociation phase diagram. +The critical +electron-phonon coupling for dissociation increases with the +Coulomb attraction U: it is calculated with MA (blue solid) +and with perturbation theory (orange dashed). The orange +region above the critical line indicates the region where we ex- +pect dissociated electron and hole polarons, whereas the blue +region below the line represents the bound exciton-polaron +region. Other parameters are Ω = 0.5, Me = −Mh. +site i, as expected for a strongly bound, small Frenkel ex- +citon. As the coupling increases, ρij acquires “fat tails”, +that are consistent with a larger exciton. +Just before +dissociation, ρij spreads over very many sites, consis- +tent with the smooth crossover to an unbound electron- +polaron that is (nearly) equally likely to be at any dis- +tance from the hole. +V. +CONCLUSIONS +We have shown that strong carrier-phonon coupling +favors the dissociation of excitons into free polarons, +even on 1D chains where excitons should be stable for +any electron-hole attraction. +This phenomenology is +the counterpart to what drives BCS superconductivity.43 +There, phonons overscreen the electron-electron repul- +sion turning it into an effective attraction. Here, phonons +screen the electron-hole attraction and can turn it repul- +sive, at sufficiently strong coupling. +This phenomenology is robust and should be consid- +ered when analyzing exciton stability in materials with +carrier-phonon coupling because the critical coupling for +dissociation need not be very large. +Figure 4 shows a +critical value Me = −Mh ≈ 0.6, which corresponds to a +weak effective Holstein coupling λc = M 2 +e /2tΩ ≈ 0.36 for +the electron, even though the bare exciton binding energy +is a considerable 0.5t for those parameters. Indeed, panel +(b) of Fig. 4 confirms that the average phonon numbers +are small. Of course, to some extent this is because of +the rather large phonon frequency Ω = 0.5t used there, +although such ratios are reasonable in some organic ma- +terials. +Regarding the main approximations in our model: +FIG. 4. Characterization of the phonon cloud of the exciton- +polaron. a) Contour plot of the LDOS at the hole site, as a +function of the coupling Me and energy ω. The yellow solid +line tracks the exciton energy while the dashed red line tracks +the lower edge of the continuum; their intersection marks +the dissociation point. +We track the exciton energy up to +Me = 0.6, where its binding energy becomes comparable to η. +b) Average number of phonons Nph in the exciton cloud (solid +yellow line) and in the combined electron- and hole-polaron +clouds (red dashed line). c)-e) Probability ρij that the elec- +tron is at a distance |j−i| from the hole in the exciton ground- +state, scaled such that ρii = 1, for Me = 0.4, 0.5, 0.6, respec- +tively. Other parameters are Ω = 0.5, U = 1.5, Me = −Mh, +η = 0.01, nm = km = 20, |l − i|m = 50. +(i) we do not expect different dimensionality to change +this phenomenology. +In 3D, a bare exciton is stable +only if the Coulomb attraction is above a critical value.29 +Whether the critical value is 0 (like in 1D) or finite (like +in 3D) is irrelevant: strong enough carrier-phonon cou- +pling will lower the effective attraction below this critical +value and make the exciton unstable. Our MA method +can be straightforwardly used to study higher-D systems. +(ii) the assumption that the hole is immobile is also +not essential: ‘releasing’ the hole does not change this +picture qualitatively, only quantitatively. Moreover, in + +0.6 +unbound electron +0.5 ++ hole polarons +0.4 +M 0.3 +0.2 +0.1 +exciton polaron +0.2 +0.0 +0.8 +1.0 +0.4 +0.6 +U1.0 +-2.0 +exciton +-2.2 +polarons +0.8 +-2.4 +tanh(Aoo(k, w)) +0.6 +-2.6 +3 +-2.8 +0.4 +-3.0 +-3.2 +0.2 +-3.4 +0.0 +0 +0.2 +0.4 +0.6 +0.8 +Mew +.............................. +exciton +polarons +2 +................ +1 +.. +0 +0.2 +0.4 +0.6 +0.8 +Me7 +FIG. 5. Schematic of the effective potential for the exciton- +polaron. Screened electron-hole interaction (black line), ob- +tained by summing the bare long-range Coulomb attraction +(dashed line) and the contribution from phonon screening +(blue line). Top: when the coupling is weak, the combined +polaron radius D is large and the screening is weak. Mid- +dle: strong coupling leads to small polarons with a strong +short-range repulsion. The total potential has a minimum at +r ∼ D. Bottom: for a rapidly-decreasing bare attraction, a +metastable exciton may be trapped at the r = 0 local mini- +mum, before tunneling into a dissociated state. +the context of OSC materials doped with either acceptor +or donor molecules, it is possible to envision trapping one +species of the carriers on such molecules. +(iii) the assumptions that the coupling is to a single +optical mode and that it is of Holstein type are also not +essential. Regardless of such details, polaron formation +associated with local excess charge leads to a lowering of +the energy. That is the only ingredient necessary for the +mechanism discussed here. +(iv) The assumption of a short-range Coulomb attrac- +tion is non-trivial, however, and relaxing it can lead to +qualitative changes. This is because the phonon screen- +ing discussed here acts only at electron-hole distances +r < D, where D is the sum of the radii of the two po- +larons. If the electron and hole are sufficiently far, so that +each can create its polaron cloud (r > D), the phonon +screening vanishes. This contribution looks roughly like +the blue lines in Fig. +5, where ∆EB ≈ −2MeMh/Ω +is the difference between the exciton-polaron and the +free polarons formation energies. While ∆EB increases +with increasing coupling, D decreases as the polarons be- +come smaller. If the Coulomb attraction decreases rather +slowly with r (dashed line), it is possible that as the +coupling goes from weak (top panel) to strong (middle +panel), the total potential has a well whose minimum +moves from r ∼ 0 to r ∼ D. The latter well can still trap +a stable exciton in 1D, because both the lower dimension- +ality and the increased effective mass of strongly-coupled +Holstein polarons would favor a bound state. +We be- +lieve that this explains why exciton dissociation was not +observed in Ref. 44. However, in higher dimensions rele- +vant for OSCs and/or for lighter Peierls polarons,33 such +a ‘donut’-shaped trap might not suffice to bind the po- +larons and the ground-state at strong coupling would still +exhibit dissociation. +A new scenario can occur if the bare Coulomb attrac- +tion decreases significantly from r = 0 to r = D. +As +sketched in Fig. +5(c), r = 0 can be a local minimum +of the total potential (black line) followed by a potential +barrier and a very shallow potential well for r > D. A +Frenkel exciton with radius smaller than D can then be +metastable, with a lifetime inversely proportional to the +probability of tunneling through the barrier. +Even though the ground state is the dissociated state, +small excitons loaded optically into the metastable state +might live long enough to control the OSC’s behavior. +This may explain the very puzzling fact that some OSC +materials, like pure C60 films, have both very strongly +bound excitons45,46 and finite, albeit small, charge sepa- +ration efficiency.47 The latter would represent the small +fraction of excitons that tunnel out and dissociate. This +scenario is also qualitatively consistent with the ob- +servation that a dilute (∼10%) concentration of donor +molecules increases the charge separation efficiency. Such +molecules boost light absorption, so the metastable exci- +ton state is populated more efficiently. This will increase +the concentration of charge-separated pairs accordingly +if the donor molecules are dilute enough to allow charge +separation to proceed, explaining why peak efficiency oc- +curs at a very low donor molecules concentration.47 The +above scenario cannot be verified with MA; however, a +recent study found a weak potential barrier due to nonlo- +cal phonon screening in lead halide perovskites.48 While +their parameters are very different than ours, their find- +ing supports the possible appearance of this new scenario +in the right circumstances. +The results presented in this work illustrate some of +the interesting physics expected in the many OSCs that +have strong carrier-phonon coupling, and point towards +possible ways to exploit it. We plan to investigate some +of these topics in more detail in future works. + +Vtot(R) +△EB +D +R +U +Vtot(R) +△EB +D +-U +Vtot(R) +AEB +>R +-U8 +ACKNOWLEDGMENTS +We thank Sarah Burke for bringing this problem to +our attention and for many useful discussions. We thank +David Reichman, Holger Fehske and Krzysztof Bieniasz +for insightful comments. We acknowledge support from +the Max Planck-UBC-UTokyo Centre for Quantum Ma- +terials and the Canada First Research Excellence Fund, +Quantum Materials and Future Technologies Program of +the Stewart Blusson Quantum Matter Institute, and from +the Natural Sciences and Engineering Research Council +of Canada (NSERC). We gratefully acknowledge the use +of computing resources from the Stewart Blusson Quan- +tum Matter Institute computing cluster LISA. +Appendix A: Free carrier Green’s function +The Green’s function G(i,0) +ij +(z) corresponding to ˆH0 = +ˆTe + ˆVe−h + ˆHph, i.e. +for the system without carrier- +phonon coupling, can be calculated analytically. In the +absence of electron-phonon coupling there is only an elec- +tron hopping on a 1D tight-binding lattice, subject to an +on-site attractive potential from the static hole located +at i. The corresponding Hamiltonian is H0 = T − Uc† +ici. +Here we calculate its lattice Green’s function: +G(i,0) +lj +(z) = ⟨0| cl[z − H0]−1c† +j |0⟩ +(A1) +Applying Dyson’s identity, we find the EOM: +G(i,0) +l,j (z) = gl−j(z) − Ugi−j(z)G(i,0) +l,i +(z) +(A2) +where the free lattice Green’s functions gl−j(z) += +⟨0| cl[z − T]−1c† +j |0⟩ +can +be +calculated +analytically: +gδ(z) = |ζ(z)||δ|/√z − 2t√z + 2t, with ζ(z) = z/2t − +� +z/2t − 1 +� +z/2t + 1. +Equation (A2) can be solved trivially to find: +G(i,0) +li +(z) = G(i,0) +l−i (z) = +gl−i(z) +1 + Ug0(z) +(A3) +and +G(i,0) +ll +(z) = g0(z) − U [gi−l(z)]2 +1 + Ug0(z). +(A4) +The propagators ˜G(i,0) +il +(z) appearing in the main text +and in other appendices have the same expressions but +with U → ˜U, where ˜U is the overscreened Coulomb at- +traction defined in Sec. III. +Appendix B: Green’s function with carrier-lattice +coupling +Here the MA equations of motion are obtained by re- +peated application of the Dyson identity ˜G(˜z) = ˆG(i) +0 (˜z)+ +˜G(˜z) ˆVe−ph ˆG(i) +0 (˜z) where ˆG(i) +0 (z) = (z − ˆTe + ˜Uc† +ici)−1 +is the resolvent in the absence of electron-phonon cou- +pling. We note that its corresponding Green’s functions +˜G(i,0) +ij +(z) = ⟨0|ci ˆG(i) +0 (z)c† +j|0⟩ equal those calculated in +Sec. A upon replacing U → ˜U. +Using Dyson’s identity once, we find: +Hij(n, ˜z) = ˜G(i,0) +ij +(˜z − nΩ) +�Mh +Ω +�n +e−M 2 +h/2Ω2+ ++ ˜G(i,0) +ij +(˜z − nΩ)Me [nHii(n − 1, ˜z) + Hii(n + 1, ˜z)] + ++ +� +l̸=i +˜G(i,0) +lj +(˜z − nΩ)MeFill(n, 1, ˜z). +(B1) +Here, the terms on the 2nd line arise when the electron +travels to site i and adds to or removes from the phonons +already present there, while the last line describes terms +where the electron moves to some other site l and starts +a new cloud there, with the corresponding generalized +two-cloud propagator: +Fijl(n, k, ˜z) ≡ ⟨0| cihiUi ˜G(˜z)h† +ic† +j(b† +i)n(b† +l )k |0⟩ . +(B2) +The equation of motion (B1) is exact. Solving it neces- +sitates calculating the propagators Fill that appear in it. +We generate their equations of motion using again the +Dyson identity, but now also imposing the variational +constraint consistent with the one-site MA(0) approxi- +mation for the electron cloud, namely that additional +phonons cannot be created away from the two existing +clouds. The resulting EOMs are +Fill(n, k, ˜z) =Me ˜G(i,0) +ll +(˜z − (n + k)Ω) [kFill(n, k − 1, ˜z) + Fill(n, k + 1, ˜z)] ++ Me ˜G(i,0) +il +(˜z − (n + k)Ω) [kFiil(n, k − 1, ˜z) + Fiil(n, k + 1, ˜z)] +Fiil(n, k, ˜z) =Me ˜G(i,0) +ii +(˜z − (n + k)Ω) [kFiil(n, k − 1, ˜z) + Fiil(n, k + 1, ˜z)] ++ Me ˜G(i,0) +il +(˜z − (n + k)Ω) [kFiil(n, k − 1, ˜z) + Fiil(n, k + 1, ˜z)] . +(B3) +Eqs. (B1-B3) define a linear, inhomogeneous system +of coupled equations that can be numerically solved for + +9 +each value of z, with the resulting Hij(n, ˜z) then used in +Eq. (8) to construct Gij(z). However, this approach is +computationally intensive because one needs large cut- +offs for the maximum numbers km, nm of phonons in the +two clouds, as well as for the maximum distance |l − i|m +between the clouds, before convergence is reached. An +improved approach is discussed in Appendix C. +Appendix C: Simplifying the EOMs +A much more efficient yet still accurate solution to Eqs. +(B1-B3) can be obtained by taking advantage of the fact +that for the energies of interest, which lie below the free +electron continuum, the free propagators ˜G(i,0) +il +(z) de- +crease exponentially with the distance |l − i|. If we keep +only the largest term with l = i, then Eqs. (B3) split into +two uncoupled recurrence relations, one for Fill and one +for Fiil, with only the former needed in Eq. (B1). This +former recurrence relation can be solved with the ansatz: +Fill(n, k, ˜z) = A(i,l) +k +(˜z − nΩ)Fill(n, k − 1, ˜z) +(C1) +where we note that Fill(n, 0, ˜z) ≡ Hil(n, ˜z). The contin- +ued fractions +A(i,l) +k +(z) = +kMe ˜G(i,0) +ll +(z − kΩ) +1 − Me ˜G(i,0) +ll +(z − kΩ)A(i,l) +k+1(z) +(C2) +are calculated starting from A(i,l) +km+1(z) = 0 for a suffi- +ciently large km to ensure the desired accuracy. In par- +ticular, this means that we can replace Fill(n, 1, ˜z) = +A(i,l) +1 +(˜z − nΩ)Hil(n, ˜z) in Eq. (B1) to convert it into a +linear system linking only the Hij propagators. This still +requires a summation over all the sites in the system, +which in practice means summing over sites l up to a +distance large enough from i that the sum converges. +An efficient solution of such a linear system was pro- +posed in Refs. 37 and 38 and we adopt it here. It is +based on the observation that for |l − i| ≫ 1, the local +potential ˜U created by the hole becomes irrelevant and +the impurity Green’s function reduces to the free electron +propagator +˜G(i,0) +ll +(˜z) → g0(˜z) = 1 +N +� +k +1 +˜z − ϵk += +1 +√˜z − 2t√˜z + 2t. +(C3) +As a result, for |l − i| ≫ 1, the continued fractions ap- +proach an asymptotic value that becomes independent +of i, l: A(i,l) +1 +(˜z − nΩ) → ΣMA(˜z − nΩ)/Me . Physically, +ΣMA(z) is the MA(0) self-energy of the electron-polaron +in the absence of the ‘impurity’ potential created by the +hole located at i (see Ref. 30 for a derivation) +ΣMA(z) = +M 2 +e g0(z − Ω) +1 − +2M 2 +e g0(z − Ω)g0(z − 2Ω) +1 − 3M 2 +e g0(z − 2Ω)g0(z − 3Ω) +1 − . . . +(C4) +Because this asymptotic value is independent of l, we +can define a renormalized energy +vil(˜z − nΩ) = MeA(i,l) +1 +(˜z − nΩ) − ΣMA(˜z − nΩ) +(C5) +which vanishes fast with increasing |l − i|. The sum in +Eq. (B1) can be recast in terms of it by renormalizing +the energy argument of the free propagators: +Hij(n, ˜z) = ˜G(i,0) +ij +(˜˜zn) +�Mh +Ω +�n +e− +M2 +h +2Ω2 + ˜G(i,0) +ij +(˜˜zn)Me [nHii(n − 1, ˜z) + Hii(n + 1, ˜z)] ++ +� +l̸=i +˜G(i,0) +lj +(˜˜zn)vil(˜z − nΩ)Hil(n, ˜z) +(C6) +where we defined ˜˜zn ≡ ˜z −nΩ−ΣMA(˜z −nΩ). Equations +(C6) converge much more quickly with the summation +over l and can be solved efficiently. +The accuracy of the approximation of replacing the +coupled Eqs. (B1-B3) with the much more compact and +efficienct Eq. (C6) is validated in Appendix D. +Appendix D: Full vs approximate variational +solutions +The full variational solution of the particle+hole prop- +agator can be obtained by simultaneously solving Eqs. +(8), (B1) and (B3). They can be solved numerically, but +this is slow because exceedingly large truncation cutoffs +(system sizes) are required for convergence. +Above in +Appendix C, we proposed a much more efficient approx- +imation which replaces Eqs. (B1)-(B3) with Eqs. (C6). +To validate this approximation, in Fig. 6 we show a +typical comparison of the results of the two methods for +the LDOS at the hole site, focusing on the lower-energy +part of the spectrum, of interest for the dissociation issue. +Evidently, the agreement is very good. Similar diagrams +were produced in all parameter regimes explored in this +paper, thus effectively validating our approximation. + +10 +FIG. 6. Comparison of the LDOS at the hole site from solving +the full variational solution described by Eqs. (8),(B1),(B3), +shown in the left panel, versus the simplified and much more +efficient Eq. (C6), shown in the right panel. Visually, the +two are nearly indistinguishable, with most differences coming +in at higher energies. +Model parameters are U = 1, Ω = +0.5, η = 0.01, Me = −Mh and convergence parameters are +nm = km = 12, |l − i|m = 50. +Appendix E: Perturbation theory for exciton +dissociation +Here we summarize the perturbation theory (PT) cal- +culation used to draw the dissociation line in Fig. +3 +in the main text. We begin by estimating the ground- +state energies for the individual polarons. +The result +for the (static) hole-polaron is Eh +P = −M 2 +h/Ω. To find +the electron-polaron’s PT counterpart, we use the sin- +gle polaron Green’s function at the same one-site MA(0) +level of approximation:30 G(k, z) = [z − ϵk − ΣMA(z)]−1 +where the full expression for ΣMA(z) is shown in Eq. +(C4). +To lowest non-trivial order in PT, it becomes +ΣMA ≈ M 2 +e g0(ω − Ω). Using this expression to find the +lowest k = 0 pole, we find the polaron ground-state en- +ergy to be: +Ee +P (k = 0) = −2t − +M 2 +e +� +Ω(Ω + 4t) +(E1) +The PT-predicted lower edge of the continuum is then at +Emin = Ee +P (k = 0) + Eh +P . +To find the bound exciton energy, we proceed similarly, +essentially solving the EOMs to lowest order in the cou- +plings, and then finding the location of the lowest peak +for k = 0. +For simplicity, we only list here the result +when Me = −Mh. We find the exciton ground-state en- +ergy to be given by Eexc = z0 + αg0(z0 − Ω)M 2 +e where +z0 = − +√ +U 2 + 4t2 is the bare exciton energy, and +α = +4G(i,0) +ii +(z0)[g0(z0 − Ω) − 2G(i,0) +ii +(z0 − Ω)] +1 + 2G(i,0) +ii +(z0)[g0(z0 − Ω) − 2G(i,0) +ii +(z0 − Ω)] +The dissociation occurs when Eexc = Emin. +1 M. Kaltenbrunner, M. S. White, E. D. G�lowacki, T. Seki- +tani, T. Someya, N. S. Sariciftci, and S. Bauer, Nat. Com- +mun. 3 (2012). +2 X. Xu, K. Fukuda, A. Karki, S. Park, H. Kimura, H. Jinno, +N. Watanabe, S. Yamamoto, S. Shimomura, D. Kitazawa, +T. Yokota, S. Umezu, T.-Q. Nguyen, +and T. Someya, +PNAS 115, 4589 (2018). +3 A. Gambhir, P. Sandwell, +and J. Nelson, Sol. Energy +Mater Sol. Cells 156, 49 (2016). +4 L. X. Chen, ACS Energy Lett. 4,10, 2537 (2019). +5 E. H. dos Santos Rosa, E. L. Kowalski and L. F. Toledo, +Sol Energy 221 (2021). +6 A. J. Heeger, Adv. Mater. 26 (2013). +7 J. B. K. Vandewal, S. Mertens and Q. Liu, J. Phys. Chem. +Lett. 11 (2020). +8 S. E. Gledhill, B. Scott, and B. A. Gregg, J. Mater. Res. +20, 3167 (2005). +9 J. Nelson, Elsevier 6, 87 (2002). +10 S. G´elinas, A. Rao, A. Kumar, S. L. Smith, A. W. Chin, +J. Clark, T. S. Van Der Poll, G. C. Bazan, +and R. H. +Friend, Science 343, 512 (2014). +11 S. Sutty, G. Williams, and H. Aziz, J. Photonics Energy +4, 1 (2014). +12 S. Emmerich, S. Hedwig, B. Arnoldi, J. Stockl, F. Haag, +R. Hemm, M. Cinchetti, S. Mathias, B. Stadtm¨uller, and +M. Aeschlimann, J. Phys. Chem. C 124, 23579 (2020). +13 A. A. Bakulin, A. Rao, V. G. Pavelyev, P. H. M. van Loos- +drecht, M. S. Pshenichnikov, D. Niedzialek, J. Cornil, D. +Beljonne & R. H. Friend, Science 335, 1340 (2012). +14 B. Bernardo, D. Cheyns, B. Verreet, R.D. Schaller, B.P. +Rand & N.C. Giebink, Nat. Commun. 5 (2014). +15 F. J. Kahle, C. Saller, S. Olthof, C. Li, J. Lebert, S. Weiß, +E. M. Herzig, S. H¨uttner, K. Meerholz, P. Strohriegl, and +A. K¨ohler, J. Phys. Chem. C 122, 21792–21802 (2018). +16 S. E. Canton, A. J. Yencha, E. Kukk, J. D. Bozek, M.C.A +Lopes, G. Snell and N. Berrah, Phys. Rev. Lett. 89, 045502 +(2002). +17 A. Zhugayevych and S. Tretiak, Annu. Rev. Phys. Chem. +66:1, 305 (2015). +18 S. M. Falke, C. A. Rozzi, D. Brida , M. Maiuri, M. Amato, +E. Sommer, A. De Sio, A. Rubio, G. Cerullo, E. Molinari +and C. Lienau, Science 344, 1001 (2014). +19 Y. Song, S. N. Clafton, R. D. Pensack, T. W. Kee & G. D. +Scholes, Nat. Commun. 5, 4933 (2014). +20 S. Bera, N. Gheeraert, S. Fratini, S. Ciuchi & S. Florens, +Phys. Rev. B 91, 041107(R) (2015). +21 Z. X. Z. Hu and G. Chen, J. Chem. Phys. 154 (2021). +22 A. E. Jailaubekov, A. P. Willard, J. R. Tritsch, W. L. +Chan, N. Sai, R. Gearba, L. G. Kaake, K. J. Williams, +K. Leung, P. J. Rossky & X-Y. Zhu , Nat. Mater. 12, 66 +(2013). +23 H. Tamura and I. Burghardt, J. Am. Chem. Soc. 135, +16364 (2013). +24 H. Tamura, +J. G. S. Ramon, +E. R. Bittner and I. +Burghardt, J. Phys. Chem. B. 112, 495 (2008). +25 E. R. Bittner and C. Silva, Nat. Commun. 5, 3119 (2014). +26 A. Sumi, J. Phys. Soc. Jpn. 43, 1286 (1977). +27 B. Gerlach and H. L¨owen, Phys. Rev. B 42, 3537 (1990). +28 J. Pollmann and H. B¨uttner, Phys. Rev. B 16, 4480 (1977). +29 E. Burovski, H. Fehske, and A. S. Mishchenko, Phys. Rev. +Lett. 101, 116403 (2008). +30 M. Berciu, Phys. Rev. Lett. 97, 036402 (2006). + +-2.0 +1.0 +-2.2 +0.8 +tanh(Aoo(k, w) +-2.4 +0.6 +3 +-2.6 +0.4 +-2.8 +0.2 +-3.0 +0.0 +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +Me-2.0 +1.0 +-2.2 +0.8 +tanh(Aoo(k, w) +-2.4 +0.6 +3 +-2.6 +0.4 +-2.8 +0.2 +-3.0 +0.0 +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +Me11 +31 M. Berciu and G. L. Goodvin, Phys. Rev. B 76, 165109 +(2007). +32 M. Berciu and H. Fehske, Phys. Rev. B 82, 085116 (2010). +33 D. Marchand, G. De Filippis, V. Cataudella, M. Berciu, +N. Nagaosa, N. Prokof’Ev, A. Mishchenko, and P. Stamp, +Phys. Rev. Lett. 105, 266605 (2010). +34 C. P. Adolphs and M. Berciu, Phys. Rev. B 90, 085149 +(2014). +35 J. Sous, M. Chakraborty, C. Adolphs, R. Krems, +and +M. Berciu, Scientific reports 7, 1 (2017). +36 J. Sous, M. Chakraborty, R. V. Krems, +and M. Berciu, +Phys. Rev. Lett. 121, 247001 (2018). +37 M. Berciu, A. S. Mishchenko, and N. Nagaosa, Europhys. +Lett. 89 (2010). +38 H. Ebrahimnejad and M. Berciu, Phys. Rev. B 85 (2012). +39 D. Marchand, P. C. E. Stamp, and M. Berciu, Phys. Rev. +B 95 (2017). +40 G. L. Goodvin, M. Berciu, +and G. A. Sawatzky, Phys. +Rev. B 74 (2006). +41 H. Hellmann, Einfuhrung in die Quantenchemie (Leipzig: +Franz Deuticke, 1937). +42 R. P. Feynman, Phys. Rev. 56, 340 (1939). +43 J. Bardeen, L. N. Cooper, and J. R. Schrieffer, Phys. Rev. +106 (1957). +44 M. Hohenadler, P. B. Littlewood, +and H. Fehske, Phys. +Rev. B 76, 184303 (2007). +45 Y. Ishijima and T. Ishiguro, J. Phys. Soc. Jpn. 65, 1574 +(1996). +46 H. Schlaich, +M. Muccini, +J. Feldmann, +H. B¨assler, +E. G¨obel, R. Zamboni, C. Taliani, J. Erxmeyer, +and +A. Weidinger, Chem. Phys. Lett. 236, 135 (1995). +47 M. Zhang, H. Wang, H. Tian, Y. Geng, and C. W. Tang, +Adv. Mater. 23, 4960 (2011). +48 Y. Park, A. Obliger, and D. T. Limmer, Nano Lett. 22, +2398 (2022). + diff --git a/69E1T4oBgHgl3EQf7AXC/content/tmp_files/load_file.txt b/69E1T4oBgHgl3EQf7AXC/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..854a23897baec75e228ba6ff28b95da9ba098278 --- /dev/null +++ b/69E1T4oBgHgl3EQf7AXC/content/tmp_files/load_file.txt @@ -0,0 +1,963 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf,len=962 +page_content='Exciton dissociation mediated by phonons in organic photovoltaics Stepan Fomichev,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' ∗ Leonard Ruocco,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' ∗ Alexandra Tully,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2 and Mona Berciu1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 3 1Department of Physics and Astronomy,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' University of British Columbia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Vancouver,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' British Columbia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' V6T 1Z1 Canada 2Stewart Blusson Quantum Matter Institute,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' University of British Columbia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Vancouver,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' British Columbia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' V6T 1Z4 Canada 3Leibniz Institute for Solid State and Materials Research (IFW) Dresden,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Helmholtzstrasse 20,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 01069 Dresden,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Germany (Dated: January 10,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2023) It is well known that phonons can overscreen the bare Coulomb electron-electron repulsion,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' turning it into the effective attraction that binds the Cooper pairs responsible for BCS superconductivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Here, we use a simple lattice model to prove that the counterpart of this is also possible, whereby phonons overscreen the bare electron-hole attraction and may turn it repulsive at short distances, driving exciton dissociation in certain regions of the parameter space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We argue that this phonon- mediated short-range screening plays an important role in the physics of organic solar cell materials (and other materials with strong electron-phonon coupling) and could point the way to new strategies for optimizing their efficiencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' INTRODUCTION Organic solar cells (OSCs) have been heralded as a rev- olutionary technology in the renewable energy sector due to their flexible and light-weight nature and low produc- tion cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='1–4 While power conversion efficiencies of OSC devices have been improving,5 they have not yet reached levels high enough for OSCs to realize their promise;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' this is largely due to the challenge of efficiently extracting free charge carriers without detrimental losses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6,7 All light-harvesting devices start by capturing a pho- ton to excite a bound electron-hole pair – an exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Voltage is ultimately produced through the generation of free charge carriers, requiring the dissociation of the exciton through some internal mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Conventional (inorganic) solar cells, such as those based on Si or GaAs, have highly effective charge screen- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Because the screened Coulomb attraction is weak, the Wannier excitons it creates are highly extended and have small binding energies (few tens of meV).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A combi- nation of thermal fluctuations and external electric fields is therefore sufficient to drive dissociation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' By contrast, OSC materials have poor charge screen- ing, resulting in small Frenkel excitons with large binding energies of a hundred meV or more.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8,9 These are stable against thermal fluctuations and fairly long-lived, lead- ing to high recombination losses and reduced efficiencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This is why understanding and engineering exciton dis- sociation in OSCs remains a foundational challenge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To date, the most investigated approach to engi- neering dissociation is to use bulk-heterojunction inter- faces combining donor and acceptor materials, chosen so that the potential gradient at their interface helps over- come the high binding energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This setup was shown to produce higher yields, which was attributed to en- hanced dissociation of so-called charge-transfer states at the donor/acceptor (D/A) interface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='10,11 Charge-transfer states are believed to be relatively short-lived excitons ∗ These authors contributed equally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lattice distortion from an exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Left panel: when the electron and the hole are far apart (red and blue circles, respectively) their excess charge induces local lattice distortions, giving rise to polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Right panel: A small Frenkel exciton produces a much weaker electric potential and thus a much smaller lattice distortion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' composed of an electron and a hole that span neigh- bouring molecular sites.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' While such excitons are quite commonly generated in the bulk,12 they delocalize more easily when they span a D/A interface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='13–15 However, more work is needed to understand both the nature of these states, and how they can be engineered to optimize exciton dissociation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Alongside charge screening, the vibrational character- istics (phonon modes) of OSCs are also relevant to disso- ciation – and even less well-understood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phonons couple strongly to molecular orbitals, as evidenced by photoe- mission experiments,16 and thus may be playing a role in the exciton dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='17 Most of the studies to date have focused on the role of phonons in the formation of charge transfer states,18,19 and how electron-phonon cou- pling affects the yield across the D/A interface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='20–25 Here we present a fundamentally different way whereby electron-phonon coupling can influence exciton dissocia- tion, even in the absence of a D/A interface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We show that sufficiently strong electron-phonon coupling can be directly responsible for exciton dissociation, despite the presence of significant Coulomb attraction between the electron and the hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The basic idea is sketched out in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 1, where we arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='03530v1 [cond-mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='str-el] 9 Jan 2023 2 compare the effects of electron-phonon coupling when the hole and electron are far apart (left panel) versus when bound in a small exciton (right panel).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The addition of an excess carrier results in a local lattice distortion that dresses that carrier into a polaron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Because the electron and the hole have opposite charges, in a polar material they create opposite lattice distortions in their vicinity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' However, when they are bound into a small exciton, their clouds essentially cancel each other out, and locally there is no distortion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Another way to say this is that there is no excess local charge in the presence of a small exciton – hence no local lattice distortion is expected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In this picture, electron-phonon coupling is seen to lower the energy of the dissociated state through polaron formation, while having little effect on the exciton bind- ing energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' For large enough electron-phonon coupling this leads to outright dissociation, as we show next.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Even when that is not the case, our work shows that one must take polaron formation into consideration when choosing the donor/acceptor materials, because the polaronic con- tribution to the energetic landscape can be considerable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' It is important to acknowledge that the idea of exci- ton dissociation driven by electron-phonon coupling was proposed previously by Sumi in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 26, where he used a variational approximation to study the effect of Fr¨ohlich coupling on an exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' His prediction of a sharp transi- tion between bound (exciton) and unbound (free electron and hole polarons) states was later discredited by Ger- lach and L¨owen,27 who proved that sharp transitions are forbidden in this class of Hamiltonians and concluded that overscreening is impossible in this context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We find a smooth crossover between the two types of states, fully consistent with the mathematical proof of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Our work shows that the contradiction between Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 26 and 27 is not because overscreening is impossible, but be- cause the predicted sharp transition was an artifact of the variational approximation28 used by Sumi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The article is organized as follows: Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' II introduces the model we use to study this problem, and Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' III explains our formalism and approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Key results are shown in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' IV, while Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' V contains an extended dis- cussion of the various approximations made in the model and the relevance of this phenomenology in the context of OSCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' THE MODEL We consider a single electron-hole pair in a one- dimensional (1D) ionic chain, where each site supports a single on-site orbital and a dispersionless Einstein phonon mode.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The single electron-hole pair assumption is reason- able if, for example, the concentration of photo-generated electron-hole pairs in the material is very low.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We focus on the 1D chain because here it is known that Coulomb attraction always results in the formation of strongly bound excitons, unlike in higher dimensions where ex- citons can be either exponentially weakly bound (in 2D) or unstable unless the attraction is sufficiently strong (in 3D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='29 Thus, demonstrating dissociation in 1D would im- ply similar behaviour in higher dimensions, given that the exciton is even more loosely bound there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Our Hamiltonian reads: ˆH = ˆTe + ˆVe−h + ˆHph + ˆVe−ph + ˆVh−ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (1) Here, ˆTe = � kσ ϵkc† kσckσ is the kinetic energy of free electrons in the conduction band, described by a tight- binding model with a dispersion ϵk = −2t cos k defined by the hopping t and momentum k ∈ (−π, π] of the bare electron (the lattice constant is set to a = 1, also ℏ = 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The creation operator c† kσ adds an electron with momen- tum k and spin σ in this band.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Its real space counterpart is c† nσ, where n = 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' N indexes the sites of the chain, with N → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Hole creation operators in real space are denoted by h† nσ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' For simplicity, we assume that holes are localized (we reflect on this assumption in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' V).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The electron-hole interaction ˆVe−h is modeled as an on-site Coulomb attraction ˆVe−h = −U � n,σ,σ′ h† nσhnσc† nσ′cnσ′, (2) characterized by U > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Longer (but finite) range attrac- tions can be treated similarly and lead to quantitative changes only, at the cost of adding more parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Optical phonons are described with an Einstein model: ˆHph = Ω � n b† nbn where b† n creates a phonon with energy Ω at site n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Finally, the Holstein carrier-lattice couplings are: ˆVe−ph =Me � nσ c† nσcnσ(bn + b† n) (3) ˆVh−ph =Mh � nσ h† nσhnσ(bn + b† n) (4) with electron/hole-phonon couplings Me and Mh, respec- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Even after all these simplifications, there are four di- mensionless parameters: U/t, Ω/t, Me/t, Mh/t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To avoid further complications, we set the temperature T = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This is justified because we are interested in cases where all energy scales (including the exciton binding energy) are much larger than the thermal energy, as is typically the case in organic photovoltaics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' METHODS Finite Coulomb attraction in 1D always leads to a ground-state with a stable, bound exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Our aim is to investigate the influence of the carrier-phonon couplings on the stability of the exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To do this, we calculate the Green’s function Gij(z) ≡ ⟨0| cihi ˆG(z)h† ic† j |0⟩ (5) 3 where we reserve the index i to label the site hosting the immobile hole (the spin degree of freedom is irrele- vant for this calculation and we ignore them from now).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The electron can move and the propagator above is the Fourier transform (at energy z = ω + iη) of the am- plitude of probability that if the hole is at site i, the electron moves from site j to site i within a given time interval, with both the initial and the final states having no phonons bn|0⟩ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The broadening η → 0 introduces an artificial lifetime ∝ 1/η for the pair to recombine, and ˆG(z) = (z − ˆH)−1 is the resolvent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The associated local density of states (LDOS), plotted in the figures, is de- fined as A(ω) = −ImGii(z)/π;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' invariance to translations ensures that the LDOS is the same at all sites i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The propagator of Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (5) for the full interacting Hamiltonian is calculated using a novel, generalized ver- sion of the Momentum Average approximation (MA) – a method well established and validated for studying sin- gle polarons30–33 and bipolarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='34–36 This generalization allows, for the first time, to include into the variational space configurations with two phonon clouds located ar- bitrarily far apart: a hole cloud at site i, and an electron cloud elsewhere in the chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We now briefly describe this method, before moving to discuss the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Non-interacting spectrum The first step is to obtain the Green’s function in the absence of carrier-phonon coupling (Me = Mh = 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The Green’s function G(i,0) ij (z) corresponding to ˆH0 = ˆTe + ˆVe−h + ˆHph, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' for the system without carrier-phonon coupling, can be calculated analytically (see Appendix A for details).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The spectrum extracted from the poles of this Green’s function has a discrete eigenstate at ω = − √ 4t2 + U 2 and a continuum for ω ∈ [−2t, 2t].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The continuum describes the electron unbound to the hole, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' free to move throughout the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The discrete eigenstate is the energy of the bound exciton, lying below this continuum for any value of U > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' All these features would be shifted by nΩ if there were n phonons in the system, but for the propagator of interest to us n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Turning on interactions: Lang-Firsov transformation In the presence of carrier-phonon couplings (finite Me, Mh), if the carriers are not bound then they each cre- ate phonon clouds in their vicinity, turning into polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In the bound state their clouds combine, resulting in an exciton-polaron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Because the hole cannot move in our simplified model, and because its coupling to the lattice is local, its phonon cloud is definitely located at hole site i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We then use the Lang-Firsov transformation Ui = exp[ Mf Ω (bi − b† i)] to integrate out the hole-phonon coupling: ˜Hi = U† i ˆHUi = ˆTe − � U + 2MeMh Ω � c† ici − M 2 h Ω + + Ω � l b† l bl + Me � l c† l cl(b† l + bl) (6) after noting that U† i blUi = bl − δi,l Mh Ω .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This transforma- tion is exact and shows the hole-polaron formation en- ergy −M 2 h/Ω but also a change of the effective Coulomb attraction experienced by the electron when at site i, U → ˜U = U+ 2MeMh Ω , arising from the electron’s coupling to the hole’s cloud in addition to the Coulomb interac- tion with the hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The propagator for the electron-hole pair Gij(z) ≡ ⟨0| cihi ˆG(z)h† ic† j |0⟩ (7) is then rewritten in terms of the transformed Hamilto- nian: Gij(z) = e− M2 h 2Ω2 ∞ � n=0 1 n!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' �Mh Ω �n Hij(n, ˜z) (8) where the new propagators Hij(n, ˜z) = ⟨0| hiciUi ˜G(˜z)h† ic† jb†n i |0⟩ (9) describe the propagation of the electron in the presence of phonons created by the hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To obtain Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (8) we used the Baker–Campbell–Hausdorff formula to rewrite U† i |0⟩ = e−M 2 h/2Ω2 �∞ n=0 1 n!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' � b† i Mh Ω �n |0⟩, and we intro- duced ˜z = z + M 2 h/Ω and the transformed resolvent U† i ˆG(z)Ui ≡ ˜G(˜z) = (˜z − ˆhi)−1 where ˆhi = ˜Hi + M 2 h Ω = ˆTe − ˜Uc† ici + ˆHph + ˆVe−ph describes the electron’s kinetic energy, effective interac- tion with the hole located at i, and coupling to the lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' So far, everything is exact.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Analogy to the disorder MA Note that ˆhi obtained above is formally equivalent to the Hamiltonian for an electron with Holstein coupling in the presence of an on-site ‘disorder’ at site i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In pre- vious work, we have already demonstrated that for such problems, even the simplest version of the variational mo- mentum average (MA) approximation, namely the one- site MA(0) version, is quantitatively accurate if t/Ω is not too large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='37,38 We use the same approximation here, straightforwardly generalized to include the presence of phonons created by the hole at site i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Specifically, we im- plement an MA where the variational space allows for the 4 presence of two phonon clouds: one at site i due primar- ily to the hole, and one at any other site of the system, created by the electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We note that the electron cloud can be allowed to spread over more sites,39 increasing the accuracy of the approximation: however, the resulting improvements are quantitatively small and do not affect the physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' For our purposes it suffices to proceed with the one-site cloud approximation, which predicts energies to within an accuracy of a few percent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='30,37,38,40 Proceeding by analogy with the disorder MA calcula- tion, the equations-of-motion (EOMs) for the propaga- tors in this two-cloud generalization of MA are obtained by repeated use of the Dyson identity ˆG = ˆG0 + ˆG ˆV ˆG0 with ˆV = ˆVe−ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The resulting system of equations (B1- B3) and its derivation are shown for completeness in Ap- pendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This linear system that emerges turns out to be amenable to further simplifications driven by the in- tuition that not all propagators contribute equally: in- deed, we find that about half the propagators may be set to zero (halving the size of the system) with no no- ticeable changes to the resulting spectrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' More details on this further approximation and the intuition behind it are given in C, and in Appendix D we show some results that justify the validity of this futher approximation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Exciton wavefunction and the phonon cloud Once the Green’s functions Gij are obtained by solv- ing the linear system, to further elucidate the nature of the ground-state properties of our model we char- acterize the spatial extent of the exciton wavefunction, as well as calculate the size of its phonon cloud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To obtain the former, we use the Lehmann decomposition Gij(z) = � n ⟨0|hici|ψn⟩ ⟨ψn|c† jh† i|0⟩/(z − En), where ˆH|ψn⟩ = En|ψn⟩ are the eigenstates with one electron and one hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' At the exciton energy E0, and if η is much smaller than the gap to the continuum, there is only one dominant contribution to the Lehmann sum: Gij(z = E0 + iη) ≈ ⟨0|hici|ψ0⟩ ⟨ψ0|c† jh† i|0⟩/iη.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Therefore we can use ρij(E0) = |⟨0|hicj|ψ0⟩|2 |⟨0|hici|ψ0⟩|2 ≈ |Gij(E0)|2 |Gii(E0)|2 (10) to characterize the probability that the electron is at a distance |j −i| from the hole in the exciton ground-state, scaled such that ρii(E0) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To calculate the average number of phonons Nph in the exciton cloud, we use the Hellmann-Feynman theorem:41,42 Nph = ⟨ψ0| � l b† l bl|ψ0⟩ = ∂E0 ∂Ω .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (11) The derivative is computed numerically with the finite- difference approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Both of these metrics give addi- tional glimpses at the impact of phonons on the dissoci- ation process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' RESULTS A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Exciton dissociation driven by electron-phonon coupling Armed with the methods from the previous section, we calculate the spectrum of a system with one electron and one hole, in the presence of short range (on-site) Coulomb attraction of magnitude U > 0, and of Hol- stein carrier-phonon couplings Me and Mh, respectively, to an optical dispersionless phonon mode of energy Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' As stated previously, we focus on 1D chains, where the carriers’ tendency to bind into an exciton is enhanced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The electron’s nearest neighbor hopping is t = 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' mean- while the hole is localized, modeling either a valence band with a very large effective mass or a hole trapped by an acceptor impurity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Exciton dissociation driven by the electron-phonon coupling is demonstrated graphically in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The panels show the contour plot of the LDOS A(ω) at the hole site versus energy and coupling Me, when U = 1, Ω = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 and Me = −Mh (panel a);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Me = −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5Mh (panel b);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Me = −2Mh (panel c);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' and Me = Mh (panel d).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' At Me = Mh = 0, the lowest energy feature in the electron+hole spectrum is a discrete peak marking the existence of the exciton, just as discussed in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' III A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' If MeMh < 0, the discrete peak merges smoothly with the continuum at M (c) e and the exciton dissociates into un- bound electron- and hole-polarons for Me > M (c) e .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' There is no discontinuity in the LDOS at M (c) e : thus, there is no contradiction between our result and Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' By contrast, if MeMh > 0 (panel d), the exciton is further stabilized by increasing coupling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='29 The carrier-phonon coupling M is set by the gradient of the carrier-lattice potential with respect to a small lattice displacement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Because the hole and the electron have opposite charge, their respective carrier-lattice po- tentials have opposite signs and thus Me and Mh have opposite signs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Physically, this is because a lattice dis- tortion that is energetically favorable for an electron is generically unfavorable for a hole (left panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Moreover, a very small Frenkel exciton, with the electron and hole at the same site, creates no local charge imbal- ance so no lattice distortion is expected (right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In the atomic limit (t = 0), a vanishing exciton- polaron binding energy −(Me+Mh)2/Ω ≈ 0 implies that Me ≈ −Mh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Of course, one can envision more complex situations where |Me| ̸= |Mh|, however panels (b) and (c) of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2 show the same dissociation phenomenology for different ratios Mh/Me < 0, demonstrating that exciton dissociation does not require fine-tuning: it is guaranteed to happen at large enough couplings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' On the other hand, the exciton is always stable if Mh/Me > 0 (see panel (d) of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2), because in this case the cloud created by the exciton is larger than the sum of the individual clouds created by the two unbound carriers, further stabilizing the exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='27,29 5 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Contour plots of the LDOS A(ω) at the hole site when Ω = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 and U = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The electron-phonon coupling Me is shown on the x axis (the corresponding Mh is indicated on the figure).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The dashed red line shows where we expect the lower edge of the continuum of eigenstates describing unbound electron- and hole-polarons, based on their individually calculated MA energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Its good agreement with the calculated spectral weight provides a validation of the generalized MA we developed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The fast oscillations in the continuum weight are finite size effects, due to the cutoff |l − i|m = 50 for the maximum distance between the two clouds;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' the maximum numbers of phonons in the two clouds are set to nm = km = 20, sufficient for convergence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The discrete peak appearing below the continuum at small Me is the exciton bound state, broadened into a Lorentzian by the finite η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='01.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' With increasing coupling, the exciton approaches the continuum and eventually merges smoothly with it, marking its dissociation into a pair of unbound electron and hole polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This behaviour is robust so long as the couplings are of opposite sign, so that MeMh < 0, see panels (a)-(c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In contrast, when MeMh > 0, the exciton is always stable, see panel (d).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Exciton dissociation phase diagram Figure 3 traces the crossover (blue line) between the ground-states with an exciton-polaron and those with unbound electron- and hole-polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The dashed line shows the perturbation theory prediction (details in Ap- pendix E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The agreement is excellent at small U, as expected, while at larger U perturbation theory overes- timates the critical coupling needed for dissociation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Exciton-polaron characteristics Next, we calculate the average number of phonons Nph in the exciton cloud, and also the probability ρij that the electron is at a distance |j−i| from the hole in the exciton ground-state, scaled such that ρii = 1 (see Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' III D for details).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Representative results are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' For com- pleteness, panel (a) shows the LDOS versus ω and Me, with dissociation occurring slightly above Me = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Panel (b) shows Nph of the exciton-polaron (solid yel- low line), compared to the sum of the ground-state av- erage numbers of phonons in the electron-polaron and the hole-polaron clouds (red dashed line);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' the latter are calculated individually and then summed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' As expected, when tightly bound by an attractive U, the electron and the hole largely cancel each other’s lattice distortions, re- sulting in many fewer phonons than for the free polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Panels (c)-(e) show ρij vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' j − i for Me = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6, respectively (see vertical dotted lines in panels (a) and (b)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' At small couplings, ρij is sharply peaked at the hole 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 (a) Me= Mh 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 tanh(Aoo(w) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 Me-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 (b) Me = - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5Mh 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 tanh(Aoo(w) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 Me-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 (c) 2Mh 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 tanh(Aoo(w) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 1/m 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 Me-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 (d) Me Mr 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 tanh(Aoo(w) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 Me6 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Exciton dissociation phase diagram.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The critical electron-phonon coupling for dissociation increases with the Coulomb attraction U: it is calculated with MA (blue solid) and with perturbation theory (orange dashed).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The orange region above the critical line indicates the region where we ex- pect dissociated electron and hole polarons, whereas the blue region below the line represents the bound exciton-polaron region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Other parameters are Ω = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5, Me = −Mh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' site i, as expected for a strongly bound, small Frenkel ex- citon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' As the coupling increases, ρij acquires “fat tails”, that are consistent with a larger exciton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Just before dissociation, ρij spreads over very many sites, consis- tent with the smooth crossover to an unbound electron- polaron that is (nearly) equally likely to be at any dis- tance from the hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' CONCLUSIONS We have shown that strong carrier-phonon coupling favors the dissociation of excitons into free polarons, even on 1D chains where excitons should be stable for any electron-hole attraction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This phenomenology is the counterpart to what drives BCS superconductivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='43 There, phonons overscreen the electron-electron repul- sion turning it into an effective attraction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Here, phonons screen the electron-hole attraction and can turn it repul- sive, at sufficiently strong coupling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This phenomenology is robust and should be consid- ered when analyzing exciton stability in materials with carrier-phonon coupling because the critical coupling for dissociation need not be very large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Figure 4 shows a critical value Me = −Mh ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6, which corresponds to a weak effective Holstein coupling λc = M 2 e /2tΩ ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='36 for the electron, even though the bare exciton binding energy is a considerable 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5t for those parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Indeed, panel (b) of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 4 confirms that the average phonon numbers are small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Of course, to some extent this is because of the rather large phonon frequency Ω = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5t used there, although such ratios are reasonable in some organic ma- terials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Regarding the main approximations in our model: FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Characterization of the phonon cloud of the exciton- polaron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' a) Contour plot of the LDOS at the hole site, as a function of the coupling Me and energy ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The yellow solid line tracks the exciton energy while the dashed red line tracks the lower edge of the continuum;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' their intersection marks the dissociation point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We track the exciton energy up to Me = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6, where its binding energy becomes comparable to η.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' b) Average number of phonons Nph in the exciton cloud (solid yellow line) and in the combined electron- and hole-polaron clouds (red dashed line).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' c)-e) Probability ρij that the elec- tron is at a distance |j−i| from the hole in the exciton ground- state, scaled such that ρii = 1, for Me = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6, respec- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Other parameters are Ω = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5, U = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5, Me = −Mh, η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='01, nm = km = 20, |l − i|m = 50.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (i) we do not expect different dimensionality to change this phenomenology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In 3D, a bare exciton is stable only if the Coulomb attraction is above a critical value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='29 Whether the critical value is 0 (like in 1D) or finite (like in 3D) is irrelevant: strong enough carrier-phonon cou- pling will lower the effective attraction below this critical value and make the exciton unstable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Our MA method can be straightforwardly used to study higher-D systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (ii) the assumption that the hole is immobile is also not essential: ‘releasing’ the hole does not change this picture qualitatively, only quantitatively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Moreover, in 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 unbound electron 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5 + hole polarons 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 M 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='1 exciton polaron 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 U1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 exciton 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 polarons 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 tanh(Aoo(k, w)) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 Mew .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='. exciton polarons 2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='. 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='. 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 Me7 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Schematic of the effective potential for the exciton- polaron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Screened electron-hole interaction (black line), ob- tained by summing the bare long-range Coulomb attraction (dashed line) and the contribution from phonon screening (blue line).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Top: when the coupling is weak, the combined polaron radius D is large and the screening is weak.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mid- dle: strong coupling leads to small polarons with a strong short-range repulsion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The total potential has a minimum at r ∼ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bottom: for a rapidly-decreasing bare attraction, a metastable exciton may be trapped at the r = 0 local mini- mum, before tunneling into a dissociated state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' the context of OSC materials doped with either acceptor or donor molecules, it is possible to envision trapping one species of the carriers on such molecules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (iii) the assumptions that the coupling is to a single optical mode and that it is of Holstein type are also not essential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Regardless of such details, polaron formation associated with local excess charge leads to a lowering of the energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' That is the only ingredient necessary for the mechanism discussed here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (iv) The assumption of a short-range Coulomb attrac- tion is non-trivial, however, and relaxing it can lead to qualitative changes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This is because the phonon screen- ing discussed here acts only at electron-hole distances r < D, where D is the sum of the radii of the two po- larons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' If the electron and hole are sufficiently far, so that each can create its polaron cloud (r > D), the phonon screening vanishes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This contribution looks roughly like the blue lines in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5, where ∆EB ≈ −2MeMh/Ω is the difference between the exciton-polaron and the free polarons formation energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' While ∆EB increases with increasing coupling, D decreases as the polarons be- come smaller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' If the Coulomb attraction decreases rather slowly with r (dashed line), it is possible that as the coupling goes from weak (top panel) to strong (middle panel), the total potential has a well whose minimum moves from r ∼ 0 to r ∼ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The latter well can still trap a stable exciton in 1D, because both the lower dimension- ality and the increased effective mass of strongly-coupled Holstein polarons would favor a bound state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We be- lieve that this explains why exciton dissociation was not observed in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' However, in higher dimensions rele- vant for OSCs and/or for lighter Peierls polarons,33 such a ‘donut’-shaped trap might not suffice to bind the po- larons and the ground-state at strong coupling would still exhibit dissociation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A new scenario can occur if the bare Coulomb attrac- tion decreases significantly from r = 0 to r = D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' As sketched in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5(c), r = 0 can be a local minimum of the total potential (black line) followed by a potential barrier and a very shallow potential well for r > D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A Frenkel exciton with radius smaller than D can then be metastable, with a lifetime inversely proportional to the probability of tunneling through the barrier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Even though the ground state is the dissociated state, small excitons loaded optically into the metastable state might live long enough to control the OSC’s behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This may explain the very puzzling fact that some OSC materials, like pure C60 films, have both very strongly bound excitons45,46 and finite, albeit small, charge sepa- ration efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='47 The latter would represent the small fraction of excitons that tunnel out and dissociate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This scenario is also qualitatively consistent with the ob- servation that a dilute (∼10%) concentration of donor molecules increases the charge separation efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Such molecules boost light absorption, so the metastable exci- ton state is populated more efficiently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This will increase the concentration of charge-separated pairs accordingly if the donor molecules are dilute enough to allow charge separation to proceed, explaining why peak efficiency oc- curs at a very low donor molecules concentration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='47 The above scenario cannot be verified with MA;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' however, a recent study found a weak potential barrier due to nonlo- cal phonon screening in lead halide perovskites.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='48 While their parameters are very different than ours, their find- ing supports the possible appearance of this new scenario in the right circumstances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The results presented in this work illustrate some of the interesting physics expected in the many OSCs that have strong carrier-phonon coupling, and point towards possible ways to exploit it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We plan to investigate some of these topics in more detail in future works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Vtot(R) △EB D R U Vtot(R) △EB D U Vtot(R) AEB >R U8 ACKNOWLEDGMENTS We thank Sarah Burke for bringing this problem to our attention and for many useful discussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We thank David Reichman, Holger Fehske and Krzysztof Bieniasz for insightful comments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We acknowledge support from the Max Planck-UBC-UTokyo Centre for Quantum Ma- terials and the Canada First Research Excellence Fund, Quantum Materials and Future Technologies Program of the Stewart Blusson Quantum Matter Institute, and from the Natural Sciences and Engineering Research Council of Canada (NSERC).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We gratefully acknowledge the use of computing resources from the Stewart Blusson Quan- tum Matter Institute computing cluster LISA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Appendix A: Free carrier Green’s function The Green’s function G(i,0) ij (z) corresponding to ˆH0 = ˆTe + ˆVe−h + ˆHph, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' for the system without carrier- phonon coupling, can be calculated analytically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In the absence of electron-phonon coupling there is only an elec- tron hopping on a 1D tight-binding lattice, subject to an on-site attractive potential from the static hole located at i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The corresponding Hamiltonian is H0 = T − Uc† ici.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Here we calculate its lattice Green’s function: G(i,0) lj (z) = ⟨0| cl[z − H0]−1c† j |0⟩ (A1) Applying Dyson’s identity, we find the EOM: G(i,0) l,j (z) = gl−j(z) − Ugi−j(z)G(i,0) l,i (z) (A2) where the free lattice Green’s functions gl−j(z) = ⟨0| cl[z − T]−1c† j |0⟩ can be calculated analytically: gδ(z) = |ζ(z)||δ|/√z − 2t√z + 2t, with ζ(z) = z/2t − � z/2t − 1 � z/2t + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Equation (A2) can be solved trivially to find: G(i,0) li (z) = G(i,0) l−i (z) = gl−i(z) 1 + Ug0(z) (A3) and G(i,0) ll (z) = g0(z) − U [gi−l(z)]2 1 + Ug0(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (A4) The propagators ˜G(i,0) il (z) appearing in the main text and in other appendices have the same expressions but with U → ˜U, where ˜U is the overscreened Coulomb at- traction defined in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Appendix B: Green’s function with carrier-lattice coupling Here the MA equations of motion are obtained by re- peated application of the Dyson identity ˜G(˜z) = ˆG(i) 0 (˜z)+ ˜G(˜z) ˆVe−ph ˆG(i) 0 (˜z) where ˆG(i) 0 (z) = (z − ˆTe + ˜Uc† ici)−1 is the resolvent in the absence of electron-phonon cou- pling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We note that its corresponding Green’s functions ˜G(i,0) ij (z) = ⟨0|ci ˆG(i) 0 (z)c† j|0⟩ equal those calculated in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A upon replacing U → ˜U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Using Dyson’s identity once, we find: Hij(n, ˜z) = ˜G(i,0) ij (˜z − nΩ) �Mh Ω �n e−M 2 h/2Ω2+ + ˜G(i,0) ij (˜z − nΩ)Me [nHii(n − 1, ˜z) + Hii(n + 1, ˜z)] + + � l̸=i ˜G(i,0) lj (˜z − nΩ)MeFill(n, 1, ˜z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1) Here, the terms on the 2nd line arise when the electron travels to site i and adds to or removes from the phonons already present there, while the last line describes terms where the electron moves to some other site l and starts a new cloud there, with the corresponding generalized two-cloud propagator: Fijl(n, k, ˜z) ≡ ⟨0| cihiUi ˜G(˜z)h† ic† j(b† i)n(b† l )k |0⟩ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B2) The equation of motion (B1) is exact.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Solving it neces- sitates calculating the propagators Fill that appear in it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We generate their equations of motion using again the Dyson identity, but now also imposing the variational constraint consistent with the one-site MA(0) approxi- mation for the electron cloud, namely that additional phonons cannot be created away from the two existing clouds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The resulting EOMs are Fill(n, k, ˜z) =Me ˜G(i,0) ll (˜z − (n + k)Ω) [kFill(n, k − 1, ˜z) + Fill(n, k + 1, ˜z)] + Me ˜G(i,0) il (˜z − (n + k)Ω) [kFiil(n, k − 1, ˜z) + Fiil(n, k + 1, ˜z)] Fiil(n, k, ˜z) =Me ˜G(i,0) ii (˜z − (n + k)Ω) [kFiil(n, k − 1, ˜z) + Fiil(n, k + 1, ˜z)] + Me ˜G(i,0) il (˜z − (n + k)Ω) [kFiil(n, k − 1, ˜z) + Fiil(n, k + 1, ˜z)] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B3) Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1-B3) define a linear, inhomogeneous system of coupled equations that can be numerically solved for 9 each value of z, with the resulting Hij(n, ˜z) then used in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (8) to construct Gij(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' However, this approach is computationally intensive because one needs large cut- offs for the maximum numbers km, nm of phonons in the two clouds, as well as for the maximum distance |l − i|m between the clouds, before convergence is reached.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' An improved approach is discussed in Appendix C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Appendix C: Simplifying the EOMs A much more efficient yet still accurate solution to Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1-B3) can be obtained by taking advantage of the fact that for the energies of interest, which lie below the free electron continuum, the free propagators ˜G(i,0) il (z) de- crease exponentially with the distance |l − i|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' If we keep only the largest term with l = i, then Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B3) split into two uncoupled recurrence relations, one for Fill and one for Fiil, with only the former needed in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This former recurrence relation can be solved with the ansatz: Fill(n, k, ˜z) = A(i,l) k (˜z − nΩ)Fill(n, k − 1, ˜z) (C1) where we note that Fill(n, 0, ˜z) ≡ Hil(n, ˜z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The contin- ued fractions A(i,l) k (z) = kMe ˜G(i,0) ll (z − kΩ) 1 − Me ˜G(i,0) ll (z − kΩ)A(i,l) k+1(z) (C2) are calculated starting from A(i,l) km+1(z) = 0 for a suffi- ciently large km to ensure the desired accuracy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' In par- ticular, this means that we can replace Fill(n, 1, ˜z) = A(i,l) 1 (˜z − nΩ)Hil(n, ˜z) in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1) to convert it into a linear system linking only the Hij propagators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' This still requires a summation over all the sites in the system, which in practice means summing over sites l up to a distance large enough from i that the sum converges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' An efficient solution of such a linear system was pro- posed in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 37 and 38 and we adopt it here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' It is based on the observation that for |l − i| ≫ 1, the local potential ˜U created by the hole becomes irrelevant and the impurity Green’s function reduces to the free electron propagator ˜G(i,0) ll (˜z) → g0(˜z) = 1 N � k 1 ˜z − ϵk = 1 √˜z − 2t√˜z + 2t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (C3) As a result, for |l − i| ≫ 1, the continued fractions ap- proach an asymptotic value that becomes independent of i, l: A(i,l) 1 (˜z − nΩ) → ΣMA(˜z − nΩ)/Me .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Physically, ΣMA(z) is the MA(0) self-energy of the electron-polaron in the absence of the ‘impurity’ potential created by the hole located at i (see Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 30 for a derivation) ΣMA(z) = M 2 e g0(z − Ω) 1 − 2M 2 e g0(z − Ω)g0(z − 2Ω) 1 − 3M 2 e g0(z − 2Ω)g0(z − 3Ω) 1 − .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (C4) Because this asymptotic value is independent of l, we can define a renormalized energy vil(˜z − nΩ) = MeA(i,l) 1 (˜z − nΩ) − ΣMA(˜z − nΩ) (C5) which vanishes fast with increasing |l − i|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The sum in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1) can be recast in terms of it by renormalizing the energy argument of the free propagators: Hij(n, ˜z) = ˜G(i,0) ij (˜˜zn) �Mh Ω �n e− M2 h 2Ω2 + ˜G(i,0) ij (˜˜zn)Me [nHii(n − 1, ˜z) + Hii(n + 1, ˜z)] + � l̸=i ˜G(i,0) lj (˜˜zn)vil(˜z − nΩ)Hil(n, ˜z) (C6) where we defined ˜˜zn ≡ ˜z −nΩ−ΣMA(˜z −nΩ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Equations (C6) converge much more quickly with the summation over l and can be solved efficiently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The accuracy of the approximation of replacing the coupled Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1-B3) with the much more compact and efficienct Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (C6) is validated in Appendix D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Appendix D: Full vs approximate variational solutions The full variational solution of the particle+hole prop- agator can be obtained by simultaneously solving Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (8), (B1) and (B3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' They can be solved numerically, but this is slow because exceedingly large truncation cutoffs (system sizes) are required for convergence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Above in Appendix C, we proposed a much more efficient approx- imation which replaces Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (B1)-(B3) with Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (C6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To validate this approximation, in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 6 we show a typical comparison of the results of the two methods for the LDOS at the hole site, focusing on the lower-energy part of the spectrum, of interest for the dissociation issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Evidently, the agreement is very good.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Similar diagrams were produced in all parameter regimes explored in this paper, thus effectively validating our approximation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 10 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Comparison of the LDOS at the hole site from solving the full variational solution described by Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (8),(B1),(B3), shown in the left panel, versus the simplified and much more efficient Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (C6), shown in the right panel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Visually, the two are nearly indistinguishable, with most differences coming in at higher energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Model parameters are U = 1, Ω = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='5, η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='01, Me = −Mh and convergence parameters are nm = km = 12, |l − i|m = 50.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Appendix E: Perturbation theory for exciton dissociation Here we summarize the perturbation theory (PT) cal- culation used to draw the dissociation line in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 3 in the main text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We begin by estimating the ground- state energies for the individual polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' The result for the (static) hole-polaron is Eh P = −M 2 h/Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To find the electron-polaron’s PT counterpart, we use the sin- gle polaron Green’s function at the same one-site MA(0) level of approximation:30 G(k, z) = [z − ϵk − ΣMA(z)]−1 where the full expression for ΣMA(z) is shown in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' (C4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To lowest non-trivial order in PT, it becomes ΣMA ≈ M 2 e g0(ω − Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Using this expression to find the lowest k = 0 pole, we find the polaron ground-state en- ergy to be: Ee P (k = 0) = −2t − M 2 e � Ω(Ω + 4t) (E1) The PT-predicted lower edge of the continuum is then at Emin = Ee P (k = 0) + Eh P .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' To find the bound exciton energy, we proceed similarly, essentially solving the EOMs to lowest order in the cou- plings, and then finding the location of the lowest peak for k = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' For simplicity, we only list here the result when Me = −Mh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' We find the exciton ground-state en- ergy to be given by Eexc = z0 + αg0(z0 − Ω)M 2 e where z0 = − √ U 2 + 4t2 is the bare exciton energy, and α = 4G(i,0) ii (z0)[g0(z0 − Ω) − 2G(i,0) ii (z0 − Ω)] 1 + 2G(i,0) ii (z0)[g0(z0 − Ω) − 2G(i,0) ii (z0 − Ω)] The dissociation occurs when Eexc = Emin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 1 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kaltenbrunner, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' White, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' G�lowacki, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Seki- tani, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Someya, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sariciftci, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bauer, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Com- mun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 3 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2 X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Xu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Fukuda, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Karki, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Park, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kimura, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Jinno, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Watanabe, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Yamamoto, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Shimomura, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kitazawa, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Yokota, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Umezu, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Nguyen, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Someya, PNAS 115, 4589 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 3 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Gambhir, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sandwell, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Nelson, Sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Energy Mater Sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cells 156, 49 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 4 L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chen, ACS Energy Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 4,10, 2537 (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5 E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' dos Santos Rosa, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kowalski and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Toledo, Sol Energy 221 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 6 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Heeger, Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 26 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 7 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Vandewal, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mertens and Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Liu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 11 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 8 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Gledhill, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Scott, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Gregg, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 20, 3167 (2005).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 9 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Nelson, Elsevier 6, 87 (2002).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 10 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' G´elinas, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rao, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kumar, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Smith, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chin, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Clark, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Van Der Poll, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bazan, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Friend, Science 343, 512 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 11 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sutty, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Williams, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Aziz, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Photonics Energy 4, 1 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 12 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Emmerich, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Hedwig, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Arnoldi, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Stockl, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Haag, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Hemm, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cinchetti, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mathias, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Stadtm¨uller, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Aeschlimann, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' C 124, 23579 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 13 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bakulin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rao, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Pavelyev, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' van Loos- drecht, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Pshenichnikov, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Niedzialek, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cornil, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Beljonne & R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Friend, Science 335, 1340 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 14 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bernardo, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cheyns, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Verreet, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Schaller, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rand & N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Giebink, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 15 F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kahle, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Saller, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Olthof, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Li, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lebert, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Weiß, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Herzig, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' H¨uttner, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Meerholz, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Strohriegl, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' K¨ohler, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' C 122, 21792–21802 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 16 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Canton, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Yencha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kukk, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bozek, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='A Lopes, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Snell and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berrah, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 89, 045502 (2002).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 17 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Zhugayevych and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Tretiak, Annu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 66:1, 305 (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 18 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Falke, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rozzi, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Brida , M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Maiuri, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Amato, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sommer, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' De Sio, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rubio, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cerullo, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Molinari and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lienau, Science 344, 1001 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 19 Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Song, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Clafton, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Pensack, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kee & G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Scholes, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5, 4933 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 20 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bera, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Gheeraert, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Fratini, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Ciuchi & S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Florens, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 91, 041107(R) (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 21 Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Hu and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 154 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 22 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Jailaubekov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Willard, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Tritsch, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chan, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sai, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Gearba, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Kaake, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Williams, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Leung, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rossky & X-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Zhu , Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 12, 66 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 23 H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Tamura and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Burghardt, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Am.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 135, 16364 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 24 H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Tamura, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Ramon, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bittner and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Burghardt, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 112, 495 (2008).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 25 E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bittner and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Silva, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 5, 3119 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 26 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sumi, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Jpn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 43, 1286 (1977).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 27 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Gerlach and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' L¨owen, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 42, 3537 (1990).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 28 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Pollmann and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B¨uttner, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 16, 4480 (1977).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 29 E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Burovski, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Fehske, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mishchenko, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 101, 116403 (2008).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 30 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 97, 036402 (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 tanh(Aoo(k, w) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 Me-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 tanh(Aoo(k, w) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content='0 Me11 31 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Goodvin, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 76, 165109 (2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 32 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Fehske, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 82, 085116 (2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 33 D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Marchand, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' De Filippis, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cataudella, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Nagaosa, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Prokof’Ev, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mishchenko, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Stamp, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 105, 266605 (2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 34 C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Adolphs and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 90, 085149 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 35 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sous, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chakraborty, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Adolphs, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Krems, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, Scientific reports 7, 1 (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 36 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sous, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Chakraborty, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Krems, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 121, 247001 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 37 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mishchenko, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Nagaosa, Europhys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 89 (2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 38 H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Ebrahimnejad and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 85 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 39 D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Marchand, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Stamp, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 95 (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 40 G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Goodvin, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Berciu, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Sawatzky, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 74 (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 41 H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Hellmann, Einfuhrung in die Quantenchemie (Leipzig: Franz Deuticke, 1937).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 42 R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Feynman, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 56, 340 (1939).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 43 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Bardeen, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Cooper, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Schrieffer, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 106 (1957).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 44 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Hohenadler, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Littlewood, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Fehske, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B 76, 184303 (2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 45 Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Ishijima and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Ishiguro, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Jpn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 65, 1574 (1996).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 46 H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Schlaich, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Muccini, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Feldmann, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' B¨assler, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' G¨obel, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Zamboni, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Taliani, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Erxmeyer, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Weidinger, Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 236, 135 (1995).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 47 M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Zhang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Wang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Tian, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Geng, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Tang, Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 23, 4960 (2011).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 48 Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Park, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Obliger, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' Limmer, Nano Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} +page_content=' 22, 2398 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E1T4oBgHgl3EQf7AXC/content/2301.03530v1.pdf'} diff --git a/6tFAT4oBgHgl3EQfnx0W/vector_store/index.pkl b/6tFAT4oBgHgl3EQfnx0W/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..4abbf28880b90812c8533cdc8c8daa65ee7a63ea --- /dev/null +++ b/6tFAT4oBgHgl3EQfnx0W/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5dc31e369b7c87d7eacd9da7f2ee7dd895ca6a9dd0bde984c62818302fb3adb2 +size 129303 diff --git a/89FLT4oBgHgl3EQfBi6R/vector_store/index.faiss b/89FLT4oBgHgl3EQfBi6R/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..de75239ce28320efefba063638c8d0a8e316763e --- /dev/null +++ b/89FLT4oBgHgl3EQfBi6R/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4b2ee4984c14c41d8ee792bf921ec9f407870a8de0c60de9c0522c64910dd0e8 +size 6094893 diff --git a/8NFLT4oBgHgl3EQfsy_c/vector_store/index.faiss b/8NFLT4oBgHgl3EQfsy_c/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..639f2bfc458e04bbf63f9f78585a4c0d637b000f --- /dev/null +++ b/8NFLT4oBgHgl3EQfsy_c/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0e3b871f20500423481b0d2314a1062dfc13ad0f6226a878a223b31a736745e9 +size 4128813 diff --git a/ANFQT4oBgHgl3EQf8jdP/content/2301.13447v1.pdf b/ANFQT4oBgHgl3EQf8jdP/content/2301.13447v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..5a5e3c2f2cec09cc9cd7c55c2ebd08f11c79ee98 --- /dev/null +++ b/ANFQT4oBgHgl3EQf8jdP/content/2301.13447v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:31aa9f1fdaa1a3385d99eafa13fb25cd5c04768ea21852ad3f859490bf354421 +size 2224545 diff --git a/ANFQT4oBgHgl3EQf8jdP/vector_store/index.faiss b/ANFQT4oBgHgl3EQf8jdP/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..b2434002aa4355227762dbb25b71911276d1881f --- /dev/null +++ b/ANFQT4oBgHgl3EQf8jdP/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9ac924d3a8e04a2abecd4983ee1efe83cdec6e8b0ab371359a3f7f990e459ba2 +size 2621485 diff --git a/AtE1T4oBgHgl3EQfpAWX/content/tmp_files/2301.03327v1.pdf.txt b/AtE1T4oBgHgl3EQfpAWX/content/tmp_files/2301.03327v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..f522b52a1f1c78fb7cc33dbee94918c49a0fc5c4 --- /dev/null +++ b/AtE1T4oBgHgl3EQfpAWX/content/tmp_files/2301.03327v1.pdf.txt @@ -0,0 +1,1369 @@ +A-posteriori QMC-FEM error estimation +for Bayesian inversion and optimal control +with entropic risk measure +Marcello Longo∗, Christoph Schwab∗, Andreas Stein∗† +January 10, 2023 +Abstract +We propose a novel a-posteriori error estimation technique where the +target quantities of interest are ratios of high-dimensional integrals, as occur +e.g. in PDE constrained Bayesian inversion and PDE constrained optimal +control subject to an entropic risk measure. We consider in particular +parametric, elliptic PDEs with affine-parametric diffusion coefficient, on +high-dimensional parameter spaces. We combine our recent a-posteriori +Quasi-Monte Carlo (QMC) error analysis, with Finite Element a-posteriori +error estimation. The proposed approach yields a computable a-posteriori +estimator which is reliable, up to higher order terms. The estimator’s +reliability is uniform with respect to the PDE discretization, and robust +with respect to the parametric dimension of the uncertain PDE input. +1 +Introduction +The efficient numerical approximation of high-dimensional, parametric partial +differential equations (PDEs for short) received increasing attention during the +past years. In this work, we address two classes of high-dimensional numerical +integration problems which arise in connection with data assimilation and PDE +constrained optimization. We illustrate the abstract concepts for a parametric, +linear elliptic PDE. The first class is the so-called Bayesian inverse problem (BIP). +There, we are interested in the posterior expectation of a (linear) functional of +the solution u of a parametric PDE, conditional on observation data subject to +additive, centered Gaussian observation noise [18,19]. See also [10]. A second +problem class is PDE-constrained optimization. Specifically, the optimal control +problem (OCP) of parametric PDEs under an entropic risk measure [7], where +the state variable satisfies a parametric PDE constraint [9]. +When numerically approximating solutions of a BIP or an OCP, it is essential +to quantify the error due to the numerical discretization in order to meet a +prescribed numerical tolerance without wasting computational resources. As +solving PDEs exactly is in general not possible, discretizations such as Finite +Element Methods (FEM) must be used instead. Additionally, the parametric +∗Seminar for Applied Mathematics, ETH Zürich +†Corresponding author. Email: andreas.stein@sam.math.ethz.ch +1 +arXiv:2301.03327v1 [math.NA] 9 Jan 2023 + +uncertainty in the forward PDE model is passed on to the solution, and this +must be taken into account both in the computation and in the error estimation. +This justifies the need for an a-posteriori error analysis. +Assuming that the uncertain PDE coefficients can be described by means of a +parameter vector y ∈ U := +� +− 1 +2, 1 +2 +�s where s ∈ N, s ≫ 1, e.g. (6) below, we can +employ suitable quasi-Monte Carlo (QMC) rules to approximate integrals over U. +Here, we select extrapolated polynomial lattice (EPL) rules as first introduced +in [3,5]. This choice is motivated by the deterministic nature or their quadrature +nodes Pm, |Pm| = bm for some prime b [15], and good convergence properties +under quantified parametric regularity of the integrand functions with respect +to y ∈ U, uniformly in the dimension s [3]. Moreover, it was shown in [5,14] +that under assumptions, EPL quadratures allow for computable a-posteriori +quadrature error estimators that are asymptotically exact as m → ∞, with +dimension robust ratio between estimated and actual quadrature error. +Both, BIP and OCP problems for PDEs with parametric input take the form +Z′ +Z ∈ Y, +where Z = +� +U +Θ(y) dy, +Z′ = +� +U +Θ′(y) dy, +(1) +for some suitable integrable functions Θ: U → R and Θ′ : U → Y, where Y +is a separable Hilbert space and Z, Z′ are Bochner integrals with respect to a +product measure dy on the possibly high-dimensional parameter space U. In +particular, we have Y = R for the BIP case and Y ∈ L2(D) for the OCP case, +with D being the physical domain of the considered PDE. Approximating the +high-dimensional integrals with averages over polynomial lattices Pm ⊂ U yields +a first approximation +Z′ +m +Zm +∈ Y, +where Zm = 1 +bm +� +y∈Pm +Θ(y), +Z′ +m = 1 +bm +� +y∈Pm +Θ′(y). +(2) +Then, since the integrands Θ, Θ′ depend on the solution of a y-parametric +PDE, we discretize the parametric PDEs for y ∈ Pm, resulting in computable, +parametric integrand functions Θh(y), Θ′ +h(y) and in the computable estimates +Z′ +m,h +Zm,h +∈ Y, +where Zm,h = 1 +bm +� +y∈Pm +Θh(y), +Z′ +m,h = 1 +bm +� +y∈Pm +Θ′ +h(y). +(3) +Here, the parameter h > 0 denotes the meshwidth of conforming Lagrangian +Finite Element discretizations. We present a computable a-posteriori estimator +for the combined Finite Element discretization and quadrature error +err = +���� +Z′ +Z − +Z′ +m,h +Zm,h +���� +Y +. +(4) +In the rest of this section we introduce the setting and we describe the two +problems of interest, namely the BIP and the OCP with entropic risk measure. +Section 2 and Section 3 are devoted to the QMC and the FEM a-posteriori +error analysis, respectively, and these results will be combined in Section 4. We +present numerical experiments in Section 5 and summary and conclusions in +Section 6. +2 + +1.1 +Affine-Parametric Forward PDE +For brevity of presentation, we consider a model, linear elliptic PDE with +homogeneous Dirichlet boundary conditions. Given a bounded polygon D ⊆ R2 +and a parameter sequence y ∈ U, s ∈ N, consider the following parametric, +linear, second order elliptic PDE in variational form: find u(·, y) ∈ X = H1 +0(D) +such that +� +D +a(x, y)∇xu(x, y) · ∇xv(x) dx = +� +D +f(x)v(x) dx +∀v ∈ X. +(5) +We assume that a is affine-parametric, namely that we are given a family of +functions {ψj}j∈N0 ⊆ L∞(D) such that, with essinf ψ0 > κ > 0 and bj := +1 +κ ∥ψj∥L∞(D), we have +a(x, y) = ψ0(x) + +s +� +j=1 +yjψj, +� +j≥1 +bj < 2. +(6) +Then essinf a(·, y) > essinf ψ0 − κ > 0 for all y ∈ U. By the Lax-Milgram +lemma, the parametric weak solution u(·, y) ∈ X is well defined for any f ∈ +X ∗ = H−1(D), where ∗ denotes the topological dual. To justify the a-posteriori +QMC error analysis of Section 2, we will additionally require the summability +b = (bj)j≥1 ∈ ℓp(N) +for some p ∈ (0, 1/2]. +(7) +For the FEM approximation, we consider conforming subspaces1 Xh ⊆ X h ∈ +H ⊆ (0, ∞), dim(Xh) < ∞, that are linked to shape-regular, simplicial partitions +{Th}h∈H of D [6, Section 8]. Assume that the resulting spaces are nested and +conforming, that is Xh ⊆ Xh′ for any h, h′ ∈ H, h > h′ and that H accumulates +at 0. We construct the Galerkin discretizations uh(y) ∈ Xh of (5), by solving +� +D +a(x, y)∇xuh(x, y) · ∇xv(x) dx = +� +D +f(x)v(x) dx +∀v ∈ Xh. +(8) +To simplify notation, we write a(y) = a(·, y) and u(y) = u(·, y) and we omit the +variable x for ∇x = ∇ and divx = div. +1.2 +Bayesian inverse problem (BIP) +Let X = {a ∈ L∞(D) : essinf a > 0} and fix f ∈ X ∗. Then, we can define the +data-to-solution map S : X → X for the forward problem (5). We also define the +observation functional O ∈ (X ∗)K, with a finite number K ∈ N of observations +(e.g. representing sensors), and a goal functional (also called quantity of interest) +G ∈ X ∗. We define the prior measure π0 to be the uniform distribution on U. +The observations O(S(a)) are assumed to be additionally subject to additive +observation noise η, which we assume to be centered Gaussian, i.e., η ∼ N(0, Γ) +for some known, nondegenerate covariance matrix Γ ∈ RK×K. In other words, +we assume given noisy observation data δ ∈ RK modeled as +δ = O(S(a)) + η ∈ L2 +Γ(RK). +(9) +1In practice, h either parametrizes the local mesh-size maxT ∈Th |T|1/2, for quasi-uniform +collections of partitions, or it relates to the refinement level in case of adaptive refinement [16]. +3 + +We consider the Bayesian inverse problem of recovering the expected value of +G(u), given observation data δ, that is Eπ0[G(u)|δ]. By Bayes’ theorem [19], the +posterior distribution πδ of y|δ is absolutely continuous with respect to π0 and +its Radon-Nikodym derivative with respect to the prior π0 is +dπδ +dπ0 +(y) = Θ(y) +Z +, +(10) +where Θ(y) := exp(− 1 +2|δ − O(S(a(y)))|2 +Γ) = exp(− 1 +2|δ − O(u(y))|2 +Γ) denotes the +likelihood with the observation noise covariance-weighted, data-to-observation +misfit, where |x|2 +Γ := x⊤Γ−1x and Z is defined in (1). As Θ(y) > 0 for all y ∈ U, +Z > 0. In the present setting, Bayesian inversion amounts to the numerical +evaluation of the posterior mean +Eπδ[G(u)] = 1 +Z +� +U +G(u(y))Θ(y) dy. +This is (1) upon setting Θ′(y) := G(u(y))Θ(y) and Y = R. Define the FE +solution operator Sh : X → Xh as the mapping Sha(y) = uh(y) via (8). The FE +approximations of Θ, Θ′ used in (3) are then Θh = exp(− 1 +2|δ − O(uh(y))|2 +Γ) and +Θ′ +h = G(uh(y))Θh(y), respectively. +1.3 +Optimal control with entropic risk measure (OCP) +Let Y = L2(D), assume a parameter independent target state ˆu ∈ Y and a +nonempty, closed and convex set X ⊆ Y of admissible controls. Throughout +the rest of the paper, we identify Y with its dual via Riesz representation and +write ⟨·, ·⟩ for the inner product on Y. Once the affine parametric diffusion +coefficient a(y) is fixed, (5) defines a linear solution operator Ly : Y → Y by +Lyf = ι ◦ u(y) for all f ∈ Y, where ι denotes the continuous embedding X ⊂ Y. +In particular, we view u(y) as a function of the right-hand side f of (5). For +a function Φ: U → R and some θ ∈ (0, ∞), the entropic risk measure [12] is +defined by +R(Φ) = 1 +θ log +�� +U +exp(θΦ(y)) dy +� +. +(11) +The entropic risk is especially relevant when favoring a risk averse behavior [7]. +We consider the following minimization problem, for fixed constants α1, α2 > 0 +f ∗ := argmin +f∈X +J(f), +J(f) := R( α1 +2 ∥Lyf − ˆu∥2 +Y) + α2 +2 ∥f∥2 +Y . +(12) +Due to convexity of R and α2 > 0, the functional J is strongly convex so that +(12) is a well-posed minimization problem [9,12]. +Define the shorthand notation Φf(y) = α1 +2 ∥Lyf − ˆu∥2 +Y and the adjoint state +given by qf(y) = α1Ly(Lyf − ˆu) ∈ Y. Under the above conditions on X, (12) is +equivalent to the inequality ⟨J′(f ∗), f − f ∗⟩ ≥ 0 for all f ∈ X, where in analogy +with [9, Lemma 3.6] the Fréchet derivative J′(f) ∈ Y of J at f ∈ X is +J′(f) = +1 +� +U exp(θΦf(y)) dy +� +U +exp(θΦf(y))qf(y) dy + α2f. +(13) +4 + +Next, we replace in (12) the integral over U by QMC rules and the exact solution +operator Ly by the Galerkin solution Ly +h : Y → Xh defined by Ly +hf = uh(y). +Then, we obtain the discrete formulation +f ∗ +m,h := argmin +f∈X +Jm,h(f), +Jm,h(f) := Rm( α1 +2 ∥Ly +hf − ˆu∥2 +Y) + α2 +2 ∥f∥2 +Y , (14) +where Rm(Φ) = 1 +θ log +� +1 +bm +� +y∈Pm exp(θΦ(y)) +� +is again convex, due to positivity +of the QMC quadrature weights. The derivative J′ +m,h(f) ∈ Y of Jm,h is analogous +to (13), again replacing the integrals by sample averages over Pm, Φh,f(y) = +α1 +2 ∥Ly +hf − ˆu∥2 +Y and qh,f(y) = α1Ly +h(Ly +hf − ˆu) ∈ Y. The next proposition recasts +the error in the approximation f ∗ +m,h ≈ f ∗ to the form (4). Whenever it does not +cause confusion, we will write q(y) = qf ∗ +m,h(y) and qh(y) = qh,f ∗ +m,h(y). +Proposition 1. For Y = L2(D), assume Z, Z′ in (1) are defined by Θ(y) = +exp(θΦf ∗ +m,h(y)) and Θ′(y) = q(y)Θ(y). +Similarly, let Zm,h, Z′ +m,h in (3) be +defined by Θh(y) = exp(θΦh,f ∗ +m,h(y)) and Θ′ +h(y) = qh(y)Θh(y). +Then +��f ∗ − f ∗ +m,h +�� +Y ≤ 1 +α2 +��J′(f ∗ +m,h) − J′ +m,h(f ∗ +m,h) +�� +Y = 1 +α2 +���� +Z′ +Z − +Z′ +m,h +Zm,h +���� +Y +. +(15) +Proof. The inequalities ⟨J′(f ∗), f − f ∗⟩ ≥ 0 and ⟨J′ +m,h(f ∗ +m,h), f − f ∗ +m,h⟩ ≥ 0 for +all f ∈ X imply that ⟨J′ +m,h(f ∗ +m,h) − J′(f ∗), f ∗ − f ∗ +m,h⟩ ≥ 0. Moreover, strong +convexity of J yields the relation ⟨J′(f ∗)−J′(f ∗ +m,h)−α2(f ∗−f ∗ +m,h), f ∗−f ∗ +m,h⟩ ≥ 0. +Thus, we get +α2 +��f ∗ − f ∗ +m,h +��2 +Y ≤ ⟨J′ +m,h(f ∗ +m,h) − J′(f ∗) + α2(f ∗ − f ∗ +m,h), f ∗ − f ∗ +m,h⟩ +≤ ⟨J′ +m,h(f ∗ +m,h) − J′(f ∗ +m,h), f ∗ − f ∗ +m,h⟩ +≤ +��J′ +m,h(f ∗ +m,h) − J′(f ∗ +m,h) +�� +Y +��f ∗ − f ∗ +m,h +�� +Y , +which implies the inequality in (15). +The equality follows by substituting +J′ +m,h(f ∗ +m,h) = +Z′ +m,h +Zm,h + α2f ∗ +m,h and (13). +Remark 1. Note that Θ, Θ′ as defined in Proposition 1, and hence Z, Z′, also +implicitly depend on h via the discrete minimizer f ∗ +m,h. In particular, the exact +minimizer f ∗ does not appear in the right hand side of (15). This fact will be +crucial for the ensuing a-posteriori error estimation methodology. +2 +A-posteriori QMC error estimation +We develop computable a-posteriori error estimators for the PDE discretization +error and for the QMC-quadrature error, the latter being reliable independent +of the integration dimension s. +2.1 +Parametric regularity +To leverage the results from [5, 14] and overcome the curse of dimensionality, +we need to quantify the regularity with respect to y ∈ U. To this end, we +5 + +write |ν| = � +j νj, supp(ν) = {j : νj ̸= 0} and, given smooth F : U → Y and +ν ∈ F := {ν ∈ NN +0 : | supp(ν)| < ∞} we introduce the multi-index notation +∂ν +yF(y) = � +j∈supp(ν) ∂νj +yj F(y) for the derivatives with respect to y. Moreover, +given β = (βj)j∈N ∈ ℓp(N) for some p ∈ (0, 1), n ∈ N and c > 0, we define the +SPOD weights γ = (γu)u⊆{1:s} via +γu = +� +ν∈{1:α}|u| +(|ν| + n)! +� +j∈u +cβνj +j . +(16) +Definition 1. Let Y be a separable Hilbert space, α ∈ N, α ≥ 2. We define the +weighted unanchored Sobolev space Ws,α,γ with dominating mixed smoothness +as the completion of C∞(U, Y) with respect to the norm +∥F∥s,α,γ := max +u⊆{1:s} γ−1 +u +� +v⊆u +� +νu\v∈{1:α}|u\v| +� +[− 1 +2 , 1 +2 ]|v| +����� +� +[− 1 +2 , 1 +2 ]s−|v| ∂ +(νu\v,αv) +y +F(y) dy{1:s}\v +����� +Y +dyv, +where µ = (νu\v, αv) ∈ F is such that µj = νj if j ∈ u \ v, µj = α if j ∈ v and +µj = 0 otherwise. The inner integral is interpreted as a Bochner integral. +The relevance of the space Ws,α,γ in our context is justified by the following +result, which will be the starting point of our analysis. This is a consequence of +the so-called component-by-component (CBC) construction as described in [5,14], +which takes as input s, α, γ and m and returns a polynomial lattice Pm. +Theorem 1. Let α ∈ N, α ≥ 2 and F : U → Y for some separable Hilbert space +Y be such that F ∈ Ws,α,γ for some weights γ of the form (16) for β ∈ ℓp(N), +p ∈ (0, 1/2]. Then, there exists a sequence (Pm)m∈N of polynomial lattice rules +such that as m → ∞ +Em(F) := +� +U +F − 1 +bm +� +y∈Pm +F(y) = ∥F∥s,α,γ O(b−m), +as well as for all ε > 0 +Em(F) = 1 +bm +� +y∈Pm +F(y) − +1 +bm−1 +� +y∈Pm−1 +F(y) + ∥F∥s,α,γ O(b−2m+ε). +Here the constants hidden in O(·) are independent of s, m ∈ N and F, but depend +on ε and γ. In addition, the point sets (Pm)m∈N can be constructed explicitly by +a CBC construction in O(smbm + s2bm) operations. +Proof. For the case Y = R, this is proved in [5, Theorem 4.1]. Otherwise, let +v ∈ Y arbitrary such that ∥v∥Y = 1. Then, ∂ν +y⟨F(y), v⟩ = ⟨∂ν +yF(y), v⟩ for all +ν ∈ F implies ∥⟨F, v⟩∥s,α,γ ≤ ∥F∥s,α,γ. Hence, we reduced to the case Y = R +and by linearity of the integral and the quadrature we conclude. +Corollary 1. Assume that the PDE (5) satisfies (6) and (7). Then we can +construct polynomial lattice rules (Pm)m∈N (depending on b) in O(smbm + s2bm) +operations such that for all ε > 0 it holds for the BIP +Z − Zm = Zm − Zm−1 + O(b−2m+ε), +Z′ − Z′ +m = Z′ +m − Z′ +m−1 + O(b−2m+ε), +as m → ∞. The hidden constants in O(·) are independent of s, m ∈ N. +6 + +Proof. From [18, Section 4.1], [4, Theorem 3.1] and ν! := � +j∈supp(ν) νj! ≤ |ν|!, +we have that sups ∥Θ∥s,α,γ + sups ∥Θ′∥s,α,γ < ∞ for α = 1 + ⌊1/p⌋ and some +SPOD weights (16) defined by a sequence β ∼ b and n = 0. Hence we can apply +Theorem 1 and conclude. +A similar result can be given for the OCP, based on the results in [8,9]. +Corollary 2. Assume that the PDE (5) satisfies (6) and (7). Then we can +construct polynomial lattice rules (Pm)m∈N (depending on b) in O(smbm + s2bm) +operations such that for all ε > 0 it holds for the OCP +Z − Zm = Zm − Zm−1 + O(b−2m+ε), +Z′ − Z′ +m = Z′ +m − Z′ +m−1 + O(b−2m+ε), +as m → ∞. The hidden constants in O(·) are independent of s, m ∈ N. +Proof. Applying the result of [8, Lemma 4.6] in [9, Theorems 5.4 and 5.6], we +conclude that sups ∥Θ∥s,α,γ + sups ∥Θ′∥s,α,γ < ∞ for α = 1 + ⌊1/p⌋ and for +some SPOD weights (16) defined by a sequence β ∼ b and n = 2. +2.2 +Ratio error estimator +Proposition 2. Assume that the PDE (5) satisfies (6) and (7). Then, for the +BIP and the OCP, we can construct polynomial lattice rules (Pm)m∈N such that +Z′ +Z − Z′ +m +Zm += +1 +bZm − Zm−1 +�Zm−1Z′ +m − ZmZ′ +m−1 +Zm +� ++ O(b−2m+ε), +(17) +holds for all ε > 0 as m → ∞. The hidden constant in O(·) is independent of +s, m. +Proof. First, Z − Zm → 0 as m → ∞ implies that Zm > Z/2 > 0 for m +sufficiently large. Next, due to either Corollary 1 or 2, for all ε > 0 we have +Z′ +Z − Z′ +m +Zm += (Z′ − Z′ +m)Zm − (Z − Zm)Z′ +m +(Z − Zm)Zm + Z2m += +1 +b−1(Z′ +m − Z′ +m−1 + O(b−2m+ε))Zm − +1 +b−1(Zm − Zm−1 + O(b−2m+ε))Z′ +m +1 +b−1(Zm − Zm−1 + O(b−2m+ε))Zm + Z2m += +1 +b−1(Z′ +m − Z′ +m−1) +1 +b−1(bZm − Zm−1) + O(b−2m+ε) +− +1 +b−1(Zm − Zm−1)Z′ +m +( +1 +b−1(bZm − Zm−1) + O(b−2m+ε))Zm ++ O(b−2m+ε). +Clearly Am := +1 +b−1(bZm − Zm−1) → Z as m → ∞, so that Am > Z/2 > 0 for +m sufficiently large. Hence, by a geometric sum argument, collecting in Bm all +terms contained in O(b−2m+ε) in the denominator, we obtain for m → ∞ that +1 +Am + Bm += +1 +Am +∞ +� +k=0 +(−1)k +�Bm +Am +�k += +1 +Am ++ O(b−2m+ε). +7 + +Therefore, as m → ∞ +Z′ +Z − Z′ +m +Zm += +1 +b−1(Z′ +m − Z′ +m−1) +Am +− +1 +b−1(Zm − Zm−1)Z′ +m +AmZm ++ O(b−2m+ε), +(18) +which, upon rearranging the terms, is the claim. +Since Z′ +Z − Z′ +m +Zm += O(b−m) ≫ O(b−2m+ε), Proposition 2 states that +Ebm(Θ′, Θ) := +1 +bZm − Zm−1 +�Zm−1Z′ +m − ZmZ′ +m−1 +Zm +� +(19) +is a computable, asymptotically exact error estimator. +3 +A-posteriori FEM error estimation +In practice the parametric solution u(y) ∈ X is not exactly available, and hence +Zm, Z′ +m are not computable. For any y ∈ U, u(y) will be approximated by the +corresponding Galerkin discretizations uh(y) ∈ Xh. +3.1 +Ratio error estimator +Let Θh, Θ′ +h, Zh, Z′ +h be defined replacing u and q by uh, qh in the definitions of +Θ, Θ′, Z, Z′, respectively. Similarly, let Zm,h, Z′ +m,h be defined replacing u and q +by uh, qh in the definitions of Zm, Z′ +m, respectively. +Proposition 3. Assume there exist ζm,h, ζ′ +m,h such that for some c > 0 inde- +pendent of h ∈ H, |Zm − Zm,h| ≤ cζm,h and +���Z′ +m − Z′ +m,h +��� +Y ≤ cζ′ +m,h. Assume +that ζm,h → 0 as h → 0. Then, there exists h0 ∈ H such that for all h ≤ h0 +���� +Z′ +m +Zm +− +Z′ +m,h +Zm,h +���� +Y +≤ c +Zm,hζ′ +m,h + +���Z′ +m,h +��� +Y ζm,h +Z2 +m,h − cζm,hZm,h +. +Proof. Due to the limit ζm,h → 0 there exists h1 ∈ H such that Zm,h ≥ Zm/2 > 0 +for all h ≤ h1, h ∈ H. Therefore, we can pick h0 ∈ H such that Zm,h > cζm,h +for all h ≤ h0, h ∈ H. Thus +���� +Z′ +m +Zm +− +Z′ +m,h +Zm,h +���� +Y += +����� +(Z′ +m − Z′ +m,h)Zm,h − (Zm − Zm,h)Z′ +m,h +(Zm − Zm,h)Zm,h + Z2 +m,h +����� +Y +≤ +���Z′ +m − Z′ +m,h +��� +Y Zm,h + |Zm − Zm,h| +���Z′ +m,h +��� +Y +Z2 +m,h − |Zm − Zm,h| Zm,h +≤ c +Zm,hζ′ +m,h + +���Z′ +m,h +��� +Y ζm,h +Z2 +m,h − cζm,hZm,h +. +8 + +Due to this result, we are left with the task of finding computable ζm,h, ζ′ +m,h +satisfying the conditions |Zm − Zm,h| ≤ cζm,h and +���Z′ +m − Z′ +m,h +��� +Y ≤ cζ′ +m,h for +some c > 0 independent of m, h. Thus, in the following sections we will provide +such error estimators for BIP and OCP. +3.2 +FEM error estimators for BIP +For a finite collection of observation functionals O = (O1, . . . , OK) ∈ (X ∗)K, +define ∥O∥X ∗ = +��K +k=1 ∥Ok∥2 +X ∗. The starting point to estimate the FEM error +will be the following well-known result, e.g. [16]. Let {Th}h∈H be a family of +shape-regular, simplicial meshes of D and let Pk(Th) be the set of piecewise +polynomial functions on Th of degree at most k ∈ N0 in each T ∈ Th. Let Eh be +the set of interior edges of all elements T ∈ Th. We assume that Xh := P1(Th)∩X, +that f ∈ L2(D) and that a(y) ∈ W 1,∞(D). Let hT = |T|1/2 for T ∈ Th and he +the length of an edge e ∈ Eh. Then we define the a-posteriori error estimator +η2 +y,h := +� +T ∈Th +� +h2 +T ∥f + div(a(y)∇uh(y))∥2 +L2(T ) ++ 1 +2 +� +e⊆∂T,e∈Eh +he ∥�a(y)∇uh(y)�∥2 +L2(e) +� +. +(20) +By [16, Theorem 6.3] there exists some c∗ > 0, only depending on D and the +shape regularity constant of {Th}h∈H, and in particular independent of y ∈ U +and h ∈ H, such that +∥u(y) − uh(y)∥X ≤ c∗ηy,h. +(21) +For the important special case O ∈ (L2(D))K and G ∈ L2(D) we may derive +sharper estimates. To simplify the presentation, we assume here that the physical +domain D ⊆ R2 is a convex polygon (see also Remark 3 below), and introduce +the L2(D)−residual estimator +˜η2 +y,h := +� +T ∈Th +� +h4 +T +��f ∗ +m,h + div(a(y)∇uh(y)) +��2 +L2(T ) ++ 1 +2 +� +e⊆∂T,e∈Eh +h3 +e ∥�a(y)∇uh(y)�∥2 +L2(e) +� +. +(22) +The additional factors hT , he are derived from a standard duality argument, see, +e.g. [20, Section 1.11]. Then, there exists some c∗ > 0 depending only on D +and the shape regularity constant of {Th}h∈H, and in particular independent of +y ∈ U and h ∈ H, such that +∥u(y) − uh(y)∥L2(D) ≤ c∗˜ηy,h. +(23) +Lemma 1. Fix a regular mesh Th of simplices in D and a parameter vector +y ∈ U and assume (21). Then +|Θ(y) − Θh(y)| ≤ Θh(y)(eχy,h − 1) =: ζy,h +9 + +holds for +χy,h := +���Γ−1/2O +��� +X ∗ +� +|δ − O(uh(y))|Γ + 1 +2 +���Γ−1/2O +��� +X ∗ c∗ηy,h +� +c∗ηy,h. +Furthermore, if O ∈ (L2(D))K and G ∈ L2(D), then +|Θ(y) − Θh(y)| ≤ Θh(y)(e˜χy,h − 1) := ˜ζy,h +holds for +˜χy,h := +���Γ−1/2O +��� +L2(D) +� +|δ − O(uh(y))|Γ + 1 +2 +���Γ−1/2O +��� +L2(D) c∗˜ηy,h +� +c∗˜ηy,h. +Proof. We define ∆h(y) := − 1 +2 |δ − O(u(y))|2 +Γ + 1 +2 |δ − O(uh(y))|2 +Γ to obtain +|Θ(y) − Θh(y)| = |Θh(y)(e∆h(y) − 1)| ≤ Θh(y)(e|∆h(y)| − 1). +The first part of the claim now follows with (21) and +|∆h(y)| ≤ 1 +2 +���Γ−1/2O +��� +X ∗ |2δ − O(u(y) + uh(y))|Γ ∥u(y) − uh(y)∥X +≤ +���Γ−1/2O +��� +X ∗ |δ − O(uh(y))|Γ ∥u(y) − uh(y)∥X ++ 1 +2 +���Γ−1/2O +��� +2 +X ∗ ∥u(y) − uh(y)∥2 +X . +The second part of the proof follows analogously by replacing X by L2(D) and +using (23) instead of (21). +Lemma 2. Fix a regular mesh of simplices Th and y ∈ U and assume (21). +Then there exists a constant c∗ > 0 such that for all y ∈ U and h ∈ H +|Θ′(y) − Θ′ +h(y)| ≤ ∥G∥X ∗ (c∗ηy,hΘh(y)eχy,h + ζy,h ∥uh(y)∥X ) =: ζ′ +y,h. +Furthermore, if O ∈ (L2(D))K and G ∈ L2(D), then +|Θ′(y) − Θ′ +h(y)| ≤ ∥G∥L2(D) +� +c∗˜ηy,hΘh(y)e˜χy,h + ˜ζy,h ∥uh(y)∥L2(D) +� +=: ˜ζ′ +y,h. +Proof. Since Θ′(y) = G(u(y))Θ(y) = G(u(y)Θ(y)), we get +|Θ′(y) − Θ′ +h(y)| ≤ ∥G∥X ∗ ∥u(y)Θ(y) − uh(y)Θh(y)∥X +≤ ∥G∥X ∗ (∥u(y) − uh(y)∥X Θ(y) + ∥uh(y)∥X |Θ(y) − Θh(y)|), +and hence the claim follows with Lemma 1 since Θ(y) ≤ Θh(y)eχy,h. The second +part of the claim follows analogously by the second part of Lemma 1. +Remark 2. We remark that the estimates in the proof of Lemma 2 are conservative: +we used that K > 1 in Lemma 1. For K = 1, i.e. for a single observation +functional, goal-oriented AFEM results from [1] and the references there, can be +used to obtain sharper a-posteriori error bounds. +10 + +We now can define ζm,h by averaging ζy,h for y ∈ Pm, that is ζm,h := +1 +bm +� +y∈Pm ζy,h. Then we get from Lemma 1 +|Zm − Zm,h| ≤ 1 +bm +� +y∈Pm +|Θ(y) − Θh(y)| ≤ ζm,h. +(24) +Analogously, with ζ′ +m,h = +1 +bm +� +y∈Pm ζ′ +y,h, Lemma 2 implies +��Z′ +m − Z′ +m,h +�� ≤ 1 +bm +� +y∈Pm +|Θ′(y) − Θ′ +h(y)| ≤ ζ′ +m,h. +(25) +In particular, if we construct Th such that it also holds ηy,h → 0 as h → 0 for +all y ∈ U, (24) and (25) verify the hypotheses of Proposition 3 with c = 1. +3.3 +FEM error estimators for OCP with entropic risk +In the case of OCP we require error estimates for the parametric state at the +discrete optimal control f ∗ +m,h, i.e. u(y) = Lyf ∗ +m,h and for the corresponding +adjoint state q(y) = α1Ly(Lyf ∗ +m,h − ˆu). The error will be measured in the +L2(D)-norm. Again we assume that Xh := P1(Th) ∩ X, that f ∈ L2(D) and +a(y) ∈ W 1,∞(D), and that D ⊆ R2 is a convex polygon. +Lemma 3. Fix a mesh Th and y ∈ U and impose (23). With the notation of +Proposition 1 and ˜ηy,h defined as in (22), we have +|Θ(y) − Θh(y)| ≤ Θh(y)(eχy,h − 1) =: ζy,h, +where +χy,h := θc∗ �α1 +2 ˜η2 +y,h + α1 +��Ly +hf ∗ +m,h − ˆu +�� +L2(D) ˜ηy,h +� +. +Proof. By twofold application of the triangle inequality we have +���Φf ∗ +m,h(y) − Φh,f ∗ +m,h(y) +��� ≤ α1 +2 +��(Ly − Ly +h)f ∗ +m,h +��2 +L2(D) ++ α1 +��Ly +hf ∗ +m,h − ˆu +�� +L2(D) +��(Ly − Ly +h)f ∗ +m,h +�� +L2(D) +≤ c∗ �α1 +2 ˜η2 +y,h + α1 +��Ly +hf ∗ +m,h − ˆu +�� +L2(D) ˜ηy,h +� +=: c∗ξy,h. +Note that ξy,h is computable due to Remark 1. Then, it follows with ∆h(y) := +θ(Φf ∗ +m,h(y) − Φh,f ∗ +m,h(y)) that +|Θ(y) − Θh(y)| = +���Θh(y)(e∆h(y) − 1) +��� ≤ Θh(y)(e|∆h(y)| − 1). +Using a residual estimator in the form (22) for the adjoint problem yields +∥q(y) − qh(y)∥L2(D) ≤ 2 max(c∗, 1)c∗˜˜ηy,h, +(26) +where +˜˜η2 +y,h := α2 +1 +� +T ∈Th +� +h4 +T ∥uh(y) − ˆu + div(a(y)∇qh(y))∥2 +L2(T ) +(27) ++ 1 +2 +� +e⊆∂T,e∈Eh +h3 +e ∥�a(y)∇qh(y)�∥2 +L2(e) +� ++ (max +T ∈Th h4 +T )˜η2 +y,h. +11 + +Lemma 4. Let Y = L2(D). Fix a mesh Th and y ∈ U and impose (23) and +(26). With the notation of Proposition 1, we have +∥Θ′(y) − Θ′ +h(y)∥Y ≤ ζy,h ∥qh(y)∥Y + 2c∗Θh(y)eχy,h ˜˜ηy,h =: ζ′ +y,h +Proof. As in the proof of Lemma 2, we get by Θ(y) ≤ Θh(y)eχy,h that +∥q(y)Θ(y) − qh(y)Θh(y)∥Y ≤ |Θ(y) − Θh(y)| ∥qh(y)∥Y ++ Θ(y) ∥q(y) − qh(y)∥Y +≤ ζy,h ∥qh(y)∥Y + 2c∗Θh(y)eχy,h ˜˜ηy,h. +Remark 3. If D ⊆ R2 is a non-convex polygon, the reliability assumption (23) +and the corresponding definitions (22), (27) of ˜ηy,h, ˜˜ηy,h must be adapted by +using weighted L2 norms, with weights near the re-entrant corners. We refer +to [21, Theorem 3.1] for a precise result in the case of the Poisson equation. +4 +Combined QMC-FEM estimator +In view of Propositions 2 and 3 we employ the computable a-posteriori estimator +ESTbm,h := ∥Ebm(Θ′ +h, Θh)∥Y + +Zm,hζ′ +m,h + +���Z′ +m,h +��� +Y ζm,h +Z2 +m,h − ζm,hZm,h +. +(28) +Note that the QMC error estimator ∥Ebm(Θ′, Θ)∥Y derived from Proposition 2 +is itself approximated by the computable expression ∥Ebm(Θ′ +h, Θh)∥Y. In the +next proposition we precise that the additional error committed due to this +extra approximation is of higher asymptotic order, as m → ∞. We equip the set +C0(U, Y) with the norm ∥F∥∞ = supy∈U ∥F(y)∥Y. +Proposition 4. Fix a family of regular meshes {Th}h∈H such that for some +˜C > 0 independent of s ∈ N, h ∈ H and some SPOD weights (16), it holds +max(∥Θ∥s,α,γ , ∥Θ′∥s,α,γ , ∥Θh∥s,α,γ , ∥Θ′ +h∥s,α,γ) ≤ ˜C. +(29) +Assume that the spaces {Xh}h are contained in X and that they are selected so +that ∥Θ − Θh∥∞ → 0 as h → 0. Then we can construct a sequence of polynomial +lattices (Pm)m∈N in O(smbm + s2bm) operations such that, for some h0 ∈ H and +some constant C > 0 (independent of m, h, s) we have for any h < h0 that +∥Ebm(Θ′, Θ) − Ebm(Θ′ +h, Θh)∥Y +≤ Cb−m(∥Θ − Θh∥∞ + ∥Θ′ − Θ′ +h∥∞ + ∥Θ − Θh∥s,α,γ + ∥Θ′ − Θ′ +h∥s,α,γ). +Proof. Throughout the proof, C > 0 is a generic constant independent of m, h, s. +We compute the difference of the numerators +∆1 := Zm−1Z′ +m − ZmZ′ +m−1 − Zm−1,hZ′ +m,h + Zm,hZ′ +m−1,h += −(Zm − Zm−1)(Z′ +m − Z′ +m,h) − (Zm − Zm,h − Zm−1 + Zm−1,h)Z′ +m,h ++ (Zm − Zm,h)(Z′ +m − Z′ +m−1) + Zm,h(Z′ +m − Z′ +m,h − Z′ +m−1 + Z′ +m−1,h). +12 + +We have |Zm − Zm,h| ≤ ∥Θ − Θh∥∞ and +���Z′ +m − Z′ +m,h +��� +Y ≤ ∥Θ′ − Θ′ +h∥∞. From +Theorem 1, we know that Zm = Zm−1 + ∥Θ∥s,α,γ O(b−m) and Z′ +m = Z′ +m−1 + +∥Θ′∥s,α,γ O(b−m) as m → ∞, with hidden constants in O(·) independent of +s, m, h. Furthermore Zm − Zm,h − Zm−1 + Zm−1,h = ∥Θ − Θh∥s,α,γ O(b−m), +and Z′ +m − Z′ +m,h − Z′ +m−1 + Z′ +m−1,h = ∥Θ′ − Θ′ +h∥s,α,γ O(b−m) also follow by +Theorem 1. Therefore, we have +∥∆1∥Y ≤ Cb−m(∥Θ − Θh∥∞ + ∥Θ′ − Θ′ +h∥∞ + ∥Θ − Θh∥s,α,γ + ∥Θ′ − Θ′ +h∥s,α,γ). +Next, we define T1 := Zm−1,hZ′ +m,h − Zm,hZ′ +m−1,h and obtain the estimate +∥T1∥Y ≤ C(∥Θh∥s,α,γ + ∥Θ′ +h∥s,α,γ)b−m. Moreover, +∆2 := (bZm − Zm−1)Zm − (bZm,h − Zm−1,h)Zm,h += (b(Zm − Zm,h) + (Zm−1,h − Zm−1))Zm + (bZm,h − Zm−1,h)(Zm − Zm,h) +gives |∆2| ≤ C ∥Θ − Θh∥∞. Next, we observe that T2 = (bZm,h − Zm−1,h)Zm,h +is bounded from below away from 0, for h sufficiently small. Therefore, for h +sufficiently small we apply the elementary inequality +���� +T1 + ∆1 +T2 + ∆2 +− T1 +T2 +���� +Y +≤ max(∥∆1∥Y , ∥T1∆2∥Y) +1 + |T2| +|T2| (|T2| − |∆2|), +valid for T1, T2, ∆1, ∆2 ∈ R with |∆2| < |T2|, which is satisfied since |∆2| → 0 +as h → 0. Combining all these observations we obtain the claim. +Theorem 2. For either the BIP or the OCP, assume that D ⊆ R2 is a con- +vex polygon and that the PDE (5) satisfies (6), (7), f ∈ L2(D) and b′ ∈ +ℓp(N), p ∈ (0, 1/2], with b′j = ∥ψj∥W 1,∞(D). Let Xh = P1(Th) ∩ X for a family +of shape-regular meshes Th such that h = maxT ∈Th hT . Then, we can construct +polynomial lattices (Pm)m∈N such that the estimator ESTbm,h in (28) satisfies +���� +Z′ +Z − +Z′ +m,h +Zm,h +���� +Y +≤ ESTbm,h + O(b−2m+ε + b−mh), +for any ε > 0 as m → ∞, h → 0. The constant in O(·) is independent of s, m +and h, but depends on ε. +Proof. Since bj ≤ b′ +j, from either Corollary 1 or 2, there exist SPOD weights γ′ +as in (16) with β′ ∼ b′, such that sups ∥Θ∥s,α,γ′ + ∥Θ′∥s,α,γ′ < ∞. Combining +(20) with Lemma 1 and h → 0 we have ζm,h → 0 for the BIP case for any m ∈ N. +Similarly, combining (22) with Lemma 3 yields the same observation for the +OCP case. Therefore we can apply Propositions 2 and 3 to get that we can +construct polynomial lattices so that as m → ∞ +���� +Z′ +Z − +Z′ +m,h +Zm,h +���� +Y +≤ ∥Ebm(Θ′, Θ)∥Y + +Zm,hζ′ +m,h + +���Z′ +m,h +��� +Y ζm,h +Z2 +m,h − ζm,hZm,h ++ O(b−2m+ε). +Next, we say that ρ ∈ (1, ∞)N is (b′, ε)-admissible if � +j≥1(ρj − 1)b′ +j ≤ ε, see [4]. +Then we define Tb′,ε = � +ρ,(b′,ε)-adm.{y ∈ Cs : dist(yj, [− 1 +2, 1 +2]) ≤ ρj − 1}. Fol- +lowing the computations in [2, Theorem 4.1], yield h0 ∈ H and ε > 0 sufficiently +13 + +small such that for all h ≤ h0, h ∈ H, we have supy∈Tb′,ε |Θ(y) − Θh(y)| + +∥Θ′(y) − Θ′ +h(y)∥Y ≤ Ch. By [4, Theorem 3.1], this implies that for a constant +C independent of h, s, +∥Θ − Θh∥ ∞ + ∥Θ′ − Θ′ +h∥∞ + ∥Θ − Θh∥s,α,γ′ + ∥Θ′ − Θ′ +h∥s,α,γ′ ≤ Ch. +Thus, (29) and ∥Θ − Θh∥∞ → 0 hold, and we apply Proposition 4 to conclude. +5 +Numerical experiment +We consider the PDE (5) on the physical domain D := (0, 1)2, with f ≡ 10, and +parametric diffusion coefficient given by +a(x, y) = 1 +2 + +16 +� +j=1 +yj +(k2 +j,1 + k2 +j,2)2 sin(kj,1x1) sin(kj,2x2). +The pairs (kj,1, kj,2) ∈ N2 are defined by the ordering of N2 such that for j ∈ N, +k2 +j,1 + k2 +j,2 ≤ k2 +j+1,1 + k2 +j+1,2, and the ordering is arbitrary when equality holds. +We investigate a BIP with observation functional O = (O1, . . . , O4) ∈ (L2(D))4, +given by Ok(v) := +1 +0.01 +� +Ik vdx for v ∈ L2(D) and k = 1, . . . , 4, where I1 := +[0.1, 0.2]2, I2 := [0.1, 0.2] × [0.8, 0.9], I3 := [0.8, 0.9] × [0.1, 0.2], I4 := [0.8, 0.9]2. +We draw a (random) sample of a to compute the "ground truth" of observa- +tions O(S(a)) on a sequence of regular FE meshes of triangles obtained by +uniform refinement, with 525.313 degrees of freedom (dofs). +We add ran- +dom noise η ∼ N(0, σ2I4) to the observations, where σ is set as 10% of +the average of O(S(a)) ∈ R4. The realized synthetic data is then given by +δ = (0.5205, 0.5037, 0.5443, 0.4609)⊤. +Our aim is to approximate Eπδ[G(u)] by the ratio estimator +Z′ +m,h +Zm,h , where +G ∈ L2(D) is given by G(v) := +1 +0.5 +� +[0.25,0.75]2 vdx for v ∈ L2(D). The FE +mesh and the polynomial lattice rule, that eventually determine h and m, are +refined successively based on the combined estimator in (28). For tolerances +τFEM, τQMC > 0, we start from an initial FE mesh of D, that is uniformly refined +until the stopping criterion +Zm,hζ′ +m,h+∥Z′ +m,h∥Yζm,h +Z2 +m,h−ζm,hZm,h +≤ τFEM is met. Thereafter, we +increase the number bm of lattice points until there holds |Ebm(Θ′ +h, Θh)| ≤ τQMC. +We initialize by a FE mesh with 41 dofs and bm0 QMC points with base b = 2 +and m0 = 2, and set the tolerances to τFEM = τQMC = 2−6. To assess the total +realized error, we compute a reference solution Z′ +ref +Zref by a multilevel Monte Carlo +ratio estimator, see [17], and report absolute error +��� +Z′ +m,h +Zm,h − Z′ +ref +Zref +���. The reference +estimator uses 6 refinement levels with 545/525.313 dofs on the coarsest/finest +level, respectively, and uniform (pseudo-) random numbers y. The number +of samples is adjusted to balance statistical error and discretization bias on +each level. The experiment has been implemented in MATLAB using the +MooAFEM library [11] for the FE discretization. All arising linear systems are +solved directly by the \-operator in MATLAB. +The estimated and realized errors vs. +the number of iterations (in the +sense of refinement steps) are depicted Figure 1. Here, the FE a-posteriori +14 + +estimator gives negative values on rather coarse meshes, where c∗˜ηy,h > 1. +Therefore, we discarded these "pre-asymptotic" values in the plot. We see +that the FE a-posteriori estimator from Proposition 3 is rather conservative at +first, but eventually approaches the actual error for finer meshes. The QMC +estimator |Ebm(Θ′ +h, Θ′ +h)| is of the same magnitude as σ at first, and only two +more refinement steps are needed once the FE mesh is sufficiently fine. The +combined error estimate ESTbm,h aligns well with the realized error, as expected +from our theoretical analysis. +Figure 1: Results for the QMC-FEM ratio estimator with a-posterior ratio refinement. +First the FE mesh is refined until the tolerance τFEM is achieved (dashed w. circles), +then the QMC a-posterior refinement takes place (dashed w. triangles). The estimated +error (solid w. stars) is conservative for coarse meshes, but eventually approaches the +realized error (solid w. diamonds). +6 +Conclusion +In this paper we outlined the construction of an a-posteriori QMC-FEM estimator, +that allows to quantify the approximation error to a) posterior expectation +in Bayesian inverse problems and b) the optimal control under the entropic +risk measure. The estimator is computable and viable for large number of +parameters s and it is asymptotically an upper bound for the errors in a) and b). +Furthermore, the particular ratio structure Z′ +Z of the sought quantities allows +to tackle both the BIP and OCP, in a unified manner. In either case, we work +under the assumption that the underlying model is a parametric elliptic PDE +with affine-parametric diffusion. Nevertheless, the present QMC methodology to +high-dimensional integration is applicable to non-affine parametric PDEs with +quantified, holomorphic-parametric dependence, see [4] and the references there. +Since the error estimators we consider ηy,h, ˜ηy,h, ˜˜ηy,h are expressed as sums of +local error contributions for T ∈ Th, a possible direction of research is to employ +the presently proposed estimators ζy,h, ζ′ +y,h to steer an adaptive QMC-FEM +algorithm [13]. +15 + + total error +Z +Zm.h +Total/estimated errors +-QMC-error est. +*-FEM+QMC-error est. +... TFEM/TQMC +LC +7 +# IterationsReferences +[1] R. Becker, M. Brunner, M. Innerberger, J. M. Melenk, and D. Praetorius. Rate- +optimal goal-oriented adaptive FEM for semilinear elliptic PDEs. Comput. Math. +Appl., 118:18–35, 2022. +[2] J. Dick, R. N. Gantner, Q. T. L. Gia, and Ch. Schwab. Multilevel higher-order +quasi-Monte Carlo Bayesian estimation. Math. Mod. Meth. Appl. Sci., 27(5):953– +995, 2017. +[3] J. Dick, T. Goda, and T. Yoshiki. Richardson extrapolation of polynomial lattice +rules. SIAM J. Numer. Anal., 57(1):44–69, 2019. +[4] J. Dick, Q. T. Le Gia, and Ch. Schwab. Higher order quasi-Monte Carlo integra- +tion for holomorphic, parametric operator equations. SIAM/ASA J. Uncertain. +Quantif., 4(1):48–79, 2016. +[5] J. Dick, M. Longo, and Ch. Schwab. Extrapolated polynomial lattice rule inte- +gration in computational uncertainty quantification. SIAM/ASA J. Uncertain. +Quantif., 10(2):651–686, 2022. +[6] A. Ern and J.-L. Guermond. Finite elements I—Approximation and interpolation, +volume 72 of Texts in Applied Mathematics. Springer, Cham, 2021. +[7] H. Föllmer and T. Knispel. Entropic risk measures: coherence vs. convexity, +model ambiguity, and robust large deviations. Stoch. Dyn., 11(2-3):333–351, 2011. +[8] P. A. Guth, V. Kaarnioja, F. Y. Kuo, C. Schillings, and I. H. Sloan. A quasi-Monte +Carlo method for optimal control under uncertainty. SIAM/ASA J. Uncertain. +Quantif., 9(2):354–383, 2021. +[9] P. A. Guth, V. Kaarnioja, F. Y. Kuo, C. Schillings, and I. H. Sloan. Parabolic +PDE-constrained optimal control under uncertainty with entropic risk measure +using quasi-Monte Carlo integration. arXiv:2208.02767, 2022. +[10] L. Herrmann, M. Keller Ch. Schwab. Quasi-Monte Carlo Bayesian estimation +under Besov priors in elliptic inverse problems. Math. Comp., 90(2021) 1831–1860. +[11] M. Innerberger and D. Praetorius. "MooAFEM: An object oriented Matlab code +for higher-order (nonlinear) adaptive FEM." , arXiv:2203.01845, 2022. +[12] D. P. Kouri and T. M. Surowiec. Existence and optimality conditions for risk-averse +PDE-constrained optimization. SIAM/ASA J. Uncertain. Quantif., 6(2):787–815, +2018. +[13] M. Longo. Adaptive Quasi-Monte Carlo Finite Element Methods for Parametric +Elliptic PDEs. J. Sci. Comput., 92(1), 2022. +[14] M. Longo. +Extrapolated polynomial lattices and adaptivity in computational +Uncertainty Quantification. PhD thesis, ETH Zürich, 2022. +[15] H. Niederreiter. Low-discrepancy point sets obtained by digital constructions over +finite fields. Czechoslovak Math. J., 42(117)(1):143–166, 1992. +[16] R. H. Nochetto, K. G. Siebert, and A. Veeser. Theory of adaptive finite element +methods: an introduction. In Multiscale, nonlinear and adaptive approximation, +pages 409–542. Springer, Berlin, 2009. +16 + +[17] R. Scheichl, A.M. Stuart, and A.L. Teckentrup. Quasi-Monte Carlo and multilevel +Monte Carlo methods for computing posterior expectations in elliptic inverse +problems. SIAM/ASA J. Uncertain. Quantif., 5(1): 493-518, 2017. +[18] C. Schillings and Ch. Schwab. +Sparsity in Bayesian inversion of parametric +operator equations. Inverse Problems, 30(6):065007, 30, 2014. +[19] A. M. Stuart. Inverse problems: a Bayesian perspective. Acta Numer., 19:451–559, +2010. +[20] R. Verfürth. a-posteriori error estimation techniques for finite element methods. +Numerical Mathematics and Scientific Computation. Oxford University Press, +Oxford, 2013. +[21] T. P. Wihler. Weighted L2-norm a-posteriori error estimation of FEM in polygons. +Int. J. Numer. Anal. Model., 4(1):100–115, 2007. +17 + diff --git a/AtE1T4oBgHgl3EQfpAWX/content/tmp_files/load_file.txt b/AtE1T4oBgHgl3EQfpAWX/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..0b792e43f1b8eca6757996f5ff25aac6e74ac9e4 --- /dev/null +++ b/AtE1T4oBgHgl3EQfpAWX/content/tmp_files/load_file.txt @@ -0,0 +1,533 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf,len=532 +page_content='A-posteriori QMC-FEM error estimation for Bayesian inversion and optimal control with entropic risk measure Marcello Longo∗, Christoph Schwab∗, Andreas Stein∗† January 10, 2023 Abstract We propose a novel a-posteriori error estimation technique where the target quantities of interest are ratios of high-dimensional integrals, as occur e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' in PDE constrained Bayesian inversion and PDE constrained optimal control subject to an entropic risk measure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We consider in particular parametric, elliptic PDEs with affine-parametric diffusion coefficient, on high-dimensional parameter spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We combine our recent a-posteriori Quasi-Monte Carlo (QMC) error analysis, with Finite Element a-posteriori error estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The proposed approach yields a computable a-posteriori estimator which is reliable, up to higher order terms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The estimator’s reliability is uniform with respect to the PDE discretization, and robust with respect to the parametric dimension of the uncertain PDE input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 1 Introduction The efficient numerical approximation of high-dimensional, parametric partial differential equations (PDEs for short) received increasing attention during the past years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In this work, we address two classes of high-dimensional numerical integration problems which arise in connection with data assimilation and PDE constrained optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We illustrate the abstract concepts for a parametric, linear elliptic PDE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The first class is the so-called Bayesian inverse problem (BIP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' There, we are interested in the posterior expectation of a (linear) functional of the solution u of a parametric PDE, conditional on observation data subject to additive, centered Gaussian observation noise [18,19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' See also [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' A second problem class is PDE-constrained optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Specifically, the optimal control problem (OCP) of parametric PDEs under an entropic risk measure [7], where the state variable satisfies a parametric PDE constraint [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' When numerically approximating solutions of a BIP or an OCP, it is essential to quantify the error due to the numerical discretization in order to meet a prescribed numerical tolerance without wasting computational resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' As solving PDEs exactly is in general not possible, discretizations such as Finite Element Methods (FEM) must be used instead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Additionally, the parametric ∗Seminar for Applied Mathematics, ETH Zürich †Corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Email: andreas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='stein@sam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='ethz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='ch 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='03327v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='NA] 9 Jan 2023 uncertainty in the forward PDE model is passed on to the solution, and this must be taken into account both in the computation and in the error estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' This justifies the need for an a-posteriori error analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assuming that the uncertain PDE coefficients can be described by means of a parameter vector y ∈ U := � − 1 2, 1 2 �s where s ∈ N, s ≫ 1, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (6) below, we can employ suitable quasi-Monte Carlo (QMC) rules to approximate integrals over U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Here, we select extrapolated polynomial lattice (EPL) rules as first introduced in [3,5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' This choice is motivated by the deterministic nature or their quadrature nodes Pm, |Pm| = bm for some prime b [15], and good convergence properties under quantified parametric regularity of the integrand functions with respect to y ∈ U, uniformly in the dimension s [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Moreover, it was shown in [5,14] that under assumptions, EPL quadratures allow for computable a-posteriori quadrature error estimators that are asymptotically exact as m → ∞, with dimension robust ratio between estimated and actual quadrature error.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Both, BIP and OCP problems for PDEs with parametric input take the form Z′ Z ∈ Y, where Z = � U Θ(y) dy, Z′ = � U Θ′(y) dy, (1) for some suitable integrable functions Θ: U → R and Θ′ : U → Y, where Y is a separable Hilbert space and Z, Z′ are Bochner integrals with respect to a product measure dy on the possibly high-dimensional parameter space U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In particular, we have Y = R for the BIP case and Y ∈ L2(D) for the OCP case, with D being the physical domain of the considered PDE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Approximating the high-dimensional integrals with averages over polynomial lattices Pm ⊂ U yields a first approximation Z′ m Zm ∈ Y, where Zm = 1 bm � y∈Pm Θ(y), Z′ m = 1 bm � y∈Pm Θ′(y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (2) Then, since the integrands Θ, Θ′ depend on the solution of a y-parametric PDE, we discretize the parametric PDEs for y ∈ Pm, resulting in computable, parametric integrand functions Θh(y), Θ′ h(y) and in the computable estimates Z′ m,h Zm,h ∈ Y, where Zm,h = 1 bm � y∈Pm Θh(y), Z′ m,h = 1 bm � y∈Pm Θ′ h(y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (3) Here, the parameter h > 0 denotes the meshwidth of conforming Lagrangian Finite Element discretizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We present a computable a-posteriori estimator for the combined Finite Element discretization and quadrature error err = ���� Z′ Z − Z′ m,h Zm,h ���� Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (4) In the rest of this section we introduce the setting and we describe the two problems of interest, namely the BIP and the OCP with entropic risk measure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Section 2 and Section 3 are devoted to the QMC and the FEM a-posteriori error analysis, respectively, and these results will be combined in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We present numerical experiments in Section 5 and summary and conclusions in Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1 Affine-Parametric Forward PDE For brevity of presentation, we consider a model, linear elliptic PDE with homogeneous Dirichlet boundary conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Given a bounded polygon D ⊆ R2 and a parameter sequence y ∈ U, s ∈ N, consider the following parametric, linear, second order elliptic PDE in variational form: find u(·, y) ∈ X = H1 0(D) such that � D a(x, y)∇xu(x, y) · ∇xv(x) dx = � D f(x)v(x) dx ∀v ∈ X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (5) We assume that a is affine-parametric, namely that we are given a family of functions {ψj}j∈N0 ⊆ L∞(D) such that, with essinf ψ0 > κ > 0 and bj := 1 κ ∥ψj∥L∞(D), we have a(x, y) = ψ0(x) + s � j=1 yjψj, � j≥1 bj < 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (6) Then essinf a(·, y) > essinf ψ0 − κ > 0 for all y ∈ U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' By the Lax-Milgram lemma, the parametric weak solution u(·, y) ∈ X is well defined for any f ∈ X ∗ = H−1(D), where ∗ denotes the topological dual.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' To justify the a-posteriori QMC error analysis of Section 2, we will additionally require the summability b = (bj)j≥1 ∈ ℓp(N) for some p ∈ (0, 1/2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (7) For the FEM approximation, we consider conforming subspaces1 Xh ⊆ X h ∈ H ⊆ (0, ∞), dim(Xh) < ∞, that are linked to shape-regular, simplicial partitions {Th}h∈H of D [6, Section 8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assume that the resulting spaces are nested and conforming, that is Xh ⊆ Xh′ for any h, h′ ∈ H, h > h′ and that H accumulates at 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We construct the Galerkin discretizations uh(y) ∈ Xh of (5), by solving � D a(x, y)∇xuh(x, y) · ∇xv(x) dx = � D f(x)v(x) dx ∀v ∈ Xh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (8) To simplify notation, we write a(y) = a(·, y) and u(y) = u(·, y) and we omit the variable x for ∇x = ∇ and divx = div.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='2 Bayesian inverse problem (BIP) Let X = {a ∈ L∞(D) : essinf a > 0} and fix f ∈ X ∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, we can define the data-to-solution map S : X → X for the forward problem (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We also define the observation functional O ∈ (X ∗)K, with a finite number K ∈ N of observations (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' representing sensors), and a goal functional (also called quantity of interest) G ∈ X ∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We define the prior measure π0 to be the uniform distribution on U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The observations O(S(a)) are assumed to be additionally subject to additive observation noise η, which we assume to be centered Gaussian, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', η ∼ N(0, Γ) for some known, nondegenerate covariance matrix Γ ∈ RK×K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In other words, we assume given noisy observation data δ ∈ RK modeled as δ = O(S(a)) + η ∈ L2 Γ(RK).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (9) 1In practice, h either parametrizes the local mesh-size maxT ∈Th |T|1/2, for quasi-uniform collections of partitions, or it relates to the refinement level in case of adaptive refinement [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 3 We consider the Bayesian inverse problem of recovering the expected value of G(u), given observation data δ, that is Eπ0[G(u)|δ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' By Bayes’ theorem [19], the posterior distribution πδ of y|δ is absolutely continuous with respect to π0 and its Radon-Nikodym derivative with respect to the prior π0 is dπδ dπ0 (y) = Θ(y) Z , (10) where Θ(y) := exp(− 1 2|δ − O(S(a(y)))|2 Γ) = exp(− 1 2|δ − O(u(y))|2 Γ) denotes the likelihood with the observation noise covariance-weighted, data-to-observation misfit, where |x|2 Γ := x⊤Γ−1x and Z is defined in (1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' As Θ(y) > 0 for all y ∈ U, Z > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In the present setting, Bayesian inversion amounts to the numerical evaluation of the posterior mean Eπδ[G(u)] = 1 Z � U G(u(y))Θ(y) dy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' This is (1) upon setting Θ′(y) := G(u(y))Θ(y) and Y = R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Define the FE solution operator Sh : X → Xh as the mapping Sha(y) = uh(y) via (8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The FE approximations of Θ, Θ′ used in (3) are then Θh = exp(− 1 2|δ − O(uh(y))|2 Γ) and Θ′ h = G(uh(y))Θh(y), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='3 Optimal control with entropic risk measure (OCP) Let Y = L2(D), assume a parameter independent target state ˆu ∈ Y and a nonempty, closed and convex set X ⊆ Y of admissible controls.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Throughout the rest of the paper, we identify Y with its dual via Riesz representation and write ⟨·, ·⟩ for the inner product on Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Once the affine parametric diffusion coefficient a(y) is fixed, (5) defines a linear solution operator Ly : Y → Y by Lyf = ι ◦ u(y) for all f ∈ Y, where ι denotes the continuous embedding X ⊂ Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In particular, we view u(y) as a function of the right-hand side f of (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For a function Φ: U → R and some θ ∈ (0, ∞), the entropic risk measure [12] is defined by R(Φ) = 1 θ log �� U exp(θΦ(y)) dy � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (11) The entropic risk is especially relevant when favoring a risk averse behavior [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We consider the following minimization problem, for fixed constants α1, α2 > 0 f ∗ := argmin f∈X J(f), J(f) := R( α1 2 ∥Lyf − ˆu∥2 Y) + α2 2 ∥f∥2 Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (12) Due to convexity of R and α2 > 0, the functional J is strongly convex so that (12) is a well-posed minimization problem [9,12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Define the shorthand notation Φf(y) = α1 2 ∥Lyf − ˆu∥2 Y and the adjoint state given by qf(y) = α1Ly(Lyf − ˆu) ∈ Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Under the above conditions on X, (12) is equivalent to the inequality ⟨J′(f ∗), f − f ∗⟩ ≥ 0 for all f ∈ X, where in analogy with [9, Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='6] the Fréchet derivative J′(f) ∈ Y of J at f ∈ X is J′(f) = 1 � U exp(θΦf(y)) dy � U exp(θΦf(y))qf(y) dy + α2f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (13) 4 Next, we replace in (12) the integral over U by QMC rules and the exact solution operator Ly by the Galerkin solution Ly h : Y → Xh defined by Ly hf = uh(y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, we obtain the discrete formulation f ∗ m,h := argmin f∈X Jm,h(f), Jm,h(f) := Rm( α1 2 ∥Ly hf − ˆu∥2 Y) + α2 2 ∥f∥2 Y , (14) where Rm(Φ) = 1 θ log � 1 bm � y∈Pm exp(θΦ(y)) � is again convex, due to positivity of the QMC quadrature weights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The derivative J′ m,h(f) ∈ Y of Jm,h is analogous to (13), again replacing the integrals by sample averages over Pm, Φh,f(y) = α1 2 ∥Ly hf − ˆu∥2 Y and qh,f(y) = α1Ly h(Ly hf − ˆu) ∈ Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The next proposition recasts the error in the approximation f ∗ m,h ≈ f ∗ to the form (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Whenever it does not cause confusion, we will write q(y) = qf ∗ m,h(y) and qh(y) = qh,f ∗ m,h(y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proposition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For Y = L2(D), assume Z, Z′ in (1) are defined by Θ(y) = exp(θΦf ∗ m,h(y)) and Θ′(y) = q(y)Θ(y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Similarly, let Zm,h, Z′ m,h in (3) be defined by Θh(y) = exp(θΦh,f ∗ m,h(y)) and Θ′ h(y) = qh(y)Θh(y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then ��f ∗ − f ∗ m,h �� Y ≤ 1 α2 ��J′(f ∗ m,h) − J′ m,h(f ∗ m,h) �� Y = 1 α2 ���� Z′ Z − Z′ m,h Zm,h ���� Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (15) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The inequalities ⟨J′(f ∗), f − f ∗⟩ ≥ 0 and ⟨J′ m,h(f ∗ m,h), f − f ∗ m,h⟩ ≥ 0 for all f ∈ X imply that ⟨J′ m,h(f ∗ m,h) − J′(f ∗), f ∗ − f ∗ m,h⟩ ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Moreover, strong convexity of J yields the relation ⟨J′(f ∗)−J′(f ∗ m,h)−α2(f ∗−f ∗ m,h), f ∗−f ∗ m,h⟩ ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Thus, we get α2 ��f ∗ − f ∗ m,h ��2 Y ≤ ⟨J′ m,h(f ∗ m,h) − J′(f ∗) + α2(f ∗ − f ∗ m,h), f ∗ − f ∗ m,h⟩ ≤ ⟨J′ m,h(f ∗ m,h) − J′(f ∗ m,h), f ∗ − f ∗ m,h⟩ ≤ ��J′ m,h(f ∗ m,h) − J′(f ∗ m,h) �� Y ��f ∗ − f ∗ m,h �� Y , which implies the inequality in (15).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The equality follows by substituting J′ m,h(f ∗ m,h) = Z′ m,h Zm,h + α2f ∗ m,h and (13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Note that Θ, Θ′ as defined in Proposition 1, and hence Z, Z′, also implicitly depend on h via the discrete minimizer f ∗ m,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In particular, the exact minimizer f ∗ does not appear in the right hand side of (15).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' This fact will be crucial for the ensuing a-posteriori error estimation methodology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 2 A-posteriori QMC error estimation We develop computable a-posteriori error estimators for the PDE discretization error and for the QMC-quadrature error, the latter being reliable independent of the integration dimension s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1 Parametric regularity To leverage the results from [5, 14] and overcome the curse of dimensionality, we need to quantify the regularity with respect to y ∈ U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' To this end, we 5 write |ν| = � j νj, supp(ν) = {j : νj ̸= 0} and, given smooth F : U → Y and ν ∈ F := {ν ∈ NN 0 : | supp(ν)| < ∞} we introduce the multi-index notation ∂ν yF(y) = � j∈supp(ν) ∂νj yj F(y) for the derivatives with respect to y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Moreover, given β = (βj)j∈N ∈ ℓp(N) for some p ∈ (0, 1), n ∈ N and c > 0, we define the SPOD weights γ = (γu)u⊆{1:s} via γu = � ν∈{1:α}|u| (|ν| + n)!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' � j∈u cβνj j .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (16) Definition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let Y be a separable Hilbert space, α ∈ N, α ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We define the weighted unanchored Sobolev space Ws,α,γ with dominating mixed smoothness as the completion of C∞(U, Y) with respect to the norm ∥F∥s,α,γ := max u⊆{1:s} γ−1 u � v⊆u � νu\\v∈{1:α}|u\\v| � [− 1 2 , 1 2 ]|v| ����� � [− 1 2 , 1 2 ]s−|v| ∂ (νu\\v,αv) y F(y) dy{1:s}\\v ����� Y dyv, where µ = (νu\\v, αv) ∈ F is such that µj = νj if j ∈ u \\ v, µj = α if j ∈ v and µj = 0 otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The inner integral is interpreted as a Bochner integral.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The relevance of the space Ws,α,γ in our context is justified by the following result, which will be the starting point of our analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' This is a consequence of the so-called component-by-component (CBC) construction as described in [5,14], which takes as input s, α, γ and m and returns a polynomial lattice Pm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let α ∈ N, α ≥ 2 and F : U → Y for some separable Hilbert space Y be such that F ∈ Ws,α,γ for some weights γ of the form (16) for β ∈ ℓp(N), p ∈ (0, 1/2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, there exists a sequence (Pm)m∈N of polynomial lattice rules such that as m → ∞ Em(F) := � U F − 1 bm � y∈Pm F(y) = ∥F∥s,α,γ O(b−m), as well as for all ε > 0 Em(F) = 1 bm � y∈Pm F(y) − 1 bm−1 � y∈Pm−1 F(y) + ∥F∥s,α,γ O(b−2m+ε).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Here the constants hidden in O(·) are independent of s, m ∈ N and F, but depend on ε and γ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In addition, the point sets (Pm)m∈N can be constructed explicitly by a CBC construction in O(smbm + s2bm) operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For the case Y = R, this is proved in [5, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Otherwise, let v ∈ Y arbitrary such that ∥v∥Y = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, ∂ν y⟨F(y), v⟩ = ⟨∂ν yF(y), v⟩ for all ν ∈ F implies ∥⟨F, v⟩∥s,α,γ ≤ ∥F∥s,α,γ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Hence, we reduced to the case Y = R and by linearity of the integral and the quadrature we conclude.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Corollary 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assume that the PDE (5) satisfies (6) and (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then we can construct polynomial lattice rules (Pm)m∈N (depending on b) in O(smbm + s2bm) operations such that for all ε > 0 it holds for the BIP Z − Zm = Zm − Zm−1 + O(b−2m+ε), Z′ − Z′ m = Z′ m − Z′ m−1 + O(b−2m+ε), as m → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The hidden constants in O(·) are independent of s, m ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 6 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' From [18, Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1], [4, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1] and ν!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' := � j∈supp(ν) νj!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' ≤ |ν|!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', we have that sups ∥Θ∥s,α,γ + sups ∥Θ′∥s,α,γ < ∞ for α = 1 + ⌊1/p⌋ and some SPOD weights (16) defined by a sequence β ∼ b and n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Hence we can apply Theorem 1 and conclude.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' A similar result can be given for the OCP, based on the results in [8,9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assume that the PDE (5) satisfies (6) and (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then we can construct polynomial lattice rules (Pm)m∈N (depending on b) in O(smbm + s2bm) operations such that for all ε > 0 it holds for the OCP Z − Zm = Zm − Zm−1 + O(b−2m+ε), Z′ − Z′ m = Z′ m − Z′ m−1 + O(b−2m+ε), as m → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The hidden constants in O(·) are independent of s, m ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Applying the result of [8, Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='6] in [9, Theorems 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='4 and 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='6], we conclude that sups ∥Θ∥s,α,γ + sups ∥Θ′∥s,α,γ < ∞ for α = 1 + ⌊1/p⌋ and for some SPOD weights (16) defined by a sequence β ∼ b and n = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='2 Ratio error estimator Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assume that the PDE (5) satisfies (6) and (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, for the BIP and the OCP, we can construct polynomial lattice rules (Pm)m∈N such that Z′ Z − Z′ m Zm = 1 bZm − Zm−1 �Zm−1Z′ m − ZmZ′ m−1 Zm � + O(b−2m+ε), (17) holds for all ε > 0 as m → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The hidden constant in O(·) is independent of s, m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' First, Z − Zm → 0 as m → ∞ implies that Zm > Z/2 > 0 for m sufficiently large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Next, due to either Corollary 1 or 2, for all ε > 0 we have Z′ Z − Z′ m Zm = (Z′ − Z′ m)Zm − (Z − Zm)Z′ m (Z − Zm)Zm + Z2m = 1 b−1(Z′ m − Z′ m−1 + O(b−2m+ε))Zm − 1 b−1(Zm − Zm−1 + O(b−2m+ε))Z′ m 1 b−1(Zm − Zm−1 + O(b−2m+ε))Zm + Z2m = 1 b−1(Z′ m − Z′ m−1) 1 b−1(bZm − Zm−1) + O(b−2m+ε) − 1 b−1(Zm − Zm−1)Z′ m ( 1 b−1(bZm − Zm−1) + O(b−2m+ε))Zm + O(b−2m+ε).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Clearly Am := 1 b−1(bZm − Zm−1) → Z as m → ∞, so that Am > Z/2 > 0 for m sufficiently large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Hence, by a geometric sum argument, collecting in Bm all terms contained in O(b−2m+ε) in the denominator, we obtain for m → ∞ that 1 Am + Bm = 1 Am ∞ � k=0 (−1)k �Bm Am �k = 1 Am + O(b−2m+ε).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 7 Therefore, as m → ∞ Z′ Z − Z′ m Zm = 1 b−1(Z′ m − Z′ m−1) Am − 1 b−1(Zm − Zm−1)Z′ m AmZm + O(b−2m+ε), (18) which, upon rearranging the terms, is the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Since Z′ Z − Z′ m Zm = O(b−m) ≫ O(b−2m+ε), Proposition 2 states that Ebm(Θ′, Θ) := 1 bZm − Zm−1 �Zm−1Z′ m − ZmZ′ m−1 Zm � (19) is a computable, asymptotically exact error estimator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 3 A-posteriori FEM error estimation In practice the parametric solution u(y) ∈ X is not exactly available, and hence Zm, Z′ m are not computable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For any y ∈ U, u(y) will be approximated by the corresponding Galerkin discretizations uh(y) ∈ Xh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1 Ratio error estimator Let Θh, Θ′ h, Zh, Z′ h be defined replacing u and q by uh, qh in the definitions of Θ, Θ′, Z, Z′, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Similarly, let Zm,h, Z′ m,h be defined replacing u and q by uh, qh in the definitions of Zm, Z′ m, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assume there exist ζm,h, ζ′ m,h such that for some c > 0 inde- pendent of h ∈ H, |Zm − Zm,h| ≤ cζm,h and ���Z′ m − Z′ m,h ��� Y ≤ cζ′ m,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Assume that ζm,h → 0 as h → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, there exists h0 ∈ H such that for all h ≤ h0 ���� Z′ m Zm − Z′ m,h Zm,h ���� Y ≤ c Zm,hζ′ m,h + ���Z′ m,h ��� Y ζm,h Z2 m,h − cζm,hZm,h .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Due to the limit ζm,h → 0 there exists h1 ∈ H such that Zm,h ≥ Zm/2 > 0 for all h ≤ h1, h ∈ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Therefore, we can pick h0 ∈ H such that Zm,h > cζm,h for all h ≤ h0, h ∈ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Thus ���� Z′ m Zm − Z′ m,h Zm,h ���� Y = ����� (Z′ m − Z′ m,h)Zm,h − (Zm − Zm,h)Z′ m,h (Zm − Zm,h)Zm,h + Z2 m,h ����� Y ≤ ���Z′ m − Z′ m,h ��� Y Zm,h + |Zm − Zm,h| ���Z′ m,h ��� Y Z2 m,h − |Zm − Zm,h| Zm,h ≤ c Zm,hζ′ m,h + ���Z′ m,h ��� Y ζm,h Z2 m,h − cζm,hZm,h .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 8 Due to this result, we are left with the task of finding computable ζm,h, ζ′ m,h satisfying the conditions |Zm − Zm,h| ≤ cζm,h and ���Z′ m − Z′ m,h ��� Y ≤ cζ′ m,h for some c > 0 independent of m, h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Thus, in the following sections we will provide such error estimators for BIP and OCP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='2 FEM error estimators for BIP For a finite collection of observation functionals O = (O1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' , OK) ∈ (X ∗)K, define ∥O∥X ∗ = ��K k=1 ∥Ok∥2 X ∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The starting point to estimate the FEM error will be the following well-known result, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let {Th}h∈H be a family of shape-regular, simplicial meshes of D and let Pk(Th) be the set of piecewise polynomial functions on Th of degree at most k ∈ N0 in each T ∈ Th.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let Eh be the set of interior edges of all elements T ∈ Th.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We assume that Xh := P1(Th)∩X, that f ∈ L2(D) and that a(y) ∈ W 1,∞(D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let hT = |T|1/2 for T ∈ Th and he the length of an edge e ∈ Eh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then we define the a-posteriori error estimator η2 y,h := � T ∈Th � h2 T ∥f + div(a(y)∇uh(y))∥2 L2(T ) + 1 2 � e⊆∂T,e∈Eh he ∥�a(y)∇uh(y)�∥2 L2(e) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (20) By [16, Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='3] there exists some c∗ > 0, only depending on D and the shape regularity constant of {Th}h∈H, and in particular independent of y ∈ U and h ∈ H, such that ∥u(y) − uh(y)∥X ≤ c∗ηy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (21) For the important special case O ∈ (L2(D))K and G ∈ L2(D) we may derive sharper estimates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' To simplify the presentation, we assume here that the physical domain D ⊆ R2 is a convex polygon (see also Remark 3 below), and introduce the L2(D)−residual estimator ˜η2 y,h := � T ∈Th � h4 T ��f ∗ m,h + div(a(y)∇uh(y)) ��2 L2(T ) + 1 2 � e⊆∂T,e∈Eh h3 e ∥�a(y)∇uh(y)�∥2 L2(e) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (22) The additional factors hT , he are derived from a standard duality argument, see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [20, Section 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, there exists some c∗ > 0 depending only on D and the shape regularity constant of {Th}h∈H, and in particular independent of y ∈ U and h ∈ H, such that ∥u(y) − uh(y)∥L2(D) ≤ c∗˜ηy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (23) Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Fix a regular mesh Th of simplices in D and a parameter vector y ∈ U and assume (21).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then |Θ(y) − Θh(y)| ≤ Θh(y)(eχy,h − 1) =: ζy,h 9 holds for χy,h := ���Γ−1/2O ��� X ∗ � |δ − O(uh(y))|Γ + 1 2 ���Γ−1/2O ��� X ∗ c∗ηy,h � c∗ηy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Furthermore, if O ∈ (L2(D))K and G ∈ L2(D), then |Θ(y) − Θh(y)| ≤ Θh(y)(e˜χy,h − 1) := ˜ζy,h holds for ˜χy,h := ���Γ−1/2O ��� L2(D) � |δ − O(uh(y))|Γ + 1 2 ���Γ−1/2O ��� L2(D) c∗˜ηy,h � c∗˜ηy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We define ∆h(y) := − 1 2 |δ − O(u(y))|2 Γ + 1 2 |δ − O(uh(y))|2 Γ to obtain |Θ(y) − Θh(y)| = |Θh(y)(e∆h(y) − 1)| ≤ Θh(y)(e|∆h(y)| − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The first part of the claim now follows with (21) and |∆h(y)| ≤ 1 2 ���Γ−1/2O ��� X ∗ |2δ − O(u(y) + uh(y))|Γ ∥u(y) − uh(y)∥X ≤ ���Γ−1/2O ��� X ∗ |δ − O(uh(y))|Γ ∥u(y) − uh(y)∥X + 1 2 ���Γ−1/2O ��� 2 X ∗ ∥u(y) − uh(y)∥2 X .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The second part of the proof follows analogously by replacing X by L2(D) and using (23) instead of (21).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Fix a regular mesh of simplices Th and y ∈ U and assume (21).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then there exists a constant c∗ > 0 such that for all y ∈ U and h ∈ H |Θ′(y) − Θ′ h(y)| ≤ ∥G∥X ∗ (c∗ηy,hΘh(y)eχy,h + ζy,h ∥uh(y)∥X ) =: ζ′ y,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Furthermore, if O ∈ (L2(D))K and G ∈ L2(D), then |Θ′(y) − Θ′ h(y)| ≤ ∥G∥L2(D) � c∗˜ηy,hΘh(y)e˜χy,h + ˜ζy,h ∥uh(y)∥L2(D) � =: ˜ζ′ y,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Since Θ′(y) = G(u(y))Θ(y) = G(u(y)Θ(y)), we get |Θ′(y) − Θ′ h(y)| ≤ ∥G∥X ∗ ∥u(y)Θ(y) − uh(y)Θh(y)∥X ≤ ∥G∥X ∗ (∥u(y) − uh(y)∥X Θ(y) + ∥uh(y)∥X |Θ(y) − Θh(y)|), and hence the claim follows with Lemma 1 since Θ(y) ≤ Θh(y)eχy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The second part of the claim follows analogously by the second part of Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We remark that the estimates in the proof of Lemma 2 are conservative: we used that K > 1 in Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For K = 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' for a single observation functional, goal-oriented AFEM results from [1] and the references there, can be used to obtain sharper a-posteriori error bounds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 10 We now can define ζm,h by averaging ζy,h for y ∈ Pm, that is ζm,h := 1 bm � y∈Pm ζy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then we get from Lemma 1 |Zm − Zm,h| ≤ 1 bm � y∈Pm |Θ(y) − Θh(y)| ≤ ζm,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (24) Analogously, with ζ′ m,h = 1 bm � y∈Pm ζ′ y,h, Lemma 2 implies ��Z′ m − Z′ m,h �� ≤ 1 bm � y∈Pm |Θ′(y) − Θ′ h(y)| ≤ ζ′ m,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (25) In particular, if we construct Th such that it also holds ηy,h → 0 as h → 0 for all y ∈ U, (24) and (25) verify the hypotheses of Proposition 3 with c = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='3 FEM error estimators for OCP with entropic risk In the case of OCP we require error estimates for the parametric state at the discrete optimal control f ∗ m,h, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' u(y) = Lyf ∗ m,h and for the corresponding adjoint state q(y) = α1Ly(Lyf ∗ m,h − ˆu).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The error will be measured in the L2(D)-norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Again we assume that Xh := P1(Th) ∩ X, that f ∈ L2(D) and a(y) ∈ W 1,∞(D), and that D ⊆ R2 is a convex polygon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Fix a mesh Th and y ∈ U and impose (23).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' With the notation of Proposition 1 and ˜ηy,h defined as in (22), we have |Θ(y) − Θh(y)| ≤ Θh(y)(eχy,h − 1) =: ζy,h, where χy,h := θc∗ �α1 2 ˜η2 y,h + α1 ��Ly hf ∗ m,h − ˆu �� L2(D) ˜ηy,h � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' By twofold application of the triangle inequality we have ���Φf ∗ m,h(y) − Φh,f ∗ m,h(y) ��� ≤ α1 2 ��(Ly − Ly h)f ∗ m,h ��2 L2(D) + α1 ��Ly hf ∗ m,h − ˆu �� L2(D) ��(Ly − Ly h)f ∗ m,h �� L2(D) ≤ c∗ �α1 2 ˜η2 y,h + α1 ��Ly hf ∗ m,h − ˆu �� L2(D) ˜ηy,h � =: c∗ξy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Note that ξy,h is computable due to Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, it follows with ∆h(y) := θ(Φf ∗ m,h(y) − Φh,f ∗ m,h(y)) that |Θ(y) − Θh(y)| = ���Θh(y)(e∆h(y) − 1) ��� ≤ Θh(y)(e|∆h(y)| − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Using a residual estimator in the form (22) for the adjoint problem yields ∥q(y) − qh(y)∥L2(D) ≤ 2 max(c∗, 1)c∗˜˜ηy,h, (26) where ˜˜η2 y,h := α2 1 � T ∈Th � h4 T ∥uh(y) − ˆu + div(a(y)∇qh(y))∥2 L2(T ) (27) + 1 2 � e⊆∂T,e∈Eh h3 e ∥�a(y)∇qh(y)�∥2 L2(e) � + (max T ∈Th h4 T )˜η2 y,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 11 Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let Y = L2(D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Fix a mesh Th and y ∈ U and impose (23) and (26).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' With the notation of Proposition 1, we have ∥Θ′(y) − Θ′ h(y)∥Y ≤ ζy,h ∥qh(y)∥Y + 2c∗Θh(y)eχy,h ˜˜ηy,h =: ζ′ y,h Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' As in the proof of Lemma 2, we get by Θ(y) ≤ Θh(y)eχy,h that ∥q(y)Θ(y) − qh(y)Θh(y)∥Y ≤ |Θ(y) − Θh(y)| ∥qh(y)∥Y + Θ(y) ∥q(y) − qh(y)∥Y ≤ ζy,h ∥qh(y)∥Y + 2c∗Θh(y)eχy,h ˜˜ηy,h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' If D ⊆ R2 is a non-convex polygon, the reliability assumption (23) and the corresponding definitions (22), (27) of ˜ηy,h, ˜˜ηy,h must be adapted by using weighted L2 norms, with weights near the re-entrant corners.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We refer to [21, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1] for a precise result in the case of the Poisson equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 4 Combined QMC-FEM estimator In view of Propositions 2 and 3 we employ the computable a-posteriori estimator ESTbm,h := ∥Ebm(Θ′ h, Θh)∥Y + Zm,hζ′ m,h + ���Z′ m,h ��� Y ζm,h Z2 m,h − ζm,hZm,h .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (28) Note that the QMC error estimator ∥Ebm(Θ′, Θ)∥Y derived from Proposition 2 is itself approximated by the computable expression ∥Ebm(Θ′ h, Θh)∥Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In the next proposition we precise that the additional error committed due to this extra approximation is of higher asymptotic order, as m → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We equip the set C0(U, Y) with the norm ∥F∥∞ = supy∈U ∥F(y)∥Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Fix a family of regular meshes {Th}h∈H such that for some ˜C > 0 independent of s ∈ N, h ∈ H and some SPOD weights (16), it holds max(∥Θ∥s,α,γ , ∥Θ′∥s,α,γ , ∥Θh∥s,α,γ , ∥Θ′ h∥s,α,γ) ≤ ˜C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' (29) Assume that the spaces {Xh}h are contained in X and that they are selected so that ∥Θ − Θh∥∞ → 0 as h → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then we can construct a sequence of polynomial lattices (Pm)m∈N in O(smbm + s2bm) operations such that, for some h0 ∈ H and some constant C > 0 (independent of m, h, s) we have for any h < h0 that ∥Ebm(Θ′, Θ) − Ebm(Θ′ h, Θh)∥Y ≤ Cb−m(∥Θ − Θh∥∞ + ∥Θ′ − Θ′ h∥∞ + ∥Θ − Θh∥s,α,γ + ∥Θ′ − Θ′ h∥s,α,γ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Throughout the proof, C > 0 is a generic constant independent of m, h, s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We compute the difference of the numerators ∆1 := Zm−1Z′ m − ZmZ′ m−1 − Zm−1,hZ′ m,h + Zm,hZ′ m−1,h = −(Zm − Zm−1)(Z′ m − Z′ m,h) − (Zm − Zm,h − Zm−1 + Zm−1,h)Z′ m,h + (Zm − Zm,h)(Z′ m − Z′ m−1) + Zm,h(Z′ m − Z′ m,h − Z′ m−1 + Z′ m−1,h).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 12 We have |Zm − Zm,h| ≤ ∥Θ − Θh∥∞ and ���Z′ m − Z′ m,h ��� Y ≤ ∥Θ′ − Θ′ h∥∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' From Theorem 1, we know that Zm = Zm−1 + ∥Θ∥s,α,γ O(b−m) and Z′ m = Z′ m−1 + ∥Θ′∥s,α,γ O(b−m) as m → ∞, with hidden constants in O(·) independent of s, m, h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Furthermore Zm − Zm,h − Zm−1 + Zm−1,h = ∥Θ − Θh∥s,α,γ O(b−m), and Z′ m − Z′ m,h − Z′ m−1 + Z′ m−1,h = ∥Θ′ − Θ′ h∥s,α,γ O(b−m) also follow by Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Therefore, we have ∥∆1∥Y ≤ Cb−m(∥Θ − Θh∥∞ + ∥Θ′ − Θ′ h∥∞ + ∥Θ − Θh∥s,α,γ + ∥Θ′ − Θ′ h∥s,α,γ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Next, we define T1 := Zm−1,hZ′ m,h − Zm,hZ′ m−1,h and obtain the estimate ∥T1∥Y ≤ C(∥Θh∥s,α,γ + ∥Θ′ h∥s,α,γ)b−m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Moreover, ∆2 := (bZm − Zm−1)Zm − (bZm,h − Zm−1,h)Zm,h = (b(Zm − Zm,h) + (Zm−1,h − Zm−1))Zm + (bZm,h − Zm−1,h)(Zm − Zm,h) gives |∆2| ≤ C ∥Θ − Θh∥∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Next, we observe that T2 = (bZm,h − Zm−1,h)Zm,h is bounded from below away from 0, for h sufficiently small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Therefore, for h sufficiently small we apply the elementary inequality ���� T1 + ∆1 T2 + ∆2 − T1 T2 ���� Y ≤ max(∥∆1∥Y , ∥T1∆2∥Y) 1 + |T2| |T2| (|T2| − |∆2|), valid for T1, T2, ∆1, ∆2 ∈ R with |∆2| < |T2|, which is satisfied since |∆2| → 0 as h → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Combining all these observations we obtain the claim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For either the BIP or the OCP, assume that D ⊆ R2 is a con- vex polygon and that the PDE (5) satisfies (6), (7), f ∈ L2(D) and b′ ∈ ℓp(N), p ∈ (0, 1/2], with b′j = ∥ψj∥W 1,∞(D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Let Xh = P1(Th) ∩ X for a family of shape-regular meshes Th such that h = maxT ∈Th hT .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then, we can construct polynomial lattices (Pm)m∈N such that the estimator ESTbm,h in (28) satisfies ���� Z′ Z − Z′ m,h Zm,h ���� Y ≤ ESTbm,h + O(b−2m+ε + b−mh), for any ε > 0 as m → ∞, h → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The constant in O(·) is independent of s, m and h, but depends on ε.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Since bj ≤ b′ j, from either Corollary 1 or 2, there exist SPOD weights γ′ as in (16) with β′ ∼ b′, such that sups ∥Θ∥s,α,γ′ + ∥Θ′∥s,α,γ′ < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Combining (20) with Lemma 1 and h → 0 we have ζm,h → 0 for the BIP case for any m ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Similarly, combining (22) with Lemma 3 yields the same observation for the OCP case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Therefore we can apply Propositions 2 and 3 to get that we can construct polynomial lattices so that as m → ∞ ���� Z′ Z − Z′ m,h Zm,h ���� Y ≤ ∥Ebm(Θ′, Θ)∥Y + Zm,hζ′ m,h + ���Z′ m,h ��� Y ζm,h Z2 m,h − ζm,hZm,h + O(b−2m+ε).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Next, we say that ρ ∈ (1, ∞)N is (b′, ε)-admissible if � j≥1(ρj − 1)b′ j ≤ ε, see [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Then we define Tb′,ε = � ρ,(b′,ε)-adm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='{y ∈ Cs : dist(yj, [− 1 2, 1 2]) ≤ ρj − 1}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Fol- lowing the computations in [2, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1], yield h0 ∈ H and ε > 0 sufficiently 13 small such that for all h ≤ h0, h ∈ H, we have supy∈Tb′,ε |Θ(y) − Θh(y)| + ∥Θ′(y) − Θ′ h(y)∥Y ≤ Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' By [4, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1], this implies that for a constant C independent of h, s, ∥Θ − Θh∥ ∞ + ∥Θ′ − Θ′ h∥∞ + ∥Θ − Θh∥s,α,γ′ + ∥Θ′ − Θ′ h∥s,α,γ′ ≤ Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Thus, (29) and ∥Θ − Θh∥∞ → 0 hold, and we apply Proposition 4 to conclude.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 5 Numerical experiment We consider the PDE (5) on the physical domain D := (0, 1)2, with f ≡ 10, and parametric diffusion coefficient given by a(x, y) = 1 2 + 16 � j=1 yj (k2 j,1 + k2 j,2)2 sin(kj,1x1) sin(kj,2x2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The pairs (kj,1, kj,2) ∈ N2 are defined by the ordering of N2 such that for j ∈ N, k2 j,1 + k2 j,2 ≤ k2 j+1,1 + k2 j+1,2, and the ordering is arbitrary when equality holds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We investigate a BIP with observation functional O = (O1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' , O4) ∈ (L2(D))4, given by Ok(v) := 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='01 � Ik vdx for v ∈ L2(D) and k = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' , 4, where I1 := [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='2]2, I2 := [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='2] × [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='8, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='9], I3 := [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='8, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='9] × [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='1, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='2], I4 := [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='8, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='9]2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We draw a (random) sample of a to compute the "ground truth" of observa- tions O(S(a)) on a sequence of regular FE meshes of triangles obtained by uniform refinement, with 525.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='313 degrees of freedom (dofs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We add ran- dom noise η ∼ N(0, σ2I4) to the observations, where σ is set as 10% of the average of O(S(a)) ∈ R4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The realized synthetic data is then given by δ = (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='5205, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='5037, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='5443, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='4609)⊤.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Our aim is to approximate Eπδ[G(u)] by the ratio estimator Z′ m,h Zm,h , where G ∈ L2(D) is given by G(v) := 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='5 � [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='25,0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='75]2 vdx for v ∈ L2(D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The FE mesh and the polynomial lattice rule, that eventually determine h and m, are refined successively based on the combined estimator in (28).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' For tolerances τFEM, τQMC > 0, we start from an initial FE mesh of D, that is uniformly refined until the stopping criterion Zm,hζ′ m,h+∥Z′ m,h∥Yζm,h Z2 m,h−ζm,hZm,h ≤ τFEM is met.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Thereafter, we increase the number bm of lattice points until there holds |Ebm(Θ′ h, Θh)| ≤ τQMC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We initialize by a FE mesh with 41 dofs and bm0 QMC points with base b = 2 and m0 = 2, and set the tolerances to τFEM = τQMC = 2−6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' To assess the total realized error, we compute a reference solution Z′ ref Zref by a multilevel Monte Carlo ratio estimator, see [17], and report absolute error ��� Z′ m,h Zm,h − Z′ ref Zref ���.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The reference estimator uses 6 refinement levels with 545/525.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='313 dofs on the coarsest/finest level, respectively, and uniform (pseudo-) random numbers y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The number of samples is adjusted to balance statistical error and discretization bias on each level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The experiment has been implemented in MATLAB using the MooAFEM library [11] for the FE discretization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' All arising linear systems are solved directly by the \\-operator in MATLAB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The estimated and realized errors vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' the number of iterations (in the sense of refinement steps) are depicted Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Here, the FE a-posteriori 14 estimator gives negative values on rather coarse meshes, where c∗˜ηy,h > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Therefore, we discarded these "pre-asymptotic" values in the plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' We see that the FE a-posteriori estimator from Proposition 3 is rather conservative at first, but eventually approaches the actual error for finer meshes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The QMC estimator |Ebm(Θ′ h, Θ′ h)| is of the same magnitude as σ at first, and only two more refinement steps are needed once the FE mesh is sufficiently fine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The combined error estimate ESTbm,h aligns well with the realized error, as expected from our theoretical analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Figure 1: Results for the QMC-FEM ratio estimator with a-posterior ratio refinement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' First the FE mesh is refined until the tolerance τFEM is achieved (dashed w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' circles), then the QMC a-posterior refinement takes place (dashed w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' triangles).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The estimated error (solid w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' stars) is conservative for coarse meshes, but eventually approaches the realized error (solid w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' diamonds).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 6 Conclusion In this paper we outlined the construction of an a-posteriori QMC-FEM estimator, that allows to quantify the approximation error to a) posterior expectation in Bayesian inverse problems and b) the optimal control under the entropic risk measure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' The estimator is computable and viable for large number of parameters s and it is asymptotically an upper bound for the errors in a) and b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Furthermore, the particular ratio structure Z′ Z of the sought quantities allows to tackle both the BIP and OCP, in a unified manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In either case, we work under the assumption that the underlying model is a parametric elliptic PDE with affine-parametric diffusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Nevertheless, the present QMC methodology to high-dimensional integration is applicable to non-affine parametric PDEs with quantified, holomorphic-parametric dependence, see [4] and the references there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Since the error estimators we consider ηy,h, ˜ηy,h, ˜˜ηy,h are expressed as sums of local error contributions for T ∈ Th, a possible direction of research is to employ the presently proposed estimators ζy,h, ζ′ y,h to steer an adaptive QMC-FEM algorithm [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 15 total error Z Zm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='h Total/estimated errors QMC-error est.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' *-FEM+QMC-error est.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' TFEM/TQMC LC 7 # IterationsReferences [1] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Becker, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Brunner, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Innerberger, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Melenk, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Praetorius.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Rate- optimal goal-oriented adaptive FEM for semilinear elliptic PDEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 118:18–35, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [2] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Dick, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Gantner, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Gia, and Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schwab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Multilevel higher-order quasi-Monte Carlo Bayesian estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 27(5):953– 995, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [3] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Dick, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Goda, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Yoshiki.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Richardson extrapolation of polynomial lattice rules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' SIAM J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Numer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 57(1):44–69, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [4] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Dick, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Le Gia, and Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schwab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Higher order quasi-Monte Carlo integra- tion for holomorphic, parametric operator equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' SIAM/ASA J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Uncertain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quantif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 4(1):48–79, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [5] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Dick, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Longo, and Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schwab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Extrapolated polynomial lattice rule inte- gration in computational uncertainty quantification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' SIAM/ASA J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Uncertain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quantif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 10(2):651–686, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [6] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Ern and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Guermond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Finite elements I—Approximation and interpolation, volume 72 of Texts in Applied Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Springer, Cham, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [7] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Föllmer and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Knispel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Entropic risk measures: coherence vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' convexity, model ambiguity, and robust large deviations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Stoch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Dyn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 11(2-3):333–351, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [8] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Guth, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Kaarnioja, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Kuo, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schillings, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Sloan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' A quasi-Monte Carlo method for optimal control under uncertainty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' SIAM/ASA J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Uncertain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quantif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 9(2):354–383, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [9] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Guth, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Kaarnioja, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Kuo, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schillings, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Sloan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Parabolic PDE-constrained optimal control under uncertainty with entropic risk measure using quasi-Monte Carlo integration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' arXiv:2208.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='02767, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [10] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Herrmann, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Keller Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schwab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quasi-Monte Carlo Bayesian estimation under Besov priors in elliptic inverse problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 90(2021) 1831–1860.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [11] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Innerberger and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Praetorius.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' "MooAFEM: An object oriented Matlab code for higher-order (nonlinear) adaptive FEM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='" , arXiv:2203.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='01845, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [12] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Kouri and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Surowiec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Existence and optimality conditions for risk-averse PDE-constrained optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' SIAM/ASA J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Uncertain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quantif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 6(2):787–815, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [13] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Longo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Adaptive Quasi-Monte Carlo Finite Element Methods for Parametric Elliptic PDEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 92(1), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [14] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Longo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Extrapolated polynomial lattices and adaptivity in computational Uncertainty Quantification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' PhD thesis, ETH Zürich, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [15] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Niederreiter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Low-discrepancy point sets obtained by digital constructions over finite fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Czechoslovak Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 42(117)(1):143–166, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [16] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Nochetto, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Siebert, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Veeser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Theory of adaptive finite element methods: an introduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' In Multiscale, nonlinear and adaptive approximation, pages 409–542.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Springer, Berlin, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 16 [17] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Scheichl, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Stuart, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Teckentrup.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quasi-Monte Carlo and multilevel Monte Carlo methods for computing posterior expectations in elliptic inverse problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' SIAM/ASA J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Uncertain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Quantif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 5(1): 493-518, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [18] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schillings and Ch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Schwab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Sparsity in Bayesian inversion of parametric operator equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Inverse Problems, 30(6):065007, 30, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [19] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Stuart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Inverse problems: a Bayesian perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Acta Numer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 19:451–559, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [20] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Verfürth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' a-posteriori error estimation techniques for finite element methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Numerical Mathematics and Scientific Computation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Oxford University Press, Oxford, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' [21] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Wihler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Weighted L2-norm a-posteriori error estimation of FEM in polygons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Numer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=', 4(1):100–115, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} +page_content=' 17' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE1T4oBgHgl3EQfpAWX/content/2301.03327v1.pdf'} diff --git a/AtE2T4oBgHgl3EQf8QmS/content/2301.04217v1.pdf b/AtE2T4oBgHgl3EQf8QmS/content/2301.04217v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..e69067158574a8c92538dff6dddfd9dc7744dc23 --- /dev/null +++ b/AtE2T4oBgHgl3EQf8QmS/content/2301.04217v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:99efd703f9c26f33fcb4ab9183451bf34491e311fc4464ad6b4afe550b872231 +size 189717 diff --git a/AtE2T4oBgHgl3EQf8QmS/vector_store/index.pkl b/AtE2T4oBgHgl3EQf8QmS/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..e197ea895c4986012695e4ad054d9e155e6c6ca2 --- /dev/null +++ b/AtE2T4oBgHgl3EQf8QmS/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:62d4ebfa2800bf1b71eddebe452d1e3547774319e658dd7ba9639bb29438c4e1 +size 65947 diff --git a/AtE4T4oBgHgl3EQf5A4w/content/tmp_files/2301.05318v1.pdf.txt b/AtE4T4oBgHgl3EQf5A4w/content/tmp_files/2301.05318v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..4f62dc1a57ae70af6f7fec6f3d58734dc0eb3f1d --- /dev/null +++ b/AtE4T4oBgHgl3EQf5A4w/content/tmp_files/2301.05318v1.pdf.txt @@ -0,0 +1,589 @@ +Language-Informed Transfer Learning for Embodied Household Activities +Yuqian Jiang 1*, Qiaozi Gao 2, Govind Thattai 2, Gaurav Sukhatme 2,3 +1 The University of Texas at Austin, 2 Amazon Alexa AI, 3 University of Southern California +jiangyuqian@utexas.edu, {qzgao, thattg}@amazon.com, gaurav@usc.edu +Abstract +For service robots to become general-purpose in everyday +household environments, they need not only a large library +of primitive skills, but also the ability to quickly learn novel +tasks specified by users. Fine-tuning neural networks on a va- +riety of downstream tasks has been successful in many vision +and language domains, but research is still limited on trans- +fer learning between diverse long-horizon tasks. We propose +that, compared to reinforcement learning for a new household +activity from scratch, home robots can benefit from transfer- +ring the value and policy networks trained for similar tasks. +We evaluate this idea in the BEHAVIOR simulation bench- +mark which includes a large number of household activities +and a set of action primitives. For easy mapping between state +spaces of different tasks, we provide a text-based representa- +tion and leverage language models to produce a common em- +bedding space. The results show that the selection of similar +source activities can be informed by the semantic similarity +of state and goal descriptions with the target task. We further +analyze the results and discuss ways to overcome the problem +of catastrophic forgetting. +Introduction +Domestic service robots have been envisioned to help in a +variety of household activities. Imagine a single robot that +can be versatile enough from tidying up the rooms to play- +ing with kids. Such a robot not only requires the sensing, +navigation, and manipulation capabilities, but also needs to +intelligently combine these skills to perform each activity as +requested by the users. +Since every home is different, a simple library of pre- +programmed tasks will hardly serve the purpose. For ex- +ample, when a user wants to clean the kitchen cupboard, +the specific goal conditions they would like to achieve will +depend on their personal preferences and constraints of the +environment. Does the robot re-arrange the dishes in a cer- +tain pattern? Does the robot dust the outside of the cup- +board? The reality is that there could be an infinite number +of combinations of goals, and a robot will most likely have +to learn to solve new goals after it is deployed in the individ- +ual homes. +In this paper, we study the problem of learning novel +user-specified household activities for a service robot that +*Work completed during an internship with Amazon Alexa AI. +is shipped with pre-trained policies for a set of standard ac- +tivities. We propose to learn the new activity by transferring +from the policy of a similar activity. Our hypothesis is that +the transfer can be more efficient than learning the new activ- +ity from scratch if their initial state and goal conditions are +similar. Intuitively, a robot should be able to learn putting +away cleaned dishes efficiently if it has a good policy for +cleaning kitchen cupboard. Further, we can measure activity +similarities by leveraging language models to embed their +state and goal descriptions. +We test our hypothesis using the BEHAVIOR bench- +mark (Srivastava et al. 2021). BEHAVIOR simulates a large +number of household activities for an embodied AI to learn. +We first present a reinforcement learning (RL) approach to +solve a subset of activities from scratch. The approach lever- +ages text descriptions of the agent’s current state and goal to +allow the policies to operate in a common state space. We +then initialize the learner with each of the pretrained policies +when training it on a new activity, and evaluate the hypothe- +sis that the transfer performance corresponds to the semantic +similarity between the activity text descriptions. We present +some initial results to show the potential of this approach for +enabling versatile and adaptive home robots. +Related Work +Transfer learning leverages the knowledge learned in a +source domain to improve the performance of a learner on +the target domain. Transfer learning in reinforcement learn- +ing has been studied to transfer knowledge between different +Markov Decision Processes (MDPs) (Zhu, Lin, and Zhou +2021; Taylor and Stone 2009). While many approaches are +evaluated in tasks with the same high-level goal and only +different configurations in Mujoco, navigation, and Atari do- +mains (Barreto et al. 2017; Schaul et al. 2015), a few re- +cent transfer learning approaches have demonstrated posi- +tive transfer between distinct Atari games (Rusu et al. 2016; +Fernando et al. 2017). Soemers et al. introduces an approach +that transfers policy and value networks between distinct +board games that have different action spaces (Soemers et al. +2021). Encouraged by these successes, we propose to trans- +fer RL policies among distinct embodied household activi- +ties which require high-level long-horizon reasoning about a +large variety of goal conditions. Further, this work proposes +to use language models on activity descriptions to inform the +arXiv:2301.05318v1 [cs.RO] 12 Jan 2023 + +selection of source domains. +BEHAVIOR is a benchmark where embodied AI so- +lutions are evaluated on household activities in a realis- +tic physics simulation. The activities are selected from the +American Time Use Survey to reflect the real distribution of +household chores. There has been very little success using +RL to solve BEHAVIOR in its original setting (Srivastava +et al. 2021). In this paper, the method of providing the text- +based, fully observable state representation is most similar +to the work done by Shridhar et al. for the ALFRED bench- +mark (Shridhar et al. 2021). +Approach +Our approach consists of two steps. In the first part, we in- +troduce a text-based state representation for a RL agent to +efficiently learn a set of diverse BEHAVIOR activities from +scratch. The state representation is also in a common embed- +ding space to allow easy knowledge transfer to other activi- +ties. In the second part, we introduce how these pre-trained +policies are re-used for learning new activities, and test our +hypothesis that the semantic similarity between activity de- +scriptions can be used to predict transfer performances. +Learning Single Activities +We introduce a different RL formulation from the original +one in the BEHAVIOR benchmark, in order to speed up +learning these activities using standard RL algorithms. +Text-Based State and Goal Representation +Given the +low RL performance in the original setting of BEHAVIOR, +we take a similar approach to ALFWORLD (Shridhar et al. +2021) by providing full observability of the logical state +in the form of language. The simulator backbone of BE- +HAVIOR extracts logical predicates that describe the current +states and relations of all objects in the world. We filter the +logical predicates to the ones relevant to the activity, and use +a template to generate text descriptions of the logical state. +Similarly, the goal conditions are represented with text de- +scriptions. Figure 1 shows the initial state for one instance +of the cleaning kitchen cupboard activity. Figure 2 shows +the goal definition of the cleaning kitchen cupboard activity. +There are two goals: 1) dust every cabinet and 2) move all +cups to one cabinet and all bowls to the other. For the exam- +ple initial state, there are two ways to ground the second goal +based on how the cups and bowls are assigned to cabinets, +and each grounding leads to a distinct set of subgoals. +Action Primitives +The action space includes a set of dis- +crete action primitives implemented in BEHAVIOR: GRASP, +TOGGLE ON, TOGGLE OFF, OPEN, CLOSE, PLACE INSIDE, +PLACE ON TOP. Each action primitive takes a parameter that +refers to an object. For example, PLACE INSIDE(cabinet 0) +means the robot will put the object currently in its gripper +into the cabinet. +Problem Formulation +We formulate a BEHAVIOR ac- +tivity as a Markov Decision Process denoted by the tuple +M = (S, A, P, R). S is the space that consists of tok- +enized state and goal descriptions. A is the space of action +top cabinet 47 is dusty. top cabinet 47 is next to cup 1. bot- +tom cabinet 41 is dusty. bottom cabinet 41 is on top cup 0. +bottom cabinet 41 is next to cup 0. bottom cabinet 41 is +next to bowl 1. countertop 26 is under bath towel 0. coun- +tertop 26 is in reach of robot. countertop 26 is in same room +as robot. bath towel 0 is on top countertop 26. bath towel 0 +is in reach of robot. soap 0 is on top countertop 26. +soap 0 is in reach of robot. bowl 0 is on top counter- +top 26. bowl 0 is in reach of robot. bowl 1 is inside +bottom cabinet 41. bowl 1 is next to bottom cabinet 41. +cup 0 is inside bottom cabinet 41. cup 0 is next to bot- +tom cabinet 41. cup 1 is inside top cabinet 47. cup 1 is next +to top cabinet 47. room floor kitchen 0 is in reach of robot. +room floor kitchen 0 is in field of view of robot. +Figure 1: An example initial state of cleaning kitchen cup- +board +For every cabinet, the following is NOT true: +the cabinet is dusty. +For at least one cabinet, for every bowl, the bowl is inside +the cabinet, and the following is NOT true: +cup1 is inside the cabinet. +For at least one cabinet, for every cup, the cup is inside the +cabinet, and the following is NOT true: +bowl1 is inside the cabinet. +Figure 2: An example goal definition of cleaning kitchen +cupboard +primitives, parameterized by the objects relevant to the ac- +tivity. P(·|s, a) is the unknown stochastic transition prob- +abilities. R : S × A × S → R is the reward function. +Given the grounded subgoals of the activity, R is defined +as follows: if a is not executable at s, R(s, a, s′) = −1; oth- +erwise, let g(s) be the number of subgoals satisfied in the +state s, R(s, a, s′) = +g(s′)−g(s) +total number of subgoals · c where c +is a large constant. The reward function penalizes choosing +action primitives that are not executable, such as TOGGLE +OFF(cup 0), and generously rewards achieving new sub- +goals. The objective is to learn a policy π : S → A that +maximizes the expected total reward. +Actor-Critic Policy +The policy can be trained by pol- +icy gradient methods such as PPO (Schulman et al. 2017). +Figure 3 shows the actor-critic architecture. We use a pre- +trained DistilBert model (Sanh et al. 2020) to tokenize and +encode the input text. The actor network outputs a tuple of +the action primitive index and the object index. +Transfer Learning +Since the aim of this work is not to achieve top performances +on BEHAVIOR, but rather to explore the connection be- +tween transfer performance and activity similarity, we adopt +a straightforward method to re-use pre-trained policies and +compare the learning curves. + +Figure 3: Actor-critic network architecture for learning one +BEHAVIOR activity. +State and Action Mappings +Since S is a space of tok- +enized state and goal descriptions, the state space is common +for all activities. However, the action primitives are param- +eterized by the objects in the scene, so the action space can +have different sizes. To re-use a policy for a new activity, we +copy all the weights in the network (Figure 3) except for the +actor output layer. Then we resize the actor output layer to +match the new action space and randomly initialize it before +training. +Semantic Similarity +Given a new activity with an initial +state and a set of goal conditions, the text-based state and +goal representation constructed for the MDP formulation is +also a unique description of this activity. We use the pre- +trained SimCSE model (Gao, Yao, and Chen 2022) to embed +activity descriptions, and compute the consine similarity be- +tween the embeddings of any pair of activities. +Transfer Metric +We evaluate the transfer performance of +each pair of activities by the transfer ratio (or transfer score) +metric (Taylor and Stone 2009; Rusu et al. 2016). The trans- +fer ratio measures the ratio of the total reward given to the +transfer learner and the total reward given to the non-transfer +learner after a certain number of training steps. It can be +computed by the ratio of the area under the transfer learning +curve over the area under the non-transfer learning curve. +Experiments +We choose to study 7 activities from BEHAVIOR: storing +food, cleaning kitchen cupboard, putting away Halloween +decorations, collect misplaced items, putting away cleaned +dishes, locking every window, cleaning microwave oven. +The policies are trained with the PPO algorithm as imple- +mented in the stable-baselines3 library (Raffin et al. 2021). +An episode terminates when all the subgoals are achieved +or the maximum number of steps (64) has been taken. The +hyperparameter c in the reward function is set to 200. As +a result, the highest total reward of an episode is 200, i.e. +achieving all subgoals without any penalty. The lowest total +Figure 4: Semantic similarities between source and target +activities. +reward is -64, i.e. always executing invalid actions. +Training from Scratch +To obtain a policy for each activ- +ity, we train for 512 episodes and take the top performing +policy out of 3 runs. Table 1 shows the mean reward per +episode achieved at the end of training by the top policy for +each activity. Note that there is a wide gap between how +well these activities are solved by our policies. The policies +for locking every window and cleaning microwave oven are +near optimal, whereas the policy for cleaning kitchen cup- +board never manages to achieve all subgoals during training. +This difference is due to the solution length and the stochas- +ticity of executing the action primitives. Some activities re- +quire executing more than 10 actions in the correct order, +and some actions (e.g. grasp) have a low success rate in pro- +ducing the desired effects. The uncertain action effects re- +flect the challenge for real robots, since the task-level policy +should know how to recover when there are failures during +execution. +Since it’s much faster to learn window and microwave +than the other activities, they are only used as source tasks +but not target tasks in the transfer experiments below. +Semantic Similarity +Figure 4 summarizes the semantic +similarity in a matrix. Each row is a source activity and +each column is a target activity. A high number (or warm +color) means the descriptions of the two activities are close +in the embedding space, whereas a low number (or cool +color) indicates that the embeddings are distant. It may not +be intuitive why some activities are more similar than oth- +ers based on their abbreviated names. For example, stor- +ing food, cleaning kitchen cupboard, putting away dishes, +putting away Halloween decorations all involve moving ob- + +Grasp cup_o +(0, +5) +123.456 +ActionOutput Layer +Value Output Layer +Actor Layer 3 +Critic Layer 3 +Actor Layer 2 +Critic Layer 2 +Actor Layer 1 +Critic Layer 1 +Features Extractor (DistilBert Encoder +Tokenizedtextobservationstarget +source +food +cupboard +halloween + misplaced +dishes +0.5 +window +0.19 +0.35 +0.18 +0.07 +0.24 +0.3 +0.37 +0.25 +0.1 +0.25 + 0.4 +microwave +X +poor +0.39 +0.37 +0.14 +0.39 +0.3 +X +cupboard +0.39 +0.3 +0.07 +0.43 +X +0.2 +halloween +0.37 +0.3 +0.2 +0.4 +X +misplaced +0.14 +0.07 +0.2 +0.19 +0.1 +X +dishes +0.39 +0.43 +0.4 +0.19food +cupboard +halloween +misplaced +dishes +window +microwave +-8.5 +-34.5 +1.1 +4.0 +-7.0 +196.0 +189.0 +Table 1: Mean reward per episode achieved at the end of training. +Figure 5: Transfer ratios of the first 80 episodes. +jects into cabinets, so their similarity scores are high when +taking into account the full descriptions. +Transfer Ratios +Figure 5 presents the transfer ratio ma- +trix after 80 episodes (or about 5000 steps). A ratio above +1 indicates positive transfer, i.e. the transfer learner receives +higher total reward during training. Comparing with the sim- +ilarity score matrix, we can make two observations. First, a +high-quality source policy can lead to positive transfer, even +if the activity is not similar. The activities storing food and +putting away Halloween decorations (two difficult tasks) are +not similar to locking every window or cleaning microwave +oven (two easy tasks), but we see high transfer ratios in the +first two rows of their columns. Second, for each target ac- +tivity, higher semantic similarity has a higher chance of pos- +itive transfer. Cleaning kitchen cupboard and putting away +cleaned dishes have a high semantic similarity (0.43). The +only positive transfer to cupboard was from dishes and vice +versa. On the other hand, collecting misplaced items is se- +mantically very different from all other activities, and gets +some of the worst transfer ratios. +Catastrophic Forgetting +While there are clear signs that +re-using policies can jump start learning a new activity, the +benefits of transfer quickly disappear as catastrophic forget- +ting takes place. Figure 6 shows the transfer ratios after 160 +episodes (or about 10,000 steps). The general observations +in Figure 5 still hold, but the ratios are getting lower and +Figure 6: Transfer ratios of the first 160 episodes. +there are fewer cases of positive transfer. +For future studies, one of the ideas to transfer knowl- +edge without suffering from the conflicting goals is by de- +coupling the task-independent knowledge from the task- +dependent knowledge. In the case of household activities, +there is a lot of shared knowledge across activities, espe- +cially the preconditions and effects of actions. For example, +TOGGLE OFF(cup 0) is an invalid action in any activity. To +this end, successor features (Barreto et al. 2017) and uni- +versal value function approximation (Schaul et al. 2015) are +both methods to learn representations that decouple the dy- +namics from the rewards so they will generalize over differ- +ent goals. Meanwhile, there are neural representations de- +signed to avoid catastrophic forgetting. Progressive neural +nets (Rusu et al. 2016) add a new column of network while +preserving the weights learned in previous tasks. +Conclusion +We propose that home robots can efficiently learn novel +household tasks from similar but distinct activities, and +present our analysis in the BEHAVIOR benchmark. Our ex- +periments show encouraging results: activity similarity mea- +sured by language embeddings can be used as a predictor for +transfer performance, and a high-quality source policy of an +easy but different activity can sometimes lead to a jump- +start. We also observe the problem of catastrophic forgetting +and suggest future research in this direction. + +target +food +cupboard halloween misplaced +source +dishes +2.00 +window +2.24 +0.78 +1.52 +0.30 +0.64 +1.75 +microwave +6.61 +0.52 +2.08 +1.15 +0.75 +1.50 +pooy +X +0.81 +1.01 +0.71 +0.54 +1.25 +0.70 +X +cupboard +1.00 +0.32 +1.09 +1.00 +2.39 +0.29 +X +halloween +0.28 +0.58 +0.75 +X +0.50 +misplaced +1.43 +0.33 +0.79 +0.74 +0.25 +1.78 +1.26 +1.30 +0.19 +X +dishes +0.00target +source +food +cupboard halloween misplaced +dishes +2.00 +window +1.08 +0.76 +0.92 +0.43 +0.48 +1.75 +microwave +3.28 +0.32 +1.33 +0.47 +0.51 +1.50 +food +X +0.76 +0.67 +0.74 +0.62 +1.25 +X +cupboard +0.88 +0.72 +0.40 +1.09 +1.00 +X +1.76 +0.46 +0.40 +0.62 +0.75 +halloween +X +0.50 +misplaced +1.10 +0.23 +0.65 +0.84 +0.25 +1.40 +1.00 +0.21 +X +dishes +0.87 +0.00References +Barreto, A.; Dabney, W.; Munos, R.; Hunt, J. J.; Schaul, T.; +van Hasselt, H. P.; and Silver, D. 2017. Successor Features +for Transfer in Reinforcement Learning. +In Advances in +Neural Information Processing Systems, volume 30. Curran +Associates, Inc. +Fernando, C.; Banarse, D.; Blundell, C.; Zwols, Y.; Ha, D.; +Rusu, A. A.; Pritzel, A.; and Wierstra, D. 2017. Pathnet: +Evolution Channels Gradient Descent in Super Neural Net- +works. arXiv preprint arXiv:1701.08734. +Gao, T.; Yao, X.; and Chen, D. 2022. +SimCSE: +Simple Contrastive Learning of Sentence Embeddings. +arXiv:2104.08821. +Raffin, A.; Hill, A.; Gleave, A.; Kanervisto, A.; Ernestus, +M.; and Dormann, N. 2021. Stable-Baselines3: Reliable Re- +inforcement Learning Implementations. Journal of Machine +Learning Research, 22(268): 1–8. +Rusu, A. A.; Rabinowitz, N. C.; Desjardins, G.; Soyer, H.; +Kirkpatrick, J.; Kavukcuoglu, K.; Pascanu, R.; and Hadsell, +R. 2016. Progressive Neural Networks. arXiv:1606.04671. +Sanh, V.; Debut, L.; Chaumond, J.; and Wolf, T. 2020. +DistilBERT, a Distilled Version of BERT: Smaller, Faster, +Cheaper and Lighter. arXiv:1910.01108. +Schaul, T.; Horgan, D.; Gregor, K.; and Silver, D. 2015. Uni- +versal value function approximators. In International con- +ference on machine learning, 1312–1320. PMLR. +Schulman, J.; Wolski, F.; Dhariwal, P.; Radford, A.; and +Klimov, O. 2017. Proximal Policy Optimization Algorithms. +arXiv preprint arXiv:1707.06347. +Shridhar, M.; Yuan, X.; Cˆot´e, M.-A.; Bisk, Y.; Trischler, +A.; and Hausknecht, M. 2021. +ALFWorld: Aligning +Text and Embodied Environments for Interactive Learning. +arXiv:2010.03768. +Soemers, D. J. N. J.; Mella, V.; Piette, E.; Stephenson, M.; +Browne, C.; and Teytaud, O. 2021. Transfer of Fully Convo- +lutional Policy-Value Networks Between Games and Game +Variants. arXiv:2102.12375. +Srivastava, S.; Li, C.; Lingelbach, M.; Mart´ın-Mart´ın, R.; +Xia, F.; Vainio, K.; Lian, Z.; Gokmen, C.; Buch, S.; Liu, +C. K.; Savarese, S.; Gweon, H.; Wu, J.; and Fei-Fei, L. 2021. +BEHAVIOR: Benchmark for Everyday Household Activ- +ities in Virtual, Interactive, and Ecological Environments. +arXiv:2108.03332. +Taylor, M. E.; and Stone, P. 2009. Transfer Learning for Re- +inforcement Learning Domains: A Survey. Journal of Ma- +chine Learning Research, 10(7). +Zhu, +Z.; +Lin, +K.; +and +Zhou, +J. +2021. +Transfer +Learning in Deep Reinforcement Learning: A Survey. +arXiv:2009.07888 [cs, stat]. + diff --git a/AtE4T4oBgHgl3EQf5A4w/content/tmp_files/load_file.txt b/AtE4T4oBgHgl3EQf5A4w/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..2f2a3f9d3ad5ccec352bede15054e13517941b2b --- /dev/null +++ b/AtE4T4oBgHgl3EQf5A4w/content/tmp_files/load_file.txt @@ -0,0 +1,505 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf,len=504 +page_content='Language-Informed Transfer Learning for Embodied Household Activities Yuqian Jiang 1*, Qiaozi Gao 2, Govind Thattai 2, Gaurav Sukhatme 2,3 1 The University of Texas at Austin, 2 Amazon Alexa AI, 3 University of Southern California jiangyuqian@utexas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='edu, {qzgao, thattg}@amazon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='com, gaurav@usc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='edu Abstract For service robots to become general-purpose in everyday household environments, they need not only a large library of primitive skills, but also the ability to quickly learn novel tasks specified by users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Fine-tuning neural networks on a va- riety of downstream tasks has been successful in many vision and language domains, but research is still limited on trans- fer learning between diverse long-horizon tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We propose that, compared to reinforcement learning for a new household activity from scratch, home robots can benefit from transfer- ring the value and policy networks trained for similar tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We evaluate this idea in the BEHAVIOR simulation bench- mark which includes a large number of household activities and a set of action primitives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For easy mapping between state spaces of different tasks, we provide a text-based representa- tion and leverage language models to produce a common em- bedding space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The results show that the selection of similar source activities can be informed by the semantic similarity of state and goal descriptions with the target task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We further analyze the results and discuss ways to overcome the problem of catastrophic forgetting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Introduction Domestic service robots have been envisioned to help in a variety of household activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Imagine a single robot that can be versatile enough from tidying up the rooms to play- ing with kids.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Such a robot not only requires the sensing, navigation, and manipulation capabilities, but also needs to intelligently combine these skills to perform each activity as requested by the users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Since every home is different, a simple library of pre- programmed tasks will hardly serve the purpose.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For ex- ample, when a user wants to clean the kitchen cupboard, the specific goal conditions they would like to achieve will depend on their personal preferences and constraints of the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Does the robot re-arrange the dishes in a cer- tain pattern?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Does the robot dust the outside of the cup- board?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The reality is that there could be an infinite number of combinations of goals, and a robot will most likely have to learn to solve new goals after it is deployed in the individ- ual homes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In this paper, we study the problem of learning novel user-specified household activities for a service robot that Work completed during an internship with Amazon Alexa AI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' is shipped with pre-trained policies for a set of standard ac- tivities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We propose to learn the new activity by transferring from the policy of a similar activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Our hypothesis is that the transfer can be more efficient than learning the new activ- ity from scratch if their initial state and goal conditions are similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Intuitively, a robot should be able to learn putting away cleaned dishes efficiently if it has a good policy for cleaning kitchen cupboard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Further, we can measure activity similarities by leveraging language models to embed their state and goal descriptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We test our hypothesis using the BEHAVIOR bench- mark (Srivastava et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' BEHAVIOR simulates a large number of household activities for an embodied AI to learn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We first present a reinforcement learning (RL) approach to solve a subset of activities from scratch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The approach lever- ages text descriptions of the agent’s current state and goal to allow the policies to operate in a common state space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We then initialize the learner with each of the pretrained policies when training it on a new activity, and evaluate the hypothe- sis that the transfer performance corresponds to the semantic similarity between the activity text descriptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We present some initial results to show the potential of this approach for enabling versatile and adaptive home robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Related Work Transfer learning leverages the knowledge learned in a source domain to improve the performance of a learner on the target domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer learning in reinforcement learn- ing has been studied to transfer knowledge between different Markov Decision Processes (MDPs) (Zhu, Lin, and Zhou 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Taylor and Stone 2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' While many approaches are evaluated in tasks with the same high-level goal and only different configurations in Mujoco, navigation, and Atari do- mains (Barreto et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Schaul et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2015), a few re- cent transfer learning approaches have demonstrated posi- tive transfer between distinct Atari games (Rusu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2016;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Fernando et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Soemers et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' introduces an approach that transfers policy and value networks between distinct board games that have different action spaces (Soemers et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Encouraged by these successes, we propose to trans- fer RL policies among distinct embodied household activi- ties which require high-level long-horizon reasoning about a large variety of goal conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Further, this work proposes to use language models on activity descriptions to inform the arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='05318v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='RO] 12 Jan 2023 selection of source domains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' BEHAVIOR is a benchmark where embodied AI so- lutions are evaluated on household activities in a realis- tic physics simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The activities are selected from the American Time Use Survey to reflect the real distribution of household chores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' There has been very little success using RL to solve BEHAVIOR in its original setting (Srivastava et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In this paper, the method of providing the text- based, fully observable state representation is most similar to the work done by Shridhar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' for the ALFRED bench- mark (Shridhar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Approach Our approach consists of two steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In the first part, we in- troduce a text-based state representation for a RL agent to efficiently learn a set of diverse BEHAVIOR activities from scratch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The state representation is also in a common embed- ding space to allow easy knowledge transfer to other activi- ties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In the second part, we introduce how these pre-trained policies are re-used for learning new activities, and test our hypothesis that the semantic similarity between activity de- scriptions can be used to predict transfer performances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Learning Single Activities We introduce a different RL formulation from the original one in the BEHAVIOR benchmark, in order to speed up learning these activities using standard RL algorithms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Text-Based State and Goal Representation Given the low RL performance in the original setting of BEHAVIOR, we take a similar approach to ALFWORLD (Shridhar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021) by providing full observability of the logical state in the form of language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The simulator backbone of BE- HAVIOR extracts logical predicates that describe the current states and relations of all objects in the world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We filter the logical predicates to the ones relevant to the activity, and use a template to generate text descriptions of the logical state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Similarly, the goal conditions are represented with text de- scriptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 1 shows the initial state for one instance of the cleaning kitchen cupboard activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 2 shows the goal definition of the cleaning kitchen cupboard activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' There are two goals: 1) dust every cabinet and 2) move all cups to one cabinet and all bowls to the other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For the exam- ple initial state, there are two ways to ground the second goal based on how the cups and bowls are assigned to cabinets, and each grounding leads to a distinct set of subgoals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Action Primitives The action space includes a set of dis- crete action primitives implemented in BEHAVIOR: GRASP, TOGGLE ON, TOGGLE OFF, OPEN, CLOSE, PLACE INSIDE, PLACE ON TOP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Each action primitive takes a parameter that refers to an object.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For example, PLACE INSIDE(cabinet 0) means the robot will put the object currently in its gripper into the cabinet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Problem Formulation We formulate a BEHAVIOR ac- tivity as a Markov Decision Process denoted by the tuple M = (S, A, P, R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' S is the space that consists of tok- enized state and goal descriptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' A is the space of action top cabinet 47 is dusty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' top cabinet 47 is next to cup 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bot- tom cabinet 41 is dusty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bottom cabinet 41 is on top cup 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bottom cabinet 41 is next to cup 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bottom cabinet 41 is next to bowl 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' countertop 26 is under bath towel 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' coun- tertop 26 is in reach of robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' countertop 26 is in same room as robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bath towel 0 is on top countertop 26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bath towel 0 is in reach of robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' soap 0 is on top countertop 26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' soap 0 is in reach of robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bowl 0 is on top counter- top 26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bowl 0 is in reach of robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bowl 1 is inside bottom cabinet 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' bowl 1 is next to bottom cabinet 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' cup 0 is inside bottom cabinet 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' cup 0 is next to bot- tom cabinet 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' cup 1 is inside top cabinet 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' cup 1 is next to top cabinet 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' room floor kitchen 0 is in reach of robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' room floor kitchen 0 is in field of view of robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 1: An example initial state of cleaning kitchen cup- board For every cabinet, the following is NOT true: the cabinet is dusty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For at least one cabinet, for every bowl, the bowl is inside the cabinet, and the following is NOT true: cup1 is inside the cabinet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For at least one cabinet, for every cup, the cup is inside the cabinet, and the following is NOT true: bowl1 is inside the cabinet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 2: An example goal definition of cleaning kitchen cupboard primitives, parameterized by the objects relevant to the ac- tivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' P(·|s, a) is the unknown stochastic transition prob- abilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' R : S × A × S → R is the reward function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Given the grounded subgoals of the activity, R is defined as follows: if a is not executable at s, R(s, a, s′) = −1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' oth- erwise, let g(s) be the number of subgoals satisfied in the state s, R(s, a, s′) = g(s′)−g(s) total number of subgoals · c where c is a large constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The reward function penalizes choosing action primitives that are not executable, such as TOGGLE OFF(cup 0), and generously rewards achieving new sub- goals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The objective is to learn a policy π : S → A that maximizes the expected total reward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Actor-Critic Policy The policy can be trained by pol- icy gradient methods such as PPO (Schulman et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 3 shows the actor-critic architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We use a pre- trained DistilBert model (Sanh et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2020) to tokenize and encode the input text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The actor network outputs a tuple of the action primitive index and the object index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer Learning Since the aim of this work is not to achieve top performances on BEHAVIOR, but rather to explore the connection be- tween transfer performance and activity similarity, we adopt a straightforward method to re-use pre-trained policies and compare the learning curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 3: Actor-critic network architecture for learning one BEHAVIOR activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' State and Action Mappings Since S is a space of tok- enized state and goal descriptions, the state space is common for all activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' However, the action primitives are param- eterized by the objects in the scene, so the action space can have different sizes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' To re-use a policy for a new activity, we copy all the weights in the network (Figure 3) except for the actor output layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Then we resize the actor output layer to match the new action space and randomly initialize it before training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Semantic Similarity Given a new activity with an initial state and a set of goal conditions, the text-based state and goal representation constructed for the MDP formulation is also a unique description of this activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We use the pre- trained SimCSE model (Gao, Yao, and Chen 2022) to embed activity descriptions, and compute the consine similarity be- tween the embeddings of any pair of activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer Metric We evaluate the transfer performance of each pair of activities by the transfer ratio (or transfer score) metric (Taylor and Stone 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Rusu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The trans- fer ratio measures the ratio of the total reward given to the transfer learner and the total reward given to the non-transfer learner after a certain number of training steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' It can be computed by the ratio of the area under the transfer learning curve over the area under the non-transfer learning curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Experiments We choose to study 7 activities from BEHAVIOR: storing food, cleaning kitchen cupboard, putting away Halloween decorations, collect misplaced items, putting away cleaned dishes, locking every window, cleaning microwave oven.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The policies are trained with the PPO algorithm as imple- mented in the stable-baselines3 library (Raffin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' An episode terminates when all the subgoals are achieved or the maximum number of steps (64) has been taken.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The hyperparameter c in the reward function is set to 200.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' As a result, the highest total reward of an episode is 200, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' achieving all subgoals without any penalty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The lowest total Figure 4: Semantic similarities between source and target activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' reward is -64, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' always executing invalid actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Training from Scratch To obtain a policy for each activ- ity, we train for 512 episodes and take the top performing policy out of 3 runs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Table 1 shows the mean reward per episode achieved at the end of training by the top policy for each activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Note that there is a wide gap between how well these activities are solved by our policies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The policies for locking every window and cleaning microwave oven are near optimal, whereas the policy for cleaning kitchen cup- board never manages to achieve all subgoals during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' This difference is due to the solution length and the stochas- ticity of executing the action primitives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Some activities re- quire executing more than 10 actions in the correct order, and some actions (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' grasp) have a low success rate in pro- ducing the desired effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The uncertain action effects re- flect the challenge for real robots, since the task-level policy should know how to recover when there are failures during execution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Since it’s much faster to learn window and microwave than the other activities, they are only used as source tasks but not target tasks in the transfer experiments below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Semantic Similarity Figure 4 summarizes the semantic similarity in a matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Each row is a source activity and each column is a target activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' A high number (or warm color) means the descriptions of the two activities are close in the embedding space, whereas a low number (or cool color) indicates that the embeddings are distant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' It may not be intuitive why some activities are more similar than oth- ers based on their abbreviated names.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For example, stor- ing food, cleaning kitchen cupboard, putting away dishes, putting away Halloween decorations all involve moving ob- Grasp cup_o (0, 5) 123.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='456 ActionOutput Layer Value Output Layer Actor Layer 3 Critic Layer 3 Actor Layer 2 Critic Layer 2 Actor Layer 1 Critic Layer 1 Features Extractor (DistilBert Encoder Tokenizedtextobservationstarget source food cupboard halloween misplaced dishes 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='5 window 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='19 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='35 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='07 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='24 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='37 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='4 microwave X poor 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='39 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='37 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='39 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='3 X cupboard 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='39 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='07 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='43 X 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='2 halloween 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='37 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='4 X misplaced 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='07 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='19 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='1 X dishes 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='39 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='43 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='19food cupboard halloween misplaced dishes window microwave 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='5 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='1 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='0 196.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='0 189.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='0 Table 1: Mean reward per episode achieved at the end of training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 5: Transfer ratios of the first 80 episodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' jects into cabinets, so their similarity scores are high when taking into account the full descriptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer Ratios Figure 5 presents the transfer ratio ma- trix after 80 episodes (or about 5000 steps).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' A ratio above 1 indicates positive transfer, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' the transfer learner receives higher total reward during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Comparing with the sim- ilarity score matrix, we can make two observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' First, a high-quality source policy can lead to positive transfer, even if the activity is not similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The activities storing food and putting away Halloween decorations (two difficult tasks) are not similar to locking every window or cleaning microwave oven (two easy tasks), but we see high transfer ratios in the first two rows of their columns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Second, for each target ac- tivity, higher semantic similarity has a higher chance of pos- itive transfer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Cleaning kitchen cupboard and putting away cleaned dishes have a high semantic similarity (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='43).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The only positive transfer to cupboard was from dishes and vice versa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' On the other hand, collecting misplaced items is se- mantically very different from all other activities, and gets some of the worst transfer ratios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Catastrophic Forgetting While there are clear signs that re-using policies can jump start learning a new activity, the benefits of transfer quickly disappear as catastrophic forget- ting takes place.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Figure 6 shows the transfer ratios after 160 episodes (or about 10,000 steps).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' The general observations in Figure 5 still hold, but the ratios are getting lower and Figure 6: Transfer ratios of the first 160 episodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' there are fewer cases of positive transfer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For future studies, one of the ideas to transfer knowl- edge without suffering from the conflicting goals is by de- coupling the task-independent knowledge from the task- dependent knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In the case of household activities, there is a lot of shared knowledge across activities, espe- cially the preconditions and effects of actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' For example, TOGGLE OFF(cup 0) is an invalid action in any activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' To this end, successor features (Barreto et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017) and uni- versal value function approximation (Schaul et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2015) are both methods to learn representations that decouple the dy- namics from the rewards so they will generalize over differ- ent goals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Meanwhile, there are neural representations de- signed to avoid catastrophic forgetting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Progressive neural nets (Rusu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2016) add a new column of network while preserving the weights learned in previous tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Conclusion We propose that home robots can efficiently learn novel household tasks from similar but distinct activities, and present our analysis in the BEHAVIOR benchmark.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Our ex- periments show encouraging results: activity similarity mea- sured by language embeddings can be used as a predictor for transfer performance, and a high-quality source policy of an easy but different activity can sometimes lead to a jump- start.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' We also observe the problem of catastrophic forgetting and suggest future research in this direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' target food cupboard halloween misplaced source dishes 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00 window 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='24 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='78 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='52 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='30 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='64 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='75 microwave 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='61 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='52 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='08 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='75 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='50 pooy X 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='81 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='71 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='54 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='70 X cupboard 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='32 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='09 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='39 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='29 X halloween 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='28 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='58 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='75 X 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='50 misplaced 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='43 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='33 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='79 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='74 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='25 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='78 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='26 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='30 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='19 X dishes 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00target source food cupboard halloween misplaced dishes 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00 window 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='92 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='43 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='48 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='75 microwave 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='28 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='32 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='33 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='47 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='51 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='50 food X 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='67 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='74 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='62 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='25 X cupboard 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='88 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='72 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='40 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='09 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00 X 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='46 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='40 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='62 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='75 halloween X 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='50 misplaced 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='23 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='65 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='84 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='25 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='40 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='21 X dishes 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='87 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='00References Barreto, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Dabney, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Munos, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Hunt, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Schaul, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' van Hasselt, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Silver, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Successor Features for Transfer in Reinforcement Learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In Advances in Neural Information Processing Systems, volume 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Curran Associates, Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Fernando, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Banarse, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Blundell, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Zwols, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Ha, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Rusu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Pritzel, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Wierstra, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Pathnet: Evolution Channels Gradient Descent in Super Neural Net- works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv preprint arXiv:1701.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='08734.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Gao, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Yao, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Chen, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' SimCSE: Simple Contrastive Learning of Sentence Embeddings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:2104.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='08821.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Raffin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Hill, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Gleave, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Kanervisto, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Ernestus, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Dormann, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Stable-Baselines3: Reliable Re- inforcement Learning Implementations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Journal of Machine Learning Research, 22(268): 1–8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Rusu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Rabinowitz, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Desjardins, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Soyer, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Kirkpatrick, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Kavukcuoglu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Pascanu, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Hadsell, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Progressive Neural Networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:1606.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='04671.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Sanh, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Debut, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Chaumond, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Wolf, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' DistilBERT, a Distilled Version of BERT: Smaller, Faster, Cheaper and Lighter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:1910.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='01108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Schaul, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Horgan, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Gregor, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Silver, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Uni- versal value function approximators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' In International con- ference on machine learning, 1312–1320.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' PMLR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Schulman, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Wolski, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Dhariwal, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Radford, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Klimov, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Proximal Policy Optimization Algorithms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv preprint arXiv:1707.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='06347.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Shridhar, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Yuan, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Cˆot´e, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='-A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Bisk, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Trischler, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Hausknecht, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' ALFWorld: Aligning Text and Embodied Environments for Interactive Learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='03768.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Soemers, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Mella, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Piette, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Stephenson, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Browne, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Teytaud, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer of Fully Convo- lutional Policy-Value Networks Between Games and Game Variants.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:2102.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='12375.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Srivastava, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Li, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Lingelbach, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Mart´ın-Mart´ın, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Xia, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Vainio, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Lian, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Gokmen, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Buch, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Liu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Savarese, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Gweon, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Wu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Fei-Fei, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' BEHAVIOR: Benchmark for Everyday Household Activ- ities in Virtual, Interactive, and Ecological Environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='03332.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Taylor, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Stone, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer Learning for Re- inforcement Learning Domains: A Survey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Journal of Ma- chine Learning Research, 10(7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Zhu, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Lin, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=';' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' and Zhou, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' Transfer Learning in Deep Reinforcement Learning: A Survey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content=' arXiv:2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} +page_content='07888 [cs, stat].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf'} diff --git a/BdFQT4oBgHgl3EQf9zeq/content/tmp_files/2301.13452v1.pdf.txt b/BdFQT4oBgHgl3EQf9zeq/content/tmp_files/2301.13452v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..ecafa3b1989bcce37edc8d7694de6089f4e2971f --- /dev/null +++ b/BdFQT4oBgHgl3EQf9zeq/content/tmp_files/2301.13452v1.pdf.txt @@ -0,0 +1,2126 @@ +Distribution of the number of pivots needed using Gaussian elimination with +partial pivoting on random matrices∗ +John Peca-Medlin† +Abstract. Gaussian elimination with partial pivoting (GEPP) remains the most common method to solve dense +linear systems. Each GEPP step uses a row transposition pivot movement if needed to ensure the +leading pivot entry is maximal in magnitude for the leading column of the remaining untriangularized +subsystem. We will use theoretical and numerical approaches to study how often this pivot movement +is needed. We provide full distributional descriptions for the number of pivot movements needed +using GEPP using particular Haar random ensembles, as well as compare these models to other +common transformations from randomized numerical linear algebra. Additionally, we introduce new +random ensembles with fixed pivot movement counts and fixed sparsity, α. Experiments estimating +the empirical spectral density (ESD) of these random ensembles leads to a new conjecture on a +universality class of random matrices with fixed sparsity whose scaled ESD converges to a measure +on the complex unit disk that depends on α and is an interpolation of the uniform measure on the +unit disk and the Dirac measure at the origin. +Key words. Gaussian elimination, partial pivoting, butterfly matrices, Stirling numbers of the first kind, nu- +merical linear algebra, universality +AMS subject classifications. 60B20, 15A23, 65F99 +1. Introduction and background. Gaussian elimination (GE) is the most used method +to solve linear systems +(1.1) +Ax = b +for A ∈ Rn×n, and remains a staple of introductory linear algebra courses. If no leading prin- +cipal minors of A vanish, then GE iteratively transforms (1.1) into two equivalent triangular +systems, resulting in the factorization A = LU for L unipotent lower triangular and U upper +triangular matrices using 2 +3n2(1 +o(1)) FLOPs. If A is nonsingular but does have a vanishing +principal minor, then GE would need to be combined with a selected pivoting strategy to +ensure GE can be continued at each intermediate step without encountering a zero pivot. The +row and column movements used to ensure nonzero pivots would then result in additional +permutation matrices P, Q for a modified GE factorization PAQ = LU. Even when pivoting +is not necessary, it remains desirable for added computational stability for certain pivoting +strategies. +This includes GE with partial pivoting (GEPP), the most prominent pivoting +strategy for dense linear systems, which is the default strategy used by MATLAB with its +built-in lu function. GEPP uses only row permutations and so results in a final PA = LU +factorization. (See Subsection 1.3 for relevant description of GE, while Section 3 provides +further background for GEPP.) +With high performance computing, choosing a desired pivoting strategy with GE often +becomes a balancing act that takes into account the total computation time (viz., total FLOP +∗Submitted to the editors February 1, 2023. +†Department of Mathematics, University of Arizona, Tucson, AZ (johnpeca@math.arizona.edu). +1 +arXiv:2301.13452v1 [math.NA] 31 Jan 2023 + +2 +J. PECA-MEDLIN +count) rather than just accuracy (viz., the numerical stability of computed solutions). The +cost of moving large amounts of data can be very expensive on high performance machines. +For example, numerical experiments on a hybrid CPU/GPU setup have shown GEPP used +with moderately sized random matrices have pivoting account for over 20 percent of the total +computation time [1]. Hence, limiting pivot movements using GEPP is desirable to save time. +Parker introduced a preconditioning method through the use of random butterfly matrices +to remove the need for pivoting overall for any nonsingular linear system [16]. +Butterfly +matrices are a recursively defined class of orthogonal matrices (see Section 4 for a full definition +of random butterfly matrices) for which matrix-vector multiplication Ax is computed using +3n log2 n FLOPs rather than the O(n2) FLOPs needed using a general dense matrix. Parker +established for U, V iid random butterfly matrices, then Ax = b can be transformed into the +equivalent system +(1.2) +UAy = Ub +and +x = V ∗y +for which GE without pivoting (GENP) can be carried out with probability near 1. The above +computations shows then transforming (1.1) int to (1.2) can be performed using O(n2 log2 n) +FLOPs, and hence does not impact the leading order complexity of GE. +In [17], Peca-Medlin and Trogdon further explored the numerical stability of using GE with +a variety of pivoting strategies in addition to using randomized preconditioning methods, +which included random butterfly and Haar orthogonal transformations. +One output was +certain preconditioners had the impact that running the preconditioner followed then by GE +with another pivoting strategy could “upgrade” the pivoting strategy in terms of the numerical +accuracy for the computed solution. For instance, even though GENP often leads to accuracy +far from that achieved using GEPP or GE with complete pivoting (GECP), a preconditioned +matrix using GEPP would lead to accuracy on par with using GECP. Adding one step of +iterative refinement would further seal this alignment in accuracy. +A natural direction that arose out of this previous analysis in [17] was to better understand +how many actual pivot movements are needed with these different pivoting strategies on the +preconditioned linear systems. The goal of this paper is to provide a clearer answer to this +question with respect to GEPP. GEPP can use a pivot movement at each GE step, for up to +n − 1 total pivot movements. So applying GEPP to a random linear system will result in the +number of pivot movements being a random variable with support in 0, 1, . . . , n − 1. We will +study the question of how much movement one should expect if they choose to use GEPP in +conjunction with randomized preconditioning methods1. +Our results include both theoretical and numerical approaches focusing on applying GEPP +to several random matrix ensembles. The theoretical results rely on input matrices from Haar +orthogonal and butterfly ensembles (see Subsection 1.2 for a review of Haar measures). Our +numerical studies use further study these models in relation to other common transformations +from randomized numerical linear algebra transformations, which expand studies in [17]. +1.1. Outline of paper. This paper is structured to explore the question of how much +actual pivot movement is necessary when using GEPP with a variety of randomized precon- +1This is a simpler focus than the more general study of the distribution of the GEPP permutation matrix +factor. + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +3 +ditioning methods on particular nonsingular linear systems. The remainder of Section 1 will +establish notation and preliminary background on GE (Subsection 1.3) and the Stirling-1 +distribution (Subsection 1.4). This includes connections to previous statistical results of dis- +tributions using Stirling numbers of the first kind, as well as formally establishing standard +statistics for this distribution that will be used for comparison in later numerical results in +Section 6. +Section 2 provides a statement of the main theoretical result, Theorem 2.1, that provides +the full distribution for the number of GEPP pivot movements needed for particular random +ensembles. This includes the distribution of pivot movements when +I. the resulting GEPP permutation matrix factor P is uniformly distributed among the +permutation matrices, which uses the Stirling-1 distribution, Υn, that satisfies +(1.3) +P(Υn = k) = |s(n, k)| +n! +for k = 1, 2, . . . , n where s(n, k) is the Stirling number of the first kind; and +II. when GEPP is applied to a Haar-butterfly matrix, which results in a scaled Bernoulli +distribution. +The remainder of Section 2 provides results and implications of (I) in connection with QR +factorizations and other standard Haar unitary models. The proof of Theorem 2.1 is postponed +under Sections 3 and 4. +Section 3 provides the necessary background to establish a proof of part (I) of Theo- +rem 2.1. This includes introducing explicit decompositions of permutations in Sn, the group +of permutations of n objects, that connect explicitly to GEPP permutation matrix factors as +well as uniform sampling of Sn. Section 4 provides more background for P(B) +N , the butterfly +permutation matrices, and yields a proof for part (II) of Theorem 2.1. Additionally, explicit +structural configurations of exact pivot movement locations of Haar-butterfly matrices are +established, that yield a distribution on the pivot location configurations. +Section 5 builds on top of Theorem 2.1 to introduce a new ensemble of random matrices +that align with uniformly sampling from GLn(R)/Un(R), the left cosets of the group of non- +singular upper triangular matrices in the general linear group. This ensemble can be used +to sample from random ensembles with fixed pivot movement distributions. General random +ensembles are introduced with fixed sparsity conditions. A new conjecture is provided for the +asymptotic empirical spectral distribution for this generalized random ensemble with fixed +sparsity that connects to and subsumes the famous circular law in random matrix theory. +Section 6 uses numerical experiments to further explore the distribution of pivot move- +ments needed using other transformations from randomized numerical linear algebra. These +experiments focus on three initial models, two that need minimal GEPP pivot movements and +one that require the maximal number of GEPP pivot movements. These approaches build +on top of the numerical experiments used in [17], as well as connect to other random models +used in earlier sections. +1.2. Notation and preliminaries. For convenience, N will be reserved for powers of 2, with +N = 2n. For A ∈ Fn×m where F = R or C, Aij denotes the entry in the ith row and jth column +of A, while Aα,β will denote the submatrix of A with row indices α ⊂ [n] := {1, 2, . . . , n} and + +4 +J. PECA-MEDLIN +β ⊂ [m]. Let ei denote the standard basis elements of Fn and Eij = eieT +j , the standard basis +elements of Fn×m. I denotes the identity matrix and 0 the zero matrix or vector (with the +dimensions implicit from context if not stated explicitly). If A ∈ Fn×n is nonsingular, then +A0 := I. Let D = {z ∈ C : |z| < 1} denote the unit complex disk, with ∂D denoting the unit +complex circle. We will write Sn−1 = {x ∈ Fn : ∥x∥2 = 1}, where ∥ · ∥2 denotes the standard +ℓ2-norm. +Let Sn denote the symmetric group on n elements. Recall every permutation σ ∈ Sn can +be written in cycle notation, with σ = τ1τ2 · · · τj where τi = (ai1 ai2 · · · aik) is a k-cycle, such +that τi(aim) = aim+1 for m < k and τi(aik) = ai1. Moreover, recall every permutation can be +written as a product of disjoint cycles. For σ ∈ Sn, let Pσ denote the orthogonal permutation +matrix such that Pσei = eσ(i). For example, for (1 2) ∈ S2, then +(1.4) +P(1 2) = +�0 +1 +1 +0 +� +. +Let Pn denote the n×n permutation matrices, i.e., the left regular representation of the action +of Sn on [n]. +Let ∥·∥max denote the element-wise max norm of a matrix defined by ∥A∥max = maxi,j |Aij|. +Define A ⊕ B ∈ F(n1+m1)×(n2+m2) to be the block diagonal matrix with blocks A ∈ Fn1×m1 +and B ∈ Fn2×m2. Define A ⊗ B ∈ Fn1n2×m1m2 to be the Kronecker product of A ∈ Rn1×m1 +and B ∈ Rn2×m2, given by +(1.5) +A ⊗ B = +� +�� +A11B +· · · +A1,m1B +... +... +... +An1,1B +· · · +An1,m1B +� +�� . +Recall Kronecker products satisfy the mixed-product property: if all matrix sizes are compat- +ible for the necessary matrix multiplications, then +(1.6) +(A ⊗ B)(C ⊗ D) = (AC) ⊗ (BD), +i.e., the product of Kronecker products is the Kronecker product of the products. As a result, +Kronecker products inherit certain shared properties of their input matrices. For example, if +A and B are both orthogonal or unitary matrices, then so is A ⊗ B. Similarly, if A ∈ Pn and +B ∈ Pm then A ⊗ B ∈ Pnm. +Let GLn(F) denote the group of nonsingular matrices with entries in F. Let Un(F) denote +the subgroup of nonsingular upper triangular matrices and Ln(F) denote the subgroup of +unipotent (i.e., with all diagonal entries equal to 1) lower triangular matrices. O(n) and U(n) +denotes the orthogonal and unitary groups of n × n matrices and SO(n), SU(n) denote the +respective special orthogonal and special unitary subgroups; note O(n) will be used for the +orthogonal matrices while O(n) is the classical “big-oh” notation. Recall if H is a subgroup +of G, then G/H = {xH : x ∈ G} will denote the set of left-cosets of H in G and G\H = +{Hx : x ∈ G} the set of right-cosets of H in G. +We write X ∼ Y if X and Y are equal in distribution. +Standard distributions that +will be used in this document include X ∼ N(0, 1) to denote a standard Gaussian random + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +5 +variable (with probability density (2π)−1/2e−x2/2); X ∼ NC(0, 1) to denote a standard complex +Gaussian random variable (with X ∼ (Z1 + iZ2)/ +√ +2 for Z1, Z2 iid N(0, 1)); X ∼ Uniform(A) +to denote a uniform random variable with support on a compact set A with probability +density +1 +|A|1A (for |A| either denoting the cardinality of A if A is finite or the corresponding +appropriate Lebesgue-measure of A); ξ ∼ Bernoulli(p) to denote a Bernoulli random variable +with parameter p ∈ [0, 1] where P(ξ = 1) = p = 1 − P(ξ = 0); and ξ ∼ Rademacher +to denote a Rademacher random variable that takes only the values 1 and −1 with equal +probability (i.e., ξ ∼ (−1)Bernoulli(1/2)). A random variable is called continuous if its associated +probability density is a continuous function. Let Gin(n, m) denote the n×m Ginibre ensemble, +consisting of random matrices with independent and identically distributed (iid) standard +Gaussian entries; GinC(n, m) will denote the similarly defined complex Ginibre ensemble, +whose entries are iid standard complex Gaussian random variables. Let GOE(n) and GUE(n) +denote the Gaussian Orthogonal and Gaussian Unitary Ensembles, respectively; recall these +can be sampled using the Ginibre ensembles as follows: if G ∼ Gin(n, n) and H ∼ GinC(n, n), +then (G + GT )/ +√ +2 ∼ GOE(n) and (H + H∗)/ +√ +2 ∼ GUE(n). +Let ϵmachine denote the machine-epsilon, which is the minimal positive number such that +fl(1 + ϵmachine) ̸= 1 using floating-point arithmetic.2 If using t-bit mantissa precision, then +ϵmachine = 2−t. Our later experiments in Section 6 will use double precision in MATLAB, +which uses a 52-bit mantissa. +Standard models from randomized numerical linear algebra will be used for comparison in +Section 6. These will include the Walsh transformation and Discrete Cosine Transformations +(DCT), which were previously used in [17]. Sampling for the following experiments will use +native (deterministic) MATLAB functions (viz., the Fast Walsh-Hadamard transform fwht +and the default Type II Discrete cosine transform dct) applied after an independent row +sign transformation chosen uniformly from {±1}N. See [20, 24] for an overview of numerical +properties of the Walsh and DCT transforms, and [13] for a thorough survey that provides +proper context for use of these transforms and other tools from randomized numerical linear +algebra. +Additionally, we will utilize left and right invariance properties of the Haar measure on +locally compact Hausdorff topological groups, first established by Weil [25]. For a compact +group G, this measure can be normalized to yield a probability measure Haar(G), which in- +herits the invariance and regularity properties of the original measure and yields a means +to uniformly sample from compact groups, such as O(n) and SO(N). Recall every nonsin- +gular matrix A ∈ Fn×n has a QR factorization, with A = QR for R upper triangular with +positive diagonal entries and Q ∈ O(n) if F = R or Q ∈ U(n) if F = C. Stewart provided +an outline to sample from Haar(O(n)) by using Gin(n, n) through the QR factorization: if +A ∼ Gin(n, n) and A = QR is the QR decomposition of A where R has positive diagonal +entries, then Q ∼ Haar(O(n)) [19]. Similarly, Haar(U(n)) can be sampled using GinC(n, n). +Our experiments will employ efficient sampling methods for Haar(O(n)) that use Gaussian +Householder reflectors, in line with the QR factorization of Gin(n, n) (see [15] for an outline +of this method). +2We will use the IEEE standard model for floating-point arithmetic. + +6 +J. PECA-MEDLIN +1.3. Gaussian elimination and growth factors. GENP iteratively works through the bot- +tom right untriangularized n − k + 1 dimensional submatrices of the GE transformed matrix +A(k) to result in the factorization A = LU for L a unipotent lower triangular matrix and U +an upper triangular matrix. A(k) represents the resulting transformed matrix of A at the kth +GE step that is zero below the first k − 1 diagonals and +(1.7) +Lij = +A(j) +ij +A(j) +jj +for i > j, with A(1) = A and A(n−1) = U. When GENP can be completed (viz., when all +leading principal minors are nonzero), the final factorization A = LU can be reused with +different input b to solve the computationally simpler triangular systems +(1.8) +Ly = b +and +Ux = y. +Moreover, if A has nonvanishing principal minors, then the resulting LU factorization is +unique. See standard references, such as [10], for an explicit outline of GE. +If GENP cannot be completed, then a pivoting strategy can be applied so that GE can +continue at each step, which can involve row or column movements that ensure the leading +diagonal entry (i.e., the pivot) of the untriangularized subsystem is nonzero. Different pivot- +ing strategies then result in the modified GE factorization PAQ = LU for P, Q permutation +matrices. GEPP remains the most popular pivoting strategy, which uses only row permu- +tations to ensure the leading pivot at the kth GE step is maximal in magnitude among the +lower entries in its column. By construction, the L from the resulting GEPP factorization +PA = LU satisfies ∥L∥max = 1. If there is ever a “tie” during an intermediate GEPP pivot +search, which occurs when |Aj +ij| = |Aj +jj| and would result in |Lij| = 1 for some i > j, then +the L and U factors are not unique with respect to row transformed linear systems, i.e., if A +has the GEPP factorization PA = LU and B = QA for Q a permutation matrix, then we do +not necessarily have the GEPP factorization (PQT )B = LU. When ties are avoided, GEPP +results in unique L and U factors. +Theorem 1.1 ([17]). +Let A be a nonsingular square matrix. Then the L and U factors in +the GEPP factorization PA = LU are invariant under row permutations on A iff |Lij| < 1 +for all i > j. +Moreover, when no ties are encountered with a nonsingular A with B = QA defined as above, +then GEPP does necessarily result in the factorization (PQT )B = LU. +Even when pivoting is not necessary, pivoting can remain desirable for its numerical stabil- +ity properties when using floating-point arithmetic. Wilkinson first established the backward +stability of GEPP by showing the growth factor, +(1.9) +ρ(A) = maxk ∥A(k)∥max +∥A∥max +, +satisfies the upper exponential bound 1 ≤ ρ(A) ≤ 2n−1 for all matrices A [26]. The growth +factor controls the backwards relative error for computed solutions ˆx using GE, as Wilkinson + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +7 +further established through +(1.10) +∥ˆx − x∥∞ +∥x∥∞ +≤ 4n2κ∞(A)ρ(A)ϵmachine +for κ∞(A) = ∥A∥∞∥A−1∥∞ the ℓ∞-condition number. Section 6 will consider particular linear +models that maximize the GEPP growth factors. +In practice, GEPP implementations result in computed solutions with higher accuracy far +from the worst-case exponential behavior Wilkinson’s analysis first highlighted. Understand- +ing this behavior remains an important question in numerical analysis. This was partially +answered by Huang and Tikhomirov through the use of average-case analysis of GEPP using +A ∼ Gin(n, n): they showed with probability near 1, both the number of bits of prevision +needed to solve Ax = b to m bits of accuracy is m + O(log n) while also the computed and +exact GEPP permutation matrix factors align [11]. +1.4. Stirling-1 distribution. This section will delve further into some properties of the +Stirling-1 distribution, Υn, with probability mass function given by (1.3). Recall the Stirling +numbers of the first kind, s(n, k), arise as the coefficients using the generating function +(1.11) +(x)n = +n +� +k=0 +s(n, k)xk +for (x)n = x(x − 1) · · · (x − n + 1), where s(n, k) = 0 if not 1 ≤ k ≤ n except s(0, 0) = 1.3 The +absolute Stirling numbers of the first kind, |s(n, k)|, can similarly be generated using (1.11) +along with |s(n, k)| = (−1)n+ks(n, k); alternatively, |s(n, k)| are determined by the generating +function +(1.12) +⟨x⟩n = +n +� +k=0 +|s(n, k)|xk +for ⟨x⟩n = x(x + 1) · · · (x + n − 1). (1.12) further establishes the relation +(1.13) +|s(n, k)| = sn−k(1, 2, . . . , n − 1) +where +(1.14) +sj(a1, a2, . . . , am) = +� +i1<··· 0. +Plugging x = 1 into (1.12) can be used to establish the identity +(1.16) +n! = +n +� +k=1 +|s(n, k)|, +which yields (1.3) denotes a valid probability density. An alternative justification for (1.16) +follows from the standard interpretation that |s(n, k)| counts the number of permutations +σ ∈ Sn that have exactly k cycles in their disjoint cycle decomposition, where fixed points +are counted as 1-cycles4. This interpretation using Sn can be used to provide a combinatorial +proof of (1.16): the left hand side of (1.16) is the number of elements of Sn, and the right +hand side is the sum of each subset of permutations with a fixed number of k cycles for k +ranging from 1 (viz., the n-cycles, of which there are |s(n, 1)| = (n−1)!) to n (viz., the identity +permutation, in which each object comprises its own cycle of length 1, so that |s(n, n)| = 1).5 +Stirling numbers have appeared in connection with statistical problems dating back to +their original formulation by Stirling in the 1730s (cf. [4]). Probabilistic tools have been +used to establish and analyze properties of Stirling numbers in the mid- to late-20th century +[3, 4, 9]. Υn has appeared as a variant of a more general ensemble of Stirling distributions +but has not been studied extensively in the literature. For instance, the mean and variance +have been computed for Υn (cf. [3]), but general higher moment computations have not been +touched. Applying successive derivatives in x to (1.12) and then plugging in x = 16 yields +EΥn = Hn +and +Var Υn = Hn − H(2) +n , +(1.17) +where +(1.18) +H(m) +n += +n +� +j=1 +1 +jm +are the generalized Harmonic numbers and Hn = H(1) +n +the standard Harmonic numbers. Well +known asymptotic results as n → ∞ using Harmonic numbers include Hn − log n → γ ≈ +4This correspondence is justified by noting +�n +k +� +, the number of permutations σ ∈ Sn with k disjoint cycles +in their disjoint cycle decomposition, satisfies both the initial conditions along with the recurrence (1.15) (a +combinatorial argument yields the analogous recurrence by separating whether 1 comprises its own cycle, which +aligns with |s(n − 1, k − 1)|, or if 1 is contained in a larger cycle, which aligns with (n − 1)|s(n − 1, k)| since +there are then n − 1 places to insert 1 into an existing cycle). +5Similarly, the Stirling numbers of the second kind, S(n, k), can be defined as the number of partitions of +n objects into k nonempty sets, which can be connected to Sn. S(n, k) and s(n, k) further are related as they +yield the coordinates n, k for lower triangular n × n matrices that are mutual inverses (cf. pg. 144 in [5]). +6For example, using +d +dx⟨x⟩n = ⟨x⟩n · +�n−1 +� +j=0 +1 +x + j +� += +n +� +k=1 +|s(n, k)|kxk−1 +and then plugging in x = 1 yields n!Hn = �n +k=1 k|s(n, k)| = n!EΥn. + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +9 +0.5772156649, the Euler–Mascheroni constant, and H(m) +n +→ ζ(m) for m > 1, where +(1.19) +ζ(m) = +� +n≥1 +1 +nm +is the Riemann-zeta function, with ζ(2) = π2 +6 . +Continuing with higher moment computations using (1.12) then yields EΥm +n is a function +of H(j) +n +for j = 1, 2, . . . , m. Moreover, after computing also the third and fourth moments +of Υn, gathering all resulting terms that use only Hn = H(1) +n +results in a Bell polynomial of +order m with inputs Hn for each component, i.e., +(1.20) +EΥn mod (H(2) +n , H(3) +n , . . . , H(n) +n ) = Bn(Hn, . . . , Hn). +This aligns also with the above formulas for EΥn = Hn = B1(Hn) and EΥ2 +n = Var(Υn) + +(EΥn)2 = H2 +n + Hn − H(2) +n += B2(Hn, Hn) − H(2) +n . A future research area can explore finding +closed forms for the higher moments of Υn, including establishing (1.20) for higher orders, as +well as other general Stirling distributions. +1.5. Butterfly matrices. This section will define and introduce relevant background for +butterfly matrices and random butterfly matrices, including Haar-butterfly matrices, Bs(N, ΣS). +See [17, 23] for a fuller discussion of additional numerical and spectral properties of butterfly +matrices and random butterfly matrices. +The butterfly matrices of order N are an ensemble of special orthogonal matrices defined +recursively as follows: let {1} as the order 1 butterfly matrices; for each order N > 1 butterfly +matrix B, there exist order N/2 butterfly matrices A1, A2 and order N/2 symmetric matrices +C, S such that CS = SC and C2 + S2 = IN/2 where +(1.21) +B = +� C +S +−S +C +� �A1 +0 +0 +A2 +� += +� CA1 +SA2 +−SA1 +CA2 +� +. +The simple butterfly matrices are formed such that A1 = A2 at each recursive step. The +scalar butterfly matrices, B(N), are formed using (C, S) = (cos θI, sin θI) for some angle θ +at each recursive step, where Bs(N) then denotes the simple scalar butterfly matrices. Note +then each B ∈ B(N) is of the form +(1.22) +B = (B(θ) ⊗ I2)(A1 ⊕ A2) +for +(1.23) +B(θ) = +� cos θ +sin θ +− sin θ +cos θ +� +the (counter-clockwise) rotation matrix, while each B ∈ Bs(N) can then be written of the +form +(1.24) +B = B(θ) = +n +� +j=1 +B(θn−j+1) + +10 +J. PECA-MEDLIN +for θ ∈ [0, 2π)n. Note Bs(N) ⊂ B(N) ⊂ SO(N), with equality when N ≤ 2. While B(N) is +not multiplicatively closed, Bs(N) forms a closed subgroup of SO(N) with +(1.25) +B(θ)B(ψ) = B(θ + ψ) +and +B(θ)−1 = B(−θ) +for B(θ), B(ψ) ∈ Bs(N). +Let Σ be a collection of dimension 2k pairs (Ck, Sk) of random symmetric matrices with +CkSk = SkCk and C2 +k + S2 +k = I2k for k ≥ 1. We will write B(N, Σ) and Bs(N, Σ) to denote +the ensembles of random butterfly matrices and random simple butterfly matrices formed by +independently sampling (C, S) from Σ at each recursive step. Let +ΣS = {(cos θ(k)I2k−1, sin θ(k)I2k−1) : θ(k) iid Uniform([0, 2π), k ≥ 1} +and +(1.26) +ΣD = { +2k−1 +� +j=1 +(cos θ(k) +j , sin θ(k) +j ) : θ(k) +j +iid Uniform([0, 2π), k ≥ 1}. +(1.27) +A large focus for the remainder of this paper is on the Haar-butterfly matrices, Bs(N, ΣS), +while numerical experiments in Section 6 will also use the other random scalar butterfly ensem- +ble, B(N, ΣS), along with the random diagonal butterfly ensembles, B(N, ΣD) and Bs(N, ΣD). +Since Bs(N) is a compact abelian group, it has a Haar measure that enables uniform sampling +of its elements. The name of Haar-butterfly matrices for Bs(N, ΣS) is precisely because this +construction aligns exactly with this Haar measure on Bs(N). +Proposition 1.2 ([23]). +Bs(N, ΣS) ∼ Haar(Bs(N)) +Using the mixed-product property, matrix factorizations of each Kronecker component +lead to a matrix factorization of Kronecker products. In particular, this holds for the LU +factorizations of Bs(N) using GENP and GEPP (see Proposition 4.1). +In particular, the +permutation matrix factors from the GEPP factorization of B ∈ Bs(N) are from the butterfly +permutation matrices, P(B) +N , which are defined recursively as P(B) +2 += {I2, P(1 2)} and +(1.28) +P(B) +N += +� +� +� +n +� +j=1 +P ej +(1 2) : ej ∈ {0, 1} +� +� +� = P(B) +2 +⊗ P (B) +N/2 +for N > 2. These resulting permutations are explicit examples of perfect shuffles. See [6] for a +thorough overview of perfect shuffles and some of their inherent applications and properties. +The mixed-product property further yields P(B) +N +comprises a subgroup of permutation matrices +that is isomorphic to (Z/2Z)n. +Moreover, if B ∼ Bs(N, ΣS), then P ∼ Haar(P(B) +N ) for +PB = LU the GEPP factorization of B (see Corollary 4.2). +2. Distribution of GEPP pivot movements for particular random matrices. We first will +state the main theoretical result on the distribution of the number of GEPP pivot movements +used that applies to particular input random matrix models. These will make use of Υn, the +Stirling-1 distribution (see Subsection 1.4), and P(B) +N , the butterfly permutation matrices (see +Subsection 1.5). + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +11 +Theorem 2.1. (I) If A is a n × n random matrix with independent columns whose first +n − 1 columns have continuous iid entries, then P ∼ Uniform(Pn) for PA = LU the GEPP +factorization of A for n ≥ 2. Moreover, the number of GEPP pivot movements needed for A +is equal in distribution to n − Υn. +(II) If B ∼ Bs(N, ΣS), then P ∼ Uniform(P(B) +N ) for PB = LU the GEPP factorization. +Moreover, the number of GEPP pivot movements needed for B is equal in distribution to +N +2 Bernoulli +� +1 − 1 +N +� +. +The proof of Theorem 2.1 will be postponed until Section 3 for (I) and Section 4 for (II). +Part (I) gives the most general result that yields pivot movements following the Stirling-1 +distribution. This includes iid random matrices when the entry distribution is continuous. +Corollary 2.2. If A is a n×n matrix with continuous iid entries, then the number of GEPP +pivot movements needed for A is equal in distribution to n − Υn. +If A is an iid matrix with entries taken from a distribution ξ with atoms (i.e., P(ξ = c) > 0 +for some c), then GEPP would yield a different distribution on the number of pivot movements. +Example 2.3. If A is 2 × 2 where Aij are each iid Bernoulli(p), then GEPP yields the +permutation matrix factor P = P ζ +(1 2) where ζ ∼ Bernoulli(p(1 − p)). This follows since a +pivot movement is needed only if A11 = 0 and A21 = 1. A pivot is needed with probability +p(1 − p) ≤ 1 +4, so the number of GEPP pivot movements is equal in distribution to ζ. +Other continuous random models that do not fit the conditions in (I) would yield different +distributions on the resulting GEPP permutation matrix factors. +Example 2.4. Consider G ∼ GOE(2), where G11, G22 ∼ N(0, 2) and G21 = G12 ∼ N(0, 1) +are independent. The resulting number of GEPP pivot movements for G is equal in distribu- +tion to Bernoulli(p) for +p = P(|G21| > |G11|) = P(|Z1| > +√ +2|Z2|) = P(Z2 +1/Z2 +2 > 2) += P(F1,1 > 2) = 1 +π +� ∞ +2 +dx +√x(1 + x) = 2 +π arctan +� 1 +√ +2 +� +≈ 0.391826552 +using Zi ∼ N(0, 1) iid and Fµ,ν denotes the F-distribution with µ > 0 numerator degrees of +freedom (d.f.) and ν > 0 denominator d.f. +Example 2.5. Consider now G ∼ GUE(2), where G11, G22 ∼ N(0, 1) while G12 = G21 ∼ +NC(0, 1), then the resulting number of GEPP pivot movements would similarly be equal in +distribution to Bernoulli(q) for +q = P(|G21| > |G11|) = P +�� +(Z2 +1 + Z2 +2)/2 > |Z3| +� += P((Z2 +1 + Z2 +2)/2 > Z2 +3) += P(F2,1 > 1) = +� ∞ +1 +dx +(1 + 2x)3/2 = +1 +√ +3 ≈ 0.577350269 +Remark 2.6. In comparison to Examples 2.3 to 2.5, Corollary 2.2 yields if G is a continuous +iid 2 × 2 matrix, then the number of GEPP pivots needed would be equal in distribution to +2 − Υ2 ∼ Bernoulli(1 +2), where we note P(Υ2 = 1) = |s(2,1)| +2! += 1 +2 = |s(2,2)| +2! += P(Υ2 = 2). + +12 +J. PECA-MEDLIN +A further result from Theorem 2.1 and Corollary 2.2 involves the relationship of the +LU factorization of an iid matrix to its QR factorization. If A has the GEPP factorization +PA = LU, then its QR factorization A = QR yields PQ = AR−1 = L(UR−1).7 In particular, +the resulting permutation matrix and hence the pivot movements that would be needed using +GEPP on Q and A are identical when no ties are encountered by Theorem 1.1. This obser- +vation then can be combined with Stewart’s realization of Haar orthogonal and Haar unitary +sampling using Ginibre ensembles (cf. Subsection 1.2) to yield: +Corollary 2.7. If A ∼ Haar(O(n)) or A ∼ Haar(U(n)), then the number of GEPP pivot +movements needed for A is equal in distribution to n − Υn. +A similar approach can then yield information about the pivot movements needed on +Haar(SO(n)) and Haar(SU(n)). +Note Stewart’s sampling method for Haar(O(n)) can be +indirectly rephrased in terms of the Subgroup algorithm, which was formally established by +Diaconis and Shahshahani [7]. The Subgroup algorithm enables a uniform sampling method +for a compact group by using a subgroup and its associated cosets: +Theorem 2.8 (Subgroup algorithm,[7]). If G is a compact group, H is a closed subgroup of +G, and H/G is the set of left-costs of H, then if x ∼ Uniform(G/H) and y ∼ Haar(H), then +xy ∼ Haar(G). +Theorem 2.8 can analogously be stated using right cosets. +Stewart’s approach for sampling Haar orthogonal matrices can be realized in light of The- +orem 2.8 by iteratively using Householder reflectors as coset representatives of the subgroup +of orthogonal matrices whose first row and column have 1 in the leading diagonal and are +zero elsewhere.8 More directly, one can then realize Haar(SO(n)) by using the coset repre- +sentatives of O(n)/ SO(n) of D(x) = diag(x, 1, . . . , 1) for x = ±1: if A ∼ Haar(SO(n)) and +x ∼ Uniform(±1), then D(x)A ∼ Haar(O(n)).9 Moreover, group homomorphisms can be used +to yield uniform measures on cosets as push forward measures of Haar measures. In particular, +since SO(n) is a normal subgroup of O(n) (since it is the kernel of the group homomorphism +det : O(n) → R), then the natural quotient map C2 = {±1} ∼= O(n)/ SO(n) ∼= O(n)\ SO(n) +yields C2 × SO(n) ∼= O(n). This yields uniform sampling from both C2 and SO(n) using +push forwards of the Haar sampling on O(n) along with the natural projection maps to each +component, which similarly holds using instead U(n) and SU(n): +Corollary 2.9. x ∼ Uniform(±1) and A ∼ Haar(SO(n)) iff AD(x) ∼ Haar(O(n)), while +y ∼ Uniform(T) and A ∼ Haar(SU(n)) iff AD(y) ∼ Haar(U(n)). +Hence, mimicking the result aligning the GEPP permutation matrix factors between A and +the Q from the A = QR factorization, we similarly have identical P factors for A ∼ Haar(O(n)) +and B ∼ Haar(SO(n)) where A = BD(x).10 +Corollary 2.10. If A ∼ Haar(SO(n)) or A ∼ Haar(SU(n)), then the number of GEPP pivot +7Note UR−1 ∈ U(F, n) when U, R ∈ U(F, n) since U(F, n) is a group. +8The Householder reflectors then can be uniformly sampled by choosing x ∈ Sn−1 uniformly. +9Similarly Haar(U(n)) and Haar(SU(n)) can be related using the coset representatives D(x) for x ∈ T. +10The argument from the paragraph before Corollary 2.7 is identical after replacing R ∈ U(F, n) with +D(x) ∈ U(F, n). + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +13 +movements needed for A is equal in distribution to n − Υn. +In [16, 17], the authors studied particular random preconditioning transformations of the +form UAV ∗ for iid U, V so that the resulting output can almost surely (a.s.) have a LU +factorization. In [17], the authors further studied the numerical properties for GE pivoting +strategies, including GEPP, after applying these random preconditioning transformations. +Relating this to our current topic, one could ask how many pivot movements are needed using +GEPP after these random transformations? +For the Haar orthogonal case (as well as the unitary, special orthogonal and special unitary +cases), the result is immediate: Let A be a nonsingular real matrix. Suppose U, V are iid +Haar(O(n)) and let B = AV ∗, which is independent of U. Let B = QR be the QR factorization +of B. Then UAV ∗ = UB = U(QR) = (UQ)R. The permutation matrix factor resulting +from GEPP for UAV ∗ is then identical (if no ties are encountered, which holds a.s.) to the +permutation matrix factor needed for UQ. Since Haar(O(n)) is right invariant, then UQ ∼ U. +This then yields the resulting number of pivots under this two-sided transformations is equal +in distribution to the (I) case. +Corollary 2.11. If A is a n×n nonsingular matrix, and U, V are iid from the Haar measure +on O(n), U(n), SO(n) or SU(n), then the number of GEPP pivot movements needed for UAV ∗ +is equal in distribution to n − Υn. +Remark 2.12. Extensions of (II) from Theorem 2.1 are less direct, since (II) relies heavily +on explicit structural properties of Haar-butterfly matrices, Bs(N, ΣS). Analogous results can +be established if the focus is restricted to matrices in +n +� +F2×2. +3. Permutations from GEPP and uniform sampling of Sn. Recall how the permuta- +tion matrix factor is formed when applying GEPP to a matrix. First a search for a largest +magnitude element is performed on the first column of A = A(1). After that value is found, +say at index i1 (for i1 ≥ 1), then the corresponding row permutation for the transposition +σ1 = (1 i1) is applied to A (using P (1) = Pσ1), after which the standard GE step follows to +iteratively eliminate each element under the first diagonal value to form A(2) using the pivot +element and the resulting lower triangular GE elimination factor ˜L(1,1), so that +(3.1) +A(2) = (L(1,1))−1P (1)A(1). +Then GE continues with a search for the largest magnitude element on the leading column of +A(2) +2:n,2:n, which results in a transposition of the form σ2 = (2 i2) for i2 ≥ 2. The corresponding +row permutation is performed (using P (2)) followed by the standard GE elimination step using +the second pivot (using ˜L(2,2)), with which one groups the lower triangular and permutation +matrix factors using the relation L(j,k) = P (j)L(j−1,k)P (j)11, so that +(3.2) +A(3) = (L(2,2))−1P (2)A(2) = (L(2,1)L(2,2))−1P (2)P (1)A(1). +The process then continues, moving one column at a time, which results in the final GEPP +factorization PA = LU for P = P (n−1) · · · P (2)P (1), L = L(n−1,n−1) · · · L(n−1,2)L(n−1,1) and +U = A(n−1). +11Note P (j) = (P (j))−1 since these permutation matrices correspond to transpositions that have order 2. + +14 +J. PECA-MEDLIN +Hence, the resulting permutation matrix factor is built up step by step using σk = (k ik), +resulting in +(3.3) +P = P (n−1) · · · P (2)P (1) = Pσn−1 · · · Pσ2Pσ1 = Pσn−1···σ2σ1 = Pσ +for +(3.4) +σ = (n − 1 in−1) · · · (2 i2)(1 i1) +where j ≤ ij ≤ n for each j. +Remark 3.1. If ik = k, then (3.4) can abstain from including the trivial permutation (k ik). +In particular, (3.4) can trivially be expanded to σ = (n in)σ where necessarily in = n. +(3.4) is useful because every permutation can be put in this form. +Lemma 3.2. Every permutation in Sn can be written in the form (3.4). +In particular, every permutation is realizable as corresponding to the GEPP permutation +matrix factor for some input nonsingular matrix +Proof. By counting, it is clear n! inputs can be used to form σ (n choices for i1, n−1 choices +for in−1, and so on). Moreover, we see this correspondence is one-to-one: suppose σ and σ′ +are formed using distinct inputs, and let k be the minimal index such that ik ̸= i′ +k. Without +loss of generality, assume k = 1. Let ρ = σ(1 i1) and ρ′ = σ′(1 i1). Then ρ(1) = σ(i1) = 1 +while ρ′(1) = σ′(i1) > 1; it follows σ ̸= σ′, which yields this mapping is an injection and hence +a bijection since |Sn| is finite. +Alternatively, this can be realized through induction: this clearly holds for n = 2 since +S2 = {1, (1 2)}. Now assume it holds for n − 1, then one can realize (using the inductive +hypothesis) that Sn−1 ∼= {(n − 1 in−1) · · · (2 i2) : j ≤ ij ≤ n} as a subgroup of Sn, by +recognizing the permutations that fix 1 in Sn is isomorphic to Sn−1. Moreover, adopting the +crude labeling of Sn−1 for this subgroup of Sn, [Sn : Sn−1] = n!/(n−1)! = n, and every (right) +coset representative for Sn−1 can be provided by Sn−1(1 i1) so that Sn = �n+1 +j=1 Sn−1(1 j). +The coset decomposition structure for Sn used in the alternative proof of Lemma 3.2 was +utilized by Diaconis and Shashahani through an application of the Subgroup algorithm for +generating a Haar measure on Sn [7]. Their result yields a means to sample uniformly from +Sn as the convolution of the Haar measure on Sn−1 and the uniform measure on {(1 j) : 1 ≤ +j ≤ n}. Explicitly, you can generate a uniform permutation σ ∈ Sn by first uniformly (and +independently) sampling both ρ ∈ Sn−1 and σ1 ∈ {(1 j) : 1 ≤ j ≤ n}, and then forming +σ = ρσ1. Iteratively applying this, one can uniformly sample a permutation by uniformly +sampling each ik ∈ {k, k + 1, . . . , n}, which yields a permutation in the form (3.4). +This +establishes: +Corollary 3.3. If ik ∼ Uniform{k, k + 1, . . . , n} for each k = 1, . . . , n − 1, then +(3.5) +(n − 1 in−1) · · · (2 i2)(1 i1) ∼ Uniform(Sn). +Moreover, the steps where pivot movements occur can be read off directly from σ when +it is written in the form (3.4). If Pσ is the resulting permutation matrix factor from applying + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +15 +GEPP to A, then we explicitly know at step k in GE, the pivot search on A(k) resulted in +the transposition (k ik). This translates directly to how many pivot movements are needed +through a particular implementation of GEPP by counting how many of these transpositions +have ik > k. (So no pivot movement is needed if k = ik, since this translates to the leading +pivot entry being maximal in its respective column.) +It follows then, explicitly, if A is a random matrix such that the resulting GEPP permu- +tation matrix factor P satisfies P ∼ Uniform(Pn) = Haar(Pn)12, then X, the number of pivot +movements needed during this implementation of GEPP on A, necessarily satisfies +(3.6) +P(X = k) = #{σ ∈ Sn : j = ij for n − k indices j} +|Sn| +. +Furthermore, for σ of the form (3.4), the number of times j > ij then corresponds precisely +to the number of disjoint cycles in the representation of σ: iff ik = k, then k is contained +in a cycle with elements no larger than k (each successive row transposition will fix k); so +k is the maximal element in its cycle. (Recall if k is a fixed point of a permutation, then k +comprises its own 1-cycle.) If ik > k, then k belongs to a cycle with a larger element. So +counting the number of times ik = k is then equivalent to counting the number of disjoint +cycles in the disjoint cycle decomposition of σ, since these can be enumerated by using their +maximal elements. +As is established in Subsection 1.4, these then align exactly with the +absolute Stirling numbers of the first kind, |s(n, k)|. +Example 3.4. Consider σ = (5 6)(3 4)(2 4)(1 3) ∈ S6. By default in = n, so i6 = 6 will +be considered as not needing a pivot movement on the nth GE step (this is always vacuously +true since GE completes after n − 1 steps). Here, we have only ik = k for k = 4 and k = 6, so +we should expect σ consists of precisely 2 cycles in its disjoint cycle decomposition, and 4 and +6 are the maximal elements in those two cycles. This is verified by finding the final disjoint +cycle form of σ = (1 4 2 3)(5 6), for which 4 and 6 are the maximal elements of each of the +disjoint cycles. +Remark 3.5. Connecting the above conversation with the form (3.4), one can form a n- +cycle in Sn by requiring ik > k for all k up to n − 1. Moreover, connecting this further to +Corollary 3.3, one can uniformly sample n-cycles by sampling ik ∼ Uniform{k + 1, . . . , n} for +k = 1, 2, . . . , n − 1. Let +(3.7) +Pn -cycles +n += {Pσ : σ is a n-cycle in Sn} +denote the subset of permutation matrices Pn that correspond to the n-cycles. If the cor- +responding GEPP permutation matrix factor is in Pn -cycles +n +for a n × n matrix A, then ev- +ery GE step required a pivot movement for A. +Moreover, if ik ∼ Uniform{k + 1, . . . , n} +for each k is used to generate the corresponding n-cycle σ = (n − 1 in−1) · · · (1 i1), then +Pσ ∼ Uniform(Pn -cycles +n +). +3.1. Proof of (I) of Theorem 2.1. Now we have the sufficient tools to establish: +12This is equivalent to the statement P = Pσ for σ ∼ Uniform(Sn). + +16 +J. PECA-MEDLIN +Theorem 2.1: (I) If A is a n × n random matrix with independent columns +whose first n − 1 columns have continuous iid entries, then P ∼ Uniform(Pn) +for PA = LU the GEPP factorization of A for n ≥ 2. Moreover, the number +of GEPP pivot movements needed for A is equal in distribution to n − Υn. +Proof. Suppose A satisfies the (I) hypothesis, and let P be the associated GEPP permu- +tation matrix factor for A. +We will prove P ∼ Uniform(Pn) using induction on n ≥ 2. +Suppose n = 2, so the first column of A has continuous iid entries A11 and A21. +Us- +ing GEPP, a pivot will be needed only if |A21| > |A11|, but P(|A11| > |A21|) = +1 +2 since +A11 ∼ A21 (and P(|A11| = |A21|) = 0 since these are continuous random variables). Hence, +P = P ζ +(1 2) ∼ Haar(P2) for ζ ∼ Bernoulli(1 +2). +Now assume the result holds for any random matrix of dimension n − 1 with independent +columns whose first n − 2 columns have continuous iid entries. +Let A be the dimension +n matrix satisfying the statement. Using GEPP on A, for the first pivot search using the +leading column of A = A(1), we have +(3.8) +P(max(|A11|, |A21|, . . . , |An1|) = |A11|) = P(max(|A11|, |A21|, . . . , |An1|) = |Ak1|) +for each k = 1, 2, . . . , n since A11 ∼ Ak1 are continuous iid. +It follows the first GEPP +row transposition is of the form P (1) = Pσ1 for σ1 = (1 i1) for i1 ∼ Uniform{1, 2, . . . , n}, +where i1 = argmaxk |Ak1|. Now applying the GE elimination factor L(1,1) results in A(2) = +(L(1,1))−1P (1)A(1). Moreover, ˜A(1) = P (1)A(1) still satisfies the (I) hypothesis since row per- +mutations preserve each of the column independence and iid properties of A(1). A(2) then has +entries of the form +(3.9) +A(2) +ij = ˜Aij − ˜A1j · L(1) +i1 = ˜Aij − ˜A1j · +˜Ai1 +˜A11 +. +for i, j ≥ 2. In particular, since the columns are independent and have continuous iid entries, +then L(1) +i1 +is independent of ˜Aij for each i when j ≥ 2, while ˜A1j · L(1) +i1 +is independent of +˜Aij for each i ≥ 2, so that B = A(2) +2:n,2:n also satisfies the (I) hypothesis. +Now we can +apply the inductive hypothesis to B to yield a GEPP factorization PB = LU where P ∼ +Uniform(Pn−1). Embedding Pn−1 into Pn using the map Q �→ 1 ⊕ Q yields then the resulting +GEPP permutation matrix factor +(3.10) +Pσ = (1 ⊕ P)P (1) +for A. Moreover, since P ∼ Uniform(Pn−1), then 1 ⊕ P = Pρ for ρ ∼ Uniform(Sn−1)13 while +P (1) = Pσ1 for σ1 ∼ Uniform{(1 j) : j = 1, 2, . . . , n}, so that by the Subgroup algorithm +we have σ = ρσ1 ∼ Uniform(Sn). It follows Pσ ∼ Uniform(Pn). This establishes the first +statement part of (I) from Theorem 2.1. +Now suppose X is the number of pivot movements needed using GEPP on A. The prior +13Now associating Sn−1 with the isomorphic subgroup of Sn that fixes 1. + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +17 +conversation up to (3.6) establishes the correspondence +P(X = n − k) = #{σ ∈ Sn : j = ij for k indices j} +n! += #{σ ∈ Sn : σ has k cycles in its disjoint cycle decomposition} +n! += |s(n, k)| +n! += P(Υn = k) +for k = 1, 2, . . . , n, which yields the desired result n − X ∼ Υn. +4. Butterfly permutations. Using the Kronecker product factorization for B(θ) ∈ Bs(N) +(where N = 2n) along with the mixed-product property, then matrix factorizations of each +Kronecker component yield the matrix factorization of the resulting butterfly matrix. This was +used in [17] to yield both the eigenvalue (Schur) decomposition as well as the LU factorizations +of scalar simple butterfly matrices, Bs(N). For completeness, we will restate this latter result: +Proposition 4.1 ([17]). +Let B = B(θ) ∈ Bs(N). +(I) If cos θi ̸= 0 for all i, then B has the GENP factorization B = LθUθ where Lθ = +�n +j=1 Lθn−j+1 and Uθ = �n +j=1 Uθn−j+1 for +(4.1) +Lθ = +� +1 +0 +− tan θ +1 +� +and +Uθ = +�cos θ +sin θ +0 +sec θ +� +. +(II) Using θ ∈ [0, 2π)n, let +(4.2) +ej = +� 1 +if | tan θj| ≤ 1, +0 +if | tan θj| > 1 +for each j. Let θ′ ∈ [0, 2π)n be such that θ′ +j = π +2 ej + (−1)ejθj = θjej + ( π +2 − θj)(1 − ej) +for each j. If | tan θj| ̸= 1 for any j, then the GEPP factorization of B is PB = LU where +P = Pθ = �n +j=1 Pθn−j+1, L = Lθ′, and U = Uθ′Dθ for +(4.3) +Pθ = P ej +(1 2) +and +Dθ = (−1)1−ej ⊕ 1. +Moreover, (PB)(k) = B(θ′)(k)Dθ for all k where B(θ′) ∈ Bs(N). +In particular, P ∈ P(B) +N +(cf. (1.28)) for PB = LU the GEPP factorization of B ∈ Bs(N). +Note if θ ∼ Uniform([0, 2π)) then P(| tan θ| ≤ 1) = 1 +2, so the resulting GEPP permutation +matrix factor Pθ for B(θ) ∼ Bs(N, ΣS), a Haar-butterfly matrix, then satisfies +(4.4) +P(Pθ = Q) = 2−n = 1 +N = +1 +|P(B) +N | +for each Q ∈ P(B) +N +(using also Propositions 1.2 and 4.1). This establishes the first part of (II) +from Theorem 2.1: + +18 +J. PECA-MEDLIN +Corollary 4.2. If B ∼ Bs(N, ΣS), then P ∼ Uniform(P(B) +N ) for the GEPP factorization +PB = LU. +Next, we can connect the resulting GEPP permutation matrix factors for Haar-butterfly +matrices to the corresponding number of total pivot movements needed. +This can be ac- +complished by finding the associated permutation σ ∈ Sn written in the form (3.4) for the +corresponding butterfly permutation. +Proposition 4.3. If n = 1, P(B) +2 += P2. For n > 1, then Pσ ∈ P(B) +2N where σ ∈ S2N written +in the form (3.4) is one of four options: either σ = 1 if Pσ = I2 ⊗ IN or σ ̸= 1 is the product +of N disjoint transpositions, where σ = (N 2N) · · · (2 N + 2)(1 N + 1) if Pσ = P(1 2) ⊗ IN, or +(4.5) +σ = (a1 + N a2 + N) · · · (aN−1 + N aN + N)(a1 a2) · · · (aN−1 aN) +if Pσ = I2 ⊗ Pρ, or +σ = (a2 a1 + N)(a1 a2 + N) · · · (aN aN−1 + N)(aN−1 aN + N) +if Pσ = P(1 2) ⊗ Pρ, +where Pρ ∈ P(B) +N +with ρ = (a1 a2) · · · (aN−1 aN) ∈ SN in the form (3.4) such that a2k−1 < a2k +for each k unless ρ = 1 and a2k−1 > a2k+1 for each k when n > 2. +Proof. We will use induction on n = log2 N along with the fact P(B) +2N = P(B) +2 +⊗ P(B) +N . For +n = 2, starting with P(B) +2 += P2 = {I2, P(1 2)} we have +P(B) +4 += P2 ⊗ P2 = {I2 ⊗ I2, P(1 2) ⊗ I2, I2 ⊗ P(1 2), P(1 2) ⊗ P(1 2)} +(4.6) += {I4, P(2 4)(1 3), P(3 4)(1 2), P(2 3)(1 4)}. +(4.7) +The corresponding permutations as written above then all satisfy the form (3.4), where we +abstain from including the trivial permutations (ik k) when ik = k. Moreover, writing each +associated non-trivial permutation can be written as the product of N = 2 disjoint transposi- +tions of the form (a1 a2)(a3 a4), which then have a1 > a3 and a2k−1 < a2k for k = 1, 2. (Note +the (distinct) transpositions used must necessarily be disjoint since necessarily P 2 +σ = Pσ2 = I.) +Assume the result holds for n. The n+1 case follows by just reading off the corresponding +permutations I2 ⊗ Pρ and P(1 2) ⊗ Pρ for ρ = (a1 a2) · · · (aN−1 aN) such that Pρ ∈ P(B) +N +(for +ρ already in form (3.4)). For ρ = 1, then P1 = IN yields I2 ⊗ IN = I2N and P(1 2) ⊗ IN = +P(N 2N)···(2 N+2)(1 N+1); if Pρ ∈ P(B) +N +for ρ = (a1 a2) · · · (aN−1 aN) ∈ SN where a2k+1 < +a2k−1 < a2k for each k, then +(4.8) +Pσ = I2 ⊗ Pρ = P(a1+N a2+N)···(aN−1+N aN+N)(a1 a2)···(aN−1 aN) +and +Pσ = P(1 2) ⊗ Pρ = P(a2 a1+N)(a1 a2+N)···(aN aN−1+N)(aN−1 aN+N). +Moreover, each associated permutation σ in the form (3.4) then is either the trivial per- +mutation or is the product of N disjoint transpositions and can be written in the form +(b1 b2) · · · (b2N−1 b2N) where b2k+1 < b2k−1 < b2k for each k. This holds directly by con- +struction for the associated permutations for I2 ⊗ IN, P(1 2) ⊗ IN and I2 ⊗ Pρ, which follows +since ak ≤ N along with a2k+1 < a2k−1 < a2k for all k. It remains to show σ can be written +in this form when Pσ = P(1 2) ⊗ Pρ. +By (4.8), σ = (a2 a1 + N)(a1 a2 + N) · · · (aN aN−1 + N)(aN−1 aN + N). Note this is the +product of N disjoint transpositions again since ak ≤ N and ai ̸= aj for all i ̸= j. Moreover, + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +19 +since the aj are distinct, we can label b2k−1 = a(N−k+1) for k = 1, 2, . . . , N using the ordered +statistics subscript (so a(1) < a(2) < · · · < a(N)), with then b2k = ρ(a(N−k+1)) + N. We can +then further write σ = (b1 b2) · · · (b2N−1 b2N) since disjoint cycles commute, for which it then +follows also b2k+1 < b2k−1 < b2k for each k. +Example 4.4. The corresponding permutations are {1, (1 2)} = S2 for P(B) +2 +, {1, (2 4)(1 3), +(3 4)(1 2), (2 3)(1 4)} for P(B) +4 +, and +(4.9) +� +� +� +� +� +� +� +1, (4 8)(3 7)(2 6)(1 5), +(6 8)(5 7)(2 4)(1 3), (4 6)(3 5)(2 8)(1 7), +(7 8)(5 6)(3 4)(1 2), (4 7)(3 8)(2 5)(1 6), +(6 7)(5 8)(2 3)(1 4), (4 5)(3 6)(2 7)(1 8) +� +� +� +� +� +� +� +for P(B) +8 +. +Remark 4.5. If no pivot movements are needed on the first GE step, then no pivot move- +ments will be needed at any GE step (using (3.4) and Proposition 4.3). +Furthermore, it +follows inductively that half the time all of the pivot movements occur in the first N/2 steps; +a quarter of the time all of the pivot movements occur as the first N/4 steps of each N/2 +partitioning; an eighth of the time all of the pivots occur at the first N/8 steps of each N/4 +partitioning; and so on, where 2−k of the time the pivots occur at each step in the first half +of each N21−k partitioning of the GE steps, which stops with exactly one permutation (i.e., +2−n = +1 +N of the time) does pivoting occur at precisely every other GE step. The remaining +permutation accounts for no pivoting ever occurring when Pθ = I. This yields a Cantor set- +like decomposition of [n] into the possible configuration of locations of where the pivots can +occur using GEPP. To find out which configuration will be used on a particular simple scalar +butterfly matrix (i.e., the exact pivoting locations one will encounter), this is determined by +the first step where k = ik. +For example, using the associated permutations from P(B) +8 +from Example 4.4, we see +4 permutations have pivot movements only at the first half of the total GE steps (i.e., +(4 8)(3 7)(2 6), (1 5), (4 6)(3 5)(2 8)(1 7), (4 7)(3 8)(2 5)(1 6), and (4 5)(3 6)(2 7)(1 8) +each yield pivot movements at GE steps 1 through 4); 2 permutations have pivot movements +only at the first half of each half partitioning of the total GE steps (i.e, (6 8)(5 7)(2 4)(1 3) +and (6 7)(5 8)(2 3)(1 4) yield pivot movements only at steps 1,2 and 5,6); 1 partition has +pivot movements at every other GE step (i.e., (7 8)(5 6)(3 4)(1 2) yields pivot movements +only at steps 1,3,5,7); with only one permutation (the trivial permutation) having no GE pivot +movements. +Moreover, applying GEPP to Haar-butterfly matrices, where then each butterfly permuta- +tion occurs with equal probability, then induces a probability measure on these configurations. +Figure 1 shows the possible GEPP pivot movement locations associated with Haar-butterfly +permutations of size N = 28, along with the probability for each particular configuration. +4.1. Proof of (II) of Theorem 2.1. Now we have the sufficient tools to establish: +Theorem 2.1: (II) If B ∼ Bs(N, ΣS), then P ∼ Uniform(P(B) +N ) for PB = LU +the GEPP factorization. +Moreover, the number of GEPP pivot movements +needed for B is equal in distribution to N +2 Bernoulli +� +1 − 1 +N +� +. + +20 +J. PECA-MEDLIN +0 +50 +100 +150 +200 +250 +2-8 +2-8 +2-7 +2-6 +2-5 +2-4 +2-3 +2-2 +2-1 +Figure 1: GEPP pivot movement configurations for Haar-butterfly permutations for N = 28 +and their associated probabilities, pk, with the exact pivot movement locations indicated by +blue +Proof. Corollary 4.2 yields directly that applying GEPP to a Haar-butterfly matrix results +in a uniform butterfly permutation matrix factor, which is the first part of (II). Moreover, +using the associated permutations from GEPP in the form (3.4) to then be able to read off +explicitly which GE steps need pivot movements, then we have by Proposition 4.3 that ik > k +precisely for N/2 indices k for each non-trivial case and for precisely 0 times in the trivial +case. It follows then if Y is the number of pivot movements needed when using GEPP on +B(θ) ∼ Bs(N, ΣS), then since Pθ ∼ Uniform(P(B) +N ) we have +P(Y = 0) = P(Pθ = IN) = 2−n = 1 +N , and +(4.10) +P +� +Y = N +2 +� += P(Pθ ̸= IN) = 1 − P(Pθ = IN) = 1 − 1 +N . +(4.11) +Hence, Y ∼ N +2 Bernoulli(1 − 1 +N ). +5. Random ensembles PLmax +n +(ξ), PLn(ξ), PLmax +n +(ξ, α) and PLn(ξ, α). Using the +prior discussions, we can build a random ensemble of matrices that require a maximal number +of GEPP pivot movements. As mentioned in Remark 3.5, a maximal number of GEPP pivot +movements occurs when the corresponding permutation matrix factor P ∈ Pn -cycles +n +. Using + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +21 +this, we can define +(5.1) +PLmax +n +(ξ) = {PL : P ∼ Uniform(Pn -cycles +n +), L ∈ Ln independent of P, Lij ∼ ξ iid for i > j}. +Recall, by construction, the corresponding GEPP lower triangular matrix factor L satisfies +∥L∥max = 1. In particular, |Lij| ≤ 1 for all i > j. Moreover, Theorem 1.1 yields the L factor is +invariant under row permutations if |Lij| < 1 for all i > j. Hence, if A = PLU where U ∈ Un +and PL ∼ PLn(ξ) for any distribution ξ with |ξ| < 1, then A will always require n − 1 GEPP +pivot movements. Similar ensembles can be constructed where the P factor is restricted to +particular pivot configurations. +We will also study the more general model +(5.2) +PLn(ξ) = {PL : P ∼ Uniform(Pn), L ∈ Ln independent of P, Lij ∼ ξ iid for i > j}. +When |ξ| < 1, then A = PLU for PL ∼ PLn(ξ) and U ∈ Un corresponds to the GEPP LU +factorization of A. +Remark 5.1. Two natural distributions to consider are ξ ∼ Uniform([−1, 1]) and ξ ∼ +Uniform(D). +Using GEPP on GLn(F), the left-coset representatives of Un(F) in GLn(F), +GLn(F)/Un(F), are precisely of the form PL for P ∈ Pn and L ∈ Ln where |Lij| ≤ 1 for all i > +j. Hence, PLn(ξ) then corresponds to uniformly sampled representatives of GLn(R)/Un(R) +when ξ ∼ Uniform([−1, 1]) and uniformly sampled representatives of GLn(C)/Un(C) when +ξ ∼ Uniform(D). +5.1. Eigenvalues of PLmax +n +(ξ) and PLn(ξ). Suppose PL ∼ PLmax +n +(ξ). Since L ∈ Ln, +then its eigenvalues are exactly 1 with multiplicity n. Since P ∈ Pn -cycles +n +, then its eigenvalues +are exactly the nth roots of unity, e2πi/n. The spectral pictures for each P and L separately +fall exactly on ∂D, and these are deterministic despite each matrix being random. +So a natural next question is what does the spectral picture look like for their product, PL? +The eigenvalues no longer stay on ∂D, but they appear to remain asymptotically concentrated +inside D when scaled by +� +nσ2/2 when Eξ = 0 (i.e., ξ is centered) and σ2 = E|ξ|2 is the variance +of ξ. Figure 2 shows the (computed) eigenvalue locations for PLmax +n +(ξ) scaled by +� +nσ2/2 +using n = 214 = 16, 384 and ξ sampled from Uniform([−1, 1]), Uniform(D), Rademacher and +N(0, 1). Noticeably, Figure 2 further suggests a universality result for this limiting behavior. +Recall the empirical spectral distribution (ESD) of a n × n matrix A is the probability +measure +(5.3) +µA = 1 +n +n +� +k=1 +δλk(A), +which gives equal weight to the location of each eigenvalue of A. Note if A is a random matrix, +then µA is a random probability measure. +Empirically, Figure 2 then suggests µA is converging to a probability measure on D that is +an interpolation between the uniform measure on D and the Dirac measure at the origin when +A = PL/ +� +nσ2/2 for PL ∼ PLn(ξ) with ξ having 0 mean and finite variance. Although the +eigenvalues of A have a higher density near the origin, they can never include the origin since +PL is nonsingular. + +22 +J. PECA-MEDLIN +(a) ξ ∼ Uniform([−1, 1]) +(b) ξ ∼ Uniform(D) +(c) ξ ∼ Rademacher +(d) ξ ∼ N(0, 1) +Figure 2: Computed eigenvalues (in blue) for PL/ +� +nσ2/2 where n = 214 = 16, 384 and +PL ∼ PLmax +n +(ξ) for (a) ξ ∼ Uniform([−1, 1]) where σ2 = +1 +3, (b) ξ ∼ Uniform(D) where +σ2 = 1 +2, (c) ξ ∼ Rademacher where σ2 = 1, and (d) ξ ∼ N(0, 1) where σ2 = 1, mapped +against the unit complex circle ∂D (in red) +The pictures are indistinguishable to Figure 2 when instead using PLn(ξ), where P ∼ +Uniform(Pn) instead of P ∼ Uniform(Pn -cycles +n +). In both cases, the ESD of P limit to the +uniform measure on ∂D in probability in the weak star sense [8]. +However, replacing P +with another random matrix from an ensemble whose ESDs similarly limit to the uniform +measure on ∂D (e.g., using Haar sampling for O(n), U(n), or Bs(n) [8, 23]) yield different +spectral pictures that extend beyond D when still using the scaling +� +nσ2/2. This points to +the significance of the divisor of 2 in the above scaling, which corresponds to the density of + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +23 +the L factor of 1 +2; for example, UL has full density when U ∼ Haar(O(n)) or U ∼ Bs(N, ΣS). +Since multiplication by permutation matrices preserves density, one might expect the +same scaling when uniformly sampling permutation matrices versus corresponding n-cycle +permutation matrices. Both should adequately mix up the rows of L so that the eigenvalues +move away from 1. However, preserving density is not sufficient on its own, as can be seen if +using a diagonal matrix D, since then DL will only have eigenvalues located at the diagonal +entries of D (since L is unipotent lower triangular). A future area of research can study a +more general random ensemble that could replace P in PL ∼ PLn(ξ) with another random +matrix that sufficiently randomizes the rows of L without changing the sparsity of L. +5.2. Fixed sparsity random ensembles PLmax +n +(ξ, α) and PLn(ξ, α). We can similarly +study random ensembles with (approximately) fixed sparsity. Let the sparsity of a matrix +A be determined by α = α(A), the ratio of the number of nonzero entries of A to the total +number of entries of A. If α = 1, then A has full density, and if α = 0 then A is the zero +matrix. A full lower triangular matrix has density given by α = +�n+1 +2 +� +/n2 = 1 +2(1 + 1 +n) ≈ 1 +2 for +large n. We can then construct a matrix with fixed (approximate) sparsity by zeroing out all +entries above a specific diagonal. For a n × n matrix that has zero entries only above a set +diagonal k ∈ [−n, n] with entries at indices (i, i + k) (where k = 0 is the main diagonal, k > 0 +is the super diagonal, and k < 0 are the sub diagonals), one can determine the sparsity by +computing: +(5.4) +gn(k) = 1 +n2 +�1 +2(n + k)(n + k + 1) − k(k + 1) · 1(k > 0) +� +. +This is the ratio of nonzero entries to the total number of matrix entries for a matrix that +is zero above and full at or below the kth diagonal; the triangular numbers naturally show +up for the numerator. Note gn(k) is a quadratic polynomial in k for fixed n, so gn(k) can be +extended to include non-integral k. In particular, one could uniquely solve for +(5.5) +kα ∈ [−n, n] +such that +gn(kα) = α. +Using this, we can introduce another random ensemble +(5.6) +PLn(ξ, α) = +� +PL : P ∼ Uniform(Pn), L independent of P, Lij = 0 +if i + ⌊kα⌋ ≤ j, +Lij ∼ ξ iid +if i + ⌊kα⌋ > j +� +We can similarly define PLmax +n +(ξ, α) by requiring P ∼ Uniform(Pn -cycles +n +) (as well as other +ensembles with fixed pivot configurations). Note if PL ∼ PLn(ξ, 1 +2) then P(L+In) ∼ PLn(ξ). +Known results for asymptotic limiting behavior of ESDs to probability measures on D +include the famous Circular law introduced by Bai in [2] and proven with a fourth moment +condition by Tao and Vu [21]. +Theorem 5.2 (Circular law [21]). +Let A be a n × n matrix with iid entries sampled from +ξ where Eξ = 0, σ2 = E|ξ|2 and E|ξ|4 < ∞. Then µA/ +√ +nσ2 converges weakly to the uniform +measure on D in probability and almost surely. + +24 +J. PECA-MEDLIN +Theorem 5.2 yields the asymptotic spectral picture for PLn(ξ, 1) when ξ is centered with +finite fourth moment. Figure 3a shows the map of the computed eigenvalues PLn(N(0, 1), 1) ∼ +Gin(n, n) for n = 214, while Figure 3b plots n random sample points from Uniform(D). +Comparing this to the Ginibre picture (i.e., Figure 3a) also exemplifies how the asymptotic +result does not hold for fixed n. The Ginibre picture has repulsions between its eigenvalues +that lead to points being similarly spaced, while the asymptotic endpoint (i.e., Figure 3b) has +Poisson clumping. +(a) ξ ∼ N(0, 1), α = 1 +(b) n = 214 iid samples from Uniform(D) +(c) ξ ∼ N(0, 1), α = 3 +4 +(d) ξ ∼ N(0, 1), α = 1 +4 +Figure 3: Computed eigenvalues (in blue) for PL/ +√ +αnσ2 where n = 214 = 16, 384 and +PL ∼ PLn(ξ, α) for ξ ∼ N(0, 1) (where σ2 = 1) and (a) α = 1, (c) α = 3/4, and (d) α = 1/4, +along with (b) n iid samples from Uniform(D), mapped against the unit complex circle ∂D +(in red) + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +25 +Using A ∼ PLn(ξ, α) for fixed α ∈ (0, 1] and ξ ∼ N(0, 1), empirical data suggest a similar +asymptotic result for the ESD of A/ +√ +αnσ2. Note the scaling matches that of Theorem 5.2 +where α = 1 as well as that seen in Figure 2 where α = 1 +2. In particular, following the trajec- +tory for α = 1 in Figure 3a, α = 3 +4 in Figure 3d, α = 1 +2 in Figure 2 (recall P ∼ Uniform(Pn) +and P ∼ Uniform(Pn -cycles +n +) empirically result in indistinguishable spectral pictures), and +α = 1 +4 in Figure 3c, suggests the scaling by +√ +αnσ2 have the corresponding ESDs limit to +να, a fixed probability measure with support on D that depends on α (and not on ξ), which +further converge to ν, the uniform measure on D, as α → 1 and converge to δ0, the Dirac +measure at the origin, as α → 0. So the limiting measure is an interpolation between ν and +δ0. +Together, these suggest different universality classes than those included by the Circular +law. Previous studies of sparsity and the Circular law have studied iid ensembles that have +sparsity α = αn converging to 0 slow enough whose ESDs still limit to ν [14, 18]. Other studies +have similarly explored the impact of sparsity on the extreme eigenvalues in the Hermitian +case, which has ESDs limiting to the semicircular law [12]. Results in the literature for fixed +sparsity random ensembles remain sparse. The above discussion provides supporting evidence +for the following conjecture: +Conjecture 5.3. Fix α ∈ (0, 1]. Let A = PLQ be the n × n matrix, where P and Q are iid +uniformly chosen permutation matrices and L is a n×n random matrix independent of P and +Q whose nonzero entries are iid from ξ with Eξ = 0, E|ξ| = σ2 and E|ξ|4 < ∞, where Lij = 0 +if i + ⌊kα⌋ < j. Then there exists a probability measure, να, on D that is an interpolation +between the uniform measure on D, ν, and the Dirac measure at the origin, δ0, such that +µAn/ +√ +αnσ2 converges weakly to να in probability and almost surely. Furthermore, να → ν as +α → 1 and να → δ0 as α → 0, with both convergences holding uniformly with respect to the +total variation distance. +Remark 5.4. For α = 1, this is the circular law. +Remark 5.5. Note the right permutation matrix Q term is irrelevant, since A is similar +to QPL, and QP ∼ P since the uniform measure on Sn is left- and right-invariant (it is the +Haar measure on Pn). So the study of the above ensembles reduces to the ensembles of the +form PLn(ξ, α) for centered ξ with finite fourth moments. +Remark 5.6. Additional random ensembles that can be studied in light of Conjecture 5.3 +include perturbations of PLn(ξ, α) for deterministic matrices (similar to those studied in +[14, 21]), as well as P(L + In) for PL ∼ PLn(ξ, α). This latter model is interesting when +α ≤ 1 +2 since the corresponding L factor has eigenvalues of 0 with multiplicity n; in particular, +L and hence PL does not have full rank. Using experiments for several fixed α < 1 +2, then +the nullity of PL ∼ PLn(N(0, 1), α) appears to be approximately (1 − +√ +2α)n, while 0 is an +eigenvalue of multiplicity approximately (1−2α)n; when α ≥ 1 +2, both are 0 (a.s.). Conversely, +now considering A = P(L + In), then 0 is never an eigenvalue for A and so A is always full +rank for all α. +6. Numerical experiments. The final section will focus on a set of experiments that will +study the number of GEPP pivot movements needed on particular random linear systems. +These experiments will expand on results first presented in [17], which studied the impact on + +26 +J. PECA-MEDLIN +the growth factors and relative error computations when using common random transforma- +tions from numerical linear algebra on particular fixed linear systems, Ax = b. Both initial +models represent scenarios when no GEPP pivot movements are needed, so we will refer to +both here as min-movement models. Carrying forward the naming scheme from [17], the two +linear systems studied include: +1. the min-movement (na¨ıve) model14, with A = In where ρ(In) = 1 is minimized, and +2. the min-movement (worst-case) model15, with A = An a particular linear model that +maximizes the growth factor ρ(An) = 2n−1. +In the na¨ıve model, the authors studied the 1-sided random transformation ΩI = Ω, which +provides a means to directly study the corresponding random matrix, Ω, itself. The worst-case +model considered the 2-sided random transformations, UAnV ∗, where U, V were independently +sampled random matrices; this 2-sided transformation follows the construction used by Parker +that would remove the need for pivoting in GEPP (with high probability), so that UAnV ∗ = +LU has a GE factorization [16]. The matrix An is of the form +(6.1) +An = In − +� +i>j +Eij + +n−1 +� +j=1 +Ein. +Wilkinson introduced An to establish the growth factor bound ρ(A) ≤ 2n−1 is sharp [26]. By +construction, no GEPP pivoting would be needed at any intermediate GE step when using +An, so the final GENP and GEPP factorizations of An both align, with An = LnUn for +Ln = In − � +i>j Eij and Un = In − Enn + �n +k=1 2k−1Ekn. It follows ρ(An) = |Unn| = 2n−1. +For example, +(6.2) +A4 = +� +��� +1 +0 +0 +1 +−1 +1 +0 +1 +−1 +−1 +1 +1 +−1 +−1 +−1 +1 +� +��� = +� +��� +1 +0 +0 +0 +−1 +1 +0 +0 +−1 +−1 +1 +0 +−1 +−1 +−1 +1 +� +��� +� +��� +1 +0 +0 +1 +0 +1 +0 +2 +0 +0 +1 +4 +0 +0 +0 +8 +� +��� = L4U4 +has ρ(A4) = 8 = 23. +With respect to GEPP, both the na¨ıve and worst-case models use input matrices that +need 0 total pivot movements. We will study both of these min-movement models in addition +to a third model, that looks at the other extreme in terms of the number of GEPP pivot +movements: +3. the max-movement model, where A ∼ PLmax +n +(ξ) for ξ ∼ Uniform([−1, 1]). +Note if A = PL ∼ PLmax +n +(ξ) when |ξ| < 1 a.s., then ρ(A) = ρ(L) = 1. +We will consider only the 1-sided transformation case for the na¨ıve model (so that we +can study the random matrices themselves) and only the 2-sided transformation cases for the +worst-case and max-movement models. Together, these three models will allow us to study the +14The na¨ıve model was named to reflect that using any method is unnecessary to solve the trivial linear +system Ix = x = b. +15The worst-case moniker was chosen to reflect the numerical stability of computed solutions using GEPP, +which is controlled by the growth factors: solving Anx = b sees relative errors of order O(1) starting when +n ≈ 60. + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +27 +impact of random transformations on two different systems where no GEPP pivot movements +are needed as well as one (independently sampled random) system where a maximal number +of GEPP pivot movements are needed. +For each set of experiments, we will consider the following random transformations for +fixed N = 2n: +• Bs(N, ΣS) +• B(N, ΣS) +• Bs(N, ΣD) +• B(N, ΣD) +• Walsh transform +• Haar(O(N)) +• Discrete Cosine Transform (DCT II) +To ease the following discussion, we choose N = 24 = 16 and N = 28 = 256 to focus on as we +feel they are representative of the behavior we saw for other choices of N. For the na¨ıve model, +which will study the pivot movements for each of the associated random matrices themselves +(using the 1-sided preconditioning with A = I), our experiments will additionally use: +• GOE(N) +• GUE(N) +• Bernoulli(1 +2) +These models were touched on for N = 2 in Examples 2.3 to 2.5. +Each of the butterfly models is sampled using custom MATLAB recursive functions with +iid uniformly chosen angles16 in line with methods outlined in [17, 23]. See Subsection 1.2 for +more information and sampling techniques of the Walsh, Haar orthogonal, DCT, GOE(N) +and GUE(N) transformations. The Bernoulli ensemble uses iid Bernoulli(1 +2) entries17. Each +set of experiments (using N = 24 and N = 28 for all three models) will use 10,000 trials using +MATLAB in double precision, where ϵ = 2−52 (ϵ ≈ 2.220446 · 10−16). +6.1. Min-movement (na¨ıve) model. For the na¨ıve model, our goal is to study the number +of GEPP pivot movements needed for 10 different random ensembles. +These allow us to +gauge the impact on (1-sided) random transformations on the simplest linear system, Ix = +b, in terms of the number of GEPP pivot movements needed. +Starting with I, no pivot +movements are needed, so the transformed system ΩI = Ω then allows us to study how much +this transformation introduces new pivot movements. This model also then enables us to +directly study the number of pivot movements needed for each random matrix, Ω. +Table 1 shows the sample medians, means (¯x), and standard deviations (s) for the 10,000 +trials each for N = 24 and N = 28, while Figure 4 summarizes the total number of GEPP +pivot movements encountered for each sampled random matrix across each set of trials. Note +the axes in Figure 4 show each possible step output for 0 to N − 1. +16The number of angles used depends on if the cosine and sine matrices are scalar and if the butterfly matrix +is simple. For Bs(N, ΣS), then one uniform angle is sampled at each recursive step, for n = log2 N total uniform +angles needed, while similarly B(N, ΣS) and Bs(N, ΣD) both sample a total of N − 1 uniform angles, with +B(N, ΣD) using 1 +2Nn total uniform angles. These compare to Haar(O(N)), which (using Givens rotations to +find the QR factorization of Gin(N, N)) can be sampled using +�N +2 +� += 1 +2N(N − 1) uniform angles. The above + +28 +J. PECA-MEDLIN +N = 16 +N = 256 +Median +¯x +s +Median +¯x +s +Bs(N, ΣS) +8 +7.492 +1.951 +128 +127.501 +7.978 +B(N, ΣS) +11 +10.934 +2.622 +232 +230.392 +14.418 +Bs(N, ΣD) +12 +11.287 +2.459 +245 +241.915 +10.308 +B(N, ΣD) +13 +12.535 +1.430 +250 +249.901 +2.112 +Walsh +6 +6 +- +120 +120 +- +Haar(O(N)) +13 +12.624 +1.345 +250 +249.884 +2.123 +DCT II +13 +13 +- +249 +249 +- +GOE(N) +11 +10.954 +1.780 +249 +248.696 +2.359 +GUE(N) +11 +11.132 +1.761 +249 +248.867 +2.348 +Bernoulli +11 +10.509 +1.774 +248 +247.783 +2.467 +Table 1: Pivot counts for numerical experiments for GEPP with 10,000 trials, for random +matrices of orders N = 24 and N = 28 +0 +5 +10 +15 +0 +50 +100 +150 +200 +250 +Figure 4: Histogram of 104 samples of pivot movement counts for random matrices of order +N = 24 and N = 28. +ordering reflects this ordering of complexity. +17Bernoulli matrices are sampled using native MATLAB functions, round(rand(n)). + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +29 +6.1.1. Discussion. For each set of experiments, the Haar-butterfly and Walsh transforms +introduce the least amount of additional movement from the initial minimal GEPP movement +setup, each with total pivot movements at most N/2 while the remaining models had total +pivot movements closer to the upper bound of N − 1. +By construction, both the Walsh and DCT models have deterministic output. This follows +since the transformations are of the form WD where W is a deterministic associated matrix +(the default Fast-Walsh Hadamard matrix or the DCT matrix used by the native MATLAB +functions for the associated multiplication operators) while D is a random row sign matrix +sampled uniformly from {±1}N. Hence, if the GEPP factorization of W is PW = LU, then +the GEPP factorization of WD is PWD = L(UD). So the permutation matrix factor is +independent of D for these models. +This is reflected in Figure 4 and Table 1 (e.g., both +sample standard deviations are 0). +The two Haar random ensembles studied (viz., Bs(N, ΣS) and Haar(O(N))) have the full +distribution on the number of GEPP pivot movements determined by Theorem 2.1, using also +Corollary 2.7. From Figure 4, these two models also appear to represent relative extreme +models among the random ensembles considered in these trials, with the resulting uniform +GEPP permutation matrix factor yielding the most pivot movements. +For Haar-butterfly matrices, we can directly compare the sample statistics against the +exact distribution statistics for YN ∼ N +2 Bernoulli(1 − 1 +N ). We can compute exactly +EYN = N +2 +� +1 − 1 +N +� +and +(6.3) +σYN = N +2 +�� +1 − 1 +N +� +· 1 +N , +(6.4) +This yields that EY16 = 7.5 and σY16 ≈ 1.93649167, which align (as expected) with the +associated sample mean of 7.492 and sample standard deviation of 1.951 from Table 1 for +N = 16. Similarly, the exact values EY256 = 127.5 and σY256 ≈ 7.98435971 align with the +sample statistics ¯x = 127.501 and s = 7.978 for N = 256. +Moreover, as can be seen in +Figure 4, the trials resulted only in total GEPP movements of 0 or N +2 , as should be expected +for a scaled Bernoulli distribution. This agrees with the result from [11] that the computed +GEPP permutation matrix factors using floating-point arithmetic and exact arithmetic align +with very high probability for Gin(n, n). Other standard sample statistic comparisons for the +Haar-butterfly matrices similarly align, as expected18. +Similarly, we can compare the output for the Haar(O(N)) trials, which have XN, the total +GEPP pivot movements needed, equal in distribution to N − ΥN. We can compute exactly +EXN = N − EΥN = N − HN +and +(6.5) +σXN = σΥN = +� +HN − H(2) +N . +(6.6) +18For example, the sample medians exactly match the exact medians of N/2. Also, we can compare the +sample proportion ˆpN to the population success parameter pN = 1 − 1 +N . These again compare very favorably, +where 1 − ˆp16 = 0.0635 aligns with 1 − p16 = +1 +16 = 0.0625 and 1 − ˆp256 = 0.0039 aligns with 1 − p256 = +1 +256 = +0.00390625. + +30 +J. PECA-MEDLIN +This yields that EX16 ≈ 12.619271006771006 and σX16 ≈ 1.340291930806123, which align +with the associated sample mean of 12.624 and sample standard deviation of 1.345 from +Table 1 for N = 16. Similarly, the exact values EX256 ≈ 249.8756550371827 and σX256 ≈ +2.117382706670809 align with the sample statistics ¯x = 249.696 and s = 2.123 for N = 256. +Figure 4 shows the butterfly models pivot movements lie strictly between the pivot move- +ments for Haar-butterfly matrices and Haar(O(N)), with the increase in associated number +of uniform angles needed for the butterfly models leading to the sample distributions progres- +sively moving toward the Haar(O(N)) model for both N = 16 and N = 256. While B(N, ΣD) +results in pivot movements very close to those modeled by the uniform GEPP permutation ma- +trix factors, B(N, ΣS) and Bs(N, ΣD) lie strictly in between both the Haar-butterfly and Haar +orthogonal pivot movements. Moreover, the remaining random models for GOE(N), GUE(N) +and Bernoulli have pivot movement distributions staying to the left of the Haar orthogonal +model, which move closer to the Haar orthogonal model distribution as N increases. This +suggests as N increases for these remaining models, the resulting random GEPP permutation +matrix moves closer to a uniform permutation matrix. +Remark 6.1. For both the Haar-butterfly and Haar orthogonal models, the 1-sided na¨ıve +model is equivalent to the 2-sided na¨ıve model since UINV ∗ = UV ∗ ∼ U by the right- +invariance of the Haar measure. This does not hold, however, for any other random matrices +in the na¨ıve experiments. +Remark 6.2. For the Bernoulli model, it is possible to generate a singular random matrix, +which occurs with probability 2−N(1 + o(1)) [22]. Of the 10,000 trials, this occurred 48 times +for N = 16 and 0 times for N = 256. Table 1 and Figure 4 show the summary statistics +and overall GEPP pivot counts for the remaining 9,952 nonsingular Bernoulli matrices when +N = 16. +6.2. Min-movement (worst-case) model. For the worst-case model, we want to study +the number of GEPP pivot movements needed when starting with a fixed linear system, AN, +that again requires no pivot movements. This provides a means to measure how much new +GEPP pivot movements are generated by these random transformations. For this model, we +will consider only the 2-sided transformation, UANV ∗, where U and V are iid samples from +each random model used in the experiments. +Analogously to the na¨ıve model, Table 2 shows the sample medians, means (¯x), and stan- +dard deviations (s) for the 10,000 trials again for N = 24 and N = 28, while Figure 5 sum- +marizes the total number of GEPP pivot movements encountered for each sampled UANV ∗ +across each set of trials. +6.2.1. Discussion. Only the Haar(O(N)) model for UANV ∗ is sampled from a distri- +bution determined in Theorem 2.1, since Corollary 2.11 yields resulting GEPP permutation +matrix factor is a uniform permutation matrix, so that XN, the number of GEPP pivot move- +ments, is equal in distribution to N −ΥN. Since AN does not preserve the Kronecker product +structure, the Haar-butterfly pivot movement distribution is not preserved. Hence, the num- +ber of GEPP pivot movements is no longer a scaled Bernoulli distribution and now has full +support on 0, 1, . . . , N − 1. +Again, both the Haar-butterfly and Haar orthogonal models provide representatives for + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +31 +N = 16 +N = 256 +Median +¯x +s +Median +¯x +s +Bs(N, ΣS) +11 +10.563 +2.380 +179 +181.784 +27.493 +B(N, ΣS) +12 +12.217 +1.760 +249 +247.936 +4.322 +Bs(N, ΣD) +12 +11.967 +1.995 +249 +247.493 +5.521 +B(N, ΣD) +13 +12.558 +1.406 +250 +249.876 +2.090 +Walsh +12 +12.245 +1.617 +250 +249.654 +2.253 +Haar(O(N)) +13 +12.636 +1.335 +250 +249.900 +2.129 +DCT II +12 +11.820 +1.719 +250 +249.447 +2.313 +Table 2: Pivot counts for numerical experiments for GEPP with 10,000 trials, for 2-sided +transformation of Worst-case model of orders N = 24 and N = 28 +0 +5 +10 +15 +0 +50 +100 +150 +200 +250 +Figure 5: Histogram of 104 samples of pivot movement counts for 2-sided random transfor- +mations of order N = 24 and N = 28 worst-case model, UANV ∗. +the extremes in the number of pivot movements introduced by these random transformations. +As in the na¨ıve model, the Haar-butterfly transformation introduced the least amount of new +GEPP pivot movements for the initial minimal GEPP pivot movement model AN. +Of the remaining models, only B(N, ΣS) and Bs(N, ΣD) have resulting distributions that +do not appear to align with the Haar orthogonal model, although they both appear much +closer to the Haar orthogonal than Haar-butterfly models. +The remaining models’ align- + +32 +J. PECA-MEDLIN +ment with the Haar orthogonal models manifests even for the small N = 16 experiments for +B(N, ΣD) and the Walsh transform: the exact values EX16 ≈ 12.619271006771006 and σX16 ≈ +1.340291930806123 compare to the remaining respective samples means of 12.558 and 12.245 +and sample standard deviations of 1.406 and 1.617 for the B(N, ΣD) and Walsh models. This +alignment is even more pronounced for N = 256: the exact values EX256 ≈ 249.8756550371827 +and σX256 ≈ 2.117382706670809 line up very well for B(N, ΣD), Walsh, and DCT II models, +whose sample means range from 249.447 to 249.876 and whose sample standard deviations +range from 2.090 to 2.313. Moreover, the remaining models have sample medians each of +250 that exactly match that for the Haar orthogonal model for N = 256, while the sample +medians match or are smaller by one than the true Haar orthogonal sample median of 13 for +N = 16. Again, these suggest performance for the non-butterfly models moving toward the +uniform row permutations as N increases. +6.3. Max-movement model. While the min-movement models studied the impact of +random transformations on the number of pivot movements introduced to initial models that +require no GEPP pivot movements, the max-movement model will instead study the impact +of the random transformations on a model that has maximal GEPP pivot movements, PL ∼ +PLmax +N +(ξ) for ξ ∼ Uniform([−1, 1]). (Unlike the min-movements models, the input matrix +PL is random.) This provides a means to measure how much GEPP pivot movement can +be removed by these random transformations. As in the worst-case model, we will consider +only the 2-sided transformation, UPLV ∗, where U and V are iid samples from each random +model. +Table 3 shows the sample medians, means (¯x), and standard deviations (s) for the 10,000 +trials each for N = 24 and N = 28, while Figure 6 summarizes the total number of GEPP +pivot movements encountered for each sampled matrix UPLV ∗. +N = 16 +N = 256 +Median +¯x +s +Median +¯x +s +Bs(N, ΣS) +13 +12.580 +1.348 +250 +249.864 +2.126 +B(N, ΣS) +13 +12.594 +1.369 +250 +249.899 +2.090 +Bs(N, ΣD) +13 +12.613 +1.357 +250 +249.901 +2.120 +B(N, ΣD) +13 +12.626 +1.322 +250 +249.887 +2.121 +Walsh +13 +12.630 +1.332 +250 +249.879 +2.123 +Haar(O(N)) +13 +12.625 +1.339 +250 +249.833 +2.130 +DCT II +13 +12.573 +1.344 +250 +249.923 +2.116 +Table 3: Pivot counts for numerical experiments for GEPP with 10,000 trials, for 2-sided +transformation of max-movement model of orders N = 24 and N = 28 +6.3.1. Discussion. As in the worst-case model, only the Haar orthogonal transformed +model UPLV ∗ has its distribution determined by Theorem 2.1, where Corollary 2.11 again +yields XN, the number of GEPP pivot movements, correspond to uniform row permutations, +so XN ∼ N − ΥN. Unlike both min-movement models, all of the resulting experiments align +strongly with this uniform row permutation model. All of the sample means are within 0.05 of + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +33 +0 +5 +10 +15 +0 +50 +100 +150 +200 +250 +Figure 6: Histogram of 104 samples of pivot movement counts for 2-sided random transfor- +mations of order N = 24 and N = 28 maximal movement real model, UPLV ∗. +the exact means EXN and all of the sample standard deviations are within 0.02 of the exact +standard deviations σXN for both N = 16 and N = 256 (see Table 3). Moreover, every set +of experiments exactly matched the true medians for the uniform row permutation models of +13 for N = 16 and 250 for N = 256. Hence, this suggests every random transformation had +essentially equivalent dampening impacts on the total GEPP pivot movements when starting +with a maximal pivot movement model. +6.4. Conclusions. The Haar orthogonal model, which had GEPP pivot movements Xn ∼ +n − Υn, remains a strong comparison point for each random transformation across each min- +and max-movement model. In each case, Xn represents both an upper bound for overall per- +formance in terms of numbers of pivot movements, as well as a limiting class for most random +transformations, which further suggest a universality result in terms of GEPP pivot move- +ments. Since the Haar orthogonal model results in uniform GEPP permutation matrix factors, +this suggests most random transformation classes have sufficient random mixing properties +using both minimal and maximal GEPP movement input models. Undesirably, however, this +model asymptotically is concentrated near the upper bound of n − 1 in terms of total pivot +movements, with average n − Hn = (n − 1)(1 + o(1)). +The Haar-butterfly model introduced the least amount of additional pivot movements +among the min-movement models, while the remaining butterfly models introduced increasing +pivot movements as they increased in randomness (i.e., from B(N, ΣS) and BS(N, ΣD) to + +34 +J. PECA-MEDLIN +B(N, ΣD)). However, only the Haar-butterfly models remained far from the upper bound +for the min-movement models. In [17], a future direction wanted to explore the impact of +combining random transformations (that remove the need of GEPP pivoting) with GEPP on +the total number of pivot movements. To address this concern, these experiments suggest +the butterfly models do the least amount of damage in terms of introducing new GEPP pivot +movements when starting with a linear system with little GEPP pivot movements necessary. +However, no models had strong dampening performance when starting with a max-movement +input system. +7. Acknowledgements. The author would like to thank a referee on a previous paper who +had asked about the number of movements still needed after using a random transformation +on a linear system, which led to the particular direction pursued here. Additionally, the author +thanks Tom Trogdon and Nick Ercolani for many helpful thoughts and insights during the +project. +REFERENCES +[1] M. Baboulin, X. S. Li, and F.-H. Rouet, Using random butterfly transformations to avoid pivoting +in sparse direct methods, In: Proc. of Int. Con. on Vector and Par. Proc., (2014), https://doi.org/10. +1007/978-3-319-17353-5 12. +[2] Z. Bai, Circular law, Ann. Probab., 1 (1997), pp. 494–529, https://doi.org/10.2307/3214948. +[3] L. Bellavista, On the Stirling numbers of the first kind arising from probabilistic and statistical problems, +Rend. Circ. Mat. Palermo, 32 (1983), pp. 19–26, https://doi.org/10.1007/BF02851099. +[4] C. Charalambides and J. Singh, A review of the Stirling numbers, their generalization and statisti- +cal applications, Comm. in Stat.-Theory Meth., 17 (1988), pp. 2533–2593, https://doi.org/10.1080/ +03610928808829760. +[5] L. Comtet, Advanced Combinatorics, D. Reidel, Dordrecht, Holland, 1974. +[6] P. Diaconis, R. L. Graham, and W. M. Kantor, The mathematics of perfect shuffles, Adv. in App. +Math., 4 (1983), pp. 175–196, https://doi.org/10.1016/0196-8858(83)90009-X. +[7] P. Diaconis and M. Shahshahani, The subgroup algorithm for generating uniform random variables, +Prob. in the Eng. and Info. Sci., 1 (1987), pp. 15–32, https://doi.org/10.1017/S0269964800000255. +[8] P. Diaconis and M. Shahshahani, On the eigenvalues of random matrices, J. of App. Prob., 31 (1994), +pp. 49–62, https://doi.org/10.2307/3214948. +[9] Y. Hajime, A probabilistic approach to Stirling numbers of the first kind, Comm. in Stat.-Theory Meth., +19 (1990), pp. 3915–3923, https://doi.org/10.1080/03610929008830421. +[10] N. J. Higham, Accuracy and Stability of Numerical Algorithms, Second Edition, SIAM, Philadelphia, +PA, 2002. +[11] H. Huang and K. Tikhomirov, Average-case analysis of the Gaussian elimination with partial pivoting, +2022, https://arxiv.org/abs/arXiv:2206.01726. +[12] P. Y. Konstantin Tikhomirov, Outliers in spectrum of sparse Wigner matrices, Rand. Struct. & Alg., +58 (2021), pp. 517–605, https://doi.org/10.1002/rsa.20982. +[13] P.-G. Martinsson and J. A. Tropp, Randomized numerical linear algebra: Foundations and algorithms, +Acta Numerica, 29 (2020), pp. 403–572, https://doi.org/10.1017/S0962492920000021. +[14] P. Matchett Wood, Universality and the circular law for sparse random matrices, Ann. of Appl. Prob., +22 (2012), pp. 1266–1300. +[15] F. Mezzadri, How to generate random matrices from the classical compact groups, Notices of the Amer- +ican Mathematical Society, 54 (2007), pp. 592 – 604. +[16] D. S. Parker, Random butterfly transformations with applications in computational linear algebra, Tech. +rep., UCLA, (1995). +[17] J. Peca-Medlin and T. Trogdon, Growth factors of random butterfly matrices and the stability of + +DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP +35 +removing pivoting, 2022, https://arxiv.org/abs/arXiv:2203.15921. +[18] M. Rudelson and K. Tikhomirov, The sparse circular law under minimal assumptions, Geom. Funct. +Anal., 29 (2019), pp. 561–637, https://doi.org/10.1007/s00039-019-00492-6. +[19] G. W. Stewart, The efficient generation of random orthogonal matrices with an application to condition +estimators, SIAM J. Numer. Anal., 17 (1980), pp. 403–409, https://doi.org/10.1137/0717034. +[20] G. Strang, The discrete cosine transform, SIAM Review, 41 (1999), pp. 135–147, https://doi.org/10. +1137/S0036144598336745. +[21] T. Tao and V. Vu, Random matrices: Universality of ESDs and the circular law, Ann. Probab., 38 +(2010), pp. 2023—-2065, https://doi.org/10.1214/10-AOP534. +[22] K. Tikhomirov, Singularity of random Bernoulli matrices, Ann. Math, 191 (2020), pp. 593–634, https: +//doi.org/10.4007/annals.2020.191.2.6. +[23] T. Trogdon, On spectral and numerical properties of random butterfly matrices, Applied Math. Letters, +95 (2019), pp. 48–58, https://doi.org/10.1016/j.aml.2019.03.024. +[24] J. A. Tropp, Improved analysis of the subsampled randomized Hadamard transform, Adv. Adapt. Data +Anal., 3 (2011), pp. 115–126, https://doi.org/10.1142/S1793536911000787. +[25] A. Weil, L’int´egration dans les groupes topologiques et ses applications, Actualit´es Scientifiques et In- +dustrielles, vol. 869, Paris: Hermann, 1940. +[26] J. Wilkinson, Error analysis of direct methods of matrix inversion, J. Assoc. Comput. Mach., 8 (1961), +pp. 281–330, https://doi.org/10.1145/321075.321076. + diff --git a/BdFQT4oBgHgl3EQf9zeq/content/tmp_files/load_file.txt b/BdFQT4oBgHgl3EQf9zeq/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..4f1a10ea56300485ed6e8f8ba02c3b627df54521 --- /dev/null +++ b/BdFQT4oBgHgl3EQf9zeq/content/tmp_files/load_file.txt @@ -0,0 +1,1347 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf,len=1346 +page_content='Distribution of the number of pivots needed using Gaussian elimination with partial pivoting on random matrices∗ John Peca-Medlin† Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Gaussian elimination with partial pivoting (GEPP) remains the most common method to solve dense linear systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Each GEPP step uses a row transposition pivot movement if needed to ensure the leading pivot entry is maximal in magnitude for the leading column of the remaining untriangularized subsystem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' We will use theoretical and numerical approaches to study how often this pivot movement is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' We provide full distributional descriptions for the number of pivot movements needed using GEPP using particular Haar random ensembles, as well as compare these models to other common transformations from randomized numerical linear algebra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Additionally, we introduce new random ensembles with fixed pivot movement counts and fixed sparsity, α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Experiments estimating the empirical spectral density (ESD) of these random ensembles leads to a new conjecture on a universality class of random matrices with fixed sparsity whose scaled ESD converges to a measure on the complex unit disk that depends on α and is an interpolation of the uniform measure on the unit disk and the Dirac measure at the origin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Key words.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Gaussian elimination, partial pivoting, butterfly matrices, Stirling numbers of the first kind, nu- merical linear algebra, universality AMS subject classifications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 60B20, 15A23, 65F99 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Introduction and background.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Gaussian elimination (GE) is the most used method to solve linear systems (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1) Ax = b for A ∈ Rn×n, and remains a staple of introductory linear algebra courses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' If no leading prin- cipal minors of A vanish, then GE iteratively transforms (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1) into two equivalent triangular systems, resulting in the factorization A = LU for L unipotent lower triangular and U upper triangular matrices using 2 3n2(1 +o(1)) FLOPs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' If A is nonsingular but does have a vanishing principal minor, then GE would need to be combined with a selected pivoting strategy to ensure GE can be continued at each intermediate step without encountering a zero pivot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The row and column movements used to ensure nonzero pivots would then result in additional permutation matrices P, Q for a modified GE factorization PAQ = LU.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Even when pivoting is not necessary, it remains desirable for added computational stability for certain pivoting strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This includes GE with partial pivoting (GEPP), the most prominent pivoting strategy for dense linear systems, which is the default strategy used by MATLAB with its built-in lu function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' GEPP uses only row permutations and so results in a final PA = LU factorization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' (See Subsection 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='3 for relevant description of GE, while Section 3 provides further background for GEPP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=') With high performance computing, choosing a desired pivoting strategy with GE often becomes a balancing act that takes into account the total computation time (viz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', total FLOP ∗Submitted to the editors February 1, 2023.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' †Department of Mathematics, University of Arizona, Tucson, AZ (johnpeca@math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='arizona.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='edu).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='13452v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='NA] 31 Jan 2023 2 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' PECA-MEDLIN count) rather than just accuracy (viz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', the numerical stability of computed solutions).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The cost of moving large amounts of data can be very expensive on high performance machines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For example, numerical experiments on a hybrid CPU/GPU setup have shown GEPP used with moderately sized random matrices have pivoting account for over 20 percent of the total computation time [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Hence, limiting pivot movements using GEPP is desirable to save time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Parker introduced a preconditioning method through the use of random butterfly matrices to remove the need for pivoting overall for any nonsingular linear system [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Butterfly matrices are a recursively defined class of orthogonal matrices (see Section 4 for a full definition of random butterfly matrices) for which matrix-vector multiplication Ax is computed using 3n log2 n FLOPs rather than the O(n2) FLOPs needed using a general dense matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Parker established for U, V iid random butterfly matrices, then Ax = b can be transformed into the equivalent system (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='2) UAy = Ub and x = V ∗y for which GE without pivoting (GENP) can be carried out with probability near 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The above computations shows then transforming (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1) int to (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='2) can be performed using O(n2 log2 n) FLOPs, and hence does not impact the leading order complexity of GE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' In [17], Peca-Medlin and Trogdon further explored the numerical stability of using GE with a variety of pivoting strategies in addition to using randomized preconditioning methods, which included random butterfly and Haar orthogonal transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' One output was certain preconditioners had the impact that running the preconditioner followed then by GE with another pivoting strategy could “upgrade” the pivoting strategy in terms of the numerical accuracy for the computed solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For instance, even though GENP often leads to accuracy far from that achieved using GEPP or GE with complete pivoting (GECP), a preconditioned matrix using GEPP would lead to accuracy on par with using GECP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Adding one step of iterative refinement would further seal this alignment in accuracy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' A natural direction that arose out of this previous analysis in [17] was to better understand how many actual pivot movements are needed with these different pivoting strategies on the preconditioned linear systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The goal of this paper is to provide a clearer answer to this question with respect to GEPP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' GEPP can use a pivot movement at each GE step, for up to n − 1 total pivot movements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' So applying GEPP to a random linear system will result in the number of pivot movements being a random variable with support in 0, 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' , n − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' We will study the question of how much movement one should expect if they choose to use GEPP in conjunction with randomized preconditioning methods1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Our results include both theoretical and numerical approaches focusing on applying GEPP to several random matrix ensembles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The theoretical results rely on input matrices from Haar orthogonal and butterfly ensembles (see Subsection 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='2 for a review of Haar measures).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Our numerical studies use further study these models in relation to other common transformations from randomized numerical linear algebra transformations, which expand studies in [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Outline of paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This paper is structured to explore the question of how much actual pivot movement is necessary when using GEPP with a variety of randomized precon- 1This is a simpler focus than the more general study of the distribution of the GEPP permutation matrix factor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP 3 ditioning methods on particular nonsingular linear systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The remainder of Section 1 will establish notation and preliminary background on GE (Subsection 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='3) and the Stirling-1 distribution (Subsection 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This includes connections to previous statistical results of dis- tributions using Stirling numbers of the first kind, as well as formally establishing standard statistics for this distribution that will be used for comparison in later numerical results in Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Section 2 provides a statement of the main theoretical result, Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1, that provides the full distribution for the number of GEPP pivot movements needed for particular random ensembles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This includes the distribution of pivot movements when I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' the resulting GEPP permutation matrix factor P is uniformly distributed among the permutation matrices, which uses the Stirling-1 distribution, Υn, that satisfies (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='3) P(Υn = k) = |s(n, k)| n!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' for k = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' , n where s(n, k) is the Stirling number of the first kind;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' and II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' when GEPP is applied to a Haar-butterfly matrix, which results in a scaled Bernoulli distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The remainder of Section 2 provides results and implications of (I) in connection with QR factorizations and other standard Haar unitary models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The proof of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1 is postponed under Sections 3 and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Section 3 provides the necessary background to establish a proof of part (I) of Theo- rem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This includes introducing explicit decompositions of permutations in Sn, the group of permutations of n objects, that connect explicitly to GEPP permutation matrix factors as well as uniform sampling of Sn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Section 4 provides more background for P(B) N , the butterfly permutation matrices, and yields a proof for part (II) of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Additionally, explicit structural configurations of exact pivot movement locations of Haar-butterfly matrices are established, that yield a distribution on the pivot location configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Section 5 builds on top of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1 to introduce a new ensemble of random matrices that align with uniformly sampling from GLn(R)/Un(R), the left cosets of the group of non- singular upper triangular matrices in the general linear group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This ensemble can be used to sample from random ensembles with fixed pivot movement distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' General random ensembles are introduced with fixed sparsity conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' A new conjecture is provided for the asymptotic empirical spectral distribution for this generalized random ensemble with fixed sparsity that connects to and subsumes the famous circular law in random matrix theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Section 6 uses numerical experiments to further explore the distribution of pivot move- ments needed using other transformations from randomized numerical linear algebra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' These experiments focus on three initial models, two that need minimal GEPP pivot movements and one that require the maximal number of GEPP pivot movements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' These approaches build on top of the numerical experiments used in [17], as well as connect to other random models used in earlier sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Notation and preliminaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For convenience, N will be reserved for powers of 2, with N = 2n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For A ∈ Fn×m where F = R or C, Aij denotes the entry in the ith row and jth column of A, while Aα,β will denote the submatrix of A with row indices α ⊂ [n] := {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' , n} and 4 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' PECA-MEDLIN β ⊂ [m].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let ei denote the standard basis elements of Fn and Eij = eieT j , the standard basis elements of Fn×m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' I denotes the identity matrix and 0 the zero matrix or vector (with the dimensions implicit from context if not stated explicitly).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' If A ∈ Fn×n is nonsingular, then A0 := I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let D = {z ∈ C : |z| < 1} denote the unit complex disk, with ∂D denoting the unit complex circle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' We will write Sn−1 = {x ∈ Fn : ∥x∥2 = 1}, where ∥ · ∥2 denotes the standard ℓ2-norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let Sn denote the symmetric group on n elements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Recall every permutation σ ∈ Sn can be written in cycle notation, with σ = τ1τ2 · · · τj where τi = (ai1 ai2 · · · aik) is a k-cycle, such that τi(aim) = aim+1 for m < k and τi(aik) = ai1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Moreover, recall every permutation can be written as a product of disjoint cycles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For σ ∈ Sn, let Pσ denote the orthogonal permutation matrix such that Pσei = eσ(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For example, for (1 2) ∈ S2, then (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='4) P(1 2) = �0 1 1 0 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let Pn denote the n×n permutation matrices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', the left regular representation of the action of Sn on [n].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let ∥·∥max denote the element-wise max norm of a matrix defined by ∥A∥max = maxi,j |Aij|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Define A ⊕ B ∈ F(n1+m1)×(n2+m2) to be the block diagonal matrix with blocks A ∈ Fn1×m1 and B ∈ Fn2×m2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Define A ⊗ B ∈ Fn1n2×m1m2 to be the Kronecker product of A ∈ Rn1×m1 and B ∈ Rn2×m2, given by (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='5) A ⊗ B = � �� A11B · · A1,m1B .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' An1,1B · · An1,m1B � �� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Recall Kronecker products satisfy the mixed-product property: if all matrix sizes are compat- ible for the necessary matrix multiplications, then (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='6) (A ⊗ B)(C ⊗ D) = (AC) ⊗ (BD), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', the product of Kronecker products is the Kronecker product of the products.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' As a result, Kronecker products inherit certain shared properties of their input matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For example, if A and B are both orthogonal or unitary matrices, then so is A ⊗ B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Similarly, if A ∈ Pn and B ∈ Pm then A ⊗ B ∈ Pnm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let GLn(F) denote the group of nonsingular matrices with entries in F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let Un(F) denote the subgroup of nonsingular upper triangular matrices and Ln(F) denote the subgroup of unipotent (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', with all diagonal entries equal to 1) lower triangular matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' O(n) and U(n) denotes the orthogonal and unitary groups of n × n matrices and SO(n), SU(n) denote the respective special orthogonal and special unitary subgroups;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' note O(n) will be used for the orthogonal matrices while O(n) is the classical “big-oh” notation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Recall if H is a subgroup of G, then G/H = {xH : x ∈ G} will denote the set of left-cosets of H in G and G\\H = {Hx : x ∈ G} the set of right-cosets of H in G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' We write X ∼ Y if X and Y are equal in distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Standard distributions that will be used in this document include X ∼ N(0, 1) to denote a standard Gaussian random DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP 5 variable (with probability density (2π)−1/2e−x2/2);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' X ∼ NC(0, 1) to denote a standard complex Gaussian random variable (with X ∼ (Z1 + iZ2)/ √ 2 for Z1, Z2 iid N(0, 1));' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' X ∼ Uniform(A) to denote a uniform random variable with support on a compact set A with probability density 1 |A|1A (for |A| either denoting the cardinality of A if A is finite or the corresponding appropriate Lebesgue-measure of A);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' ξ ∼ Bernoulli(p) to denote a Bernoulli random variable with parameter p ∈ [0, 1] where P(ξ = 1) = p = 1 − P(ξ = 0);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' and ξ ∼ Rademacher to denote a Rademacher random variable that takes only the values 1 and −1 with equal probability (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', ξ ∼ (−1)Bernoulli(1/2)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' A random variable is called continuous if its associated probability density is a continuous function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let Gin(n, m) denote the n×m Ginibre ensemble, consisting of random matrices with independent and identically distributed (iid) standard Gaussian entries;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' GinC(n, m) will denote the similarly defined complex Ginibre ensemble, whose entries are iid standard complex Gaussian random variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let GOE(n) and GUE(n) denote the Gaussian Orthogonal and Gaussian Unitary Ensembles, respectively;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' recall these can be sampled using the Ginibre ensembles as follows: if G ∼ Gin(n, n) and H ∼ GinC(n, n), then (G + GT )/ √ 2 ∼ GOE(n) and (H + H∗)/ √ 2 ∼ GUE(n).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let ϵmachine denote the machine-epsilon, which is the minimal positive number such that fl(1 + ϵmachine) ̸= 1 using floating-point arithmetic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='2 If using t-bit mantissa precision, then ϵmachine = 2−t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Our later experiments in Section 6 will use double precision in MATLAB, which uses a 52-bit mantissa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Standard models from randomized numerical linear algebra will be used for comparison in Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' These will include the Walsh transformation and Discrete Cosine Transformations (DCT), which were previously used in [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Sampling for the following experiments will use native (deterministic) MATLAB functions (viz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', the Fast Walsh-Hadamard transform fwht and the default Type II Discrete cosine transform dct) applied after an independent row sign transformation chosen uniformly from {±1}N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' See [20, 24] for an overview of numerical properties of the Walsh and DCT transforms, and [13] for a thorough survey that provides proper context for use of these transforms and other tools from randomized numerical linear algebra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Additionally, we will utilize left and right invariance properties of the Haar measure on locally compact Hausdorff topological groups, first established by Weil [25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' For a compact group G, this measure can be normalized to yield a probability measure Haar(G), which in- herits the invariance and regularity properties of the original measure and yields a means to uniformly sample from compact groups, such as O(n) and SO(N).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Recall every nonsin- gular matrix A ∈ Fn×n has a QR factorization, with A = QR for R upper triangular with positive diagonal entries and Q ∈ O(n) if F = R or Q ∈ U(n) if F = C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Stewart provided an outline to sample from Haar(O(n)) by using Gin(n, n) through the QR factorization: if A ∼ Gin(n, n) and A = QR is the QR decomposition of A where R has positive diagonal entries, then Q ∼ Haar(O(n)) [19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Similarly, Haar(U(n)) can be sampled using GinC(n, n).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Our experiments will employ efficient sampling methods for Haar(O(n)) that use Gaussian Householder reflectors, in line with the QR factorization of Gin(n, n) (see [15] for an outline of this method).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 2We will use the IEEE standard model for floating-point arithmetic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 6 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' PECA-MEDLIN 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Gaussian elimination and growth factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' GENP iteratively works through the bot- tom right untriangularized n − k + 1 dimensional submatrices of the GE transformed matrix A(k) to result in the factorization A = LU for L a unipotent lower triangular matrix and U an upper triangular matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' A(k) represents the resulting transformed matrix of A at the kth GE step that is zero below the first k − 1 diagonals and (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='7) Lij = A(j) ij A(j) jj for i > j, with A(1) = A and A(n−1) = U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' When GENP can be completed (viz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', when all leading principal minors are nonzero), the final factorization A = LU can be reused with different input b to solve the computationally simpler triangular systems (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='8) Ly = b and Ux = y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Moreover, if A has nonvanishing principal minors, then the resulting LU factorization is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' See standard references, such as [10], for an explicit outline of GE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' If GENP cannot be completed, then a pivoting strategy can be applied so that GE can continue at each step, which can involve row or column movements that ensure the leading diagonal entry (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', the pivot) of the untriangularized subsystem is nonzero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Different pivot- ing strategies then result in the modified GE factorization PAQ = LU for P, Q permutation matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' GEPP remains the most popular pivoting strategy, which uses only row permu- tations to ensure the leading pivot at the kth GE step is maximal in magnitude among the lower entries in its column.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' By construction, the L from the resulting GEPP factorization PA = LU satisfies ∥L∥max = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' If there is ever a “tie” during an intermediate GEPP pivot search, which occurs when |Aj ij| = |Aj jj| and would result in |Lij| = 1 for some i > j, then the L and U factors are not unique with respect to row transformed linear systems, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=', if A has the GEPP factorization PA = LU and B = QA for Q a permutation matrix, then we do not necessarily have the GEPP factorization (PQT )B = LU.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' When ties are avoided, GEPP results in unique L and U factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='1 ([17]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Let A be a nonsingular square matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Then the L and U factors in the GEPP factorization PA = LU are invariant under row permutations on A iff |Lij| < 1 for all i > j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Moreover, when no ties are encountered with a nonsingular A with B = QA defined as above, then GEPP does necessarily result in the factorization (PQT )B = LU.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Even when pivoting is not necessary, pivoting can remain desirable for its numerical stabil- ity properties when using floating-point arithmetic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Wilkinson first established the backward stability of GEPP by showing the growth factor, (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='9) ρ(A) = maxk ∥A(k)∥max ∥A∥max , satisfies the upper exponential bound 1 ≤ ρ(A) ≤ 2n−1 for all matrices A [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' The growth factor controls the backwards relative error for computed solutions ˆx using GE, as Wilkinson DISTRIBUTION OF THE NUMBER OF PIVOTS NEEDED USING GEPP 7 further established through (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='10) ∥ˆx − x∥∞ ∥x∥∞ ≤ 4n2κ∞(A)ρ(A)ϵmachine for κ∞(A) = ∥A∥∞∥A−1∥∞ the ℓ∞-condition number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Section 6 will consider particular linear models that maximize the GEPP growth factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' In practice, GEPP implementations result in computed solutions with higher accuracy far from the worst-case exponential behavior Wilkinson’s analysis first highlighted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Understand- ing this behavior remains an important question in numerical analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This was partially answered by Huang and Tikhomirov through the use of average-case analysis of GEPP using A ∼ Gin(n, n): they showed with probability near 1, both the number of bits of prevision needed to solve Ax = b to m bits of accuracy is m + O(log n) while also the computed and exact GEPP permutation matrix factors align [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Stirling-1 distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' This section will delve further into some properties of the Stirling-1 distribution, Υn, with probability mass function given by (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' Recall the Stirling numbers of the first kind, s(n, k), arise as the coefficients using the generating function (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='11) (x)n = n � k=0 s(n, k)xk for (x)n = x(x − 1) · · · (x − n + 1), where s(n, k) = 0 if not 1 ≤ k ≤ n except s(0, 0) = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='3 The absolute Stirling numbers of the first kind, |s(n, k)|, can similarly be generated using (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='11) along with |s(n, k)| = (−1)n+ks(n, k);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' alternatively, |s(n, k)| are determined by the generating function (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='12) ⟨x⟩n = n � k=0 |s(n, k)|xk for ⟨x⟩n = x(x + 1) · · · (x + n − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='12) further establishes the relation (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='13) |s(n, k)| = sn−k(1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' , n − 1) where (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content='14) sj(a1, a2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BdFQT4oBgHgl3EQf9zeq/content/2301.13452v1.pdf'} +page_content=' , am) = � i1<··· 2(x−y)2. The term (p00(a)+p11(a)−1) +can be understood as the slope of the corruption function ga. +Corruption Mechanism to Preserve Local +Privacy in Non-Stationary Environment +First, let us formally define local differential privacy. +Definition 1 (Locally differentially private mechanism) Any +randomized mechanism M is ǫ-locally differentially private +for ǫ ≥ 0, if for all d1, d2 ∈ Domain(M) and for all S ⊂ +Range(M), +P[M(d1) ∈ S] ≤ eǫ · P[M(d2) ∈ S]. +As done in Gajane, Urvoy, and Kaufmann (2018), a straight- +forward approach to achieve local differential privacy us- +ing corrupt bandits is to employ a corruption scheme on the +user feedback. This is similar to how randomized response +is used in data collection by Wang, Wu, and Hu (2016). +Definition 2 (ǫ-locally differentially private bandit feed- +back corruption scheme) A bandit feedback corruption +scheme ˜g is ǫ-locally differentially private for ǫ ≥ 0, if for + +all reward sequences Rt1, . . . , Rt2 and R′ +t1 . . . , R′ +t2, and for +all S ⊂ Range(˜g), +P[˜g(Rt1, . . . , Rt2) ∈ S] ≤ eǫ · P[˜g(R′ +t1, . . . , R′ +t2) ∈ S]. +When +corruption +is +done +by +randomized +re- +sponse, +local +differential +privacy +requires +that +max1≤a≤K +� +p00(a) +1−p11(a), +p11(a) +1−p00(a) +� +≤ eǫ. From Corollary 1, +we can see that to achieve lower regret, p00(a) + p11(a) is +to be maximized for all a ∈ A. Using Wang, Wu, and Hu +(2016, Result 1), we can state that, in order to achieve ǫ-local +differential privacy while maximizing p00(a) + p11(a), +Ma = +� +0 +1 +0 +eǫ +1+eǫ +1 +1+eǫ +1 +1 +1+eǫ +eǫ +1+eǫ +� +. +(2) +As it turns out, this is equivalent to the staircase mechanism +for local privacy which is the optimal local differential pri- +vacy mechanism for low privacy regime (Kairouz, Oh, and +Viswanath 2016, Theorem 14). The trade-off between utility +and privacy is controlled by ǫ. +Using the corruption parameters from Eq. (2) with Corol- +lary 1, we arrive at the following upper bound. +Corollary 2 At time T , the regret of +SW-KLUCB- +CF +with +ǫ-locally +differentially +private +bandit +feedback +corruption +scheme +given +by +Eq. +(2) +is +˜O +� +� +a∈A +√LTT + �LT +i=1 +� +a̸=a∗(i) +log +�� +T +LT +� +( eǫ−1 +eǫ+1) +2 +� +. +The term +� eǫ−1 +eǫ+1 +�2 in the above expression conveys the rela- +tionship of the regret with the level of local differential pri- +vacy symbolized by ǫ. For low values of ǫ, +� eǫ−1 +eǫ+1 +� +≈ ǫ/2. +This is in line with other bandit algorithms providing differ- +ential privacy (e.g., Mishra and Thakurta (2015)). +Elements of Mathematical Analysis +Here, we provide a proof outline for Theorem 1. Please refer +to the Appendix for the complete proof. +We start by bounding the expected number of times a sub- +optimal arm (i.e., an arm other than the optimal arm at the +time of selection) is pulled by the algorithm till horizon T . +Recall that, at any time step t, SW-KLUCB-CF pulls an +arm maximizing an index defined as +Indexa(t) +:= max +� +q : Na(t, w) · d +� +ˆλa(t, w), ga(q) +� +≤ f (t ∧ w) +� += max g−1 +a +�� +q : Na(t, w) · d +� +ˆλa(t, w), q +� +≤ f (t ∧ w) +�� +. +We further decompose the computation of index as follows, +Indexa(t) := +�g−1 +a (ℓa(t)) +if ga is decreasing, +g−1 +a (ua(t)) +if ga is increasing +where, +ℓa(t) := min +� +q : Na(t, w) · d +� +ˆλa(t, w), q +� +≤ f (t ∧ w) +� +, +ua(t) := max +� +q : Na(t, w) · d +� +ˆλa(t, w), q +� +≤ f (t ∧ w) +� +. +The interval [ℓa(t), ua(t)] is a KL-based confidence in- +terval on the mean feedback λa,t of arm a at time t. This +is in contrast to kl-UCB (Capp´e et al. 2013) where a con- +fidence interval is placed on the mean reward. Furthermore, +This differs from kl-UCB-CF (Gajane, Urvoy, and Kauf- +mann 2018) where the mean feedback of an arm remains the +same for all the time steps and f does not feature w. +In our analysis, we use the fact that when an arm a is +picked at time t+1 by SW-KLUCB-CF, one of the follow- +ing is true: Either the mean feedback of the optimal arm a∗,t +with mean reward µ∗,t is outside its confidence interval (i.e., +ga∗,t(µ∗,t) < ℓa∗,t(t) or ga∗,t(µ∗,t) > ua∗,t(t)) which is +unlikely. Or, the mean feedback of the optimal arm is where +it should be, and then the fact that arm a is selected indicates +that the confidence interval on λa cannot be too small as ei- +ther (ua(t) ≥ ga(µ∗,t)) or (ℓa(t) ≤ ga(µ∗,t)). The previous +statement follows from considering various cases depending +on whether the corruption functions ga and ga∗,t are increas- +ing or decreasing. We then need to control the two terms in +the decomposition of the expected number of draws of arm +a. The term regarding the “unlikely” event, is bounded using +the same technique as in the kl-UCB analysis, however with +some added challenges due to the use of a sliding window. In +particular, the analysis of a typical upper confidence bound +algorithm for bandits relies on the fact that the confidence +interval for any arm is always non-increasing, however this +is not true while using a sliding window. To control the sec- +ond term, depending on the monotonicity of the corruption +functions ga and ga∗,t, we need to meticulously adapt the +arguments in Capp´e et al. (2013) to control the number of +draws of a suboptimal arm, as can be seen in the Appendix. +Concluding Remarks +In this work, we proposed the setting of non-stationary +stochastic corrupt bandits for preserving privacy while still +maintaining high utility in sequential decision making in a +changing environment. We devised an algorithm called SW- +KLUCB-CF and proved its regret upper bound which is +near-optimal in the number of time steps and matches the +best known bound for analogous problems in terms of the +number of time steps and the number of changes. Moreover, +we provided an optimal corruption scheme to be used with +our algorithm in order to attain the dual goal of achieving +high utility while maintaining the desired level of privacy. +Interesting directions for future work include: +1. Complete an empirical evaluation of the proposed algo- +rithm on simulated as well as real-life data. +2. Characterize the changes in the environment by a varia- +tion budget (as done in Besbes, Gur, and Zeevi (2014) for +classical bandits) instead of the number of changes. +3. Incorporate contextual information in the learning pro- +cess. +4. Propose a Bayesian algorithm for non-stationary stochas- +tic corrupt bandits. +5. Propose a (near-)optimal differentially private algorithm +which does not need to know the number of changes. + +References +Auer, P.; Gajane, P.; and Ortner, R. 2019. Adaptively Track- +ing the Best Bandit Arm with an Unknown Number of Dis- +tribution Changes. In Beygelzimer, A.; and Hsu, D., eds., +Proceedings of the Thirty-Second Conference on Learning +Theory, volume 99 of Proceedings of Machine Learning Re- +search, 138–158. PMLR. +Besbes, O.; Gur, Y.; and Zeevi, A. 2014. Stochastic Multi- +Armed-Bandit Problem with Non-stationary Rewards. +In +Ghahramani, Z.; Welling, M.; Cortes, C.; Lawrence, N.; and +Weinberger, K., eds., Advances in Neural Information Pro- +cessing Systems, volume 27. Curran Associates, Inc. +Besson, L.; and Kaufmann, E. 2018. What Doubling Tricks +Can and Can’t Do for Multi-Armed Bandits. Working paper +or preprint. +Capp´e, O.; Garivier, A.; Maillard, O.-A.; Munos, R.; and +Stoltz, G. 2013. Kullback-Leibler upper confidence bounds +for optimal sequential allocation. Annals of Statistics, 41(3): +1516–1541. +Chowdhury, S. R.; and Zhou, X. 2022. Differentially Pri- +vate Regret Minimization in Episodic Markov Decision Pro- +cesses. Proceedings of the AAAI Conference on Artificial +Intelligence, 36(6): 6375–6383. +Corless, R. M.; Gonnet, G. H.; Hare, D. E. G.; Jeffrey, D. J.; +and Knuth, D. E. 1996. On the LambertW function. Ad- +vances in Computational Mathematics, 5(1): 329–359. +Duchi, J. C.; Jordan, M. I.; and Wainwright, M. J. 2014. Pri- +vacy Aware Learning. J. ACM, 61(6): 38:1–38:57. +Dwork, C.; Mcsherry, F.; Nissim, K.; and Smith, A. 2006. +Calibrating noise to sensitivity in private data analysis. In In +Proceedings of the 3rd Theory of Cryptography Conference, +265–284. Springer. +Dwork, C.; and Roth, A. 2014. The Algorithmic Founda- +tions of Differential Privacy. Found. Trends Theor. Comput. +Sci., 9: 211–407. +Gajane, P.; Ortner, R.; and Auer, P. 2018. A Sliding-Window +Approach for Reinforcement Learning in MDPs with Arbi- +trarily Changing Rewards and Transitions. In the 2nd work- +shop for Lifelong Learning: A Reinforcement Learning Ap- +proach (LLARLA). +Gajane, P.; Urvoy, T.; and Kaufmann, E. 2018. Corrupt Ban- +dits for Preserving Local Privacy. In Janoos, F.; Mohri, M.; +and Sridharan, K., eds., Proceedings of Algorithmic Learn- +ing Theory, volume 83 of Proceedings of Machine Learning +Research, 387–412. PMLR. +Garcelon, E.; Perchet, V.; Pike-Burke, C.; and Pirotta, M. +2020. Local Differentially Private Regret Minimization in +Reinforcement Learning. CoRR, abs/2010.07778. +Garivier, A.; and Moulines, E. 2011. On Upper-Confidence +Bound Policies for Switching Bandit Problems. In Kivinen, +J.; Szepesv´ari, C.; Ukkonen, E.; and Zeugmann, T., eds., +Algorithmic Learning Theory, 174–188. Berlin, Heidelberg: +Springer Berlin Heidelberg. ISBN 978-3-642-24412-4. +Joseph, M.; Roth, A.; Ullman, J.; and Waggoner, B. 2018. +Local Differential Privacy for Evolving Data. In Bengio, +S.; Wallach, H.; Larochelle, H.; Grauman, K.; Cesa-Bianchi, +N.; and Garnett, R., eds., Advances in Neural Information +Processing Systems, volume 31. Curran Associates, Inc. +Kairouz, P.; Oh, S.; and Viswanath, P. 2014. Extremal Mech- +anisms for Local Differential Privacy. In Ghahramani, Z.; +Welling, M.; Cortes, C.; Lawrence, N. D.; and Weinberger, +K. Q., eds., Advances in Neural Information Processing Sys- +tems 27, 2879–2887. Curran Associates, Inc. +Kairouz, P.; Oh, S.; and Viswanath, P. 2016. Extremal Mech- +anisms for Local Differential Privacy. Journal of Machine +Learning Research, 17(17): 1–51. +Korolova, A. 2010. Privacy Violations Using Microtargeted +Ads: A Case Study. In ICDMW 2010, The 10th IEEE In- +ternational Conference on Data Mining Workshops, Sydney, +Australia, 13 December 2010, 474–482. +Kosinski, M.; Stillwell, D.; and Graepel, T. 2013. Private +traits and attributes are predictable from digital records of +human behavior. Proceedings of the National Academy of +Sciences, 110(15): 5802–5805. +Mishra, N.; and Thakurta, A. 2015. (Nearly) Optimal Differ- +entially Private Stochastic Multi-Arm Bandits. In Proceed- +ings of the Thirty-First Conference on Uncertainty in Arti- +ficial Intelligence, UAI 2015, July 12-16, 2015, Amsterdam, +The Netherlands, 592–601. +Tao, Y.; Wu, Y.; Zhao, P.; and Wang, D. 2022. +Optimal +Rates of (Locally) Differentially Private Heavy-tailed Multi- +Armed Bandits. +In Camps-Valls, G.; Ruiz, F. J. R.; and +Valera, I., eds., Proceedings of The 25th International Con- +ference on Artificial Intelligence and Statistics, volume 151 +of Proceedings of Machine Learning Research, 1546–1574. +PMLR. +Thakurta, A. G.; and Smith, A. D. 2013. (Nearly) Optimal +Algorithms for Private Online Learning in Full-information +and Bandit Settings. In Advances in Neural Information Pro- +cessing Systems 26: 27th Annual Conference on Neural In- +formation Processing Systems 2013. Proceedings of a meet- +ing held December 5-8, 2013, Lake Tahoe, Nevada, United +States., 2733–2741. +Tossou, A. C. Y.; and Dimitrakakis, C. 2016. Algorithms for +Differentially Private Multi-Armed Bandits. In 13th Inter- +national Conference on Artificial Intelligence (AAAI 2016). +Tossou, A. C. Y.; and Dimitrakakis, C. 2017. Achieving pri- +vacy in the adversarial multi-armed bandit. In 14th Interna- +tional Conference on Artificial Intelligence (AAAI 2017). +Wang, H.; Zhao, Q.; Wu, Q.; Chopra, S.; Khaitan, A.; and +Wang, H. 2020. Global and Local Differential Privacy for +Collaborative Bandits. In Proceedings of the 14th ACM Con- +ference on Recommender Systems, RecSys ’20, 150–159. +New York, NY, USA: Association for Computing Machin- +ery. ISBN 9781450375832. +Wang, Y.; Wu, X.; and Hu, D. 2016. Using Randomized Re- +sponse for Differential Privacy Preserving Data Collection. +In Proceedings of the Workshops of the EDBT/ICDT 2016 +Joint Conference, EDBT/ICDT Workshops 2016, Bordeaux, +France, March 15, 2016. +Warner, S. L. 1965. Randomized Response: A Survey Tech- +nique for Eliminating Evasive Answer Bias. Journal of the +American Statistical Association, 60(309): 63+. + +Zheng, K.; Cai, T.; Huang, W.; Li, Z.; and Wang, L. 2020. +Locally Differentially Private (Contextual) Bandits Learn- +ing. In Larochelle, H.; Ranzato, M.; Hadsell, R.; Balcan, M.; +and Lin, H., eds., Advances in Neural Information Process- +ing Systems, volume 33, 12300–12310. Curran Associates, +Inc. + +Proof of Theorem 1 +Proof. The proof follows along the lines of the proof for Theorem 2 from Gajane, Urvoy, and Kaufmann (2018). +The index used by SW-KLUCB-CFis defined by +Indexa(t) := max +� +q : Na(t, w) · d +� +ˆλa(t, w), ga(q) +� +≤ f (t ∧ w) +� += max g−1 +a +�� +q : Na(t, w) · d +� +ˆλa(t, w), q +� +≤ f (t ∧ w) +�� +. +For the purpose of this proof, we further decompose the computation of index as follows, +Indexa(t) := +�g−1 +a (ℓa(t)) +if ga is decreasing, +g−1 +a (ua(t)) +if ga is increasing +where, +ℓa(t) := min +� +q : Na(t, w) · d +� +ˆλa(t, w), q +� +≤ f (t ∧ w) +� +and +ua(t) := max +� +q : Na(t, w) · d +� +ˆλa(t, w), q +� +≤ f (t ∧ w) +� +. +Note that, the optimal arm at time t is denoted as a∗,t and µ∗,t is the corresponding optimal mean. Along the same lines, let +ℓ∗(t) := ℓa∗,t(t) and u∗(t) := ua∗,t(t). +Let Na(t) be the number of times arm a has been pulled till time t. To get an upper bound on the regret of our algorithm, +we first bound E[Na(t)] for all the non-optimal arms a (i.e., a ̸= a∗,t at time t). Recall that µi,t is the mean reward of arm i +at time step t. Let us define T (w) as the set of indices t ∈ {K + 1, . . . , T } such that µi,s = µi,t for all i ∈ {1, . . . , K} and +all t − w < s ≤ t. That is to say T (w) is the set of all time steps t ∈ {K + 1, . . . , T } for which there was no change in the +previous w time steps. Recall that ˆat is the arm chosen by the algorithm at time step t. Then, +E(Na(T )) = 1 + +T −1 +� +t=K +P(ˆat+1 = a) +≤ 1 + LT · w + +� +K≤t≤T −1, t∈T (w) +P(ˆat+1 = a). +Depending upon if ga and ga∗,t are increasing or decreasing there are four possible sub-cases: +• Both ga∗,t and ga are increasing. +(ˆat+1 = a) +⊆ +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, u∗(t) ≥ ga∗,t(µ∗,t) +� += +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a∗,t(u∗(t)) ≥ µ∗,t +� +since ga∗,t is increasing += +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a (ua(t)) ≥ µ∗,t +� +since Indexa ≥ Indexa∗,t += +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ (ˆat+1 = a, ua(t) ≥ ga(µ∗,t)) +since ga is increasing. +∴ E(Na(T )) ≤1 + LT · w + +� +K≤t≤T −1, t∈T (w) +P +� +u∗(t) < ga∗,t(µ∗,t) +� ++ +� +K≤t≤T −1, t∈T (w) +P (ˆat+1 = a, ua(t) ≥ ga(µ∗,t)) . +(3) +• ga∗,t is decreasing and ga is increasing. +(ˆat+1 = a) +⊆ +� +ℓ∗(t) > ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, ℓ∗(t) ≤ ga∗,t(µ∗,t) +� += +� +ℓ∗(t) > ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a∗,t(ℓ∗(t)) ≥ µ∗,t +� +since ga∗,t is decreasing += +� +ℓ∗(t) > ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a (ua(t)) ≥ µ∗,t +� +since Indexa ≥ Indexa∗,t += +� +ℓ∗(t) > ga∗,t(µ∗,t) +� +∪ (ˆat+1 = a, ua(t) ≥ ga(µ∗,t)) +since ga is increasing. + +∴ E(Na(T )) ≤1 + LT · w + +� +K≤t≤T −1, t∈T (w) +P +� +ℓ∗(t) > ga∗,t(µ∗,t) +� ++ +� +K≤t≤T −1, t∈T (w) +P (ˆat+1 = a, ua(t) ≥ ga(µ∗,t)) . +(4) +• ga∗,t is increasing and ga is decreasing. +(ˆat+1 = a) +⊆ +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, u∗(t) ≥ ga∗,t(µ∗,t) +� += +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a∗,t(u∗(t)) ≥ µ∗,t +� +since ga∗,t is increasing += +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a (ℓa(t)) ≥ µ∗,t +� +since Indexa > Indexa∗,t += +� +u∗(t) < ga∗,t(µ∗,t) +� +∪ (ˆat+1 = a, ℓa(t) ≤ ga(µ∗,t)) +since ga is decreasing. +∴ E(Na(T )) ≤1 + LT · w + +� +K≤t≤T −1, t∈T (w) +P +� +u∗(t) < ga∗,t(µ∗,t) +� ++ +� +K≤t≤T −1, t∈T (w) +P (ˆat+1 = a, ℓa(t) ≤ ga(µ∗,t)) . +(5) +• ga∗,t is decreasing and ga is decreasing. +(ˆat+1 = a) +⊆ +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +∪ +� +ˆat+1 = a, ℓ∗(t) ≤ ga∗,t(µa∗,t +� += +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a∗,t(ℓ∗(t)) ≥ µa∗,t +� +since ga∗,t is decreasing += +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +∪ +� +ˆat+1 = a, g−1 +a (ℓa(t)) ≥ µa∗,t +� +since Indexa > Indexa∗,t += +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +∪ +� +ˆat+1 = a, ℓa(t) ≤ ga(µa∗,t) +� +since ga is decreasing. +∴ E(Na(T )) ≤1 + LT · w + +� +K≤t≤T −1, t∈T (w) +P +� +ℓ∗(t) > ga∗,t(µa∗,t) +� ++ +� +K≤t≤T −1, t∈T (w) +P +� +ˆat+1 = a, ℓa(t) ≤ ga(µa∗,t) +� +. +(6) +We first upper bound the two sums +� +K≤t≤T −1, t∈T (w) +P +� +u∗(t) < ga∗,t(µ∗,t) +� +and +� +K≤t≤T −1, t∈T (w) +P +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +(7) +using that ℓ∗(t) and u∗(t) are respectively lower and upper confidence bound on ga∗,t(µ∗,t). Recall that min {t, w} is denoted +as t ∧ w. +P +� +ua∗,t < ga∗,t(µ∗,t) +� +≤ P +� +ga∗,t(µ∗,t) > ˆλa∗,t(t, w) and Na∗,t(t, w) · d +� +ˆλa∗,t(t, w), ga∗,t(µ∗,t) +� +≥ f (t ∧ w) +� +≤ P +� +∃s ∈ {1, . . . , (t ∧ w)} : ga∗,t(µ∗,t) > ˆλa∗,t,s and s · d(ˆλa∗,t,s, ga∗,t(µ∗,t)) ≥ f (t ∧ w) +� +≤ min +� +1, e ⌈f (t ∧ w) log t⌉ e−f(t∧w)� +, +(8) +where the upper bound follows from Lemma 2 in Capp´e et al. (2013), and the fact that ˆλa∗,t,s is the empirical mean of s +Bernoulli samples with mean ga∗,t(µ∗,t). Similarly, one has +P +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +≤ min +� +1, e ⌈f (t ∧ w) log t⌉ e−f(t∧w)� +. +(9) +As f(x) := log x + 3(log log x), for x ≥ 3, +e⌈f(x) log x⌉ ≤ 4e log2 x. + +Then, using Eq. (8) and Eq. (9), the two quantities in Eq. (7) can be upper bounded by +1 + +T −1 +� +t=3 +e ⌈f (t ∧ w) log t⌉ e−f(t∧w) ≤ 1 + +T −1 +� +t=3 +4e · log2 (t ∧ w) · e−f(t∧w) += 1 + 4e +T −1 +� +t=3 +1 +(t ∧ w) · log (t ∧ w) += 1 + 4e +w +� +t=3 +1 +(t ∧ w) · log (t ∧ w) + 4e +T +� +t=w+1 +1 +(t ∧ w) · log (t ∧ w) +≤ 1 + 4e +w +� +t=3 +1 +3 log 3 + 4e +T +� +t=w+1 +1 +w log w +≤ 1 + +4ew +3 log 3 + +4eT +w log w. +This proves that +� +K≤t≤T −1, t∈T (w) +P +� +u∗(t) < ga∗,t(µ∗,t) +� +≤ 1 + +4ew +3 log 3 + +4eT +w log w +and, +(10) +� +K≤t≤T −1, t∈T (w) +P +� +ℓ∗(t) > ga∗,t(µa∗,t) +� +≤ 1 + +4ew +3 log 3 + +4eT +w log w . +(11) +We now turn our attention to the other two sums involved in the upper bound we gave for E(Na(T )). Let the unknown time- +step at which ith change occurs be denoted as ti. For notational convenience, we assume that the first change occurs at t = 1 so +t1 = 1 and change L+1 takes place at t = T +1 where T is the horizon. We introduce the notation d+(x, y) = d(x, y)·1(xy). So we can write, when ga is increasing, +� +K≤t≤T −1, t∈T (w) +P (ˆat+1 = a, ua(t) ≥ ga(µ∗,t)) +≤ +L +� +i=1 +� +ti≤t