jackkuo commited on
Commit
989d013
·
verified ·
1 Parent(s): 25aafac

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NE0T4oBgHgl3EQfxAEX/content/tmp_files/2301.02639v1.pdf.txt +948 -0
  2. -NE0T4oBgHgl3EQfxAEX/content/tmp_files/load_file.txt +0 -0
  3. .gitattributes +2 -0
  4. 09E4T4oBgHgl3EQfZwye/content/tmp_files/2301.05059v1.pdf.txt +1610 -0
  5. 09E4T4oBgHgl3EQfZwye/content/tmp_files/load_file.txt +0 -0
  6. 0dFJT4oBgHgl3EQfjix9/content/tmp_files/2301.11575v1.pdf.txt +776 -0
  7. 0dFJT4oBgHgl3EQfjix9/content/tmp_files/load_file.txt +0 -0
  8. 39FKT4oBgHgl3EQfRS0O/content/tmp_files/2301.11770v1.pdf.txt +1644 -0
  9. 39FKT4oBgHgl3EQfRS0O/content/tmp_files/load_file.txt +0 -0
  10. 39FRT4oBgHgl3EQfozcR/content/tmp_files/2301.13610v1.pdf.txt +1019 -0
  11. 39FRT4oBgHgl3EQfozcR/content/tmp_files/load_file.txt +0 -0
  12. 4tFAT4oBgHgl3EQfFByL/vector_store/index.faiss +3 -0
  13. 89E3T4oBgHgl3EQfSAmG/content/tmp_files/2301.04428v1.pdf.txt +1133 -0
  14. 89E3T4oBgHgl3EQfSAmG/content/tmp_files/load_file.txt +0 -0
  15. 8dE3T4oBgHgl3EQfqgpk/content/tmp_files/2301.04652v1.pdf.txt +983 -0
  16. 8dE3T4oBgHgl3EQfqgpk/content/tmp_files/load_file.txt +0 -0
  17. BNFIT4oBgHgl3EQf_iwr/content/tmp_files/2301.11415v1.pdf.txt +1343 -0
  18. BNFIT4oBgHgl3EQf_iwr/content/tmp_files/load_file.txt +0 -0
  19. E9E4T4oBgHgl3EQffg1w/content/tmp_files/2301.05108v1.pdf.txt +1716 -0
  20. E9E4T4oBgHgl3EQffg1w/content/tmp_files/load_file.txt +0 -0
  21. FNE5T4oBgHgl3EQfVQ8Q/content/tmp_files/2301.05549v1.pdf.txt +471 -0
  22. FNE5T4oBgHgl3EQfVQ8Q/content/tmp_files/load_file.txt +322 -0
  23. GtE1T4oBgHgl3EQfFQMH/content/tmp_files/2301.02899v1.pdf.txt +1418 -0
  24. GtE1T4oBgHgl3EQfFQMH/content/tmp_files/load_file.txt +0 -0
  25. H9E4T4oBgHgl3EQfIAys/content/tmp_files/2301.04909v1.pdf.txt +1008 -0
  26. H9E4T4oBgHgl3EQfIAys/content/tmp_files/load_file.txt +0 -0
  27. L9FAT4oBgHgl3EQfxB4e/content/tmp_files/2301.08684v1.pdf.txt +2278 -0
  28. L9FAT4oBgHgl3EQfxB4e/content/tmp_files/load_file.txt +0 -0
  29. LNAyT4oBgHgl3EQfgPhD/content/2301.00354v1.pdf +3 -0
  30. LNE0T4oBgHgl3EQfiwE-/content/tmp_files/2301.02449v1.pdf.txt +337 -0
  31. LNE0T4oBgHgl3EQfiwE-/content/tmp_files/load_file.txt +240 -0
  32. M9FQT4oBgHgl3EQfVza8/content/tmp_files/2301.13302v1.pdf.txt +0 -0
  33. M9FQT4oBgHgl3EQfVza8/content/tmp_files/load_file.txt +0 -0
  34. MdE0T4oBgHgl3EQfSwDa/content/tmp_files/2301.02228v1.pdf.txt +2077 -0
  35. MdE0T4oBgHgl3EQfSwDa/content/tmp_files/load_file.txt +0 -0
  36. NdFJT4oBgHgl3EQfGyyu/content/tmp_files/2301.11449v1.pdf.txt +767 -0
  37. NdFJT4oBgHgl3EQfGyyu/content/tmp_files/load_file.txt +438 -0
  38. PtE2T4oBgHgl3EQfVgea/content/tmp_files/2301.03824v1.pdf.txt +2109 -0
  39. PtE2T4oBgHgl3EQfVgea/content/tmp_files/load_file.txt +0 -0
  40. Q9E4T4oBgHgl3EQflA2r/content/tmp_files/2301.05156v1.pdf.txt +731 -0
  41. Q9E4T4oBgHgl3EQflA2r/content/tmp_files/load_file.txt +427 -0
  42. SNE3T4oBgHgl3EQfDglb/content/tmp_files/2301.04287v1.pdf.txt +1844 -0
  43. SNE3T4oBgHgl3EQfDglb/content/tmp_files/load_file.txt +0 -0
  44. XNFJT4oBgHgl3EQf5S05/content/tmp_files/2301.11669v1.pdf.txt +3568 -0
  45. XNFJT4oBgHgl3EQf5S05/content/tmp_files/load_file.txt +0 -0
  46. ZNFPT4oBgHgl3EQfuTUu/content/tmp_files/2301.13155v1.pdf.txt +1417 -0
  47. ZNFPT4oBgHgl3EQfuTUu/content/tmp_files/load_file.txt +0 -0
  48. dNE2T4oBgHgl3EQfGAZK/vector_store/index.pkl +3 -0
  49. hNAzT4oBgHgl3EQfMvs5/content/tmp_files/2301.01136v1.pdf.txt +2030 -0
  50. hNAzT4oBgHgl3EQfMvs5/content/tmp_files/load_file.txt +0 -0
-NE0T4oBgHgl3EQfxAEX/content/tmp_files/2301.02639v1.pdf.txt ADDED
@@ -0,0 +1,948 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02639v1 [math.RA] 6 Jan 2023
2
+ Filtered skew derivations on simple artinian rings
3
+ Adam Jones, William Woods
4
+ January 9, 2023
5
+ Abstract
6
+ Given a complete, positively filtered ring (R, f) and a compatible skew derivation (σ, δ),
7
+ we may construct its skew power series ring R[[x; σ, δ]]. Due to topological obstructions,
8
+ even if δ is an inner σ-derivation, in general we cannot “untwist” it, i.e. reparametrise to
9
+ find a filtered isomorphism R[[x; σ, δ]] ∼= R[[x′; σ]], as might be expected from the theory
10
+ of skew polynomial rings; similarly when σ is an inner automorphism. We find general
11
+ conditions under which it is possible to untwist the multiplication data, and use this to
12
+ analyse the structure of R[[x; σ, δ]] in the simplest case when R is a matrix ring over a
13
+ (noncommutative) noetherian discrete valuation ring.
14
+ Contents
15
+ 1
16
+ Introduction
17
+ 2
18
+ 1.1
19
+ Maximal orders in semisimple artinian rings . . . . . . . . . . . . . . . . . . . .
20
+ 2
21
+ 1.2
22
+ Untwisting skew derivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
+ 4
24
+ 1.3
25
+ Ideal contraction and simplicity . . . . . . . . . . . . . . . . . . . . . . . . . . .
26
+ 5
27
+ 1.4
28
+ Uniform dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29
+ 5
30
+ 2
31
+ Preliminaries
32
+ 6
33
+ 2.1
34
+ Filtered rings and discrete valuation rings
35
+ . . . . . . . . . . . . . . . . . . . . .
36
+ 6
37
+ 2.2
38
+ Skew derivations on semisimple artinian rings
39
+ . . . . . . . . . . . . . . . . . . .
40
+ 6
41
+ 2.3
42
+ Compatible filtrations and skew power series rings . . . . . . . . . . . . . . . . .
43
+ 7
44
+ 2.4
45
+ Discrete valuation rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
+ 8
47
+ 3
48
+ Reparametrising filtered skew derivations
49
+ 9
50
+ 3.1
51
+ Conditions for identical filtrations . . . . . . . . . . . . . . . . . . . . . . . . . .
52
+ 9
53
+ 4
54
+ Skew derivations on semisimple artinian rings
55
+ 11
56
+ 4.1
57
+ Reducing to orbits
58
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
59
+ 11
60
+ 4.2
61
+ Untwisting inner automorphisms . . . . . . . . . . . . . . . . . . . . . . . . . . .
62
+ 13
63
+ 4.3
64
+ Untwisting inner σ-derivations . . . . . . . . . . . . . . . . . . . . . . . . . . . .
65
+ 14
66
+ 5
67
+ Applications
68
+ 15
69
+ 5.1
70
+ Polynomial elements
71
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
72
+ 15
73
+ 5.2
74
+ Uniform dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
75
+ 16
76
+ 1
77
+
78
+ 1
79
+ Introduction
80
+ Let R be a ring and (σ, δ) a skew derivation on R: that is, σ is an automorphism of R, and δ
81
+ is a left σ-derivation on R, i.e. a linear map R → R satisfying δ(ab) = δ(a)b + σ(a)δ(b) for all
82
+ a, b ∈ R. Then we may define the skew polynomial ring R[x; σ, δ] as the unique ring which is
83
+ equal to R[x] as a left R-module and whose multiplication is given by xr = σ(r)x + δ(r) for all
84
+ r ∈ R.
85
+ In the theory of skew polynomial rings (see §1.2 below), it is well known that, if σ is an
86
+ inner automorphism of R, then there exists some x′ ∈ R[x; σ, δ] such that R[x; σ, δ] = R[x′; δ′]
87
+ for some derivation δ′; and likewise, if δ is an inner σ-derivation of R, then there exists some
88
+ x′ ∈ R[x; σ, δ] such that R[x; σ, δ] = R[x′; σ]. This is a crucial and frequently used simplification
89
+ in the theory: see e.g. [7, §2.3(iii), Theorem 14.9] or [6, Proposition 3.10].
90
+ We are primarily interested in skew power series rings, where there are many extra topological
91
+ difficulties to deal with.
92
+ Firstly: given an arbitrary ring R and an arbitrary skew derivation (σ, δ) on R, it is in general
93
+ not true that there exists a well-defined multiplication of the above form on the left module
94
+ R[[x]] without imposing some kind of convergence condition on the multiplication data. Our
95
+ primary motivation comes from studying the completed group algebras of certain finite-rank
96
+ pro-p groups (these completed group algebras are also known as Iwasawa algebras), where the
97
+ following notions are appropriate. If (R, v) is a complete, N-filtered ring, and (σ, δ) is compatible
98
+ with v (in the sense of Definition 2.4 below), then we can define the skew power series ring
99
+ R[[x; σ, δ]] =
100
+ ��
101
+ n≥0
102
+ rnxn : rn ∈ R
103
+
104
+ ,
105
+ which is also a complete N-filtered ring. (If v has values in Z∪{∞} rather than N ∪{∞}, then
106
+ we can define an appropriate notion of bounded skew power series ring – see [10] for details –
107
+ but we do not deal with such rings in this paper.)
108
+ Secondly: suppose that there exists t ∈ R such that δ(r) = tr − σ(r)t, an inner σ-derivation.
109
+ Then, if we reparametrise the skew polynomial ring by changing our variable from x to x′ = x+t,
110
+ we find that R[x; σ, δ] = R[x′; σ]: in passing from x to x′, we will say that we have untwisted δ
111
+ from R[x; σ, δ]. This is beneficial as rings of the form R[x′; σ] (with zero derivation) are typically
112
+ much easier to understand. (There is a similar procedure by which inner automorphisms σ can
113
+ be untwisted.) However, under a reparametrisation like this, it is generally not true that we will
114
+ have R[[x]] = R[[x′]] even as left R-modules (see Example 3.1), meaning that this simplification
115
+ is not always available.
116
+ 1.1
117
+ Maximal orders in semisimple artinian rings
118
+ The main result of this paper uses this notion of untwisting to analyse the structure of skew
119
+ power series rings. To state this result, we need to impose further conditions on the base ring,
120
+ since general filtered rings are too pathological for us to be able to say much of consequence.
121
+ The rings of interest, which we denote by O, will typically be specific maximal orders in certain
122
+ complete, filtered semisimple artinian rings Q. These are often well-behaved enough that inner
123
+ parts of the multiplication data (σ, δ) can always be untwisted from O[[x; σ, δ]], making a study
124
+ of these skew power series rings tractable using our methods.
125
+ Rings of this form are highly abundant, since beginning with a sufficiently nice filtered ring R,
126
+ it is possible to produce such a ring O which is closely related to R due to [1, §3, Theorem C
127
+ 2
128
+
129
+ and proof]. For instance, the authors of the present paper proved the results of [10] by relating
130
+ skew power series rings over R to skew power series rings over Q(O).
131
+ In short, we will take Q to be a semisimple artinian ring throughout, and we will assume that
132
+ it is complete with respect to a filtration vQ. Naturally, by the Artin-Wedderburn theorem, Q
133
+ is isomorphic to a finite direct product of full matrix rings over division rings F1, · · · , Fd, and
134
+ we will usually construct our maximal order O in Q by simply taking maximal orders in the Fi.
135
+ More specifically, we will assume that the data (Q, O, vQ) satisfies some or all of the following
136
+ hypotheses:
137
+ Hypotheses.
138
+ (H1) We can realise Q as a product Q = A1 × · · · × Ad, where the rings A1, . . . , Ad form the
139
+ minimal non-zero ideals of Q, O = O1 × · · · × Od for some maximal order Oi in Ai. and
140
+ for each i = 1, . . . , d, we are given
141
+ • a complete discrete valuation ring Di (defined as in §2.4 below),
142
+ • its Goldie ring of quotients Fi (with its induced filtration vFi: see §2.4),
143
+ • the full matrix rings Mn(Di) ⊆ Mn(Fi) (with the matrix filtration Mn(vFi): see
144
+ Definition 2.1.2),
145
+ • filtered ring isomorphisms ιi : Ai → Mn(Fi) such that Oi = ι−1
146
+ i (Mn(Di)).
147
+ In this context, we will write D and F for the products of the Di and Fi respectively, and
148
+ they will be given their respective product filtrations (see Definition 2.1.1), which we will
149
+ sometimes denote vD and vF.
150
+ It will also sometimes be convenient to identify Mn(F) = Mn(F1) × · · · × Mn(Fd). We
151
+ will write ι : Q → Mn(F) for the induced filtered isomorphism, and we assume that
152
+ vQ = Mn(vF) ◦ ι.
153
+ (H2) The skew derivation (σ, δ) is compatible with vQ (defined as in §2.3 below).
154
+ (H3) The automorphism σ permutes the minimal nonzero ideals A1, . . . , Ad of Q transitively.
155
+ It will additionally be convenient to name the following hypothesis:
156
+ (S) In the context of (H1), d = 1: that is, Q is simple artinian, F is a division ring, D is a
157
+ complete discrete valuation ring, etc.
158
+ Remarks.
159
+ • Hypotheses (H1) + (S) are the context of [1, §3, particularly 3.14]: our Q is there called
160
+ Q(B), and it can be realised as a simple quotient of the artinian ring called �Q.
161
+ • It follows from (H1) that vF is the J(D)-adic filtration on F, and hence vQ is the J(O)-adic
162
+ filtration on Q.
163
+ • Hypothesis (H2) is a crucial hypothesis when working with filtered skew power series rings:
164
+ many natural and important examples of filtered skew power series rings satisfy some
165
+ kind of compatibility criterion (see e.g. [10,13,19], [20, §§2.4–2.5]), and this compatibility
166
+ criterion ensures that the ring multiplication is well defined (see §1.2). Note that, in
167
+ particular, together with (H1) it implies that σ preserves O.
168
+ • Hypothesis (H3) is a mild simplification. In fact, our results can also deal with the more
169
+ general case where Q ∼= �d
170
+ i=1 Mni(Fi) (note that the ni may be different!) and σ has
171
+ multiple orbits, by applying the techniques of §4.1 to reduce easily to a case satisfying
172
+ (H3).
173
+ Assuming these hypotheses, our main result allows us to realise the skew power series ring
174
+ O[[x; σ, δ]] in a form that allows us to reduce to the study of skew-power series rings over the
175
+ division rings Di, a much less daunting task:
176
+ 3
177
+
178
+ Theorem A. If (Q, O, vQ) satisfy hypotheses (H1-3), with F, D, vF, ι defined as in the state-
179
+ ments of the hypotheses, then there exists a skew derivation (τ, θ) on F, compatible with vF,
180
+ and an isomorphism of filtered rings ϕ : O[[x; σ, δ]] → Mn(D[[y; τ, θ]]) extending ι|O, where y
181
+ is the image of ax − t for some a ∈ O×, t ∈ J(O).
182
+ Note that this statement makes sense, because if (τ, θ) is compatible with vF, which is the
183
+ J(D)-adic filtration, then it follows that τ and θ preserve D, and hence (τ, θ) restricts to a
184
+ compatible skew-derivation of D.
185
+ It also follows from Theorem A that the Krull dimension of O[[x; σ, δ]] is equal to the Krull
186
+ dimension of D[[y; τ, θ]], which is 2, by similar methods to those of [20, §3.1 and Theorem 3.3].
187
+ 1.2
188
+ Untwisting skew derivations
189
+ In order to prove our main result, we first find general conditions under which inner parts of
190
+ the multiplication data (σ, δ) may be untwisted from R[[x; σ, δ]]:
191
+ Notation. Given a ring R and an invertible element a ∈ R×, we will write ca for the inner
192
+ automorphism of R defined by ca(r) = ara−1 for all r ∈ R. Also, given an element t ∈ R, we
193
+ will write dσ,t for the inner σ-derivation of R defined by dσ,t(r) = tr − σ(r)t for all r ∈ R.
194
+ Let R be a ring and (σ, δ) a skew derivation on R, and fix a ∈ R× and t ∈ R. In the study
195
+ of skew polynomial rings, it is often useful to reparametrise the ring R[x; σ, δ], i.e. replace the
196
+ variable x with a new, more convenient variable y ∈ R[x; σ, δ], usually taken to be y = ax or
197
+ y = x − t. It is easy to see that R[ax] = R[x − t] = R[x] as R-modules, and a calculation of
198
+ the multiplication data shows that
199
+ (ax)r = a(σ(r)x + δ(r)) = (aσ(r)a−1)(ax) + aδ(r)
200
+ and
201
+ (x − t)r = σ(r)x + δ(r) − tr = σ(r)(x − t) + δ(r) − (tr − σ(r)t),
202
+ from which we can conclude that
203
+ • R[x; σ, δ] = R[ax; caσ, aδ],
204
+ • R[x; σ, δ] = R[x − t; σ, δ − dσ,t]
205
+ as rings. This reparametrisation is a powerful tool in the study of skew polynomial rings, as it
206
+ effectively implies that inner automorphisms and σ-derivations can be “untwisted” to become
207
+ trivial.
208
+ In the case of filtered skew power series rings R[[x; σ, δ]], we can no longer reparametrise arbi-
209
+ trarily due to the topology: that is, given a prospective new variable y ∈ R[[x; σ, δ]], it is no
210
+ longer clear when R[[x]] = R[[y]] as modules. Our second main result gives clear and broadly
211
+ applicable sufficient conditions.
212
+ Theorem B. Let (R, v) be a complete filtered ring, and suppose that (σ, δ) is a compatible
213
+ skew derivation on R. Fix a ∈ R× and t ∈ R.
214
+ (i) If v(a) = v(a−1) = 0, then Rb[[x; σ, δ]] = Rb[[ax; caσ, caδ]] as filtered rings.
215
+ (ii) If v(t) ≥ 1, then Rb[[x; σ, δ]] = Rb[[x − t; σ, δ + dσ,t]] as filtered rings.
216
+ (By the phrase “as filtered rings” here, we mean that they are equal as rings, and that the
217
+ standard filtrations as defined in (2.1) are equal: i.e. in the notation of (2.1), we have fv,x = fv,ax
218
+ in part (i) and fv,x = fv,x−t in part (ii).)
219
+ 4
220
+
221
+ This is proved at the end of §3.
222
+ 1.3
223
+ Ideal contraction and simplicity
224
+ In §5 we will prove some results that follow as consequences from our main theorems. The first
225
+ of these addresses the following question: when is R[[x; σ, δ]] a simple ring?
226
+ Let R ⊆ S be rings. Then we will say that an ideal I ✁ S is R-disjoint if I ∩ R = 0.
227
+ Let R be a simple ring and (σ, δ) a skew derivation on R. It is often useful to ask when R[x; σ, δ]
228
+ is also a simple ring: see e.g. [5, §3] or [18]. This is clearly equivalent to the statement that
229
+ R[x; σ, δ] has no nonzero R-disjoint ideals. However, the ideal generated by x is a nonzero
230
+ R-disjoint ideal in the case when δ = 0, and similarly – by untwisting – there exist nonzero
231
+ R-disjoint ideals more generally when δ is inner. This suggests that inner derivations have a
232
+ role to play in the simplicity of R[x; σ, δ].
233
+ The correct generalisation of “inner” is as follows. The following are equivalent [12, Theorem
234
+ 2.6, Corollary 2.7]:
235
+ (i) R[x; σ, δ] has nonzero R-disjoint ideals,
236
+ (ii) δ is a quasi-algebraic σ-derivation, i.e. there exists an endomorphism θ of R, an inner
237
+ θ-derivation D of R, and elements 0 ̸= an, an−1, . . . , a1, b ∈ R (for some n ≥ 1) such that
238
+ anδn(r) + an−1δn−1(r) + · · · + a1δ(r) = bD(r)
239
+ for all r ∈ R. (In fact, n and θ can be chosen so that θ = σn [12, §2].)
240
+ There are also equivalent conditions phrased in the language of invariant and semi-invariant
241
+ polynomials. Many further such results, and references to the historical literature on these
242
+ matters, are given in [11,12]. See [9, Theorem 3.4] or [4, §3] for examples of the usefulness of
243
+ conditions involving R-disjoint ideals.
244
+ Theorem C. If we assume that the data (Q, O, vQ) satisfies Hypotheses (H1–3) + (S), then
245
+ O[[x; σ, δ]] has no nonzero O[x; σ, δ]-disjoint ideals. It follows that if Q[x; σ, δ] is a simple ring,
246
+ then Q ⊗O O[[x; σ, δ]] is a simple ring.
247
+ 1.4
248
+ Uniform dimension
249
+ Recall that the uniform dimension (also called Goldie dimension or Goldie rank) of a right
250
+ R-module M is defined as follows. We set udim(MR) = n if and only if there are uniform
251
+ submodules U1, . . . , Un ≤ M, pairwise intersecting in zero, such that U1 ⊕ · · · ⊕ Un ≤ M is an
252
+ essential submodule [17, 2.2.9]. If R is a ring, we write r.udim(R) := udim(RR) for its (right)
253
+ uniform dimension.
254
+ Uniform dimension is preserved under skew polynomial extensions in many cases of interest.
255
+ For instance, Goodearl and Letzter showed that r.udim(R[x; σ, δ]) = r.udim(R) if R is a prime
256
+ noetherian ring [7, Lemma 1.2], and Matczuk [16] showed that this equality holds in an even
257
+ broader range of cases, including the case where R is semiprime right Goldie.
258
+ More recently, the study of uniform dimension under skew power series extensions was initi-
259
+ ated by Letzter and Wang in the paper [14]. Let S = R[[x; σ]] be a pure automorphic skew
260
+ power series extension (i.e. δ = 0): then, if R is semiprime right noetherian, we have that
261
+ r.udim(S) = r.udim(R) by [14, Theorem 2.8].
262
+ 5
263
+
264
+ Of course, if (R, v) is a complete positively filtered ring, (σ, δ) is a compatible skew deriva-
265
+ tion on R, and δ happens to be an inner σ-derivation of the form described in Theorem
266
+ A(ii), say δ = dσ,t for some t ∈ R satisfying v(t) ≥ 1, then it follows from Theorem A that
267
+ R[[x; σ, δ]] = R[[y; σ]] after setting y = x + t. This puts us immediately into the context of [14],
268
+ allowing us to conclude that r.udim(R[[x; σ, δ]]) = r.udim(R) in this context too.
269
+ Now assume Hypotheses (H1–3) + (S) and their notation: in particular, recall that O ∼= Mn(D).
270
+ We prove the following result only under these rather stringent restrictions, but this is (to our
271
+ knowledge) the first such result for skew power series extensions with nontrivial derivations, and
272
+ unlike the previous paragraph, it covers the case of some outer σ-derivations using methods
273
+ unlike those of [14]. We hope that, combined with the localisation process for filtered rings
274
+ outlined in [1, §3 and Theorem C], this will spark further research for more general filtered
275
+ skew power series rings. In §5.2, we prove:
276
+ Theorem D. If we assume that the data (Q, O, vQ) satisfies Hypotheses (H1-3) + (S), then
277
+ r.udim(O[[x; σ, δ]]) = r.udim(O).
278
+ 2
279
+ Preliminaries
280
+ 2.1
281
+ Filtered rings and discrete valuation rings
282
+ Our conventions for filtrations (which, in this paper, are always separated Z-filtrations) are as
283
+ follows.
284
+ A (ring) filtration on a ring R is a function f : R → Z∪{∞} satisfying the following properties
285
+ for all r, s ∈ R:
286
+ (i) f(1) = 0,
287
+ (ii) f(r + s) ≥ min{f(r), f(s)},
288
+ (iii) f(rs) ≥ f(r) + f(s),
289
+ (iv) f(r) = ∞ if and only if r = 0.
290
+ We will say that (R, f) is a filtered ring for short. If f takes values in N ∪ {∞}, we will say
291
+ that (R, f) is N-filtered or positively filtered.
292
+ Definition 2.1.
293
+ 1. If (A, fA) and (B, fB) are filtered rings, the product filtration f := fA × fB on R = A × B
294
+ is given by f(a, b) = min{fA(a), fB(b)}.
295
+ 2. If (A, f) is a filtered ring and n ≥ 2 is an integer, the matrix filtration g := Mn(f) on
296
+ Mn(A) is given by g(� aijeij) = mini,j{f(aij)}, where {eij}1≤i,j≤n is the standard set of
297
+ matrix units of Mn(A).
298
+ 2.2
299
+ Skew derivations on semisimple artinian rings
300
+ Let R be a ring. The pair (σ, δ) is called a skew derivation on R if σ ∈ Aut(R) and δ is a (left)
301
+ σ-derivation of R, which means that δ is a linear map satisfying δ(rs) = δ(r)s + σ(r)δ(s) for
302
+ all r, s ∈ R.
303
+ Here are some basic properties:
304
+ 6
305
+
306
+ Suppose that Q is a semisimple artinian ring (without topology), say Q = �d
307
+ i=1 Ai as a product
308
+ of two-sided ideals, where each Ai ∼= Mni(Fi) as rings for some positive integers ni and division
309
+ rings Fi. Suppose that (σ, δ) is a skew derivation on Q. We list some well-known facts.
310
+ Properties 2.2.
311
+ 1. There exists a permutation ρ of the indices {1, . . . , d} such that σ(Ai) = Aρ(i) and
312
+ δ(Ai) ⊆ Ai + Aρ(i). Hence, if S is an orbit of ρ, then setting B := �
313
+ i∈S Ai and σ′ = σ|B,
314
+ δ′ = δ|B, we get that (σ′, δ′) is a skew derivation of B. [3, 1.1–1.3]
315
+ 2. Suppose that ρ permutes {1, . . . , d} transitively. Then n1 = · · · = nd (= n, say), so that
316
+ there exists an isomorphism ι : Q → Mn(F1 × · · · × Fd). Writing F := F1 × · · · × Fd,
317
+ we can then write σ as η ◦ Mn(τ)ι, where η is an inner automorphism of Q and τ is an
318
+ automorphism of F. [3, 2.1–2.4] (Here, and elsewhere, Mn(τ)ι means ι−1Mn(τ)ι.)
319
+ 3. Suppose further that η is trivial, so σ = Mn(τ)ι. Then δ = ε + Mn(θ)ι, where ε is an
320
+ inner σ-derivation of Q and θ is a τ-derivation of F. [3, 2.5]
321
+ Remark 2.3. In fact, in the context of Property 2.2.3, if d > 1 then something stronger holds:
322
+ θ can be taken to be the zero map, so that δ itself is an inner σ-derivation [3, 1.4]. However, in
323
+ the context of filtered rings, we will allow θ to be nonzero, as this extra flexibility is crucial for
324
+ ensuring that the decomposition δ = ε + Mn(θ)ι behaves well with respect to the filtration.
325
+ 2.3
326
+ Compatible filtrations and skew power series rings
327
+ Definition 2.4. Let (R, v) be a filtered ring and (σ, δ) a skew derivation on R. We will say
328
+ that (σ, δ) is (weakly) compatible with v if v(σ(r)) = v(r) and v(δ(r)) > v(r) for all 0 ̸= r ∈ R.
329
+ Remark 2.5. This is more general than the notion of “compatibility” used by the authors in [10],
330
+ which could be called strong compatibility.
331
+ Definition 2.6. Let (R, v) be a complete, positively filtered ring, i.e. R is a ring admitting a
332
+ separated discrete filtration v : R → N ∪ {∞} with respect to which R is complete.
333
+ The set R[[x]] :=
334
+
335
+ n≥0
336
+ Rxn, whose elements are formal sums r0 + r1x + r2x2 + . . . over arbitrary
337
+ ri ∈ R, is a left R-module. This is a complete filtered R-module with standard filtration
338
+ f := fv,x : R[[x]] → N ∪ {∞},
339
+ given by
340
+ f
341
+ ��
342
+ i≥0
343
+ rixi
344
+
345
+ = inf
346
+ i≥0{v(ri) + i},
347
+ (2.1)
348
+ which is separated and discrete. Note that R[x] is dense in R[[x]].
349
+ A skew derivation (σ, δ) on R makes R[x] into a ring, with multiplication determined uniquely
350
+ by the rule xr = σ(r)x + δ(r). We write this ring as R[x; σ, δ].
351
+ If (σ, δ) is compatible with v, then it induces a well-defined associative multiplication on R[[x]]
352
+ in the same way: see [10, Proposition 1.17] (cf. [19, Lemma 2.1] or [13, §3.4]), and we denote this
353
+ ring by R[[x; σ, δ]]. The function f on R[[x; σ, δ]] as defined above is a positive ring filtration,
354
+ and R[[x; σ, δ]] is complete with respect to f.
355
+ 7
356
+
357
+ 2.4
358
+ Discrete valuation rings
359
+ Definition 2.7. Following Ardakov [1], we will say that a discrete valuation ring is a noetherian
360
+ domain D with the property that, for every nonzero x ∈ Q(D) (the division ring of quotients),
361
+ we have either x ∈ D or x−1 ∈ D.
362
+ We begin by showing that D has properties very similar to those of commutative discrete
363
+ valuation rings.
364
+ Lemma 2.8. Let D be a discrete valuation ring.
365
+ (i) D is a local ring.
366
+ (ii) All right (resp. left) ideals of D are principal.
367
+ (iii) The lattice of right (resp. left) ideals of D is totally ordered.
368
+ (iv) All right (resp. left) ideals of D are two-sided.
369
+ Proof. In the language of [15], D is a noetherian total subring of the skew field Q(D), and
370
+ statements (i–iii) follow from [15, Proposition 1.2.15].
371
+ The proof of (iv) below is adapted from [2, Lemma 1]. We give the proof for right ideals; the
372
+ proof for left ideals is of course similar.
373
+ Suppose there exist right ideals of D that are not two-sided, and let J be the maximal such
374
+ right ideal. By (ii), J = aD for some a ∈ D: then, for some r ∈ D, we have ra =: b ̸∈ aD by
375
+ assumption. By (iii), this implies aD ⊊ bD, and so a = bs for some s ∈ D. Combining these
376
+ two equations, we can see that b = rbs.
377
+ Now, by the maximality of J, we have that Db ⊆ DbD = bD, so that rb = bt for some t ∈ D.
378
+ In particular, b = bts, and so b(1 − ts) = 0. But b cannot be zero, so as D is a domain, we
379
+ must have ts = 1, and hence (as noetherian rings are Dedekind-finite) st = 1. It follows that
380
+ at = b, contradicting the assumption that b ̸∈ aD.
381
+ Proposition 2.9. Let D be a discrete valuation ring.
382
+ (i) J(D) = πD for some normal element π.
383
+ (ii) Every nonzero ideal of D has the form πnD for some n ∈ N.
384
+ Proof. (i) is an immediate consequence of Lemma 2.8.
385
+ To show (ii): note that Lemma 2.8(iv) also implies that D is an FBN ring [17, 6.4.7], and so
386
+ �∞
387
+ n=1 πnD = 0 by [8, Theorem 9.13]. We now argue exactly as in the commutative case: indeed,
388
+ a nonzero ideal aD must satisfy πn+1D ⊊ aD ⊆ πnD for some n by Lemma 2.8(iii), from which
389
+ it follows that a = πnu for some u ∈ D \ πD, which must be a unit by Lemma 2.8(i).
390
+ An element π as in the above proposition will be called a uniformiser of D.
391
+ In the following, D will continue to denote a complete discrete valuation ring, and we will also
392
+ set F = Q(D), O = Mn(D) and Q = Mn(F). Also write vF for the induced J(D)-adic filtration
393
+ on F, and suppose that (τ, θ) is a skew derivation on F compatible with vF; likewise write vQ
394
+ for the J(O)-adic filtration on Q, and suppose that (σ, δ) is a skew derivation on Q compatible
395
+ with vQ. This puts us essentially in the situation of Hypotheses (H1–3) + (S). The following is
396
+ now routine to check.
397
+ Corollary 2.10.
398
+ 8
399
+
400
+ (i) Let S be the multiplicatively closed set in D generated by π. Then F = S−1D = DS−1.
401
+ Moreover, π is normal in D[[y; τ, θ]], and F⊗DD[[y; τ, θ]] = S−1D[[y; τ, θ]] = D[[y; τ, θ]]S−1.
402
+ (ii) Let S be the multiplicatively closed set in O generated by π (where we identify D with
403
+ its diagonal embedding in O). Then Q = S−1O = OS−1. Moreover, π is normal in
404
+ O[[x; σ, δ]], and Q ⊗O O[[x; σ, δ]] = S−1O[[x; σ, δ]] = O[[x; σ, δ]]S−1.
405
+ 3
406
+ Reparametrising filtered skew derivations
407
+ Throughout this section, let (R, v) be a complete, positively filtered ring. Suppose also that
408
+ R admits a skew derivation (σ, δ) which is compatible with v, and take y ∈ R[x] such that
409
+ R[x] = R[y] (an equality of left R-modules).
410
+ Given an element �m
411
+ i=0 riyi ∈ R[y], we may define the function
412
+ fv,y :
413
+ m
414
+
415
+ i=0
416
+ riyi �→ inf
417
+ i≥0{v(ri) + i}.
418
+ Note that fv,x is the standard ring filtration defined in (2.1). In contrast, for arbitrary elements
419
+ y ∈ R[x], the function fv,y will not always be a ring filtration, and even when it is, it will
420
+ generally not be equivalent to fv,x.
421
+ Example 3.1. Take y := x + 1 ∈ Zp[x], and v the p-adic valuation on Zp. Then for all n, we
422
+ have fv,x((x+1)n) = 0 but fv,y((x+1)n) = n. In particular, Zp[x] = Zp[y] but Zp[[x]] ̸= Zp[[y]].
423
+ In this section, we identify two families of elements y ∈ R[x] for which fv,x and fv,y are equal
424
+ as functions.
425
+ 3.1
426
+ Conditions for identical filtrations
427
+ With notation as above, we first show that fv,x and fv,y are equal when y = x − t for some
428
+ t ∈ R satisfying v(t) ≥ 1.
429
+ Write (x − t)n = xn + βn,1xn−1 + · · · + βn,n−1x + βn,n for all n.
430
+ Lemma 3.2. For all n, i, we have v(βn,i) ≥ i.
431
+ Proof. Firstly, note that (x − t)βn,ixn−i = σ(βn,i)xn+1−i + (δ(βn,i) − tβn,i)xn−i, so (writing
432
+ βn,0 := 1 for ease of notation) we may calculate (x − t)n+1 as
433
+ (x − t)
434
+ � n
435
+
436
+ i=0
437
+ βn,ixn−i
438
+
439
+ =
440
+ n
441
+
442
+ i=0
443
+ σ(βn,i)xn+1−i +
444
+ n
445
+
446
+ j=0
447
+ (δ(βn,j) − t(βn,j))xn−j
448
+ = xn+1 +
449
+ n
450
+
451
+ i=1
452
+ (σ(βn,i) + δ(βn,i−1) − tβn,i−1)xn+1−i + (δ(βn,n) − tβn,n),
453
+ by setting j = i + 1 in the second sum. That is,
454
+
455
+
456
+
457
+
458
+
459
+ βn+1,0 = 1,
460
+ βn+1,i = σ(βn,i) + δ(βn,i−1) − tβn,i−1
461
+ (1 ≤ i ≤ n),
462
+ βn+1,n+1 = δ(βn,n) − tβn,n,
463
+ from which the claim follows by induction on n.
464
+ 9
465
+
466
+ Lemma 3.3. Let p(x) ∈ R[x] be a polynomial, and t ∈ R such that v(t) ≥ 1.
467
+ Then
468
+ fv,x(p(x − t)) ≥ fv,x(p(x)).
469
+ Proof. Write p(x) = r0 + r1x + · · · + rmxm. Then
470
+ p(x − t) =
471
+ m
472
+
473
+ n=0
474
+ rn(x − t)n =
475
+ m
476
+
477
+ n=0
478
+ rn
479
+ � n
480
+
481
+ i=0
482
+ βn,ixn−i
483
+
484
+ setting βn,0 := 1
485
+ =
486
+ m
487
+
488
+ j=0
489
+ � m
490
+
491
+ n=j
492
+ rnβn,n−j
493
+
494
+ xj
495
+ where j := n − i,
496
+ and so
497
+ fv,x(p(x − t)) = fv,x
498
+ � m
499
+
500
+ j=0
501
+ � m
502
+
503
+ n=j
504
+ rnβn,n−j
505
+
506
+ xj
507
+
508
+ =
509
+ inf
510
+ 0≤j≤m
511
+
512
+ v
513
+ � m
514
+
515
+ n=j
516
+ rnβn,n−j
517
+
518
+ + j
519
+
520
+
521
+ inf
522
+ 0≤j≤m
523
+ inf
524
+ j≤n≤m {v(rn) + v(βn,n−j) + j}
525
+ as v is a filtration
526
+
527
+ inf
528
+ 0≤j≤m
529
+ inf
530
+ j≤n≤m {v(rn) + n}
531
+ by Lemma 3.2
532
+ =
533
+ inf
534
+ 0≤n≤m {v(rn) + n}
535
+ = fv,x
536
+ � m
537
+
538
+ n=0
539
+ rnxn
540
+
541
+ = fv,x(p(x)).
542
+ Proposition 3.4. Let t ∈ R such that v(t) ≥ 1. Then fv,x = fv,x−t.
543
+ Proof. Take an arbitrary element p(x) ∈ R[x]. Then
544
+ fv,x(p(x)) ≤ fv,x(p(x + t))
545
+ applying Lemma 3.3 to − t
546
+ = fv,x−t(p(x))
547
+ changing variables x �→ x − t throughout
548
+ ≤ fv,x−t(p(x − t))
549
+ applying Lemma 3.3 to t
550
+ = fv,x(p(x))
551
+ changing variables x �→ x + t throughout,
552
+ from which we can conclude that fv,x(p(x)) = fv,x−t(p(x)).
553
+ Next, we show that fv,x and fv,y are equal when y = ax where a ∈ R× and v(a) = v(a−1) = 0.
554
+ Write (ax)n = γn,0xn + γn,1xn−1 + · · · + γn,n−1x + γn,n.
555
+ Lemma 3.5. v(γn,i) ≥ i.
556
+ Proof. As in Lemma 3.2, calculating (ax)n+1 = ax(γn,0xn +γn,1xn−1 +· · ·+γn,n−1x+γn,n) gives
557
+
558
+
559
+
560
+
561
+
562
+ γn+1,0 = aσ(γn,0),
563
+ γn+1,i = aσ(γn,i) + aδ(γn,i−1)
564
+ (1 ≤ i ≤ n),
565
+ γn+1,n+1 = aδ(γn,n),
566
+ and we may perform induction as in Lemma 3.2.
567
+ 10
568
+
569
+ Lemma 3.6. fv,x(p(ax)) ≥ fv,x(p(x)).
570
+ Proof.
571
+ p(ax) =
572
+ m
573
+
574
+ n=0
575
+ rn(ax)n =
576
+ m
577
+
578
+ n=0
579
+ rn
580
+ � n
581
+
582
+ i=0
583
+ γn,ixn−i
584
+
585
+ =
586
+ m
587
+
588
+ j=0
589
+ � m
590
+
591
+ n=j
592
+ rnγn,n−j
593
+
594
+ xj
595
+ where j := n − i,
596
+ and so
597
+ fv,x(p(ax)) = fv,x
598
+ � m
599
+
600
+ j=0
601
+ � m
602
+
603
+ n=j
604
+ rnγn,n−j
605
+
606
+ xj
607
+
608
+ ,
609
+ and the proof now proceeds exactly as in the proof of Lemma 3.3.
610
+ Proposition 3.7. fv,x = fv,ax.
611
+ Proof. Take an arbitrary element p(x) ∈ R[x]. Then
612
+ fv,x(p(x)) ≤ fv,x(p(a−1x))
613
+ applying Lemma 3.6 to a−1
614
+ = fv,ax(p(x))
615
+ changing variables x �→ ax throughout
616
+ ≤ fv,ax(p(ax))
617
+ applying Lemma 3.6 to a
618
+ = fv,x(p(x))
619
+ changing variables x �→ a−1x throughout,
620
+ from which we can conclude that fv,x(p(x)) = fv,ax(p(x)).
621
+ Finally, we fix any y ∈ R[x] such that R[x] = R[y] and fv,x = fv,y. Denote this common
622
+ filtration by f. It follows that:
623
+ Theorem 3.8. R[[x]] = R[[y]] as filtered left R-modules.
624
+ Proof of Theorem B. In case (i), set y = ax, so that f := fv,x = fv,y by Proposition 3.7; in
625
+ case (ii), set y = x − t, and use Proposition 3.4. In both cases, R[x] = R[y]. Now Theorem 3.8
626
+ implies that R[[y]] and R[[x]] can be identified as filtered modules, and the multiplication data
627
+ has already been calculated in §1.2, so the conclusion follows.
628
+ 4
629
+ Skew derivations on semisimple artinian rings
630
+ 4.1
631
+ Reducing to orbits
632
+ For now, we do not assume any of the Hypotheses (H1–3), and we let (R, v) be an arbitrary
633
+ filtered ring such that R admits a decomposition R ∼= B × C (as unfiltered rings).
634
+ We will abuse notation and write R = B × C (as unfiltered rings). We will also write B (resp.
635
+ C) for the ideal B × 0 (resp. 0 × C) of R, so that there are inclusion maps jB : B → R and
636
+ jC : C → R and projection maps πB : R → B and πC : R → C.
637
+ Suppose further that the filtration on R is complete and positive, and that R admits a skew
638
+ derivation (σ, δ) which restricts to skew derivations on B and C. (That is, setting σB = πBσjB
639
+ and δB = πBδjB, we have that (σB, δB) is a skew derivation on B, and likewise for C.)
640
+ 11
641
+
642
+ Write vB and vC for the restrictions of v to B and C respectively. In general, even if (σ, δ) is
643
+ compatible with v, it may not be true that (σB, δB) is compatible with vB, and so we must
644
+ restrict to the case in which the decomposition R ∼= B × C and the filtration v interact nicely.
645
+ The following lemma is an immediate consequence of the definition of the product filtration,
646
+ as in Definition 2.1.
647
+ Lemma 4.1. If v = vB × vC, then (σB, δB) is compatible with vB, and (σC, ��C) is compatible
648
+ with vC.
649
+ Hence, under the assumption v = vB × vC, we may define the filtered rings
650
+ • B[[xB; σB, δB]], with filtration fB, satisfying fB|B = vB and fB(xB) = 1,
651
+ • C[[xC; σC, δC]], with filtration fC, satisfying fC|C = vC and fC(xC) = 1,
652
+ as in (2.1).
653
+ Proposition 4.2. Suppose that v = vB × vC. Then there is an isomorphism of filtered rings
654
+ ϕ : R[[x; σ, δ]] → B[[xB; σB, δB]] × C[[xC; σC, δC]].
655
+ Proof. It is straightforward to check that the maps
656
+ ϕ : R[[x; σ, δ]] → B[[xB; σB, δB]] × C[[xC; σC, δC]]
657
+
658
+ i≥0
659
+ rixi �→
660
+ ��
661
+ i≥0
662
+ πB(ri)xi
663
+ B,
664
+
665
+ i≥0
666
+ πC(ri)xi
667
+ C
668
+
669
+ and
670
+ θ : B[[xB; σB, δB]] × C[[xC; σC, δC]] → R[[x; σ, δ]]
671
+ ��
672
+ i≥0
673
+ bixi
674
+ B,
675
+
676
+ i≥0
677
+ cixi
678
+ C
679
+
680
+ �→
681
+
682
+ i≥0
683
+ (jB(bi), jC(ci))xi
684
+ are the mutually inverse filtered isomorphisms as required.
685
+ Let Q′ be an arbitrary semisimple artinian filtered ring admitting a skew derivation (σ, δ), and
686
+ write the minimal nonzero ideals of Q′ as A1, . . . , Ae, so that Q′ = �e
687
+ i=1 Ai. In the case where
688
+ the Ai fall into several σ-orbits, write ρ for the permutation of the indexing set {1, . . . , e}
689
+ induced on the set {A1, . . . , Ae} by σ as in Property 2.2.1. Let S be a union of (some) orbits of
690
+ ρ and S′ = {1, . . . , e}\S, and suppose (to avoid trivial cases) that both S and S′ are nonempty.
691
+ Now set B′ = �
692
+ i∈S Ai and C′ = �
693
+ i∈S′ Ai: it follows from Property 2.2.1 that (σB′, δB′) restricts
694
+ to a skew derivation on B′, and likewise for C′.
695
+ Assume now that each Ai ∼= Mni(Fi), where ni ≥ 1 is some positive integer and Fi is the Goldie
696
+ ring of quotients of a complete discrete valuation ring Di. Set Oi to be the preimage in Ai of
697
+ Mni(Di), so that O′ = O1 × · · · × Oe is a maximal order in Q′. Moreover, if j = ρ(i) then
698
+ Aj = σ(Ai) so Mni(Fi) ∼= Mnj(Fj), which implies that ni = nj and Fi ∼= Fj.
699
+ Suppose that all of these rings are given their natural filtrations: that is,
700
+ • each Di retains its discrete valuation, and Fi inherits the J(Di)-adic valuation (see §2.4),
701
+ • Mni(Di) and Mni(Fi) are given the corresponding matrix filtrations (see Definition 2.1.2),
702
+ • Oi and Ai inherit their filtrations from Mni(Di) and Mni(Fi) under the above isomor-
703
+ phisms, and
704
+ 12
705
+
706
+ • O′ and Q′ are given the product filtrations (see Definition 2.1.1) from the Oi and Ai
707
+ respectively.
708
+ Then O′, B′ and C′ as defined above will satisfy the hypotheses of Proposition 4.2. Moreover, if
709
+ S is taken to be a single orbit of ρ with |S| = d, then (after renumbering so that S = {1, . . . , d}
710
+ and writing n = n1 = · · · = nd) the ring O := O′ ∩ B′ as defined above, its Goldie ring of
711
+ quotients Q := B′, etc. will satisfy Hypotheses (H1–3).
712
+ 4.2
713
+ Untwisting inner automorphisms
714
+ In this subsection, we assume the full force of Hypotheses (H1–3) and adopt their notation.
715
+ Without loss of generality, reordering the Ai if necessary, we will set σ(Ai) = Ai+1 for 1 ≤ i ≤ d−1
716
+ and σ(Ad) = A1.
717
+ We may now invoke Property 2.2.2. In particular, there is a decomposition σ = η ◦ Mn(τ)ι,
718
+ where η is an inner automorphism of Q, say η = ca for some a ∈ Q×, and τ is an automorphism
719
+ of F.
720
+ Lemma 4.3. Both η and Mn(τ)ι preserve O.
721
+ Proof. Since η is an inner automorphism of Q, it will preserve each Ai. But σ(Ai) = Ai+1
722
+ (with indices interpreted modulo d), so Mn(τ)ι must send Ai to Ai+1, and hence τ sends
723
+ Fi to Fi+1. However, since σ and η are continuous, it follows that τ is continuous, and so
724
+ Di+1 = Oi+1 ∩ Fi+1 = τ(Di), hence Mn(τ)ι preserves O. Now it follows that η = σ ◦ Mn(τ −1)ι
725
+ preserves O.
726
+ Our aim in this subsection is to “untwist” η by making a change of variables x �→ x′, i.e. find
727
+ an element x′ ∈ O[[x; σ, δ]] such that
728
+ O[[x; σ, δ]] = O[[x′; Mn(τ)ι, δ′]].
729
+ By Theorem B(i), it would suffice if v(a) = v(a−1) = 0: this would imply that a, a−1 ∈ O, and
730
+ we could then set x′ = a−1x, giving δ′ = a−1δ as in §1.2.
731
+ Of course, in general, a will not necessarily have this property: for instance, if O is a complete
732
+ discrete valuation ring with central uniformiser π, then ca = cπra for all r ∈ Z, and v(πra) will
733
+ usually not be zero. Surprisingly, this naive obstruction is the only kind of obstruction that
734
+ occurs.
735
+ Proposition 4.4. There exist an element b ∈ Q×, an inner automorphism η′ = cb of Q, and
736
+ an automorphism τ ′ of F such that σ = η′ ◦ Mn(τ ′)ι and v(b) = v(b−1) = 0.
737
+ Proof. Suppose a = (a1, . . . , ad) ∈ Q×: then, by Lemma 4.3, we have aiOia−1
738
+ i
739
+ = Oi for each
740
+ i. Let ki = v(ai), i.e. ai ∈ J(Oi)ki \ J(Oi)ki+1. So, if πj is a uniformiser of Dj, Ij is the
741
+ identity matrix of Mn(Dj), and ˜πj := ι−1(πjIj), then we have aj = bj˜π
742
+ kj
743
+ j for some bj ∈ Oj with
744
+ v(bj) = 0. Set b = (b1, . . . , bd), so that v(b) = 0.
745
+ By Corollary 2.10(ii), ˜πj is normal in Oj, so the right ideal bjOj is in fact a two-sided ideal.
746
+ Moreover, by Proposition 2.9(ii) and Morita equivalence, as the ideal bjOj contains the element
747
+ bj of value 0, it must be equal to Oj. Hence bj is a unit in Oj, and we have v(bj) = v(b−1
748
+ j ) = 0.
749
+ Now set η′(r) = brb−1 for all r ∈ Q and τ ′(s) = Πτ(s)Π−1, where Π = (πk1
750
+ 1 I1, . . . , πkd
751
+ d Id). The
752
+ claim now follows from a short calculation.
753
+ 13
754
+
755
+ 4.3
756
+ Untwisting inner σ-derivations
757
+ In this subsection, let (R, f) be an arbitrary Z-filtered ring admitting a compatible skew deriva-
758
+ tion (σ, δ), and write the f-level sets of R as FnR for n ∈ Z. We will also suppose that
759
+ • R = Mn(A) for some ring A,
760
+ • f = Mn(g) for some filtration g on A,
761
+ • σ = Mn(τ) for some automorphism τ of A, and
762
+ • δ = Mn(θ) + ε, where θ is a τ-derivation of A and ε is an inner σ-derivation of R, say
763
+ ε = dσ,u for some u ∈ R.
764
+ (Compare Property 2.2.3.) We will write the standard set of matrix units in R as {eij}1≤i,j≤n.
765
+ Our aim in this subsection is to “untwist” ε by making a change of variables x �→ x′, i.e. find
766
+ an element x′ ∈ R[[x; Mn(τ), δ]] such that
767
+ R≥0[[x; Mn(τ), δ]] = R≥0[[x′; Mn(τ), Mn(θ)]]
768
+ where of course, R≥0 is the positively filtered subring of R. As before, we would be done by
769
+ Theorem B(ii) if we had f(u) ≥ 1. This is also unreasonable to expect, albeit this time for
770
+ slightly less obvious reasons: for instance, if A is the division ring of fractions of a complete
771
+ discrete valuation ring with uniformiser π, then Mn(θ)+dMn(τ),u = Mn(θ+dτ,πr)+dMn(τ),u−πrI
772
+ for all r ∈ Z, and v(u − πrI) can be less than 1. However, again, under mild conditions this is
773
+ the only obstruction that occurs.
774
+ Proposition 4.5. In the above setup, there exist an element u′ ∈ R, a τ-derivation θ′ of A,
775
+ and an inner σ-derivation ε′ = inn(u′) of R such that δ = Mn(θ′) + ε′ and f(u′) ≥ 1.
776
+ Proof. Write u = �
777
+ i,j uijeij for some coefficients uij ∈ A. Let 1 ≤ p, q ≤ n be arbitrary, and
778
+ consider the matrix unit epq ∈ R. By assumption, δ(epq) ∈ F1R, and so
779
+ ε(epq) ≡ −Mn(θ)(epq)
780
+ mod F1R.
781
+ (4.1)
782
+ But we can calculate the left-hand side of this congruence (4.1) explicitly as
783
+ ε(epq) =
784
+
785
+ i,j
786
+ (uijeijepq − epquijeij) =
787
+
788
+ i
789
+ uipeiq −
790
+
791
+ j
792
+ uqjepj,
793
+ and the right-hand side of (4.1) is just −θ(1A)epq, which is zero. So we may rewrite (4.1) as
794
+
795
+ i uipeiq − �
796
+ j uqjepj ≡ 0 mod F1R, and equate corresponding entries, to get
797
+
798
+
799
+
800
+
801
+
802
+ uip ∈ F1A
803
+ i ̸= p
804
+ uqj ∈ F1A
805
+ j ̸= q
806
+ upp − uqq ∈ F1A,
807
+ and so, as p and q were arbitrary, we get u ≡ u111R mod F1R.
808
+ Now setting u′ := u − u111R, and defining θ′(a) := θ(a) + u11a − τ(a)u11 and ε′ := dMn(τ),u′, we
809
+ are done.
810
+ Upshot: in this case, using Theorem B(i) we can pass to the case when δ = Mn(θ).
811
+ Proof of Theorem A. Firstly, Proposition 4.4 shows that there exist some τ ∈ Aut(F) and some
812
+ b ∈ Q× satisfying v(b) = v(b−1) = 0 such that σ = cb ◦ Mn(τ)ι, and both of these preserve O
813
+ 14
814
+
815
+ by the same argument as in Lemma 4.3. So by Theorem B(i), we may set x′ = b−1x to get
816
+ O[[x; σ, δ]] = O[[x′; Mn(τ)ι, δ′]] for the Mn(τ)ι-derivation δ′ := b−1δ.
817
+ Secondly, Proposition 4.5 shows that there exist some τ-derivation θ of F and some u ∈ Q
818
+ satisfying v(u) ≥ 1 such that δ′ = Mn(θ)ι + dMn(τ)ι,u.
819
+ So by Theorem B(ii), we may set
820
+ x′′ = x′ − u to get O[[x′; Mn(τ)ι, δ′]] = O[[x′′; Mn(τ)ι, Mn(θ)ι]].
821
+ Finally, the maps
822
+ O[[x′′; Mn(τ)ι, Mn(θ)ι]] → Mn(D)[[y; Mn(τ), Mn(θ)]]
823
+
824
+ i≥0
825
+ qi(x′′)i �→
826
+
827
+ i≥0
828
+ ι(qi)yi
829
+ and
830
+ Mn(D)[[y; Mn(τ), Mn(θ)]] → Mn(D[[z; τ, θ]])
831
+
832
+ i≥0
833
+
834
+ n
835
+
836
+ j,k=1
837
+ cijkejk
838
+
839
+ yi �→
840
+ n
841
+
842
+ j,k=1
843
+ ��
844
+ i≥0
845
+ cijkzi
846
+
847
+ ejk
848
+ can now be checked to be filtered ring isomorphisms, and vO = Mn(vD) ◦ ι.
849
+ 5
850
+ Applications
851
+ Throughout this section, we assume our data (Q, O, vQ) satisfies Hypotheses (H1–3) + (S).
852
+ 5.1
853
+ Polynomial elements
854
+ Definition 5.1. A polynomial element of R[[x]] (resp. R[[x; σ, δ]]) is an element of R[x] (resp.
855
+ R[x; σ, δ]).
856
+ We first recall the following important generalisation of the Weierstrass preparation theorem
857
+ for skew power series rings, essentially due to Venjakob.
858
+ Theorem 5.2. Every nonzero right ideal of D[[y; τ, θ]] contains a nonzero polynomial element.
859
+ Proof. Let v be the J(D)-adic filtration and π a uniformiser for D. Then every nonzero ele-
860
+ ment r ∈ D[[y; τ, θ]] can be written as r = (s0 + s1y + s2y2 + . . . )πm, where all si ∈ D and
861
+ infi≥0{v(si)} = 0, by Corollary 2.10(i). Hence s = s0 + s1y + s2y2 + . . . satisfies the hypotheses
862
+ of [19, Theorem 3.1], and so a right-hand version of [19, Corollary 3.2] tells us that s can be
863
+ expressed uniquely as s = Pu, where u ∈ D[[y; τ, θ]]× and P ∈ D[y; τ, θ].
864
+ In particular, if A is a nonzero right ideal of D[[y; τ, θ]], then given any nonzero r ∈ A, we can
865
+ write it as r = Puπm as above. Since π is normal in D[[y; τ, θ]] by Corollary 2.10(i), this is just
866
+ r = Pπmu′ for some unit u′ ∈ D[[y; τ, θ]], and hence the polynomial element Pπm is also an
867
+ element of A.
868
+ Remark. Corollary 2.10(i) also implies a similar result for F ⊗D D[[y; τ, θ]].
869
+ Corollary 5.3. Every nonzero (two-sided) ideal of O[[x; σ, δ]] contains a nonzero polynomial
870
+ element.
871
+ 15
872
+
873
+ Proof. Theorem A tells us that there exists an isomorphism ϕ : O[[x; σ, δ]] → Mn(D[[y; τ, θ]])
874
+ extending ι, such that y = ϕ(ax − t). In particular, if P ∈ D[[y; τ, θ]] is polynomial in the
875
+ variable y, then ϕ−1(PI) (where I is the identity matrix) is polynomial in the variable x. The
876
+ result now follows from Theorem 5.2 and by Morita equivalence.
877
+ Proof of Theorem C. The first statement is simply restating Corollary 5.3.
878
+ For the second statement, take a nonzero ideal I of Q ⊗O O[[x; σ, δ]]. Then J := I ∩ O[[x; σ, δ]]
879
+ is clearly an ideal of O[[x; σ, δ]]. By Corollary 2.10(ii), multiplying any nonzero element of I by
880
+ an appropriate power of the regular element π will give an element of J, so J ̸= 0.
881
+ Hence, by the first statement, we know that J ∩ O[x; σ, δ] ̸= 0, and so I ∩ Q[x; σ, δ] ̸= 0. But
882
+ as we are assuming that Q[x; σ, δ] is simple, it must follow that I ∩ Q[x; σ, δ] = Q[x; σ, δ]. In
883
+ particular, 1 ∈ I, and so I = Q ⊗O O[[x; σ, δ]].
884
+ 5.2
885
+ Uniform dimension
886
+ This subsection continues the work of [14] on uniform dimensions (Goldie ranks) of skew power
887
+ series rings. As we have already remarked in the Introduction, Theorem B sometimes allows
888
+ us to reduce directly to the results of [14] when the derivation is inner. However, in the special
889
+ case of Hypotheses (H1–3) + (S), we can now prove similar results about skew power series
890
+ rings over O for arbitrary derivations.
891
+ Proof of Theorem D. By Theorem A, we know that O[[x; σ, δ]] ∼= Mn(D[[y; τ, θ]]) for some ap-
892
+ propriate skew derivation (τ, θ), and hence that r.udim(O[[x; σ, δ]]) = n(r.udim(D[[y; τ, θ]])) [17,
893
+ Example 2.11(iii)]. In the same way, r.udim(O) = n(r.udim(D)), and of course r.udim(D) = 1
894
+ as D is a noetherian integral domain [17, Example 2.11(i)].
895
+ It remains to show that r.udim(D[[y; τ, θ]]) = 1. So let U be a uniform right ideal of D[[y; τ, θ]],
896
+ and let I be an arbitrary nonzero right ideal.
897
+ By Theorem 5.2, U ∩ D[y; τ, θ] ̸= 0 and
898
+ I ∩ D[y; τ, θ] ̸= 0, and so as D[y; τ, θ] is a prime ring [17, Theorem 1.2.9(iii)], their inter-
899
+ section (U ∩ I) ∩ D[y; τ, θ] is also nonzero. In particular, this shows that U is an essential right
900
+ ideal of D[[y; τ, θ]], and so r.udim(D[[y; τ, θ]]) = 1.
901
+ References
902
+ [1] K. Ardakov.
903
+ Prime ideals in nilpotent Iwasawa algebras.
904
+ Inventiones mathematicae,
905
+ 190(2):439–503, 2012.
906
+ [2] H.-H. Brungs. Generalized discrete valuation rings. Canad. J. Math., 21:1404–1408, 1969.
907
+ [3] G. Cauchon and J.C. Robson. Endomorphisms, derivations, and polynomial rings. Journal
908
+ of Algebra, 53:227–238, 1978.
909
+ [4] E. Cisneros, M. Ferrero, and M. I. Gonz´alez. Prime ideals of skew polynomial rings and
910
+ skew Laurent polynomial rings. Math. J. Okoyama Univ., 32:61–72, 1990.
911
+ [5] John Cozzens and Carl Faith. Simple Noetherian rings. Cambridge University Press, 2008.
912
+ [6] K. R. Goodearl. Prime ideals in skew polynomial rings and quantized Weyl algebras. J.
913
+ Alg., 150:324–377, 1992.
914
+ [7] K. R. Goodearl and E. S. Letzter. Prime factor algebras of the coordinate ring of quantum
915
+ matrices. Proc. Amer. Math. Soc., 121(4):1017–1025, 1994.
916
+ 16
917
+
918
+ [8] K. R. Goodearl and R. B. Warfield, Jr. An Introduction to Noncommutative Noetherian
919
+ Rings. Cambridge University Press, 2004.
920
+ [9] Ronald S. Irving. Prime ideals of Ore extensions over commutative rings, II. J. Algebra,
921
+ 58:399–423, 1979.
922
+ [10] Adam Jones and William Woods. Skew power series rings over a prime base ring (preprint).
923
+ https://arxiv.org/abs/2112.10242.
924
+ [11] T. Y. Lam, K. H. Leung, A. Leroy, and J. Matczuk. Invariant and semi-invariant poly-
925
+ nomial rings. In L. Rowen, editor, Ring Theory, pages 247–261. Weizmann Science Press,
926
+ 1989.
927
+ [12] Andr´e Leroy and Jerzy Matczuk. The extended centroid and X-inner automorphisms of
928
+ Ore extensions. Journal of Algebra, 145:143–177, 1992.
929
+ [13] Edward S. Letzter. Prime ideals of noetherian skew power series rings. Israel J. Math.,
930
+ 192:67–81, 2012.
931
+ [14] Edward S. Letzter and Linhong Wang. Goldie ranks of skew power series rings of auto-
932
+ morphic type. arXiv:0812.2010v3, 2011.
933
+ [15] Hidetoshi Marubayashi and Freddy van Oystaeyen. Prime Divisors and Noncommutative
934
+ Valuation Theory. Lecture Notes in Mathematics, 2059. Springer, 2012.
935
+ [16] Jerzy Matczuk. Goldie rank of Ore extensions. Comm. Alg., 23(4):1455–1471, 1995.
936
+ [17] J.C. McConnell and J.C. Robson. Noncommutative Noetherian Rings. American Mathe-
937
+ matical Society, 2001.
938
+ [18] Johan ¨Oinert, Johan Richter, and Sergei D. Silvestrov. Maximal commutative subrings
939
+ and simplicity of Ore extensions. J. Algebra Appl., 12(4), 2013.
940
+ [19] Otmar Venjakob. A noncommutative Weierstrass preparation theorem and applications
941
+ to Iwasawa theory. J. Reine Angew. Math., 559:153–191, 2003.
942
+ [20] William Woods.
943
+ Dimension theory in iterated local skew power series rings.
944
+ Algebr.
945
+ Represent. Theory. Published online: https://doi.org/10.1007/s10468-022-10144-3,
946
+ 2022.
947
+ 17
948
+
-NE0T4oBgHgl3EQfxAEX/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -158,3 +158,5 @@ W9FQT4oBgHgl3EQfcjYS/content/2301.13327v1.pdf filter=lfs diff=lfs merge=lfs -tex
158
  H9AyT4oBgHgl3EQfrvmy/content/2301.00567v1.pdf filter=lfs diff=lfs merge=lfs -text
159
  OtFKT4oBgHgl3EQffy6V/content/2301.11831v1.pdf filter=lfs diff=lfs merge=lfs -text
160
  QNE0T4oBgHgl3EQfkQEN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
158
  H9AyT4oBgHgl3EQfrvmy/content/2301.00567v1.pdf filter=lfs diff=lfs merge=lfs -text
159
  OtFKT4oBgHgl3EQffy6V/content/2301.11831v1.pdf filter=lfs diff=lfs merge=lfs -text
160
  QNE0T4oBgHgl3EQfkQEN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
161
+ LNAyT4oBgHgl3EQfgPhD/content/2301.00354v1.pdf filter=lfs diff=lfs merge=lfs -text
162
+ 4tFAT4oBgHgl3EQfFByL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
09E4T4oBgHgl3EQfZwye/content/tmp_files/2301.05059v1.pdf.txt ADDED
@@ -0,0 +1,1610 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.05059v1 [cs.DC] 12 Jan 2023
2
+ Distributed Self-Stabilizing MIS with Few States and Weak
3
+ Communication
4
+ George Giakkoupis
5
+ Inria, Rennes, France
6
+ george.giakkoupis@inria.fr
7
+ Isabella Ziccardi
8
+ Bocconi University, Milan, Italy
9
+ isabella.ziccardi@unibocconi.it
10
+ Abstract
11
+ We study a simple random process that computes a maximal independent set (MIS) on a
12
+ general n-vertex graph. Each vertex has a binary state, black or white, where black indicates
13
+ inclusion into the MIS. The vertex states are arbitrary initially, and are updated in parallel:
14
+ In each round, every vertex whose state is “inconsistent” with its neighbors’, i.e., it is black
15
+ and has a black neighbor, or it is white and all neighbors are white, changes its state with
16
+ probability 1/2. The process stabilizes with probability 1 on any graph, and the resulting set of
17
+ black vertices is an MIS. It is also easy to see that the expected stabilization time is O(log n)
18
+ on certain graph families, such as cliques and trees. However, analyzing the process on graphs
19
+ beyond these simple cases seems challenging.
20
+ Our main result is that the process stabilizes in poly(log n) rounds w.h.p. on Gn,p random
21
+ graphs, for 0 ≤ p ≤ poly(log n) · n−1/2 and p ≥ 1/ poly(log n). Further, an extension of this
22
+ process, with larger but still constant vertex state space, stabilizes in poly(log n) rounds on Gn,p
23
+ w.h.p., for all 1 ≤ p ≤ 1. We conjecture that this improved bound holds for the original process
24
+ as well. In fact, we believe that the original process stabilizes in poly(log n) rounds on any given
25
+ n-vertex graph w.h.p. Both processes readily translate into distributed/parallel MIS algorithms,
26
+ which are self-stabilizing, use constant space (and constant random bits per round), and assume
27
+ restricted communication as in the beeping or the synchronous stone age models. To the best of
28
+ our knowledge, no previously known MIS algorithm is self-stabilizing, uses constant space and
29
+ constant randomness, and stabilizes in poly(log n) rounds in general or random graphs.
30
+ 1
31
+ Introduction
32
+ Finding a maximal independent set (MIS) is a fundamental problem in parallel and distributed
33
+ computing. Given a graph G = (V, E), the objective is to identify a set of vertices S ⊆ V such
34
+ that no two vertices u, v ∈ S are adjacent to each other (independence property), and no vertex
35
+ u ∈ V \S can be added to S without violating independence (maximality property). The significance
36
+ of the problem in parallel computing was first recognised in the early 80s [32, 8], due to its various
37
+ applications in symmetry breaking [24], and it has been studied extensively every since (see [7] for
38
+ a review of work until 2015, and [4, 17] for state of the art results).
39
+ In this paper we explore simple distributed random processes on graphs that find an MIS
40
+ starting from arbitrary initial states of the vertices. These processes immediately translate into self-
41
+ stabilizing [10, 11] synchronous distributed algorithms for network systems with severely restricted
42
+ computation and communication capabilities, such as wireless sensor networks. The processes we
43
+ consider are also relevant to certain biological cellular networks. For example, it is known that a
44
+ biological process occurring during the development of the nervous system of a fly is equivalent to
45
+ computing an MIS [2, 23].
46
+ 1
47
+
48
+ The main random process we consider, which we call the 2-state MIS process, is as follows.
49
+ Each vertex has a binary state, black or white, where black indicates inclusion into the MIS. The
50
+ vertex states are arbitrary initially and are updated in synchronous rounds. In each round, every
51
+ vertex u whose state violates the independence or maximality properties, i.e., u is black and has
52
+ a black neighbor, or it is white and has no black neighbor, changes its state to the opposite state
53
+ with probability 1/2. It is easy to see that the state of a vertex stabilizes as soon as it is black
54
+ and has no black neighbors, or it is white and has a stabilized black neighbor; and when all vertices
55
+ have stabilized, the set of black vertices is an MIS. It is also immediate that, on any graph G, the
56
+ process stabilizes eventually with probability 1 (due to the randomization) .1
57
+ The 2-state MIS process can be viewed as a natural parallelization (with the addition of ran-
58
+ domness) of a simple self-stabilizing sequential deterministic algorithm, proposed in [28, 20], where
59
+ in each step a single node updates its state (from black to white, if the node has a black neighbor,
60
+ and from white to black if it has no black neighbors). [28] also observed that by randomizing the
61
+ transitions of the sequential algorithm we obtain an algorithm that stabilizes with probability 1 on
62
+ a general adversarial scheduler model, which includes the synchronous model. A similar observa-
63
+ tion follows from a general transformation framework proposed in [31]. The sequential algorithm is
64
+ know to stabilize after each process has taken at most 2 steps (regardless of the scheduling order).
65
+ However, analyzing the stabilization time of the parallel process seems a much more challenging
66
+ problem, and has not been studied until now.
67
+ The 2-state MIS process directly translates into a self-stabilizing MIS algorithm for the harsh
68
+ beeping communication model [9]. In that model, in every synchronous round, each node either
69
+ listens or beeps, and a listening node can only differentiate between none of its neighbors’ beeping,
70
+ or at least one beeping. In our case, we can let black nodes beep in each round, while white nodes
71
+ listen. Black nodes must be able to detect collisions (otherwise they cannot tell if they have a
72
+ black neighbor), thus we assume the beeping model version with sender collision detection (a.k.a.
73
+ full-duplex model) [1, 16].
74
+ We also propose a simple variant of the 2-state MIS process, called the 3-state MIS process,
75
+ which has an additional state and does not require collision detection (see Definition 5).
76
+ This
77
+ variant is suitable for the synchronous stone age model [13, 12]. The synchronous stone age model
78
+ can be viewed as an extension of the beeping model over a constant number of channels (without
79
+ collision detection): each node beeps in at most one channel and listens to the other channels.
80
+ Overall, the algorithms obtained from the 2-state and 3-state MIS processes have several at-
81
+ tractive properties: they use a constant number of states (2 or 3) and one random bit per round,
82
+ they do not require node IDs or any global graph information (such as the number of vertices n
83
+ or the maximum degree ∆), assume very week communication (the beeping or stone age models),
84
+ they are self-stabilizing, and are extremely simple. We will prove that, on some families of graphs,
85
+ these algorithms are also fast, i.e., they stabilize (from an arbitrary initial state) in a number of
86
+ rounds that is poly-logarithmic in n, w.h.p.2 Moreover, despite that we were not able to prove such
87
+ as strong result here, we believe that these algorithms are fast in all graphs.
88
+ Several self-stabilizing distributed MIS algorithms have been proposed in the literature, but as
89
+ far as we know, none possesses all the above properties. Known self-stabilizing MIS algorithms for
90
+ the beeping model require (approximate) knowledge of n, use space that is a super-constant function
91
+ of n, and require a super-constant number of random bits [1, 23, 16]. In the stone age model, an
92
+ MIS algorithm proposed in [13] has similar properties as our algorithms (and is provably fast for all
93
+ 1We could have defined the process so that the transition from white to black (when the white vertex has no black
94
+ neighbors) occurs with probability 1, but we opted for a randomized transition because it simplifies our analysis.
95
+ 2In this paper, we do not analyze the 3-state MIS process, but we expect that it behaves similarly (or better than)
96
+ the 2-state MIS process.
97
+ 2
98
+
99
+ graphs) but is not self-stabilizing; while a self-stabilizing algorithm for the model proposed recently
100
+ in [12] is fast only on graphs whose diameter is bounded by a known constant D. Other randomized
101
+ self-stabilizing MIS algorithms required super constant state and communication [30].
102
+ Finally,
103
+ known deterministic self-stabilizing MIS algorithms require distinct node IDS, super constant state
104
+ and communication, and are in general much slower than the randomized algorithms, stabilizing
105
+ in time linear in n or in the maximum degree ∆ [22, 18, 29, 5].
106
+ 1.1
107
+ Our Contribution
108
+ We first analyze the stabilization time of the 2-state MIS process on complete graphs and on graphs
109
+ with bounded arboricity.3 We also provide an upper bound in terms of the maximum degree for
110
+ general graphs. The proof of these results is mostly straightforward.
111
+ Theorem 1. The stabilization time of the 2-state MIS process on n-vertex graph G is
112
+ • O(log n) in expectation and O(log2 n) w.h.p., if G is the complete graph Kn.
113
+ • O(log n) w.h.p., if G has bounded arboricity.
114
+ • at most O(∆ log n) w.h.p., if the maximum degree of G is ∆.
115
+ A main technical contribution of the paper is the analysis of the 2-state MIS process on Erd˝os-
116
+ R´enyi Gn,p random graphs. We show a poly-logarithmic upper bound for Gn,p random graphs when
117
+ the average degree np is at most poly(log n) · √n. The same bound is easily obtained also when
118
+ the average degree is at least n/ poly(log n).
119
+ Theorem 2. The stabilization time of the 2-state MIS process on a Gn,p random graph, such that
120
+ 0 ≤ p ≤ poly(log n) · n−1/2 or p ≥ 1/ poly(log n), is at most poly(log n) w.h.p.
121
+ Our proof techniques do not yield a poly-logarithmic upper bound for the 2-state MIS process
122
+ on Gn,p for the complete range of p. Our second technical contribution is an extension of the 2-state
123
+ MIS process that provably stabilizes in poly-logarithmic time w.h.p. on Gn,p for all 0 ≤ p ≤ 1. The
124
+ extended process uses a phase clock sub-process proposed in [12]. Interestingly, unlike [12], we do
125
+ not use the phase clock for synchronization, but rather as a local non-synchronized counter (see
126
+ Section 1.2 for a more detailed discussion).
127
+ Theorem 3. There is an extension of the 2-state process, with 18 states, such that the stabilization
128
+ time of the process on a Gn,p random graph, for any 0 ≤ p ≤ 1, is at most poly(log n) w.h.p.
129
+ We believe that the bound of Theorem 3 holds for the 2-state MIS process, as well. In fact,
130
+ we conjecture that the stabilization time of the 2-state MIS process is poly(log n) w.h.p. on any
131
+ given n-vertex graph. We also conjecture that the same is true for the 3-state MIS process. For the
132
+ 2-state process, the best general upper bound we can hope for is O(log2 n), as the process requires
133
+ Θ(log2 n) rounds to stabilize on the complete graph Kn w.h.p.4 For the 3-state process, we have
134
+ no example of a graph where the stabilization time is larger than O(log n).
135
+ 3The arboricity of a graph is the minimum number of forests into which we can partition its edges.
136
+ 4It also requires Θ(log2 n) rounds in expectation to stabilize on a graph consisting of √n disjoint cliques K√n.
137
+ 3
138
+
139
+ 1.2
140
+ Analysis Overview and Techniques
141
+ Below we give an overview of the analysis of the 2-state MIS process and its extension, on Gn,p
142
+ random graphs.
143
+ To avoid having to deal simultaneously with the randomness of the graph and the arbitrary
144
+ initialization of vertex states, we deal with graph randomness first. We define a family of good
145
+ graphs, containing those graphs that satisfy all structural properties that we will need for the
146
+ analysis, e.g., bounds on the average degree of any induced subgraph, and bounds on the number
147
+ of common neighbors of any two vertices (see Definition 17). We then show that a Gn,p random
148
+ graph is good w.h.p., and assume an arbitrary good graph in the analysis.
149
+ The analysis proceeds by showing that starting from any vertex states, the process makes
150
+ sufficient progress after O(log n) rounds, where progress is measured by the expected number of
151
+ vertices that stabilize.
152
+ In the 2-state MIS process, we call a vertex active if it is black and has a black neighbor, or it is
153
+ white and has no black neighbors. Thus, active vertices change their state to a uniformly random
154
+ state in the next step. A vertex is k-active if it is active and has at most k active neighbors.
155
+ An elementary property of the 2-state MIS process is that if a vertex is k-active, then it becomes
156
+ stabilized black in O(log k) rounds with probability Ω(1/k).
157
+ We also use an extension of this
158
+ property to sets of active vertices.5 These two properties, combined with structural properties of
159
+ good graphs, suffice to show the desired expected progress in the case in which the number of
160
+ non-stabilized vertices or the number of active vertices is large enough.
161
+ The more difficult case is when the number of non-stabilized vertices is relatively small, namely
162
+ O(p−1 log2 n), and a smaller than 1/ poly(log n) fraction of them are active. One may expect this
163
+ to be an easy case, since the induced subgraph on a random subset of O(p−1 log2 n) vertices has
164
+ maximum degree ∆ = O(log2 n) w.h.p. (and Theorem 1 gives an O(log3 n) bound for that ∆).
165
+ However, the above bound on ∆ does not apply to an induced subgraph on an arbitrary subset of
166
+ O(p−1 log2 n) vertices. Nevertheless, it is true that the average degree is O(log2 n), thus a constant
167
+ fraction of vertices have degree O(log2 n).
168
+ Let u be one such vertex, i.e., of degree d = O(log2 n) in the induced subgraph of non-stabilized
169
+ vertices. To prevent u from becoming active (and thus d-active) or becoming stabilized, in each
170
+ round at least one neighbor of u must be non-stabilized black. We show that, roughly speaking,
171
+ if a vertex v has probability b of being non-stabilized black at some point during an interval of r
172
+ rounds (ignoring the first few rounds, e.g., if v is black initially) then v has probability poly(b/r) of
173
+ becoming θ-active in that interval. For the purposes of the analysis, it suffices to set r = O(log log n).
174
+ Then θ is, roughly, bounded by the maximum number of common neighbors two nodes may have,
175
+ thus θ ≤ poly(log n) if p ≤ poly(log n) · n−1/2 (see Section 4.1 for the relevant lemmas).
176
+ If each of the d neighbors of u has probability less than 1/(2d) of becoming non-stabilized
177
+ black in the next r rounds, then u has a constant probability of becoming active (or stabilize).
178
+ On the other hand, if there is some neighbor v that has probability b ≥ 1/(2d) of becoming non-
179
+ stabilized black in the next r rounds, we saw above that v becomes θ-active with probability at
180
+ least poly(b/r) = 1/ poly(log n). We conclude that, with probability 1/ poly(log n), u is poly(log n)-
181
+ active or has some poly(log n)-active neighbor at some point in the next r = O(log log n) rounds.
182
+ It follows that u stabilizes with probability 1/ poly(log n) in the next O(log n) rounds.6
183
+ When p > poly(log n)·n−1/2, the last case of the analysis above does not give a poly-logarithmic
184
+ bound. A way to overcome this problem is to control how often a vertex can change its state from
185
+ white to black. We extend the 2-state MIS process by incorporating such a control mechanism.
186
+ 5Similar properties are commonly used in the analysis of distributed MIS algorithms in the literature.
187
+ 6We suspect that a refinement of this argument may be useful for a broader class of graphs.
188
+ 4
189
+
190
+ We call the new process the 3-color MIS process. It consists of two sub-processes running in
191
+ parallel: The first is similar to the 2-state MIS process with the addition of a third color, grey; a
192
+ black vertex now becomes gray instead of white, a gray vertex becomes white after a while, and
193
+ other vertices treat gray vertices as white. The transition from gray to white is controlled by the
194
+ second sub-process, called the logarithmic switch.
195
+ In the logarithmic switch, each vertex has an on/off binary variable, and a gray vertex changes
196
+ to white if the switch variable of the vertex is on. We would like that the logarithmic switch satisfy
197
+ two basic properties: (i) a vertex switches from off to on every Θ(log n) rounds; and (ii) it switches
198
+ from on to off every O(1) rounds.7 However, we do not know how to implement property (i) using
199
+ constant states. We observe that it suffices if property (i) is satisfied only when p > poly(log n) ·
200
+ n−1/2; for smaller p, a weaker property suffices: (i′) a vertex switches from off to on after at most
201
+ O(log n) rounds. It is not immediately obvious how to implement this distinction, because we want
202
+ the process to work for all 0 ≤ p ≤ 1 without knowing p (or anything else about the graph topology).
203
+ We achieve that as follows.
204
+ We exploit the fact that if p > poly(log n) · n−1/2 then the graph has constant diameter (in
205
+ fact diameter 2). The logarithmic switch process we devise is similar to the phase clock process
206
+ RandPhase proposed in [12]. RandPhase assumes that an upper bound D on the graph diameter
207
+ is available to the process and uses D + 3 states. The core mechanism of the logarithmic switch is
208
+ identical to that of RandPhase for D = 3 (not 2!), but the underlying graph may have arbitrary
209
+ (and unknown) diameter. The logarithmic switch includes also a mapping of the states to the on/off
210
+ values of the switch. Unlike RandPhase which is used for sychronization (it achieve synchronous
211
+ phases of length D + Θ(log n)), the purpose of the logarithmic switch is not synchronization, as it
212
+ is not required that the switch variables of different vertices change simultaneously.
213
+ Roadmap.
214
+ The rest of the paper is organized as follows. Section 2 contains the definition and
215
+ some basic properties of the 2-state and 3-state MIS processes.
216
+ Section 3 provides a proof of
217
+ Theorem 1. Section 4 proves Theorem 2. Section 5 defines the 3-color MIS process and proves
218
+ Theorem 3. And Appendix B reviews related work.
219
+ Notation.
220
+ Let G = (V, E) be a graph on n vertices. For each vertex u ∈ V , N(u) = {v: (u, v) ∈
221
+ E} is the set of neighbors of u, and N +(u) = N(u) ∪ {u}. Similarly, for a set of vertices S ⊆ V ,
222
+ we define N(S) = �
223
+ u∈S N(u) \ S and N +(S) = �
224
+ u∈S N +(u) = N(S) ∪ S. For two (not necessarily
225
+ disjoint) sets S, T ⊆ V , we let E(S, T) = {(u, v) ∈ E : u ∈ S, v ∈ T} be the set of edges with one
226
+ endpoint in S and the other in T. We also define E(S) = E(S, S). By G[S] we denote the induced
227
+ subgraph of G on S ⊆ V , i.e., G[S] = (S, E(S)).
228
+ 2
229
+ The 2-State and 3-State MIS Processes
230
+ We define two self-stabilizing distributed graph processes that compute a maximal independent set
231
+ when applied on any given graph.
232
+ Definition 4 (2-State MIS Process). In the 2-state MIS process on graph G = (V, E), each vertex
233
+ u ∈ V has a binary state from the set {black, white}, and all states are updated in parallel
234
+ 7The reason why a logarithmic switch suffices, rather than a ‘double-logarithmic’ switch is that, in the induced
235
+ subgraph on O(p−1 log2 n) vertices consider in the last case of the analysis of the 2-state MIS process, a constant
236
+ fraction of vertices have at most O(log n) neighbors of degree Ω(log3 n).
237
+ 5
238
+
239
+ rounds. The initial state c0(u) of vertex u can be arbitrary, and in each round t = 1, 2, . . . , u’s
240
+ state is updated from ct−1(u) to ct(u) according to the following rule.
241
+ let NC t(u) = {ct−1(v): v ∈ N(u)}
242
+ if
243
+
244
+ ct−1(u) = black and NC t(u) ∋ black
245
+
246
+ or
247
+
248
+ ct−1(u) = white and NC t(u) ̸∋ black
249
+
250
+ then
251
+ let ct(u) be a uniformly random state from {black, white}
252
+ else set ct(u) = ct−1(u)
253
+ We say that vertex u is black or white if its state is black or white, respectively. We say that
254
+ u is active if it is black and has some black neighbor, or it is white and has no black neighbors.
255
+ We say that vertex u is stable, if either it is black and has no black neighbors, or it is white and
256
+ has a neighbor that is black and stable. It is immediate from the update rule that once a vertex
257
+ becomes stable, it remains stable thereafter, and its state no longer changes. The stabilization
258
+ time of vertex u is the earliest round at the end of which u is stable. The stabilization time
259
+ of the process is the earliest round at the end of which all vertices are stable. It is easy to verify
260
+ that after the stabilization time of the process, the set of black vertices is an MIS of G.
261
+ We let Bt = {u ∈ V : ct(u) = black} be the set of black vertices at the end of round t ≥ 0, and
262
+ let Wt = V \ Bt be the set of white vertices. We let
263
+ At = {u ∈ Bt : N(u) ∩ Bt ̸= ∅} ∪ {u ∈ Wt : N(u) ∩ Bt = ∅}
264
+ denote the set of active vertices at the end of round t. We let It = {u ∈ Bt : N(u) ∩ Bt = ∅} be the
265
+ set of stable black vertices at the and of round t (note that It is an independent set and is a subset
266
+ of the final MIS). Finally, we let Vt = V \ N +(It) be the set of vertices that are not stable at the
267
+ end of round t.
268
+ Definition 5 (3-State MIS Process). In the 3-state MIS process on G = (V, E), each vertex u ∈ V
269
+ has a state from set {black1, black0, white}, and the states are updated in parallel rounds. The
270
+ initial state c0(u) of u is arbitrary, and in each round t ≥ 1, u’s state is updated as follows.
271
+ let NC t(u) = {ct−1(v): v ∈ N(u)}
272
+ if ct−1(u) = black1 or
273
+
274
+ ct−1(u) = black0 and NC t(u) ̸∋ black1
275
+
276
+ or
277
+
278
+ ct−1(u) = white
279
+ and NC t(u) = {white}
280
+
281
+ then
282
+ let ct(u) be a uniformly random state from {black1, black0}
283
+ else if ct−1(u) = black0 then
284
+ set ct(u) = white
285
+ else set ct(u) = ct−1(u)
286
+ In the 3-state MIS process, we say that a vertex u is black when its state is black1 or black0.
287
+ Then the stable vertices and the stabilization times are defined as before. Note that the state of a
288
+ stable black vertex alternates perpetually between states black1 and black0.
289
+ In this paper we focus on the 2-state MIS process, but we expect that all our upper bound
290
+ results should carry over to the 3-state MIS process.
291
+ 2.1
292
+ Basic Properties of the 2-State MIS Process
293
+ We show some elementary properties of the 2-state MIS process. In the analysis, it will be conve-
294
+ nient to assume that at the beginning of each round t ≥ 1, we flip for each vertex u an independent
295
+ coin φt(u) such that P[φt(u) = black] = P[φt(u) = white] = 1/2. Then if u must update its state
296
+ to a random state in that round, i.e., if u ∈ At−1, we set ct(u) = φt(u); while if u /∈ At−1, then
297
+ φt(u) is not used by the algorithm.
298
+ The lemmas below apply for any graph G = (V, E), and the probabilistic statements assume
299
+ that we know the states of vertices at the end of round t (i.e., Bt or Wt is given). The first lemma
300
+ 6
301
+
302
+ says than an active vertex u with k active neighbors has probability Ω(1/k) to become stable black
303
+ in the next O(log k) rounds.
304
+ Lemma 6. If u ∈ At and |N(u) ∩ At| = k ≥ 1, then the probability that u ∈ It+log(k+1) is at least
305
+ (2ek)−1.
306
+ Proof. Let r = ⌈log(k + 1)⌉. The probability that u ∈ It+r is lower bounded by the probability
307
+ that φt+1(v) = · · · = φt+r(v) = black holds for v = u and does not hold for any v ∈ N(u) ∩ At,
308
+ which is
309
+ (1/2)r · (1 − (1/2)r)k ≥ (1/2)r · e−k/(2r−1) ≥ (1/2k) · (1/e).
310
+ (1)
311
+ For the first inequality we used the fact (1 − 1/n)n−1 ≥ e−1, and for the second we used that
312
+ log(k + 1) ≤ r ≤ log(k) + 1.
313
+ The next statement is a generalization of Lemma 6 to multiple active vertices u1, . . . , uℓ. We
314
+ will apply this result to the set of active neighbors of a vertex u, to lower bound the probability
315
+ that u is stable after a logarithmic number of rounds (because a neighbors becomes stable black).
316
+ The proof can be found in Appendix A.1.
317
+ Lemma 7. Suppose that u1, . . . , uℓ ∈ At, and |N(ui) ∩ At| = ki > 0, for each 1 ≤ i ≤ ℓ. Then the
318
+ probability that {u1, . . . , uℓ} ∩ It+log(maxi ki+1) ̸= ∅ is at least (1/5) · min
319
+
320
+ 1, �
321
+ i(2ki)−1�
322
+ .
323
+ 3
324
+ Simple Bounds for the 2-State MIS Process
325
+ We show some simple bounds on the stabilization time of the 2-state MIS process on certain graph
326
+ families, namely, the complete graph and trees (or more generally, graphs of bounded arboricity).
327
+ We also show a basic upper bound in terms of the maximum degree on a general graph.
328
+ Theorem 8. The stabilization time of the 2-state MIS process on the complete graph Kn = (V, E)
329
+ is O(log n) in expectation and O(log2 n) w.h.p. More concretely, for any k > 0, the stabilization
330
+ time is at least k · log n with probability 2−Θ(k).
331
+ Proof. We call round t critical if |Bt| ≤ 1, and we call it stable if |Bt| = 1. Let pa be the probability
332
+ that the next critical round is stable, given that |At| = a ≥ 2. Note that in graph Kn, At = Bt if
333
+ |Bt| > 1, At = ∅ if |Bt| = 1, and At = V if Bt = ∅; thus |At| ̸= 1. We argue that for any a ≥ 2,
334
+ 2/3 ≤ pa ≤ 17/21.
335
+ The lower bound follows from the observation that, for any i ≥ 2 and j ≥ 1, the conditional
336
+ probability that round j is stable, given that it is critical and that |Aj−1| = i, is
337
+ (i
338
+ 1)2−i
339
+ (i
340
+ 1)2−i+2−i =
341
+ i
342
+ i+1 ≥
343
+ 2/3, since i ≥ 2. For the upper bound we observe that, for any i ≥ 3 and j ≥ 1, the conditional
344
+ probability of |Bj| ∈ {2, 0}, given that |Bj| ≤ 2 and that |Aj−1| = i, is
345
+ (i
346
+ 2)2−i+2−i
347
+ (i
348
+ 2)2−i+(i
349
+ 1)2−i+2−i = i2−i+2
350
+ i2+i+2 ≥
351
+ 4/7. Also, p2 = 2/3 < 17/21. Then, for any a ≥ 3, we have 1 − pa ≥ (4/7) · (1 − p2), which implies
352
+ pa ≤ 17/21.
353
+ Next, consider the number of rounds r from a non-stable critical round (when all nodes are
354
+ white) until the next critical round. The probability that r > k is lower and upper bounded by
355
+ 1 − e−n2−k ≤ 1 − (1 − 2−k)n ≤ n2−k.
356
+ 7
357
+
358
+ Combining the above we obtain that (i) from any given non-stable round, the probability that
359
+ a stable round is reached in at most k = log n + 1 rounds is at least 2/3 − n2−k ≥ 1/6; (ii) from
360
+ any given non-stable critical round, the probability that the next critical round is non-stable and is
361
+ reached in more than k = log n − 2 rounds is at least 1 − 17/24 − e−n2−k > 1/6; and (iii) assuming
362
+ round t = 0 is not critical, the probability that the first critical round is non-stable is at least
363
+ 1 − 17/24. These statements, together, imply that the stabilization time is at least k log n with
364
+ probability 2−Θ(k). And from that, the expectation and high-probability bounds follow.
365
+ Remark 9. From Theorem 8, it is immediate that the expected stabilization time of the 2-state MIS
366
+ process is Θ(log2 n) on a graph G that is the disjoint union of √n cliques K√n. The same bound
367
+ holds also w.h.p.
368
+ Remark 10. A similar analysis as for Theorem 8 gives an upper bound of O(log n) on the stabi-
369
+ lization time of the 3-state MIS process on Kn, both in expectation and w.h.p. The reason is that
370
+ once Bt ̸= ∅ then Bt′ ̸= ∅ for all t′ ≥ t (thus the next critical round is stable).
371
+ Theorem 11. The stabilization time of the 2-state MIS process on any graph G = (V, E) of bounded
372
+ arboricity (e.g., G is a tree) is O(log n) w.h.p.
373
+ Proof. Recall that the arboricity λ of G is the minimum number of forests into which its edges can
374
+ be partitioned, and is equal up to a factor of 2 to the maximum average degree in any subgraph [26].
375
+ Suppose that the average degree of any subgraph of G is at most d ≤ 2λ. Let St be the subset of
376
+ Vt consisting of of all vertices u ∈ Vt with |N(u) ∩ Vt| ≤ d. Then |St| ≥ |Vt|/(d + 1). If u ∈ St \ At
377
+ and |N(u) ∩ Vt| = du, the probability that N(u) ⊆ Wt+1 is 2−du ≥ 2−d. Thus, for each u ∈ St,
378
+ the probability that u ∈ At ∪ At+1 is at least 2−d. And if u ∈ At ∪ At+1, Lemma 6 gives that
379
+ u ∈ It+log(d+1)+1 with probability at least (2ed)−1. It follows
380
+ E
381
+
382
+ |Vt+log(d+1)+1|
383
+ �� |Vt|
384
+
385
+ ≤ |Vt| − (2ed)−1 · 2−d · |Vt|/(d − 1) ≤ (1 − ǫ) · |Vt|,
386
+ for some constant ǫ = ǫ(d). Let r = log(d + 1) + 1. Applying the above inequality iteratively,
387
+ we obtain E[|Vrt|] ≤ (1 − ǫ)rn ≤ e−ǫrn. Thus for t = 3ǫ−1 ln n, E[|Vrt|] ≤ n−2, and by Markov’s
388
+ inequality, P[|Vrt| ≥ 1] ≤ n−2, which implies the lemma.
389
+ Theorem 12. The stabilization time of the 2-state MIS process on any graph G = (V, E) of
390
+ maximum degree ∆ is at most O(∆ log n) w.h.p.
391
+ Proof. We observe that if u ∈ Vt then N +(u)∩At ̸= ∅. Let u ∈ V0, and let (v1, t1), (v2, t2), (v3, t3), . . .
392
+ be a random sequence of vertex-round pairs defined as follows: Let t0 = 0. For each i ≥ 1, if
393
+ u ∈ Vti−1, then vi is an arbitrary vertex from the set N(u)∩Ati−1, and ti = min{j > ti−1 : vi /∈ Aj};
394
+ while if u /∈ Vti−1, then (vi, ti) = (u, ti−1).
395
+ We focus on the first r = 6e∆ log n elements of the sequence above. We bound the probability
396
+ that u ∈ Vtr. For each 1 ≤ i ≤ r, the conditional probability that vi ∈ Iti+1 (and thus u /∈ Vti+1),
397
+ given vi and Bti, is at least 1/(2e∆), from Lemma 6. It follows that
398
+ P[u ∈ Vtr] ≤ (1 − 1/(2e∆))r ≤ e−r/(2e∆) = n−3.
399
+ Next, we bound the value of tr. For each 1 ≤ i ≤ r and t ≥ ti−1, if vi ∈ At then the conditional
400
+ probability that vi /∈ At+1, given (vi, ti) and Bt, is exactly 1/2 (in all cases). It follows that the
401
+ probability of tr > 4r is upper bound by the probability that a sequence of 4r fair coin tosses
402
+ contains fewer than r heads. Thus, by a Chernoff bound,
403
+ P[tr > 4r] ≤ e−(1/2)22r/2 = e−e∆ log n < n−3.
404
+ Combining the above results, we obtain that P[u /∈ V4r] ≥ P[{u /∈ Vtr} ∩ {tr ≤ 4r}] ≥ 1 − 2n−3.
405
+ (Recall that r = 6e∆ log n.) Finally, a union bound over all u ∈ V competes the proof.
406
+ 8
407
+
408
+ 4
409
+ The 2-State MIS Process on Random Graphs
410
+ We first show some additional properties of the 2-state MIS process, which hold for any graph but
411
+ are useful only when adjacent vertices do not have many common neighbors. Then we show some
412
+ structural properties of Gn,p random graphs. Finally, we use these properties to show a poly(log n)
413
+ upper bound on the stabilization time of the 2-state MIS process on Gn,p random graphs.
414
+ 4.1
415
+ Refined Properties of the 2-State MIS Process
416
+ We call a vertex k-active if it is active and has at most k active neighbors. Let
417
+ Ak
418
+ t = {u ∈ At : |N(u) ∩ At| ≤ k}
419
+ be the set of k-active vertices at the end of round t. From Lemma 6, a k-active vertex has probability
420
+ at least Ω(1/k) to become stable black in the next O(log k) rounds. It is thus desirable to have
421
+ k-active vertices for small values k.
422
+ In this section we establish lower bounds on the probability that a given vertex u becomes
423
+ k-active at some point in the next r rounds, as a function of the probability that u is active (but
424
+ has possibly more than k active neighbors) at a point in a certain subinterval of those r rounds.
425
+ The next key lemma is the base of all the other results in the section. It lower bounds the
426
+ probability q of a white vertex u, which is non-active and non-stable, to become k-active after a
427
+ single round. The lower bound is expressed in terms of the probability p that u is active white after
428
+ two rounds. The value of k depends on the number of active neighbors of u, and, crucially, on the
429
+ number of their common neighbors with u.
430
+ Lemma 13. Suppose that u ∈ Vt \ At,8 and let θ = |N(u) ∩ N +(At ∩ N(u))| be the number of u’s
431
+ neighbors that are active or adjacent to an active neighbor of u at the end of round t. Let p be the
432
+ probability that u ∈ At+2 ∩ Wt+2, and q the probability that u ∈ Ak
433
+ t+1 where k = θ + ⌈log(1/p)⌉.
434
+ Then q ≥ pα, where α = 1/log(4/3) ≤ 2.41.
435
+ Proof. Let D = N(u) ∩ At. In round t + 1, each v ∈ D updates its state to a random state, while
436
+ each v ∈ N(u) \ D remains white. Let Z = N(u) ∩ At+1 \ N +(D) be the set of active neighbors of
437
+ u at the end of round t + 1 that are at distance at least two away from set D. Clearly, Z does not
438
+ depend on the random choices of vertices v ∈ D in round t + 1.
439
+ We have that u ∈ At+1 if and only if all v ∈ D update their state to white in round t + 1, i.e.,
440
+ φt+1(v) = white.9 Also |N(u) ∩ At+1| ≤ |N(u) ∩ N +(D)| + |Z| = θ + |Z|. It follows
441
+ q ≥ (1/2)d · P[|Z| ≤ λ],
442
+ where d = |D| and λ = ⌈log(1/p)⌉.
443
+ We have that u ∈ At+2 ∩ Wt+2 only if φt+1(v) or φt+2(v) = white for every v ∈ D, and
444
+ φt+2(v) = white for every v ∈ Z. It follows that
445
+ p ≤ (3/4)d ·
446
+
447
+ i≥0
448
+ P[|Z| = i]/2i.
449
+ (2)
450
+ Let ε = P[|Z| ≤ λ]. Then
451
+ p ≤ (3/4)d ·
452
+
453
+ ε + (1 − ε)/2λ+1�
454
+ ≤ (3/4)d · (ε + (1 − ε) · p/2) .
455
+ 8Note that u ∈ Vt \ At implies u ∈ Wt ∩ Wt+1.
456
+ 9Recall the discussion about coin flips φt(v) at the beginning of Section 2.1.
457
+ 9
458
+
459
+ This implies that p ≤ ε + (1 − ε)· p/2, thus p ≤ 2ε/(1 + ε), and substituting that above yields
460
+ p ≤ (3/4)d · (ε + (1 − ε) · ε/(1 + ε)) = (3/4)d ·
461
+
462
+ 1 + ε.
463
+ Finally, since (3/4)dα = (1/2)d, and for all x ∈ [0, 1],
464
+
465
+ 2x
466
+ 1+x
467
+ �α
468
+
469
+
470
+ 2x
471
+ 1+x
472
+ �2
473
+ = x ·
474
+ 4x
475
+ (1+x)2 ≤ x,
476
+ pα ≤ (3/4)dα ·
477
+ � 2ε
478
+ 1 + ε
479
+ �α
480
+ ≤ (1/2)d · ε ≤ q.
481
+ Next, we use the above Lemma 13 to prove a similar result over a sequence of r rounds. For
482
+ any vertex u ∈ V and i ≥ 1, let
483
+ θu(i) = max{|N(u) ∩ N +(S)|: S ⊆ N(u), |S| ≤ i}.
484
+ (3)
485
+ Lemma 14. Suppose that u ∈ Vt \ At and let d = |N(u) ∩ At|. Let pr be the probability that
486
+ u ∈ At+1 ∪ · · · ∪ At+r, and let qr be the probability that u ∈ Ak
487
+ t+1 ∪ · · · ∪ Ak
488
+ t+r−1, where
489
+ k = θu
490
+
491
+ α log
492
+
493
+ 4r
494
+ pr−2−d
495
+ ��
496
+ +
497
+
498
+ log
499
+
500
+ 4r
501
+ pr−2−d
502
+ ��
503
+ ,
504
+ and α = 1/log(4/3). Then, for any r ≥ 2, qr ≥ r1−α ·
505
+
506
+ pr−2−d
507
+ 2
508
+ �α
509
+ .
510
+ Proof. For i ≥ 0, let di = |N(u) ∩ At+i|, and define the following events: Wi is the event that
511
+ u ∈ Wt+i; Ai is the event that u ∈ At+i; Ak
512
+ i is the event that u ∈ Ak
513
+ t+i; and Hi = ¯
514
+ A0 ∩ ¯
515
+ A1 ∩· · ·∩ ¯
516
+ Ai.
517
+ Let also Xi be the event that the states of the vertices at the end of round t + i are such that the
518
+ conditional probability of Ai+2 ∩ Wi+2 is at least pr−p1
519
+ 4r
520
+ . Let r ≥ 2 and λ = ⌊α log
521
+
522
+ 4r
523
+ pr−p1
524
+
525
+ ⌋. Then
526
+ pr =
527
+
528
+ 1≤i≤r
529
+ P[Ai ∩ Hi−1]
530
+ = p1 +
531
+
532
+ 2≤i≤r
533
+ P[Ai ∩ Hi−1]
534
+ = p1 +
535
+
536
+ 2≤i≤r
537
+ P[Ai ∩ Wi ∩ Hi−1]
538
+ (since Ai ∩ Hi−1 implies Wi)
539
+ ≤ p1 +
540
+
541
+ 2≤i≤r
542
+ P[Ai ∩ Wi ∩ Hi−2]
543
+ (since Hi−1 implies Hi−2)
544
+ ≤ p1 +
545
+
546
+ 2≤i≤r
547
+ P[Ai ∩ Wi ∩ Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2]
548
+ +
549
+
550
+ 2≤i≤r
551
+ P[Ai ∩ Wi ∩ Hi−2 ∩ {di−2 > λ}] +
552
+
553
+ 2≤i≤r
554
+ P[Ai ∩ Wi ∩ ¯
555
+ Xi−2].
556
+ Each of the last two sums above is at most pr−p1
557
+ 4
558
+ , because for each non-zero sum term, we have
559
+ P[Ai ∩ Wi ∩ Hi−2 ∩ {di−2 > λ}] ≤ P[Ai ∩ Wi | Hi−2, di−2 > λ] ≤
560
+ �3
561
+ 4
562
+ �λ+1
563
+ ≤ pr − p1
564
+ 4r
565
+ ,
566
+ similarly to (2), and P[Ai ∩ Wi ∩ ¯
567
+ Xi−2] ≤ P[Ai ∩ Wi | ¯
568
+ Xi−2] ≤ pr−p1
569
+ 4r
570
+ . Applying these above gives
571
+ pr − p1
572
+ 2
573
+
574
+
575
+ 2≤i≤r
576
+ P[Ai ∩ Wi ∩ Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2]
577
+ =
578
+
579
+ 2≤i≤r
580
+ P[Ai ∩ Wi | Hi−2, di−2 ≤ λ, Xi−2] · P[Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2].
581
+ 10
582
+
583
+ Next we lower bound qr. We have
584
+ qr ≥
585
+
586
+ 1≤i≤r−1
587
+ P[Ak
588
+ i ∩ Hi−1]
589
+ =
590
+
591
+ 2≤i≤r
592
+ P[Ak
593
+ i−1 ∩ Hi−2]
594
+
595
+
596
+ 2≤i≤r
597
+ P[Ak
598
+ i−1 ∩ Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2]
599
+ =
600
+
601
+ 2≤i≤r
602
+ P[Ak
603
+ i−1 | Hi−2, di−2 ≤ λ, Xi−2] · P[Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2].
604
+ From Lemma 13, applied for round t + i − 2, using p ≥ pr−p1
605
+ 4
606
+ and θ ≤ θu(λ), and observing that
607
+ p1 = 2−d, we obtain
608
+ P[Ak
609
+ i−1 | Hi−2, di−2 ≤ λ, Xi−2] ≥ (P[Ai ∩ Wi | Hi−2, di−2 ≤ λ, Xi−2])α .
610
+ We substitute this to the previous equation above, and then use Jensen’s inequality to complete
611
+ the proof: Let ν = �
612
+ 2≤i≤r P[Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2] ≤ r.
613
+ qr ≥
614
+
615
+ 2≤i≤r
616
+
617
+ P[Ak
618
+ i | Hi−2, di−2 ≤ λ, Xi−2]
619
+ �α
620
+ · P[Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2]
621
+ ≥ ν ·
622
+
623
+  �
624
+ 2≤i≤r
625
+ P[Ak
626
+ i | Hi−2, di−2 ≤ λ, Xi−2] · P[Hi−2 ∩ {di−2 ≤ λ} ∩ Xi−2]/ν
627
+
628
+
629
+ α
630
+ ≥ ν ·
631
+ �pr − p1
632
+
633
+ �α
634
+ ≥ r ·
635
+ �pr − 2−d
636
+ 2r
637
+ �α
638
+ .
639
+ Lemma 14 assumes that vertex u is initially not active. The next lemma shows a similar result
640
+ for the case where u is active initially. In this case, in place of the probability pr that u becomes
641
+ active at some point in the interval {t+1, . . . , t+r}, we use the probability br that u becomes black
642
+ at some point of a subinterval {t + ℓ, . . . , t + r}. The proof proceeds by considering the first round
643
+ after t when either u has at most k black neighbors, or u is white. If the first condition holds, then
644
+ u has probability 1/2 of being black, and thus of being k-active. If only the second condition holds
645
+ then we are in the case of Lemma 14. The proof can be found in Appendix A.2.
646
+ Lemma 15. Suppose that u ∈ At. Let ℓ ≥ 2 and r ≥ ℓ + 2, let br be the probability that u ∈
647
+ Bt+ℓ ∪· · ·∪Bt+r, and suppose that br ≥ 1/2ℓ−2. Let qr be the probability that u ∈ Ak
648
+ t ∪· · ·∪Ak
649
+ t+r−1,
650
+ where
651
+ k = θu
652
+
653
+ α log (32r/br)
654
+
655
+ + log (32r/br) + log(1/br) + 3.
656
+ Then qr ≥ r1−α · (br/16)α, where α = 1/log(4/3).
657
+ In the last lemma of this section, we consider the case in which Lemma 14 does not give a large
658
+ enough lower bound for qr, even though pr is large, because the difference pr − 2−d is small. We
659
+ proceed by essentially reducing this case to the case of Lemma 15, after a single round. The proof
660
+ is in Appendix A.3.
661
+ Lemma 16. Suppose that u ∈ Vt \ At, and let d = |N(u) ∩ At|. Let ℓ ≥ 5 and r ≥ ℓ + 2, let pr be
662
+ the probability that u ∈ At+1 ∪ · · · ∪ At+r−1, let br be the probability that u ∈ Bt+ℓ ∪ · · · ∪ Bt+r, and
663
+ 11
664
+
665
+ suppose that br ≥ 1/2ℓ−4 and br ≥ 2(pr − 2−d). Let qr be the probability that u ∈ Ak
666
+ t ∪ · · · ∪ Ak
667
+ t+r−1,
668
+ where
669
+ k = θu
670
+
671
+ α log (128r/br)
672
+
673
+ + log (128r/br) + log(4/br) + 3.
674
+ Then qr ≥ r1−α · (br/64)α, where α = 1/log(4/3).
675
+ 4.2
676
+ Structural Properties of Gn,p and Good Graphs
677
+ We describe some structural properties that a graph must possess in order for the analysis given in
678
+ the following sections to carry through. A graph satisfying these properties is called a good graph.
679
+ Then we show that a random Gn,p graph is a good graph w.h.p.
680
+ Definition 17 (Good Graphs). Let n be a positive integer and 0 < p < 1. A graph G = (V, E)
681
+ with n vertices is (n, p)-good if it satisfies all the following properties:
682
+ (P1) For any set S ⊆ V , the average degree of induced subgraph G[S] is at most max{8p|S|, 4 ln n}.
683
+ (P2) For any set S ⊆ V of size |S| ≥ 40 ln(n)/p,
684
+ |{u ∈ V \ S : |N(u) ∩ S| < p|S|/2}| ≤ |S|/2.
685
+ (P3) For any three disjoint sets S, T, I ⊆ V such that |S| ≥ 2|T| and (S ∪ T) ∩ N(I) = ∅,
686
+ |N(T) \ N +(S ∪ I)| ≤ |N(S) \ N +(I)| + 8 ln2(n)/p.
687
+ (P4) For any two disjoint sets S, T ⊆ V such that |S| ≥ |T| and |T| ≤ ln(n)/p, |E(S, T)| ≤ 6|S| ln n.
688
+ (P5) No two vertices u, v ∈ V have more than max{6np2, 4 ln n} common neighbors.
689
+ (P6) If p ≥ 2(ln(n)/n)1/2 then diam(G) ≤ 2.
690
+ Lemma 18. A random graph G = (V, E) drawn from Gn,p is (n, p)-good with probability 1−O(n−2).
691
+ The proof of Lemma 18 can be found in Appendix A.4.
692
+ 4.3
693
+ Analysis of the 2-State MIS Process on Gn,p
694
+ In this section, we prove the following bound on the stabilization time of the 2-state MIS process
695
+ on a random Gn,p graph.
696
+ Theorem 19. The stabilization time of the 2-state MIS process on a random graph drawn from
697
+ Gn,p, where p = O(
698
+
699
+ log(n)/n) or p = Ω(1/ log2.5 n), is O(log5.5 n) with probability 1 − O(n−2).
700
+ The theorem follows by combining Lemma 18 and the next lemma, which analyzes the 2-state
701
+ MIS process on a good graph.
702
+ Lemma 20. The stabilization time of the 2-state MIS process on any (n, p)-good graph G = (V, E),
703
+ where p = O(
704
+
705
+ log(n)/n) or p = Ω(1/ log2.5 n), is O(log5.5 n) with probability 1 − O(n−2).
706
+ It is straightforward to extend the above statements so that p ≤ poly(log n) · n−1/2 or p ≥
707
+ 1/ poly(log n), for any desired poly(log n) term, by adjusting the exponent of log n in the stabiliza-
708
+ tion time bound.
709
+ 12
710
+
711
+ 4.3.1
712
+ Proof of Lemma 20
713
+ We show that starting from any vector of vertex states, the process makes sufficient progress after
714
+ poly(log n) rounds, where progress is measured by the expected number of vertices that become
715
+ stable. All lemmas below assume G = (V, E) is an arbitrary (n, p)-good graph, and the probabilistic
716
+ statements assume we know the states of the vertices at the end of round t.
717
+ The first lemma
718
+ considers the case in which the number of active vertices is large, namely, |At| = Ω(log(n)/p).
719
+ Lemma 21. If |At| ≥ 80 ln(n)/p then there is a constant ǫ > 0 such that E[|Vt+log n|] ≤ (1 − ǫ)·|Vt|.
720
+ Proof. From property (P1) in Definition 17 of good graphs, the average degree of the induced
721
+ subgraph G[At] is at most k = max{8p|At|, 4 ln n} = 8p|At|.
722
+ Let S be a subset of At consisting of the |At|/2 vertices u ∈ At with the smallest degree in
723
+ G[At], i.e., for any two vertices u ∈ S and u′ ∈ At \ S, |N(u) ∩ At| ≤ |N(u′) ∩ At|. It follows that
724
+ for all u ∈ S, |N(u) ∩ At| ≤ 2k; thus S ⊆ A2k
725
+ t . Let R = {u ∈ V \ S : |N(u) ∩ S| < p|S|/2}. Since
726
+ |S| = |At|/2 ≥ 40 ln(n)/p, property (P2) in Definition 17 yields |R| ≤ |S|/2. Then the number of
727
+ vertices u ∈ Vt with |N(u) ∩ S| ≥ p|S|/2 is at least
728
+ |Vt \ (S ∪ R)| ≥ |Vt| − (|S| + |R|) ≥ |Vt| − 3|S|/2 = |Vt| − 3|At|/4 ≥ |Vt|/4.
729
+ Since each of those vertices u has at least p|S|/2 neighbors in S ⊆ A2k
730
+ t , Lemma 7 gives that the
731
+ probability at least one neighbor of u is stable black (and thus u is also stable) at the end of round
732
+ t + log n is at least
733
+ (1/5) · min
734
+
735
+ 1, (p|S|/2) · (4k)−1�
736
+ = (1/5) · min
737
+
738
+ 1, (p|At|/4) · (32p|At|)−1�
739
+ = 1/640.
740
+ Then the expected number of vertices that are not stable at the end of round t + log n is
741
+ E[|Vt+log n|] ≤ |Vt| − (|Vt|/4) · 1/640 ≤ |Vt| − |Vt|/2560.
742
+ The next lemma considers the case in which the number of vertices that are not stable is large,
743
+ namely |Vt| = Ω(ln2(n)/p), and |At| = O(ln(n)/p).
744
+ Lemma 22. If |Vt| ≥ 10 ln2(n)/p and |At| ≤ 80 ln(n)/p then there is a constant ǫ > 0 such that
745
+ E[|Vt+log n|] ≤ (1 − ǫ/ ln n) · |Vt|.
746
+ Proof. From property (P1) in Definition 17, the average degree of graph G[At] is at most
747
+ k = max{8p|At|, 4 ln n} ≤ 640 ln n.
748
+ Let S be a subset of At consisting of the 2|At|/3 vertices u ∈ At with the smallest degree in G[At],
749
+ and let T = At \ S. Then for all u ∈ S, |N(u) ∩ At| ≤ 3k; thus S ⊆ A3k
750
+ t .
751
+ The set Vt consist of (i) all the active vertices, u ∈ At = S ∪ T, and (ii) all the non-active
752
+ vertices that are not in N +(It) (these vertices are white and have at least one active neighbor). We
753
+ can thus partition Vt into the four distinct sets: S, N(S)\N(It), T \N(S), and N(T)\N +(S ∪It).
754
+ For the sizes of these sets, we have |T \ N(S)| ≤ |T| < |S| and, by property (P3) in Definition 17,
755
+ |N(T) \ N +(S ∪ It)| ≤ |N(S) \ N(It)| + 8 ln2(n)/p.
756
+ Using these two inequalities, the fact that the sizes of the four sets above sum to |Vt|, and the
757
+ assumption |Vt| ≥ 10 ln2(n)/p, we obtain
758
+ |S| + |N(S) \ N(It)| ≥ (|Vt| − 8 ln2(n)/p)/2 ≥ |Vt|/10.
759
+ 13
760
+
761
+ Therefore, at least |Vt|/10 vertices u ∈ Vt are in S or adjacent to a vertex from S. From Lemma 6,
762
+ each u ∈ S ⊆ A3k
763
+ t
764
+ is stable black (and all its neighbors are stable white) at the end of round
765
+ t + log n, with probability at least 1/(6ek). It follows that
766
+ E[|Vt+log n|] ≤ |Vt| − (|Vt|/10) · 1/(6ek) ≤ |Vt| − |Vt|/(1.1 · 105 ln n).
767
+ In the next lemma we analyze the remaining case, in which |Vt| = O(ln2(n)/p) and |At| =
768
+ O(ln(n)/p). In fact, the lemma does not require a bound on |At|. Unlike the previous lemmas,
769
+ however, it requires that p = O(
770
+
771
+ log(n)/n).
772
+ Lemma 23. If |Vt| ≤ 10 ln2(n)/p and p ≤ c
773
+
774
+ log(n)/n, for some constant c > 0, then there is a
775
+ constant ǫ = ǫ(c) > 0 such that E[|Vt+2 log n|] ≤
776
+
777
+ 1 − ǫ/ ln3.5 n
778
+
779
+ · |Vt|.10
780
+ Proof. From property (P1) in Definition 17, the average degree of graph G[Vt] is at most
781
+ k = max{8p|Vt|, 4 ln n} ≤ 80 ln2 n.
782
+ Let T be a subset of Vt consisting of the min{ln(n)/p, |Vt|/2} vertices u ∈ Vt with the largest degree
783
+ in G[Vt], and let S = Vt \ T. Then |S| ≥ |T|, and for all u ∈ S, |N(u) ∩ Vt| is at most
784
+ d = k|Vt|/|T| ≤ k · max{p|Vt|/ ln n, 2} ≤ 800 ln3 n.
785
+ From property (P4) in Definition 17, the number of edges between S and T is |E(S, T)| ≤ 6|S| ln n.
786
+ Let R = {u ∈ S : |N(u)∩T| ≤ 12 ln n}. Then |R| ≥ |S|/2 ≥ |Vt|/4. We will show for some constant
787
+ ǫ′ = ǫ′(c) that
788
+ P[u /∈ Vt+2 log n] ≥ ǫ′ ln−α−1 n · (ln ln n)−α,
789
+ for all u ∈ R.
790
+ (4)
791
+ It follows that E[|Vt+2 log n|] ≤ |Vt| − (|Vt|/4) · ǫ′ ln−α−1 n · (ln ln n)−α. Since α = 1/log(4/3) ≤ 2.41,
792
+ the above implies the lemma. To complete the proof it remains to show (4).
793
+ Let u ∈ R. We partition the neighbors of u in G[Vt] into sets N(u) ∩ S and N(u) ∩ T, and let
794
+ x = P[N(u) ∩ S ∩ A ̸= ∅]
795
+ and
796
+ y = P[N(u) ∩ T ∩ B ̸= ∅],
797
+ where A = At ∪ · · · ∪ At+r−2, B = Bt+r−2 ∪ Bt+r−1 ∪ Bt+r, and r = log(48 ln n) + 6. We distinguish
798
+ the following three cases: x + y ≤ 1/2, x ≥ 1/4, and y ≥ 1/4.
799
+ Case x + y ≤ 1/2: With probability at least 1 − (x + y) ≥ 1/2, we have N(u) ∩ S ∩ A = ∅
800
+ and N(u) ∩ T ∩ B = ∅. If N(u) ∩ S ∩ A = ∅ then N(u) ∩ S ⊆ Wt+r−2 (it is easy to see that
801
+ N(u) ∩ S ∩ It+r−2 = ∅). Similarly, if N(u) ∩ T ∩ B = ∅, it is immediate that N(u) ∩ T ⊆ Wt+r−2.
802
+ Thus, with probability at least 1/2, we have that N(u) ⊆ Wt+r−2. If N(u) ��� Wt+r−2, then either
803
+ u ∈ At+r−2 ∩ Wt−r−2 or u ∈ It+r−2. Therefore, with probability at least 1/2, either u /∈ Vt+r−2
804
+ or u ∈ At+r−2. If u ∈ At+r−2, then u ∈ Ad
805
+ t+r−2 since |N(u) ∩ Vt| ≤ d, and from Lemma 6, the
806
+ probability that u ∈ It+r−2+log n is at least (2ed)−1. Combining the last two statements yields that
807
+ the probability of u /∈ Vt+r−2+log n is at least (1/2) · (2ed)−1 ≥ (8700 ln3 n)−1, which implies (4).
808
+ Case x ≥ 1/4: With probability at least 1/4, there is a pair v, j such that v ∈ N(u) ∩ S,
809
+ 0 ≤ j ≤ r − 2, and v ∈ At+j. And if v ∈ At+j then v ∈ Ad
810
+ t+j since |N(v) ∩ Vt| ≤ d, and from
811
+ Lemma 6, the probability that v ∈ It+j+log n is at least (2ed)−1. We conclude that the probability
812
+ that u ∈ N +(It+r−2+log n) is at least (1/4) · (2ed)−1 ≥ (17400 ln3 n)−1, which implies (4).
813
+ Case y ≥ 1/4: There exists some v∗ ∈ N(u) ∩ T such that
814
+ P[v∗ ∈ B] ≥ y/|N(u) ∩ T| ≥ (4 · 12 ln n)−1 = (48 ln n)−1.
815
+ 10If c is super constant, then the proof gives E[|Vt+2 log n|] ≤
816
+
817
+ 1 − ǫ/(c2 ln3.5 n)
818
+
819
+ · |Vt|.
820
+ 14
821
+
822
+ If v∗ ∈ At then we can apply Lemma 15, for ℓ = r − 2 ≥ log(48 ln n) + 2 and br ≥ (48 ln n)−1, to
823
+ obtain that v∗ ∈ Aλ
824
+ t ∪ · · · ∪ Aλ
825
+ t+r−1 with probability at least q = r1−α · (16 · 48 ln n)−α, where
826
+ λ = θv∗�
827
+ α log (32r · 48 ln n)
828
+
829
+ + log (32r · 48 ln n) + log(48 ln n) + 3.
830
+ Suppose now that v∗ ∈ Vt \ At, and let
831
+ p∗ = P[v∗ ∈ At+1 ∪ · · · ∪ At+r−1] − 2−|N(v∗)∩At|.
832
+ If p∗ ≥ P[v∗ ∈ B]/2 ≥ (96 ln n)−1, then we can apply Lemma 14 (using r − 1 in place of r), to
833
+ obtain that v∗ ∈ Aλ′
834
+ t ∪· · ·∪Aλ′
835
+ t+r−2 with probability at least q′ = r1−α ·(p∗/2)α ≥ r1−α·(192 ln n)−α,
836
+ where
837
+ λ′ = θv∗�
838
+ α log (4r · 96 ln n)
839
+
840
+ + log (4r · 96 ln n) .
841
+ If p∗ < P[v∗ ∈ B]/2, then we can apply Lemma 16, for ℓ = r − 2 ≥ log(48 ln n) + 4 and br =
842
+ P[v∗ ∈ B] ≥ (48 ln n)−1, to obtain that that v∗ ∈ Aλ′′
843
+ t
844
+ ∪ · · · ∪ Aλ′′
845
+ t+r−1 with probability at least
846
+ q′′ = r1−α · (64 · 48 ln n)−α, where
847
+ λ′′ = θv∗�
848
+ α log (128r · 48 ln n)
849
+
850
+ + log (128r · 48 ln n) + log(4 · 48 ln n) + 3.
851
+ In all the settings above, we have q, q′, q′′ ≥ ε ln−α n · (ln ln n)1−α and λ, λ′, λ′′ ≤ β ln n · ln ln n, for
852
+ some constants ε, β > 0, where the bound on λ, λ′, λ′′ holds because property (P5) and assumption
853
+ p ≤ c
854
+
855
+ log(n)/n imply that for any v ∈ V , θv(i) ≤ i · (6c2 + 4) log n (recall the definition of θv
856
+ from (3)). Therefore, the probability that v∗ is (β · ln n · ln ln n)-active at the end of some round
857
+ in {t, . . . , t + r − 1} is at least ε · ln−α n · (ln ln n)1−α, and from Lemma 6, the probability that
858
+ v∗ ∈ It+r−1+log n is at least ε · ln−α n · (ln ln n)1−α · (2eβ · ln n · ln ln n)−1. Thus with at least that
859
+ probability we have u /∈ Vt+r−1+log n. This completes the proof of (4).
860
+ Putting the Pieces Together.
861
+ First, suppose that p ≤ c
862
+
863
+ log(n)/n for some constant c > 0.
864
+ From Lemmas 21 to 23, E[|Vt+2 log n|] ≤
865
+
866
+ 1 − ǫ/ ln3.5 n
867
+
868
+ · E[|Vt|], for any t ≥ 0. Iteratively applying
869
+ this inequality, we obtain that for any i ≥ 0,
870
+ E[|V2i log n|] ≤
871
+
872
+ 1 − ǫ/ ln3.5 n
873
+ �i · n.
874
+ Substituting i = 3 ln4.5 n/ǫ yields E
875
+
876
+ |V(6/ǫ) log n·ln4.5 n|
877
+
878
+ ≤ n−2, and by Markov’s inequality, it follows
879
+ P[|V(6/ǫ) log n·ln4.5 n| ≥ 1] ≤ n−2.
880
+ If p ≥ ε/ ln2.5 n for some constant ε > 0, then we use Lemmas 21 and 22 as above to obtain that
881
+ P[|Vt| ≥ 10 ln2(n)/p] ≤ n−2 for some t = O(log3 n). We also observe that if |Vt| < 10 ln2(n)/p then
882
+ the maximum degree of graph (V, E(Vt)) is ∆ < |Vt| ≤ 10 ln2(n)/p ≤ 10 ln4.5(n)/ε, and Theorem 12
883
+ yields a bound of O(∆ log n) = O(log5.5 n). Combining the two completes the proof of Lemma 20.
884
+ Remark 24. Some of the logarithmic factors can be shaved off with a more careful analysis. For
885
+ example, using a “pipelining” argument, one could improve the bound on halving |Vt| obtained
886
+ from Lemma 23, from O(log n · ln3.5 n) to O(log n + ln3.5 n), thus saving one logarithmic factor.
887
+ 5
888
+ Logarithmic Switch and the 3-Color MIS Process
889
+ We present an extension of the 2-state MIS process, called 3-color MIS process, which uses one
890
+ additional color, grey, and includes also a sub-process, called logarithmic switch, which runs in
891
+ parallel to the main process. Then we analyze the 3-color MIS process on Gn,p random graphs.
892
+ 15
893
+
894
+ 5.1
895
+ The Logarithmic Switch Process
896
+ We first introduce an abstract logarithmic switch process, by specifying its properties. Then we
897
+ describe an actual randomized graph process that satisfies these properties with high probability
898
+ and in a self-stabilizing manner, using 6 states per vertex.
899
+ Definition 25 (Logarithmic Switch Process). An (a, b)-logarithmic switch process on G = (V, E)
900
+ generates for each vertex u ∈ V a binary sequence σ0(u), σ1(u), . . . , where σt(u) ∈ {on, off} for
901
+ each t ≥ 0, such that the following properties hold for all u ∈ V .
902
+ (S1) Every run of consecutive off values in sequence σ0(u), σ1(u), . . . has length at most a ln n.
903
+ (S2) If diam(G) ≤ 2 then every run of consecutive off values in sequence σt(u), σt+1(u), . . . has
904
+ length at least a
905
+ 6 ln n, where t = min{i ≥ a
906
+ 6 ln n: σi(u) = on}.
907
+ (S3) If diam(G) ≤ 2 then every run of consecutive on values in sequence σt(u), σt+1(u), . . . has
908
+ length at most b, where t is some constant independent of n.
909
+ Definition 26 (Randomized Logarithmic Switch). In the randomized logarithmic switch process on
910
+ G = (V, E), each vertex u ∈ V has a state, called level, that takes on values in the set {0, 1, . . . , 5}.
911
+ The initial value level0(u) of u can be arbitrary, and in each round t ≥ 1 the level of u is updated
912
+ according to the following rule, which uses a global parameter 0 < ζ < 1.
913
+ if level t−1(u) = 5 then
914
+ choose a random bit bt(u) such that P[bt(u) = 0] = ζ
915
+ end
916
+ if (level t−1(u) = 5 and bt(u) = 1) or level t−1(u) = 0 then
917
+ set level t(u) = 5
918
+ else set level t(u) = max{level t−1(v): v ∈ N +(u)} − 1
919
+ Finally, we define the following mapping of the levels to the binary on/off values of Definition 25.
920
+ For each u ∈ V and t ≥ 0,
921
+ σt(u) =
922
+
923
+ on
924
+ if levelt(u) ≤ 2
925
+ off
926
+ if levelt(u) ≥ 3.
927
+ Lemma 27. For any graph G = (V, E), the randomized logarithmic switch process with parameter
928
+ 0 < ζ ≤ 1/2 satisfies properties (S1) to (S3) for a = 4/ζ and b = 3, with probability 1 − O(n−2),
929
+ during the first n rounds.
930
+ Proof. Let u ∈ V , and let Sv ⊆ V be the set of vertices at distance at most 2 from u. If u has level
931
+ at least 3 in all rounds t, . . . , t+a ln n, then no vertex v ∈ Su has level 0 in rounds t+2, . . . , t+a ln n;
932
+ and at least one vertex v ∈ Su must be at level 5 in all rounds t + 2, . . . , t + a ln n − 2. It follows
933
+ that the probability there is some u ∈ V and t ≤ n such that u has level at least 3 in all rounds
934
+ t, . . . , t + a ln n is at most
935
+ n2(1 − ζ)a ln n−4 ≤ n2−aζ/(1 − ζ)4 ≤ 16 · n−2,
936
+ when aζ = 4. Thus, property (S1) holds with probability at least 1 − O(n−2).
937
+ Next we assume diam(G) ≤ 2. The rest of the proof is similar to that in [12]. Observe that
938
+ there must be a vertex v and a round t∗ ≤ 5 such that levelt∗(u) = 5. And from the end of round
939
+ t∗ + 2, all vertices “synchronize” in the sense that once a vertex reaches level 2 in a round, all
940
+ vertices reach level 2 in that round, then the they all reach level 1 in the next round, then level
941
+ 0, and then 5. It follows that property (S3) holds for b = 3, starting from round t∗ + 2 ≤ 7. The
942
+ property holds with probability 1, and for all rounds after round t∗ + 2, not just for the first n.
943
+ 16
944
+
945
+ As mentioned above, after vertices have synchronized, all n vertices move from level 0 to level
946
+ 5 simultaneously, each time. When that happens, the number of rounds until there are no vertices
947
+ left at level 5 is greater than a ln n − 6 with probability at most
948
+ n(1 − ζ)a ln n−6 ≤ 64 · n−3,
949
+ as before; and is smaller than r = a
950
+ 6 ln n with probability at most
951
+ (1 − (1 − ζ)r)n ≤ e−n(1−ζ)r ≤ e−n4−ζr = e−n4−(aζ/6) ln n ≤ e−n0.07 = O(n−3).
952
+ Combining the above, using a union bound, we obtain that property (S2) holds with probability
953
+ 1 − O(n−2).
954
+ 5.2
955
+ The 3-Color MIS Process
956
+ We now define the 3-color MIS process, which is an extensions of the 2-state MIS process.
957
+ Definition 28 (3-Color MIS Process). The process consists of two (sub-)processes that run in
958
+ parallel on G = (V, E). The first is an (a, 3)-logarithmic switch process, where a = 512, which gen-
959
+ erates a value σt(u) ∈ {on, off} for each vertex u ∈ V in each round t ≥ 0. The second is a variant
960
+ of the 2-state MIS process, where each vertex u ∈ V has a state ct(u) ∈ {black, white, gray}, c0(u)
961
+ can be arbitrary, and in each round t ≥ 1, u’s state is updated as follows.
962
+ let NC t(u) = {ct−1(v): v ∈ N(u)}
963
+ if ct−1(u) = black and NC t(u) ∋ black then
964
+ let ct(u) be a uniformly random state from {black, gray}
965
+ else if ct−1(u) = white and NC t(u) ̸∋ black then
966
+ let ct(u) be a uniformly random state from {black, white}
967
+ else if ct−1(u) = gray and σt−1(u) = on then
968
+ set ct(u) = white
969
+ else set ct(u) = ct−1(u)
970
+ There are precisely two differences in the update rule above compared to that for the 2-state
971
+ MIS process: a black vertex with a black neighbor changes to gray with probability 1/2, rather
972
+ than to white; and a gray vertex changes to white if its switch value is on. Note that a gray vertex
973
+ is treated similarly to a non-active white vertex.
974
+ A vertex is stable, if it is black and has no black neighbors, or it is not black and has a neighbor
975
+ that is stable black. Other than that, the remaining definitions and notations are the same as in
976
+ the 2-state MIS process, namely, of active vertices, stabilization times, Bt, Wt, At, Ak
977
+ t , It, and
978
+ Vt. We also let Γt = V \ (Bt ∪ Wt) denote the set of gray vertices at the end of round t.
979
+ The definition of the 3-color MIS process above assumes an arbitrary logarithmic switch process.
980
+ We can use the randomized logarithmic switch from Definition 26, which uses 6 states per vertex,
981
+ to obtain a 3-color MIS process that uses 6 · 3 = 18 states in total. The probability parameter of
982
+ the randomized switch is ζ = 4/a = 27, thus at most 7 random bits are required per round for each
983
+ vertex (plus one more for each active vertex).
984
+ We note that Lemmas 6 and 7 and their proofs carry over to the 3-color MIS process, without
985
+ changes. We will use also the two simple lemmas below that are specific to the 3-color MIS process.
986
+ Recall that a = 512 is a parameter of the logarithmic switch.
987
+ Lemma 29. If t ≥ a ln n and u ∈ Γt then u ∈ At−a ln n ∪ · · · ∪ At−1.
988
+ 17
989
+
990
+ Proof. By property (S1) in Definition 25 of the logarithmic switch, a vertex is gray for at most
991
+ a ln n consecutive rounds. Also if a vertex becomes gray in round j > 0, it must be active black at
992
+ the end of round j − 1. Combining these two facts implies the lemma.
993
+ Lemma 30. If diam(G) ≤ 2, u ∈ V , t ≥ a
994
+ 6 ln n, and t′ = t + a
995
+ 6 ln n, then the expected number of
996
+ times u is active black between rounds t and t′ is E [|{j : u ∈ Bj ∩ Vj} ∩ {t, . . . , t′}| | Bt, Wt] ≤ 4.
997
+ Proof. From properties (S2) and (S3) in Definition 25, it is easy to see that sequence ct(u), . . . , ct′(u)
998
+ contains at most two runs of consecutive black states. Moreover, the expected length of the prefix
999
+ of each black run until u becomes stable black or the run finishes (and u becomes gray) is 2. It
1000
+ follows that u is non-stable black in at most 4 rounds in expectation.
1001
+ Lemmas 13 and 14 hold also for the 3-color MIS process, when u ∈ Vt \ (At ∪ Γt) and thus
1002
+ u ∈ Wt.11 The next simple lemma will be used together with Lemma 14.
1003
+ Lemma 31. Let t ≥ 0, u ∈ V , and d > 0. Let t′ ≥ t be the first round when either u is white and
1004
+ has at least d black neighbors, or u is stable. The expected number of rounds t < j < t′ at which u
1005
+ is black and has at least d black neighbors is at most 3.
1006
+ Proof. The lemma is obtained using the observations that: each time u’s state changes from white
1007
+ to black, it is equally likely that it remained white; and, when u is active black, it becomes gray in
1008
+ the next step with probability 1/2.
1009
+ 5.3
1010
+ Analysis of the 3-Color MIS Process on Gn,p
1011
+ We show that the stabilization time of the 3-color MIS process on Gn,p random graphs is poly(log n),
1012
+ for the complete range of values of p.
1013
+ Theorem 32. The stabilization time of the 3-color MIS process on a random graph drawn from
1014
+ Gn,p is O(log6 n) with probability 1 − O(n−2).
1015
+ As before, it suffices to show that the above bound holds for good graphs, and apply Lemma 18.
1016
+ Lemma 33. The stabilization time of the 3-color MIS process on any (n, p)-good graph G = (V, E)
1017
+ is O(log6 n) with probability 1 − O(n−2).
1018
+ 5.3.1
1019
+ Proof of Lemma 33
1020
+ The proof strategy is similar to Lemma 20’s: From any vector of vertex states at the end of round
1021
+ t, we show that the process makes sufficient progress in expectation in poly(log n) rounds. The
1022
+ main difference is that now we show that this is also true even in the case of |Vt| = O(log2(n)/p)
1023
+ when diam(G) ≤ 2, which corresponds to the case of p = Ω(
1024
+
1025
+ log(n)/n), by property (P6) in
1026
+ Definition 17. This is precisely the case that we could not handle in the analysis of the 2 state MIS
1027
+ process. The relevant lemma is Lemma 36.
1028
+ We first observe that Lemma 21, which considers that case of |At| = Ω(log(n)/p), carries over
1029
+ to the 3-color MIS process, without any changes in the proof.
1030
+ Next we consider the case where |At| = O(ln(n)/p), |Vt| = Ω(ln2(n)/p), and |Γt| = O(ln2(n)/p).
1031
+ The following lemma is very similar to Lemma 22, except that it requires also a bound on |Γt|.
1032
+ Recall that a = 512 is a parameter of the logarithmic switch.
1033
+ 11The proofs require just minor modifications, mostly replacing some occurrences of “white” by “not black” or
1034
+ “gray”.
1035
+ 18
1036
+
1037
+ Lemma 34. If |Vt| ≥ 82a ln2(n)/p, |At| ≤ 80 ln(n)/p, and |Γt| ≤ 80a ln2(n)/p, then there is a
1038
+ constant ǫ > 0 such that E[|Vt+log n|] ≤ (1 − ǫ/ ln n) · |Vt|.
1039
+ Proof. The proof is very similar to Lemma 22’s. As before, from property (P1) in Definition 17,
1040
+ the average degree of G[At] is at most k = max{8p|At|, 4 ln n} ≤ 640 ln n. We let S be a subset of
1041
+ At consisting of the 2|At|/3 vertices u ∈ At with the smallest degree in G[At], and let T = At \ S.
1042
+ Then for all u ∈ S, |N(u) ∩ At| ≤ 3k, thus S ⊆ A3k
1043
+ t .
1044
+ The set Vt consist of (i) all active vertices, u ∈ At = S ∪T, (ii) all non-active non-stable vertices
1045
+ that have some active neighbor, and (iii) all non-active non-stable vertices have no active neighbors
1046
+ (these vertices are gray). We can thus partition Vt into the five distinct sets: S, N(S) \ N(It),
1047
+ T \ N(S), N(T) \ N +(S ∪ It), and Vt \ N +(T ∪ Sf) ⊆ Γt. We have that |Vt \ N +(T ∪ S)| ≤ |Γt| ≤
1048
+ 80a ln2(n)/p, |T \ N(S)| ≤ |T| < |S|, and, by property (P3) in Definition 17,
1049
+ |N(T) \ N +(S ∪ It)| ≤ |N(S) \ N(It)| + 8 ln2(n)/p.
1050
+ Using these three inequalities, the fact that the sizes of the five sets above sum to |Vt|, the assump-
1051
+ tion |Vt| ≥ 82a ln2(n)/p, and that a ≥ 8, we obtain
1052
+ |S| + |N(S) \ N(It)| ≥ (|Vt| − (80a + 8) ln2(n)/p)/2 ≥ (|Vt| − 81a ln2(n)/p)/2 ≥ |Vt|/82a.
1053
+ Therefore, at least |Vt|/82a vertices u ∈ Vt are in S or adjacent to S. And, from Lemma 6, each
1054
+ u ∈ S ⊆ A3k
1055
+ t
1056
+ is in It+log n, with probability at least 1/(6ek). It follows
1057
+ E[|Vt+log n|] ≤ |Vt| − (|Vt|/82a) · 1/(6ek) ≤ |Vt| − |Vt|/(1.1 · 82a · 104 ln n).
1058
+ Next we assume |At| = O(ln(n)/p) and |Vt| = Ω(ln2(n)/p), as in the previous lemma, but now
1059
+ |Γt| = Ω(ln2(n)/p). We reduce this case to the previous cases using Lemma 29.
1060
+ Lemma 35. If |Vt| ≥ 83a ln2(n)/p, |At| ≤ 80 ln(n)/p, and |Γt| > 80a ln2(n)/p, then there is a
1061
+ constant ǫ > 0 such that E[|Vt+a ln n+log n|] ≤ (1 − ǫ/ ln n) · |Vt|.
1062
+ Proof. Let τ = min{j ≥ t: |Vj| ≤ 82a ln2(n)/p or |Aj| ≥ 80 ln(n)/p or |Γj| ≤ 80a ln2(n)/p}. We
1063
+ have τ ≤ t + a ln n, because if |Γt+a ln n| > 80a ln2(n)/p, then Lemma 29 implies there is some
1064
+ j ∈ {t, . . . , t + a ln n − 1} such that |Aj| ≥ |Γt+a ln n|/(a ln n) ≥ 80 ln(n)/p. We distinguish three
1065
+ cases depending on which condition in the definition of τ is satisfied first. If |Vτ| ≤ 82a ln2(n)/p,
1066
+ then
1067
+ |Vt+a ln n| ≤ |Vτ| ≤ 82a ln2(n)/p ≤ (1 − 1/83) · |Vt|.
1068
+ If |Aτ| ≥ 80 ln(n)/p, then Lemma 21 yields E[|Vt+a ln n+log n|] ≤ E[|Vt+τ+log n|] ≤ (1 − ǫ) · |Vt|.
1069
+ Last, if |Γτ| ≤ 80a ln2(n)/p and the other two conditions do not hold, then Lemma 34 gives
1070
+ E[|Vt+a ln n+log n|] ≤ (1 − ǫ/ ln n) · |Vt|.
1071
+ The next two lemmas deal with the case of |Vt| = O(ln2(n)/p). The first one assumes diam(G) ≤
1072
+ 2, and thus covers the case of p = Ω(
1073
+
1074
+ log(n)/n), by property (P6) in Definition 17; while the second
1075
+ lemma assumes p = O(
1076
+
1077
+ log(n)/n) and is similar to Lemma 23.
1078
+ Lemma 36. For any t ≥ a
1079
+ 6 ln n, if |Vt| ≤ 83a ln2(n)/p and diam(G) ≤ 2 then there is a constant
1080
+ ǫ > 0 such that E[|Vt+ 7
1081
+ 6 a log n+log n|] ≤
1082
+
1083
+ 1 − ǫ/ ln3 n
1084
+
1085
+ · |Vt|.
1086
+ Proof. From property (P1) in Definition 17, the average degree of induced subgraph G[Vt] is at most
1087
+ k = max{8p|Vt|, 4 ln n} ≤ 664a ln2 n. Let T be a subset of Vt consisting of the min{ln(n)/p, |Vt|/2}
1088
+ 19
1089
+
1090
+ vertices u ∈ Vt with the largest degree in G[Vt], and let S = Vt \ T. Then |S| ≥ |T|, and all u ∈ S,
1091
+ |N(u) ∩ Vt| is at most
1092
+ d = k|Vt|/|T| ≤ k · max{p|Vt|/ ln n, 2} ≤ 55112 ln3 n.
1093
+ From property (P4) in Definition 17, |E(S, T)| ≤ 6|S| ln n. Let R = {u ∈ S : |N(u) ∩ T| ≤ 12 ln n}.
1094
+ Then |R| ≥ |S|/2 ≥ |Vt|/4. We will show that, for some constant ǫ′ > 0,
1095
+ P[u /∈ Vt+ 7
1096
+ 6 a ln n+log n] ≥ ǫ′ ln−3 n,
1097
+ for all u ∈ R.
1098
+ (5)
1099
+ From this, it follows that E[|Vt+ 7
1100
+ 6 a ln n+log n|] ≤ |Vt| − (|Vt|/4) · ǫ′ ln−3 n. To complete the proof of
1101
+ the lemma it remains to prove (5).
1102
+ Let u ∈ R, and suppose that u /∈ Γt (we deal with the case u ∈ Γt at the end). From Lemma 30,
1103
+ the expected value of �
1104
+ t≤j≤t+ a
1105
+ 6 ln n |(N(u) ∩ T) ∩ (Bj ∩ Vj)|, that is, the total number of times that
1106
+ vertices v ∈ N(u)∩T are active black between rounds t and a
1107
+ 6 ln n, is at most 4·|N(u)∩T| ≤ 4·12 ln n.
1108
+ Then, by Markov’s inequality, that number is at most 5 · 12 ln n with probability at least 1/5. And
1109
+ since a
1110
+ 6 > 5 · 12, it follows that, with probability at least 1/5, there is some j ∈ {t, . . . , t + a
1111
+ 6 ln n}
1112
+ such that (N(u) ∩ T) ∩ (Bj ∩ Vj) = ∅.
1113
+ Next we claim that, if (N(u) ∩ T) ∩ (Bj ∩ Vj) = ∅ for some j ≥ t, then (i) u /∈ Vj, or (ii) u ∈ Aj′
1114
+ for some t ≤ j′ < j, or (iii) (N +(u) ∩ S) ∩ Aj ̸= ∅. Indeed, suppose that (i) and (ii) do not
1115
+ hold, i.e., u ∈ Vj and u /∈ At ∪ · · · ∪ Aj−1.
1116
+ From u ∈ Vj, it follows N +(u) ∩ Ij = ∅.
1117
+ From
1118
+ u /∈ At ∪ · · · ∪ Aj−1 and the assumption u /∈ Γt, it follows u ∈ Wj. Then, if (N(u) ∩ S) ∩ Bj ̸= ∅,
1119
+ each vertex v ∈ (N(u) ∩ S) ∩ Bj is in Aj; while if (N(u) ∩ S) ∩ Bj = ∅, then N(u) ∩ Bj = ∅ and
1120
+ u ∈ Aj. Therefore (iii) holds.
1121
+ From the above, it follows that with probability at least 1/5, there is some t ≤ j ≤ t + a
1122
+ 6 ln n
1123
+ such that u /∈ Vj or (N +(u) ∩ S) ∩ Aj ̸= ∅. And if v ∈ (N +(u) ∩ S) ∩ Aj, then v ∈ Ad
1124
+ j, and from
1125
+ Lemma 6, the probability that v ∈ Ij+log n is at least 1/(6ed). We conclude that
1126
+ P[u /∈ Vt+ a
1127
+ 6 ln n+log n] ≥ (1/5) · 1/(6ed) ≥ (4.5 · 106 ln3 n)−1,
1128
+ which implies (5).
1129
+ Finally, if u /∈ Γt, we consider the first round j > t such that u /∈ Γj. From property (S1),
1130
+ j ≤ t + a ln n. Then we apply the result for the previous case to complete the proof of (5).
1131
+ Lemma 37. If |Vt| ≤ 83a ln2(n)/p and p ≤ c
1132
+
1133
+ log(n)/n for some constant c > 0, then there is a
1134
+ constant ǫ = ǫ(c) > 0 such that E[|Vt+log1.1 n|] ≤
1135
+
1136
+ 1 − ǫ/ ln3.9 n
1137
+
1138
+ · |Vt|.
1139
+ Proof Sketch. We de���ne the set S, T, R and the degree thresholds k, d as in the proof of Lemma 36,
1140
+ and we show
1141
+ P[u /∈ Vt+log1.1 n] ≥ ǫ′ ln−3.9 n,
1142
+ for all u ∈ R,
1143
+ (6)
1144
+ which implies the lemma. Next we prove (6).
1145
+ Let u ∈ R, and suppose that u /∈ Γt (we deal with case u ∈ Γt at the end). For each v ∈ N(u)∩T,
1146
+ let tv ≥ t be the first round when either v is white and has at least ℓ = ln n black neighbors, or is
1147
+ stable; and let xv be the number of rounds t ≤ j ≤ min{tv, t+r} at which v is black and has at least
1148
+ ℓ black neighbors, where r = 12 ln n · ln2 ln n. From Lemma 31, the probability that xv ≤ ln2 ln n
1149
+ for all v is at least 1 − |N(u) ∩ T| · e−Ω(ln2 ln n) = 1 − e−ω(ln ln n). For each v ∈ N(u) ∩ T let pv be
1150
+ the conditional probability that v ∈ Btv+1 ∪ · · · ∪ Bt+r, given Bt, Wt.
1151
+ If �
1152
+ v∈N(u)∩T pv ≤ 1/2, then with probability at least 1/2 − e−ω(ln ln n) > 1/3, the total number
1153
+ of rounds in which at least one v ∈ N(u) ∩ T is black and has at least ℓ black neighbors is at
1154
+ 20
1155
+
1156
+ most |N(u) ∩ T| · ln2 ln n ≤ 12 ln n · ln2 ln n ≤ r, thus there is some j ∈ {t, . . . , t + r} such that no
1157
+ v ∈ N(u) ∩ T is black and has at least ℓ black neighbors. Then we can infer that with probability
1158
+ at least 1/3 some vertex in N +(u) is stable black or is d-active at some round in {t, . . . , t + r}, in
1159
+ the same way as in the proof of Lemma 36, and then obtain (6) using Lemma 6.
1160
+ If �
1161
+ v∈N(u)∩T pv > 1/2, then there is some v∗ ∈ N(u) ∩ T such that pv∗ ≥ (2|N(u) ∩ T|)−1 ≥
1162
+ (24 ln n)−1. We can then apply Lemma 14 to v∗ at round tv∗ to show that the probability vertex
1163
+ v∗ is z-active at some round in {t, . . . , t + r}, where z = θu
1164
+
1165
+ α log
1166
+ 4r
1167
+ pv∗−2−ℓ
1168
+
1169
+ + log
1170
+ 4r
1171
+ pv∗−2−ℓ = O(log n ·
1172
+ log log n), is at least r1−α·
1173
+
1174
+ pv∗−2−ℓ
1175
+ 2
1176
+ �α
1177
+ = Ω(ln3.9 n), as α ≤ 2.41 Again we obtain (6) using Lemma 6.
1178
+ Finally, as before, if u /∈ Γt, we consider the first round j > t such that u /∈ Γj, and apply the
1179
+ result for the previous case to complete the proof of (6).
1180
+ We can now conclude the proof of Lemma 33, as we did for Lemma 20. From Lemmas 21 and 34
1181
+ to 37, we have that for any t ≥ a
1182
+ 6 ln n, E[|Vt+log1.1 n|] ≤
1183
+
1184
+ 1 − ǫ/ ln3.9 n
1185
+
1186
+ · E[|Vt|]. Iteratively applying
1187
+ this inequality, and using by Markov’s inequality, we obtain as before P[|Vc′ ln6 n| ≥ 1] ≤ n−2, for a
1188
+ large enough constant c′ > 0. This completes the proof of Lemma 33.
1189
+ APPENDIX
1190
+ A
1191
+ Omitted Proofs
1192
+ A.1
1193
+ Proof of Lemma 7
1194
+ We assume k1 ≤ k2 ≤ · · · ≤ kℓ. For 1 ≤ i ≤ ℓ, let ri = ⌈log(ki + 1)⌉, let Ei be the event that
1195
+ φt+1(ui) = · · · = φt+ri(ui) = black, and let E = �
1196
+ i Ei. Then
1197
+ P[E] = 1 −
1198
+
1199
+ i
1200
+
1201
+ 1 − 1
1202
+ 2ri
1203
+
1204
+ ≥ 1 −
1205
+
1206
+ i
1207
+
1208
+ 1 − 1
1209
+ 2ki
1210
+
1211
+
1212
+
1213
+ 1 − e− �
1214
+ i
1215
+ 1
1216
+ 2ki
1217
+
1218
+
1219
+
1220
+ 1 − e−1�
1221
+ · min
1222
+
1223
+ 1,
1224
+
1225
+ i
1226
+ 1
1227
+ 2ki
1228
+
1229
+ .
1230
+ Suppose that E occurs and let j be the smallest index such that Ej occurs, i.e., ¯E1 ∩ · · · ∩ ¯Ej−1 ∩ Ej
1231
+ occurs. If gj = |N(uj) ∩ {u1, . . . , uj−1}|, then the probability that none of the kj vertices v ∈
1232
+ N(uj) ∩ At satisfies φt+1(v) = · · · = φt+rj(v) = black is
1233
+ (1 − 2−rj)kj−gj ≥ (1 − 2−rj)kj ≥ e−1,
1234
+ similarly to (1). Combining this with the previous inequality we obtain that the probability that
1235
+ ui ∈ It+ri for at least one vertex ui ∈ {u1, . . . , uℓ} is at least e−1 ·
1236
+
1237
+ 1 − e−1�
1238
+ · min
1239
+
1240
+ 1, �
1241
+ i
1242
+ 1
1243
+ 2ki
1244
+
1245
+
1246
+ 1
1247
+ 5 · min
1248
+
1249
+ 1, �
1250
+ i
1251
+ 1
1252
+ 2ki
1253
+
1254
+ .
1255
+ A.2
1256
+ Proof of Lemma 15
1257
+ Let B be the event u ∈ Bt+ℓ ∪ · · · ∪ Bt+r; then P[B] = br. Let
1258
+ τ = min{j > t: u ∈ Wj or |N(u) ∩ Bj| ≤ k}
1259
+ be the first round j > t at the end of which u is white or has at most k black neighbors. We
1260
+ have P[τ > t + ℓ] ≤ 2ℓ ≤ br/4, since τ > t + ℓ implies φt+1(u) = · · · = φt+ℓ(u) = black. Thus
1261
+ P[τ ≤ t + ℓ] ≥ 1 − br/4. Let
1262
+ x = P[|N(u) ∩ Bτ| ≤ k | τ ≤ t + ℓ].
1263
+ 21
1264
+
1265
+ We distinguish two cases, x ≥ br/4 and x ≤ br/4.
1266
+ First suppose that x ≥ br/4. For any given j > t,
1267
+ P[u ∈ Aj | τ = j, |N(u) ∩ Bτ| ≤ k] = 1/2.
1268
+ The reason is that u ∈ Bj−1 and |N(u) ∩ Bj−1| > k > 0 if τ = j > t + 1, and u ∈ At = Aj−1 if
1269
+ τ = j = t+1. In either case u ∈ Aj−1, thus the state of u at the end of round j is chosen uniformly
1270
+ at random, independently of the remaining choices in round j.
1271
+ In particular, u is black with
1272
+ probability 1/2 when 0 < |N(u)∩Bj| ≤ k, and is white with probability 1/2 when |N(u)∩Bj| = 0.
1273
+ It follows that
1274
+ P[{u ∈ Aτ} ∩ {|N(u) ∩ Bτ| ≤ k} ∩ {τ ≤ t + ℓ}] ≥ (1/2) · x · (1 − br/4) ≥ 3br/32.
1275
+ Since the event on the left side implies that u is k-active at the end of round τ ≤ t + ℓ < t + r, and
1276
+ 3br/32 is greater than the desired lower bound for qr, the lemma holds in this case.
1277
+ Suppose now that x ≤ br/4. Then
1278
+ P[B ∩ {|N(u) ∩ Bτ| > k} ∩ {τ ≤ t + ℓ}] ≥ P[B] − P[τ > t + ℓ] − x ≥ br − br/4 − br/4 = br/2.
1279
+ If τ ≤ t+ℓ and |N(u)∩Bτ| > k (and thus u ∈ Wτ by τ’s definition), we define the following events:
1280
+ Ak is the event that u ∈ Ak
1281
+ τ+1 ∪ · · · ∪ Ak
1282
+ t+r−1; A is the event that u ∈ Aτ+1 ∪ · · · ∪ At+r−1; and X is
1283
+ the event that the states of vertices at the end of round τ are such that the conditional probability
1284
+ of A, given these states and τ, is at least br/4.
1285
+ If τ ≤ t + ℓ and |N(u) ∩ Bτ| > k, then event B implies A, because vertex u, which is non-active
1286
+ white at the end of round τ, cannot become black before becoming active first. Thus, from the last
1287
+ inequality above, it follows
1288
+ P[A ∩ {|N(u) ∩ Bτ| > k} ∩ {τ ≤ t + ℓ}] ≥ br/2.
1289
+ Also
1290
+ P[A ∩ X ∩ {|N(u) ∩ Bτ| > k} ∩ {τ ≤ t + ℓ}] ≥ br/2 − br/4 = br/4.
1291
+ We can now apply Lemma 14, starting from round τ ≤ t + ℓ, using d > k ≥ log(1/br) + 3 and
1292
+ pr ≥ br/4, to obtain
1293
+ P[Ak ∩ X ∩ {|N(u) ∩ Bτ| > k} ∩ {τ ≤ t + ℓ}] ≥ r1−α ·
1294
+ �br/4 − 2k
1295
+ 2
1296
+ �α
1297
+ ≥ r1−α ·
1298
+ �br/4 − br/8
1299
+ 2
1300
+ �α
1301
+ .
1302
+ It follows that qr = P[Ak] ≥ r1−α ·
1303
+
1304
+ br/4−br/8
1305
+ 2
1306
+ �α
1307
+ , which concludes the proof of this case.
1308
+ A.3
1309
+ Proof of Lemma 16
1310
+ Proof. We have P[u ∈ At+1] = 2−d and P[u ∈ (At+2 ∪ · · · ∪ At+r−1) \ At+1] = pr − 2−d. We also
1311
+ note that if u /∈ At+1 then u ∈ Wt+1, and u may become black in a subsequent round only after it
1312
+ becomes active. It follows that
1313
+ P[{u ∈ (Bt+ℓ ∪ · · · ∪ Bt+r) ∩ At+1] = br − P[u ∈ (Bt+ℓ ∪ · · · ∪ Bt+r) \ At+1]
1314
+ ≥ br − P[u ∈ (At+2 ∪ · · · ∪ At+r−1) \ At+1]
1315
+ ≥ br − (pr − 2−d)
1316
+ ≥ br/2.
1317
+ 22
1318
+
1319
+ Let X be the event that the states of vertices at the end of round t+1 are such that the conditional
1320
+ probability of u ∈ Bt+ℓ ∪ · · · ∪ Bt+r is at least br/4. Then
1321
+ P[{u ∈ (Bt+ℓ ∪ · · · ∪ Bt+r) ∩ At+1} ∩ X] ≥ br/2 − P[{u ∈ (Bt+ℓ ∪ · · · ∪ Bt+r) ∩ At+1} ∩ ¯
1322
+ X ]
1323
+ ≥ br/4.
1324
+ We can now apply Lemma 15, starting from round t + 1 and using br/4 in place of br, to obtain
1325
+ P[{u ∈ (Ak
1326
+ t+1 ∪ · · · ∪ Ak
1327
+ t+r−1) ∩ At+1} ∩ X] ≥ r1−α · (br/64)α .
1328
+ This implies the lemma.
1329
+ A.4
1330
+ Proof of Lemma 18
1331
+ The proof of consists of a series of lemmas. In all these lemmas, the graph G = (V, E) considered
1332
+ is a random graph drawn from Gn,p.
1333
+ Property (P1) holds trivially for sets S of size k ≤ 4 ln n. The next lemma (applied for all
1334
+ k > 4 ln n, and then combining the results using a union bound) shows that G satisfies the property
1335
+ for all larger sets, with probability at least 1 − n−Ω(log n).
1336
+ Lemma 38. Let G = (V, E) be a random graph drawn from Gn,p, and let k ≥ 1. With probability
1337
+ at least 1 − n−k, all subgraphs of G on k vertices have at most max{4pk2, 2k ln n} edges.
1338
+ Proof. The probability there is a subgraph with k vertices and at least r = max{2k ln n, 4pk2}
1339
+ edges is at most
1340
+ �n
1341
+ k
1342
+
1343
+ ·
1344
+ �k2/2
1345
+ r
1346
+
1347
+ · pr ≤ nk ·
1348
+ �ek2
1349
+ 2r
1350
+ �r
1351
+ · pr = ek ln n−r ln
1352
+ 2r
1353
+ epk2 ≤ ek ln n−2k ln n·ln 8pk2
1354
+ epk2 ≤ n−k.
1355
+ The next lemma shows that G satisfies property (P2) with probability 1 − n−Ω(log n/p)
1356
+ Lemma 39. Let G = (V, E) be a random graph drawn from Gn,p, and let k ≥ 40 ln(n)/p. With
1357
+ probability at least 1 − n−k, every set S ⊆ V of size |S| = k satisfies
1358
+ |{u ∈ V : |N(u) ∩ S)| < pk/2}| ≤ k/2.
1359
+ Proof. For any set S of size k, and any vertex u ∈ V \ S, the expected number of neighbors of u in
1360
+ S is pk. By a Chernoff bound, the probability that u has fewer than pk/2 neighbors in S is at most
1361
+ e−pk/8. Then the probability there is some set S of size k such that at least k/2 vertices u ∈ V \ S
1362
+ have fewer than pk/2 neighbors in S, is at most
1363
+ �n
1364
+ k
1365
+
1366
+ ·
1367
+ �n − k
1368
+ k/2
1369
+
1370
+ · e−(k/2)·pk/8 ≤ nk · nk/2 · e−pk2/16 = e(3/2)k ln n−pk2/16 ≤ n−k.
1371
+ Lemma 40. Let G = (V, E) be a random graph drawn from Gn,p, and let k = 3 ln(n)/p. With
1372
+ probability at least 1 − n−k, every set S ⊆ V of size |S| ≥ k satisfies |V \ N +(S)| ≤ k.
1373
+ Proof. The probability there is a set S of size k with |V \ N +(S)| ≥ k is at most
1374
+ �n
1375
+ k
1376
+
1377
+ ·
1378
+ �n − k
1379
+ k
1380
+
1381
+ · (1 − p)k2 ≤ nk · nk · e−pk2 = e2k ln n−pk2 = n−k.
1382
+ The next lemma shows that G satisfies property (P3) with probability 1 − n−Ω(log n/p).
1383
+ 23
1384
+
1385
+ Lemma 41. Let G = (V, E) be a random graph drawn from Gn,p. With probability at least 1 −
1386
+ n− ln(n)/p, every triplet of disjoint sets S, T, I ⊆ V , such that |S| ≥ 2|T| and (S ∪ T) ∩ N(I) = ∅,
1387
+ satisfies
1388
+ |N(T) \ N +(S ∪ I)| − |N(S) \ N +(I))| ≤ 8 ln2(n)/p.
1389
+ (7)
1390
+ Proof. From Lemma 40, with probability at least 1−n−3 ln(n)/p, all sets S, I ⊆ V such that |S∪I| ≥
1391
+ 3 ln(n)/p satisfy |V \ N +(S ∪ I)| ≤ 3 ln(n)/p, and thus
1392
+ |N(T) \ N +(S ∪ I)| ≤ |V \ N +(S ∪ I)| ≤ 3 ln(n)/p,
1393
+ which implies (7).
1394
+ Next we assume that |S ∪ I| ≤ 3 ln(n)/p. Since |S| ≥ 2|S|, we have |S ∪ T ∪ I| ≤ 4.5 ln(n)/p,
1395
+ thus there are at most n4.5 ln(n)/p different triplets S, T, I. Choose one such triplet S, T, I, before
1396
+ revealing the edges of G. Then reveal the edges incident to vertices u ∈ I; this determines N(I).
1397
+ Let U = V \ (S ∪ T ∪ N +(I)).
1398
+ The two sets on the left side of (7) can then be expressed as
1399
+ N(T) \ N +(S ∪ I) = U ∩ N(T) \ N(S), and N(S) \ N +(I) = U ∩ N(S). For every u ∈ U, the
1400
+ probability that u ∈ N(T) \ N(S) is
1401
+ p1 = P[u ∈ N(T) \ N(S)] =
1402
+
1403
+ 1 − (1 − p)|T|�
1404
+ · (1 − p)|S|,
1405
+ and the probability that u ∈ N(S) is
1406
+ p2 = P[u ∈ N(S)] = 1 − (1 − p)|S|.
1407
+ Letting ε = (1 − p)|T| and using that |S| ≥ 2|T|, we obtain p1 ≤ (1 − ε) · ε2 and p2 ≥ 1 − ε2. Thus
1408
+ p2
1409
+ p1
1410
+
1411
+ 1 − ε2
1412
+ (1 − ε) · ε2 = 1 + ε
1413
+ ε2
1414
+ ≥ 2.
1415
+ It follows that, by considering all vertices u ∈ U one after the other, and revealing all edges incident
1416
+ to each u at the moment u is considered, we can analyze the difference
1417
+ D = |U ∩ N(T) \ N(S)| − |U ∩ N(S)| = |N(T) \ N +(S ∪ I)| − |N(S) \ N +(I)|
1418
+ as a biased random walk on the integers starting at 0, and moving to the right with probability
1419
+ p1 and to the left with probability p2.
1420
+ The probability that the (infinite) random walk every
1421
+ reaches value i ≥ 1 is know to be (p1/p2)i ≤ 2−i. Thus, P[D ≥ i] ≤ 2−i. And the probability that
1422
+ D ≥ 8 ln2(n)/p for at least one possible triplet S, T, I is then at most
1423
+ n4.5 ln(n)/p · 2−8 ln2(n)/p ≤ n−ln n/p.
1424
+ Property (P4) holds trivially for sets S of size k ≤ 6 ln n, since |S| ≥ |T|. The next lemma
1425
+ (applied for all k > 6 ln n) shows that G satisfies the property with probability at least 1−n−Ω(log n)
1426
+ for all larger sets.
1427
+ Lemma 42. Let G = (V, E) be a random graph drawn from Gn,p, and let k ≥ 1. With probability
1428
+ at least 1 − n−2k, every pair of disjoint sets S, T ⊆ V , such that |S| = k ≥ |T| and |T| ≤ ln(n)/p,
1429
+ satisfies |E(S, T)| ≤ 6k ln n.
1430
+ Proof. For any given pair S, T, the expected value of |E(S, T)| is p · |S| · |T| ≤ k ln n, and by a
1431
+ Chernoff bound, the probability that |E(S, T)| ≥ 6k ln n is at most 2−6k ln n. Then the probability
1432
+ there is at least one pair S, T such that |E(S, T)| ≥ 6k ln n is at most
1433
+ n|S| · n|T| · 2−6k ln n ≤ n2k · 2−6k ln n ≤ n−2k.
1434
+ 24
1435
+
1436
+ Our last lemma implies that properties (P5) and (P6) hold with probability 1 − O(n−2).
1437
+ Lemma 43. In a random graph G drawn from Gn,p, the probability that no two vertices have k
1438
+ common neighbors is at least 1 − n2 · (ep2n/k)k. And the probability that diam(G) ≤ 2 is at least
1439
+ 1 − n2 · e−p2(n−1).
1440
+ Proof. The probability there is a pair of vertices that have at least k common neighbors is at most
1441
+ �n
1442
+ 2
1443
+
1444
+ ·
1445
+ �n−2
1446
+ k
1447
+
1448
+ · p2k ≤ n2 ·
1449
+
1450
+ ep2n
1451
+ k
1452
+ �k
1453
+ . And the probability there is a pair of vertices with no common
1454
+ neighbors and no adjacent to each other is
1455
+ �n
1456
+ 2
1457
+
1458
+ · (1 − p) · (1 − p2)n−2 ≤ n2 · e−p2(n−1).
1459
+ B
1460
+ Other Related Work
1461
+ In 1985, Luby [24] proposed a simple distributed randomized algorithm that finds an MIS in
1462
+ time O(log n) w.h.p. Simultaneously, Alon et al. [3] proposed a similar algorithm with the same
1463
+ performance. Both algorithms work with O(log n)-bit messages and need access to O(log n) random
1464
+ bits at each round.
1465
+ Due to various applications in radio sensor networks, restricted distributed models of communi-
1466
+ cation were introduced, in which the MIS problem has been widely studied. In the beeping model,
1467
+ introduced by Cornejo and Kuhn [9], nodes have no knowledge of the local or global structure of
1468
+ the network, do not have access to synchronized clocks and the communication among nodes relies
1469
+ completely on carrier sensing (as described in the introduction). Afek et al. [1] show that in the
1470
+ version of the beeping model where nodes are initially asleep and are woken up by an adversary,
1471
+ it is not possible to locally converge to an MIS in sub-polynomial time. Therefore, they consider
1472
+ various relaxations on the model, providing algorithms converging to an MIS in a polylogarithmic
1473
+ number of rounds. In detail, if the nodes know an upper bound on the size of the network, or if
1474
+ the beeping nodes are awakened by the neighbor’s beep, the MIS can be found in time O(log3 n)
1475
+ w.h.p. If the nodes have synchronous clocks, an MIS can be found in time O(log2 n) w.h.p. We
1476
+ remark that the authors provide a self-stabilizing algorithm just in the first setting, i.e. when an
1477
+ upper bound on the size of the network is known by the nodes and that. In all algorithms, the
1478
+ nodes have super-constnt state and have access to a super-constant number of random bits.
1479
+ In the version of the beeping model with synchronized clocks, collision detection, and simul-
1480
+ taneous wakeup, Afek et al. [2] had earlier shown that the MIS problem is solved by a biological
1481
+ process in time O(log2 n) w.h.p. [1] showed that this bound is also achievable without knowledge of
1482
+ an upper bound on the size of the network. Jeavons et al. [23] improved these results, showing that
1483
+ an MIS can be found in time O(log n) w.h.p. An improved analyisis of the local complexity of this
1484
+ algorithm was provided by Ghaffari [16]. In the same version of the beeping model without collision
1485
+ detection, Holzer and Lynch in [21], proposed a variant of the algorithm of [15], and showed that it
1486
+ converges locally in time O((log ∆ + log 1/ε) · log 1/ε) with probability at least 1 − ε on a network
1487
+ with maximum degree ∆. All these algorithms require super constant space and random bits per
1488
+ round.
1489
+ Emek et al. [13] introduced the stone age model, inspired by biological cellular networks or
1490
+ networks of microprocessor devices. In this model, the nodes can communicate by transmitting
1491
+ messages belonging to a finite communication alphabet.
1492
+ The nodes communicate in an asyn-
1493
+ chronous environment, where the pattern is decided by an adversary, and they have no knowledge
1494
+ about the size of the network. In the stone age model, the MIS problem was considered by [13, 12].
1495
+ In [13], is provided an algorithm that compute a MIS in O(log2 n) rounds. However, it assumes
1496
+ that all the nodes have the same initial state, and therefore is not self-stabilizing. In [12], they
1497
+ 25
1498
+
1499
+ provided a self-stabilizing algorithm that stabilizes in time O((D + log n) log n) w.h.p., and the
1500
+ possible number of states of each node is O(D), where D is the diameter of the graph.
1501
+ In [25], the authors introduced a randomized distributed algorithm that finds an MIS in time
1502
+ O(log n) w.h.p. In particular, the algorithm is an adaptation of Luby’s algorithm so that messages
1503
+ of just 1 bit are used. They consider an anonymous network, but in their setting, the vertices can
1504
+ distinguish between their neighbors, and each vertex needs a number of states that depends on n
1505
+ and the node degree.
1506
+ MIS algorithm has also received a lot of attention from the Self-Stabilization community. For
1507
+ a survey of those algorithms see [19].
1508
+ We first cite here the self-stabilizing algorithm for non-anonymous networks, i.e. where vertices
1509
+ have IDs. In [18], the authors provide a simple deterministic distributed algorithm that stabilizes on
1510
+ an MIS in O(n) time and O(n2) moves (i.e. total number of state changed), in a synchronous model.
1511
+ In [22], the authors proposed a deterministic two-state algorithm that works under distributed
1512
+ scheduler (an adversary that, at each time, selects arbitrarily a set of processes to execute). Both
1513
+ algorithms stabilize in time O(n2). In [29], Turau introduces a 3-state self-stabilizing algorithm that
1514
+ stabilizes in O(n) moves, under a distributed scheduler. A breakthrough was achieved by Barenboim
1515
+ et al. [5], who proposed a self-stabilizing algorithm for the MIS and other related problems, in the
1516
+ synchronous model. They prove that the algorithm stabilizes after O(∆ + log∗ n) rounds.
1517
+ Assuming anonymous networks Shukla et al. [28] proposed two deterministic two-state self-
1518
+ stabilizing algorithms, that work under a centralized scheduler (an adversary that selects one process
1519
+ to execute at each round) and stabilizes in O(n) rounds. In [30], Turau introduced a synchronous
1520
+ randomized self-stabilizing algorithm for MIS that stabilizes w.h.p. in O(log n) rounds w.h.p. The
1521
+ possible states of the nodes are O(log n).
1522
+ Next, we briefly summarize the best known upper bounds to compute an MIS in the distributed
1523
+ LOCAL model on arbitrary graphs. Barenboim et al. [6] proved that an MIS can be computed
1524
+ with a distributed deterministic algorithm in O(∆ + log∗ n) rounds and Ghaffari et al. [17] provide
1525
+ an upper bound of O(log5 n). Regarding distributed randomized algorithms, Ghaffari [15] provides
1526
+ an upper bound of O(log ∆) + 2O(√log log n) w.h.p., which, thanks to [27, 17], was improved to
1527
+ O(log ∆ + log5 log n) w.h.p. See also [14].
1528
+ The current best-known lower bound for finding an MIS is proved by Balliu et al. [4], who
1529
+ show that computing an MIS in the LOCAL model requires Ω(min{∆, log n/ log log n}) rounds
1530
+ deterministically, and Ω(min{∆, log log n/ log log log n}) rounds with a randomized algorithm.
1531
+ References
1532
+ [1] Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, and Fabian Kuhn.
1533
+ Beeping a maximal independent set. Distributed Comput., 26(4):195–208, 2013.
1534
+ [2] Yehuda Afek, Noga Alon, Omer Barad, Eran Hornstein, Naama Barkai, and Ziv Bar-Joseph. A biological
1535
+ solution to a fundamental distributed computing problem. Science, 331(6014):183—185, January 2011.
1536
+ [3] Noga Alon, L´aszl´o Babai, and Alon Itai.
1537
+ A fast and simple randomized parallel algorithm for the
1538
+ maximal independent set problem. J. Algorithms, 7(4):567–583, 1986.
1539
+ [4] Alkida Balliu, Sebastian Brandt, Juho Hirvonen, Dennis Olivetti, Mika¨el Rabie, and Jukka Suomela.
1540
+ Lower bounds for maximal matchings and maximal independent sets. J. ACM, 68(5):39:1–39:30, 2021.
1541
+ [5] Leonid Barenboim, Michael Elkin, and Uri Goldenberg. Locally-Iterative distributed (∆ + 1)-coloring
1542
+ and applications. J. ACM, 69(1):5:1–5:26, 2022.
1543
+ [6] Leonid Barenboim, Michael Elkin, and Fabian Kuhn. Distributed (∆+1)-coloring in linear (in ∆) time.
1544
+ SIAM J. Comput., 43(1):72–95, 2014.
1545
+ 26
1546
+
1547
+ [7] Leonid Barenboim, Michael Elkin, Seth Pettie, and Johannes Schneider. The locality of distributed
1548
+ symmetry breaking. J. ACM, 63(3):20:1–20:45, 2016.
1549
+ [8] Stephen A. Cook. An overview of computational complexity. Commun. ACM, 26(6):400–408, 1983.
1550
+ [9] Alejandro Cornejo and Fabian Kuhn. Deploying wireless networks with beeps. In Proc. Distributed
1551
+ Computing, 24th International Symposium, DISC, pages 148–162, 2010.
1552
+ [10] Edsger W. Dijkstra. Self-stabilizing systems in spite of distributed control. Commun. ACM, 17(11):643–
1553
+ 644, 1974.
1554
+ [11] Shlomi Dolev. Self-Stabilization. MIT Press, 2000.
1555
+ [12] Yuval Emek and Eyal Keren. A thin self-stabilizing asynchronous unison algorithm with applications to
1556
+ fault tolerant biological networks. In Proc. ACM Symposium on Principles of Distributed Computing,
1557
+ PODC, pages 93–102, 2021.
1558
+ [13] Yuval Emek and Roger Wattenhofer. Stone age distributed computing. In Proc. ACM Symposium on
1559
+ Principles of Distributed Computing, PODC, pages 137–146, 2013.
1560
+ [14] Salwa Faour, Mohsen Ghaffari, Christoph Grunau, Fabian Kuhn, and V´aclav Rozhon. Local distributed
1561
+ rounding: Generalized to mis, matching, set cover, and beyond. CoRR, abs/2209.11651, 2022.
1562
+ [15] Mohsen Ghaffari. An improved distributed algorithm for maximal independent set. In Proc. Twenty-
1563
+ Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 270–277, 2016.
1564
+ [16] Mohsen Ghaffari. Distributed MIS via all-to-all communication. In Proc. ACM Symposium on Principles
1565
+ of Distributed Computing, PODC, pages 141–149, 2017.
1566
+ [17] Mohsen Ghaffari, Christoph Grunau, and V´aclav Rozhon. Improved deterministic network decomposi-
1567
+ tion. In Proc. ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 2904–2923, 2021.
1568
+ [18] Wayne Goddard, Stephen T. Hedetniemi, David Pokrass Jacobs, and Pradip K. Srimani. Self-stabilizing
1569
+ protocols for maximal matching and maximal independent sets for ad hoc networks. In Proc. 17th
1570
+ International Parallel and Distributed Processing Symposium (IPDPS 2003), page 162, 2003.
1571
+ [19] Nabil Guellati and Hamamache Kheddouci. A survey on self-stabilizing algorithms for independence,
1572
+ domination, coloring, and matching in graphs. J. Parallel Distributed Comput., 70(4):406–415, 2010.
1573
+ [20] S.M. Hedetniemi, S.T. Hedetniemi, D.P. Jacobs, and P.K. Srimani.
1574
+ Self-stabilizing algorithms for
1575
+ minimal dominating sets and maximal independent sets. Computers & Mathematics with Applications,
1576
+ 46(5):805–811, 2003.
1577
+ [21] Stephan Holzer and Nancy A. Lynch. Beeping a maximal independent set fast. CoRR, abs/1704.07133,
1578
+ 2017.
1579
+ [22] Michiyo Ikeda, Sayaka Kamei, and Hirotsugu Kakugawa. A space-optimal self-stabilizing algorithm for
1580
+ the maximal independent set problem. In Proc. 3rd International Conference on Parallel and Distributed
1581
+ Computing, Applications and Technologies, PDCAT, pages 70–74, 2002.
1582
+ [23] Peter Jeavons, Alex Scott, and Lei Xu. Feedback from nature: Simple randomised distributed algorithms
1583
+ for maximal independent set selection and greedy colouring. Distributed Comput., 29(5):377–393, 2016.
1584
+ [24] Michael Luby. A simple parallel algorithm for the maximal independent set problem. SIAM J. Comput.,
1585
+ 15(4):1036–1053, 1986.
1586
+ [25] Yves M´etivier, John Michael Robson, Nasser Saheb-Djahromi, and Akka Zemmari. An optimal bit
1587
+ complexity randomized distributed MIS algorithm. Distributed Comput., 23(5-6):331–340, 2011.
1588
+ [26] C. St.J. A. Nash-Williams. Decomposition of finite graphs into forests. J. Lond. Math. Soc., s1-39(1):12–
1589
+ 12, 1964.
1590
+ [27] V´aclav Rozhon and Mohsen Ghaffari. Polylogarithmic-time deterministic network decomposition and
1591
+ distributed derandomization. In Proc. 52nd Annual ACM SIGACT Symposium on Theory of Comput-
1592
+ ing, STOC, pages 350–363, 2020.
1593
+ 27
1594
+
1595
+ [28] Sandeep K. Shukla, Daniel J. Rosenkrantz, and Sekharipuram S. Ravi. Observations on self-stabilizing
1596
+ graph algorithms for anonymous networks. In Proc. 2nd Workshop on Self-Stabilizing Systems, SSS,
1597
+ 1995.
1598
+ [29] Volker Turau. Linear self-stabilizing algorithms for the independent and dominating set problems using
1599
+ an unfair distributed scheduler. Inf. Process. Lett., 103(3):88–93, 2007.
1600
+ [30] Volker Turau.
1601
+ Making randomized algorithms self-stabilizing.
1602
+ In Proc. Structural Information and
1603
+ Communication Complexity - 26th International Colloquium, SIROCCO, pages 309–324, 2019.
1604
+ [31] Volker Turau and Christoph Weyer. Randomized self-stabilizing algorithms for wireless sensor net-
1605
+ works. In Proc. Self-Organizing Systems, First International Workshop, IWSOS, and Third Interna-
1606
+ tional Workshop on New Trends in Network Architectures and Services, EuroNGI, pages 74–89, 2006.
1607
+ [32] Leslie G. Valiant. Parallel computation. In Proc. 7th IBM Symposium on Mathematical Foundations of
1608
+ Computer Science, 1982.
1609
+ 28
1610
+
09E4T4oBgHgl3EQfZwye/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
0dFJT4oBgHgl3EQfjix9/content/tmp_files/2301.11575v1.pdf.txt ADDED
@@ -0,0 +1,776 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ARiADNE: A Reinforcement learning approach using Attention-based
2
+ Deep Networks for Exploration
3
+ Yuhong Cao1, Tianxiang Hou1, Yizhuo Wang1, Xian Yi1, Guillaume Sartoretti1†
4
+ Abstract— In autonomous robot exploration tasks, a mobile
5
+ robot needs to actively explore and map an unknown envi-
6
+ ronment as fast as possible. Since the environment is being
7
+ revealed during exploration, the robot needs to frequently
8
+ re-plan its path online, as new information is acquired by
9
+ onboard sensors and used to update its partial map. While
10
+ state-of-the-art exploration planners are frontier- and sampling-
11
+ based, encouraged by the recent development in deep reinforce-
12
+ ment learning (DRL), we propose ARiADNE, an attention-
13
+ based neural approach to obtain real-time, non-myopic path
14
+ planning for autonomous exploration. ARiADNE is able to
15
+ learn dependencies at multiple spatial scales between areas of
16
+ the agent’s partial map, and implicitly predict potential gains
17
+ associated with exploring those areas. This allows the agent
18
+ to sequence movement actions that balance the natural trade-
19
+ off between exploitation/refinement of the map in known areas
20
+ and exploration of new areas. We experimentally demonstrate
21
+ that our method outperforms both learning and non-learning
22
+ state-of-the-art baselines in terms of average trajectory length
23
+ to complete exploration in hundreds of simplified 2D indoor
24
+ scenarios. We further validate our approach in high-fidelity
25
+ Robot Operating System (ROS) simulations, where we consider
26
+ a real sensor model and a realistic low-level motion controller,
27
+ toward deployment on real robots.
28
+ I. INTRODUCTION
29
+ Autonomous robot exploration (ARE) refers to the task,
30
+ in which a robot needs to autonomously explore and map an
31
+ unknown environment as efficiently and quickly as possible.
32
+ The robot is usually equipped with a sensor (e.g., LiDAR
33
+ or camera) to obtain measurements of its surroundings and
34
+ build/update a partial map of the environment. In practice,
35
+ the (high-dimensional) collected sensor data (e.g., point
36
+ cloud) is usually converted into a (simplified) occupancy grid
37
+ map or Octomap [1] that can be used for further planning [2],
38
+ [3], [4]. Such a task is also known as active SLAM [2].
39
+ Although a robot can always slowly but accurately construct
40
+ a map by carefully methodically covering the entire environ-
41
+ ment, the objective of ARE is to plan the shortest path to
42
+ complete exploration, where small noises/errors in the final
43
+ map are tolerable. In consequence, the main challenge of
44
+ ARE is to plan a non-myopic path that balances the trade-
45
+ off between exploiting surroundings (i.e., refining the map in
46
+ already-explored areas) and exploring new (usually, further
47
+ away) areas, most importantly with only partial knowledge of
48
+ the environment. Such an exploration path is usually planned
49
+ † Corresponding author, to whom correspondence should be addressed.
50
+ 1
51
+ Authors are with the Department of Mechanical Engineering,
52
+ College of Design and Engineering, National University of Singapore.
53
+ caoyuhong@u.nus.edu, htx24@foxmail.com,
54
+ {wy98,yxian11}@u.nus.edu, mpegas@nus.edu.sg
55
+ Fig. 1: Illustration of autonomous robot exploration. A
56
+ wheeled robot is building a 3D Octomap using an onboard
57
+ LiDAR. The purple ball indicates the next viewpoint output
58
+ by our planner, which is tracked by the robot using a low-
59
+ level motion controller (yellow primitives).
60
+ incrementally online, as the partial map is updated using new
61
+ measurements along the way.
62
+ For example, conventional frontier-based methods [3], [5],
63
+ [6], [7] generate multiple candidate paths, each covering
64
+ a frontier (i.e., the boundary between explored free area
65
+ and unexplored area), and greedily select the path with
66
+ maximum gain, usually defined as a combination of utility
67
+ (i.e., number of observable frontiers along the path) and
68
+ cost (i.e., path length). However, an essential problem of
69
+ these methods is that such myopic frontier selection does
70
+ not guarantee optimality in the long term. A more recent
71
+ approach [4] reasons about the whole path to cover all
72
+ current frontiers, thus guaranteeing (near-)optimal paths in
73
+ the current partial map. However, since the environment is
74
+ only partially known, a previous optimal path often quickly
75
+ becomes sub-optimal as more of the environment is revealed,
76
+ or even worse, results in redundant movements (e.g., missing
77
+ an unexplored shortcut between two rooms which were
78
+ previously not known to be connected). Based on experi-
79
+ ences from conventional exploration planners, we note that
80
+ non-myopicity comes at two different levels in autonomous
81
+ exploration. The first level, spatial non-myopicity, requires
82
+ the planner to reason about the current partial map to balance
83
+ the exploration-exploitation trade-off, while temporal non-
84
+ myopicity requires the planner to estimate the future influence
85
+ of current decisions (e.g., predict the changes in the partial
86
+ map that may stem from given path planning decisions).
87
+ To achieve non-myopicity at these two levels, we propose
88
+ a deep reinforcement learning (DRL) based approach for
89
+ ARE, named ARiADNE, which relies on two attention-based
90
+ neural networks. These networks allow the agent to reason
91
+ arXiv:2301.11575v1 [cs.RO] 27 Jan 2023
92
+
93
+ about dependencies of different areas in the partial map at
94
+ different spatial scales, thus allowing the agent to sequence
95
+ spatially non-myopic decisions efficiently without the need
96
+ to optimize a long path. Furthermore, our critic network
97
+ implicitly provides the robot with the ability to estimate
98
+ potential areas that might be found by learning the state-
99
+ action value, which furthermore helps make decisions bene-
100
+ ficial to the long-term efficiency, thus addressing temporally
101
+ non-myopicity. Specifically, we first formulate autonomous
102
+ exploration as a sequential decision-making problem on a
103
+ collision-free graph that covers the known traversable area,
104
+ where one of the nodes is the robot’s current position.
105
+ We then use our attention-based neural network to select
106
+ one neighboring node of the current robot position as the
107
+ next viewpoint for the robot. In this work, we focus on
108
+ training and testing our approach in indoor environments
109
+ based on 2D occupancy grid maps, ranging from simple
110
+ scenarios (single room) to relatively complex ones (multiple
111
+ rooms with complicated corridors). There, we experimentally
112
+ demonstrate that our approach outperforms state-of-the-art
113
+ conventional methods on average. We also validate our
114
+ approach in high-fidelity ROS (Robot Operating System)
115
+ simulations, where we consider a real sensor model and a
116
+ motion controller, showing the generalizability of our model
117
+ to realistic environments.
118
+ II. RELATED WORK
119
+ Frontier-based vs sampling-based approaches The
120
+ first
121
+ frontier-based method was proposed by Yamauchi [5], in
122
+ which the robot is constantly driven towards the nearest
123
+ frontier. In more advanced frontier-based methods, selections
124
+ of which frontier to visit are evaluated by a gain function,
125
+ which considers the effect of both utility and cost [6],
126
+ [8], [9]. On the other hand, the past few years have
127
+ seen a number of sampling-based methods be developed,
128
+ based on Rapidly-exploring Random Trees (RRT) [3],
129
+ Rapidly-exploring Random Graphs [10], and Probabilistic
130
+ Random Maps (PRM) [11]. Sampling-based methods only
131
+ need to compute the gain of sampled paths, which avoids
132
+ the complexity of identifying and evaluating all frontiers.
133
+ Recent works demonstrated that frontier-based methods are
134
+ more suitable when frontiers are sparse (e.g., 2D indoor
135
+ scenarios), while sampling-based methods perform better
136
+ with dense frontiers (e.g., 3D outdoor scenarios) [7], [11].
137
+ Intuitively, Frontier-based methods become inefficient when
138
+ there are too many frontiers to evaluate, while sampling-
139
+ based methods underperform when informative paths are
140
+ hard to sample.
141
+ Planning for long-term objectives Both frontier-based and
142
+ sampling-based methods mostly rely on greedy strategies
143
+ to plan short-term paths. Since the robot only has access
144
+ to a partial map of the environment, such paths inevitably
145
+ lead to myopic performance in the long term. Recently, Cao
146
+ et al. [4] proposed TARE to optimize the full exploration
147
+ path and mitigate myopicity. Utilizing the full knowledge
148
+ of the current partial map, TARE was shown to significantly
149
+ outperform state-of-the-art sampling-based planners in large-
150
+ scale 3D scenarios. Similar methods were also considered
151
+ to approach the informative path planning [12] problem,
152
+ which considers information gathering usually in obstacle-
153
+ free environments (in fact, works on autonomous exploration
154
+ and informative path planning mutually promote each other,
155
+ e.g., [4] and [12], [13] and [3]).
156
+ Learning-based exploration Niroui et al. [14] first com-
157
+ bined frontier-based method with deep reinforcement learn-
158
+ ing to adaptively tune the parameter of the gain function
159
+ for frontier selections and improve performance. Schmid et
160
+ al. [15] proposed to learn the underlying gain distribution
161
+ based on the partial map by supervised learning, thus help-
162
+ ing sampling-based methods more efficiently find next-best-
163
+ views and reduce computation. While the above works focus
164
+ on improving conventional methods using machine learning,
165
+ some other works [16], [17], [18], [19] directly applied deep
166
+ reinforcement learning to select a viewpoint to visit, often
167
+ relying on convolutional neural networks (CNNs). However,
168
+ although [16], [18] argue that DRL-based methods naturally
169
+ optimize long-term objectives, it seems that [16], [17], [18],
170
+ [19] are only able to reach performance slightly better than
171
+ the nearest-frontier method so far.
172
+ III. PROBLEM FORMULATION
173
+ We consider a bounded and unknown environment E
174
+ represented by a x × y 2D occupancy grid map, whose
175
+ partial (occupancy grid) map is denoted as P. The partial
176
+ map consists of unknown area Pu (i.e., unexplored area) and
177
+ known area Pk (i.e., explored area), such that Pu ∪ Pk = P.
178
+ The known area Pk is further classified into free area Pf
179
+ (i.e., traversable area for the robot) and occupied area Po
180
+ (i.e., obstacles) such that Pf ∪ Po = Pk. At the beginning
181
+ of exploration, the environment is fully unknown so the
182
+ partial map P = Pu. Then, during exploration, the unknown
183
+ area in the sensor range ds (the sensor we use is a 360-
184
+ degree LiDAR) is classified into either free area or occupied
185
+ area according to sensor measurements. The objective of
186
+ autonomous exploration is to find the shortest collision-free
187
+ robot trajectory ψ∗ to complete exploration:
188
+ ψ∗ = argmin
189
+ ψ∈Ψ
190
+ C(ψ), s.t. Pk = Pg,
191
+ (1)
192
+ where C : ψ −→ R+ maps a trajectory to its length and Pg
193
+ denotes the ground truth of the environment. Although the
194
+ ground truth is not accessible in real-world deployments, it
195
+ is known and can be utilized to evaluate the performance
196
+ of planners in testing. In practice, most works consider the
197
+ closure of occupied areas as Pk = Pg [5], [4], [18], [19].
198
+ IV. METHOD
199
+ In this section, we cast ARE as an RL problem, and in-
200
+ troduce our attention-based policy and critic neural networks
201
+ as well as details of our training.
202
+ A. Exploration as an RL Problem
203
+ Sequential Decision-making Problem Since the free area
204
+ is updated based on the robot’s movements, online planning
205
+ for ARE is a sequential decision-making problem in nature.
206
+
207
+ Following our previous work [20] for informative path plan-
208
+ ning, we consider the robot trajectory ψ as a sequence of
209
+ viewpoints ψ = (ψ0, ψ1, ...), ψi ∈ Pf. At each decision
210
+ step t, we first uniformly distribute candidate viewpoints
211
+ Vt = {v0, v1, ...}, ∀ vi = (xi, yi) ∈ Pf in the current free
212
+ area Pf, similar to [4]. Then, to find collision-free paths
213
+ between viewpoints, we connect each viewpoint with its k
214
+ nearest neighbors through a straight line and remove edges
215
+ that collide with occupied or unknown areas. In doing so,
216
+ we build a collision-free graph Gt = (Vt, Et), with Vt a
217
+ set of uniformly distributed nodes (i.e., viewpoints) over the
218
+ free area, and Et a set of traversable edges. We finally let
219
+ the robot select one neighboring node of its current position
220
+ ψt as the next viewpoint. Since the decision will be taken
221
+ upon arriving at the last selected viewpoint, the trajectory is
222
+ a sequence of waypoints such that ψi ∈ V .
223
+ Observation The observation of the agent is ot = (G′
224
+ t, ψt),
225
+ where G′
226
+ t = (V ′
227
+ t , Et) is the augmented graph based on the
228
+ current collision-free graph Gt, while ψt is the robot current
229
+ position. Note that G′
230
+ t shares the same edge set Et as Gt.
231
+ In addition to the node coordinates (i.e., vi = (xi, yi)),
232
+ The properties of each node v′
233
+ i in the augmented graph
234
+ further include a binary signal bi, which indicates if the node
235
+ has been visited by the agent already, and the associated
236
+ utility ui, such that v′
237
+ i = (xi, yi, ui, bi). We experimentally
238
+ found that the binary signal helps improve the learning by
239
+ allowing the robot to be aware of its previous movements.
240
+ The utility ui represents the number of observable frontiers
241
+ at node vi [4]. We consider observable frontiers as frontiers
242
+ within light of sight of the node (i.e., lines between the node
243
+ and observable frontiers are collision-free and their length
244
+ is smaller than the sensor range). The utility ui at node
245
+ vi is computed as ui = |Fo,i|, ∀fj ∈ Fo,i, ||fj − vi|| ≤
246
+ ds, L(vi, fj) ∩ (P − Pf) = ∅, where Fo,i denotes the
247
+ observable frontiers set at node vi, ds denotes the sensor
248
+ range and L(vi, fj) the line between node vi and frontier
249
+ fj. In practice, we scale the node coordinates and utility to
250
+ [0, 1] before feeding the observation into the neural network.
251
+ Action At each decision step t, given the agent’s observation
252
+ ot, our attention-based neural network outputs a stochastic
253
+ policy to select a node out of all neighboring nodes as the
254
+ next viewpoint to visit. The policy is denoted as πθ(at|ot) =
255
+ πθ(ψt+1 = vi, (ψt, vi) ∈ Et | ot), where θ represents the set
256
+ of weights of the neural network. The robot moves to the
257
+ next viewpoint in a straight line, and updates its partial map
258
+ based on data collected along the way.
259
+ Reward To encourage efficient exploration, after taking
260
+ each movement action at, the robot receives a reward
261
+ composed of three parts. The first part ro = |Fo,ψt+1| is
262
+ the number of observed frontiers at the new viewpoint.
263
+ The second part rc = −C(ψt, ψt+1) is a punishment on
264
+ the distance between the previous and new viewpoints. A
265
+ fixed finishing reward rf =
266
+ � 20,
267
+ Pk = Pg
268
+ 0,
269
+ otherwise,
270
+ is given
271
+ at the end of the episode, if and only if the exploration
272
+ task was completed. The total reward reads: rt(ot, at) =
273
+ a · ro + b · rc + rf, where a and b are scaling parameters (in
274
+ Fig. 2: Example decision step in the middle of an
275
+ exploration task in our approach, showing the unknown
276
+ area (grey cells), free area (white cells), occupied area (black
277
+ cells), frontiers (red cells), executed trajectory (blue line),
278
+ graph edges (tan lines), candidate viewpoints (small dots,
279
+ whose color represents their utility), robot current position
280
+ (purple disk), and robot starting position (light blue disk).
281
+ practice a = 1/50, b = 1/64).
282
+ B. Policy Network
283
+ The policy ψθ is output by our attention-based neural
284
+ network, which is composed of an encoder and a decoder
285
+ (shown in Fig. 3). We first rely on the encoder to extract
286
+ salient features from the current partial map, specifically
287
+ by learning dependencies between nodes in the associated
288
+ augmented graph G′. Based on these features as well as the
289
+ current robot position, the decoder then outputs the policy
290
+ over neighboring nodes, which can be used to decide which
291
+ one to visit next. Note that, while policy-based RL agents
292
+ often have a fixed action space, our decoder is inspired by the
293
+ Pointer Network [22] to allow the action space to depend on
294
+ the number of neighboring nodes input in the network. This
295
+ allows our network to naturally adapt to our collision-free
296
+ graph, where nodes have arbitrary numbers of neighbors.
297
+ Attention Layer We use the attention layer [21] as the
298
+ fundamental building block in our model. The input of such
299
+ an attention layer is composed of a query vector hq and a
300
+ key-and-value vector hk,v. The output of this layer, h′
301
+ i, is the
302
+ weighted sum of the value vector, where weights depend on
303
+ the similarity between key and query:
304
+ qi = W Qhq
305
+ i , ki = W Khk,v
306
+ i
307
+ , vi = W V hk,v
308
+ i
309
+ ,
310
+ uij = qT
311
+ i · kj
312
+
313
+ d
314
+ , wij =
315
+ euij
316
+ �n
317
+ j=1 euij , h′
318
+ i =
319
+ n
320
+
321
+ j=1
322
+ wijvj,
323
+ (2)
324
+ where W Q, W K, W V ∈ Rd×d are all learnable matrices.
325
+ Updated features are then passed through a feed-forward
326
+ sublayer, following [21].
327
+ Encoder In the encoder, we first linearly embed the node
328
+ inputs V ′ into d-dimensional node features hn, where hn
329
+ i =
330
+ W lv′
331
+ i +bl. We then calculate an edge mask M where mij =
332
+ � 0, (vi, vj) ∈ Et
333
+ 1, (vi, vj) /∈ Et . The node features are then passed to
334
+
335
+ Node Features
336
+ Enhanced Node Features
337
+ Enhanced Current Node Features
338
+ Neighboring Features
339
+ Encoder
340
+ Partial Map
341
+ Policy
342
+ Action
343
+ Decoder
344
+ Filter Neighboring Feature
345
+ Augmented Graph
346
+ Construct Enhanced
347
+ Current Node Feature
348
+ Fig. 3: Attention-based policy network. Note that neighboring relationships in the augmented graph (tan) are also used as
349
+ the mask [21] in attention layers in the encoder.
350
+ multiple (6 in practice) stacked attention layers, where hq =
351
+ hk,v = hn, each attention layer taking the output of the
352
+ previous one as input. An edge mask is applied to allow each
353
+ node access to its neighboring node features only, by setting
354
+ wij = 0, ∀(i, j), mij = 1. Despite attention being restricted
355
+ to neighboring nodes in each layer, nodes can still obtain
356
+ non-neighboring node features by aggregating node features
357
+ multiple times through this stacked attention structure. We
358
+ empirically found that such structure is more suitable than
359
+ graph transformers [23] (like in our previous work [20]) to
360
+ learn path finding in maps with cluttered obstacles. We term
361
+ the output of the encoder, ˆhe, the enhanced node features,
362
+ since each of these updated node features ˆhn
363
+ i contains the
364
+ dependencies of v′
365
+ i with other nodes.
366
+ Decoder We use the decoder to output a policy based on
367
+ enhanced node features ˆhe and the current robot position ψt.
368
+ Denoting the current robot position as node vc = ψt, we first
369
+ select the current node features hc and neighboring features
370
+ hnb, ∀ˆhnb
371
+ i , (vc, vi) ∈ Et from the corresponding enhanced
372
+ node features. We then pass the current node features and
373
+ enhanced node features to an attention layer, where hq =
374
+ hc, hk,v = ˆhn, concatenate its output with hc, and project it
375
+ back to a d-dimensional feature vector. We term this vector
376
+ the enhanced current node features ˆhc. After that, we pass
377
+ the enhanced current node features and neighboring features
378
+ to a pointer layer [22], an attention layer directly outputting
379
+ the attention weights w as the output with hq = ˆhc, hk,v =
380
+ hnb. We finally take the output of this pointer layer as the
381
+ robot’s policy, i.e., πθ(at | ot) = wi.
382
+ C. Critic Network
383
+ We train the policy network using the soft actor critic
384
+ (SAC) algorithm [24], [25] (see details below), where a critic
385
+ network is trained to predict state-action values. Since state-
386
+ action values approximate long-term returns (the accumu-
387
+ lated sum of rewards), we believe that they also implicitly
388
+ predict potential gains (i.e., potential areas that might be
389
+ found), which further helps the robot sequence non-myopic
390
+ decisions. In practice, we train a critic network to approx-
391
+ imate soft state-action values Qφ(ot, at), where φ denotes
392
+ the set of weights of the critic network. The structure of
393
+ the critic network is nearly the same as the policy network,
394
+ except that there is no pointer layer at the end of the decoder.
395
+ Instead, we directly concatenate the enhanced current node
396
+ features and neighboring features, then project them to soft
397
+ state-action values.
398
+ D. Training
399
+ Soft Actor-critic SAC aims to learn a policy that maximizes
400
+ return while keeping its entropy as high as possible:
401
+ π∗ = argmax E(ot,at)[
402
+ T
403
+
404
+ t=0
405
+ γt(rt + αH(π(.|ot)))],
406
+ (3)
407
+ where π∗ is the optimal policy, T the number of decision
408
+ steps, γ the discount factor, and α the temperature parameter
409
+ that tunes the importance of the entropy term versus the
410
+ return. In SAC, the soft state value is calculated as: V (ot) =
411
+ Eat[Q(ot, at)] − αlog(π(at|ot)).
412
+ The critic loss is calculated as: JQ(φ) = Eot[ 1
413
+ 2(Qφ(ot, at)−
414
+ (rt + γEot+1[V (ot+1)]))2].
415
+ The
416
+ policy
417
+ loss
418
+ loss
419
+ is
420
+ calculated
421
+ as:
422
+ Jπ(θ)
423
+ =
424
+ E(ot,at)[αlog(πθ(at|ot)) − Qφ(ot, at)].
425
+ The temperature parameter is auto-tuned during the train-
426
+ ing and the temperature loss is calculated as: J(α) =
427
+ Eat[−α(logπt(at|ot) + H)],
428
+ where H denotes the target entropy. In practice, we use
429
+ double target networks for the critic network training, as
430
+ in [24], [25].
431
+ Training Details We utilize the same environments pro-
432
+ vided in [18] for training, which are generated by a random
433
+ dungeon generator. Each environment is a 640 × 480 grid
434
+ map, while the sensor range ds = 80. To build the collision-
435
+ free graph, 900 points are uniformly distributed to cover
436
+ the whole environment, with all points in the known free
437
+ area considered as candidate viewpoints V . We check the
438
+ k = 20 nearest neighbor of each viewpoint, and connect
439
+ them if such an edge is collision-free, to form the edge
440
+ set E. We consider the exploration task to be completed
441
+ once more than 99% of the ground truth has been explored
442
+ (|Pk|/|Pg| > 0.99). During training, we set the max episode
443
+ length to 128 decision steps, the discount factor to γ = 1,
444
+ the batch size to 256, and the episode buffer size to 10, 000.
445
+ Training starts after the episode buffer collects more than
446
+ 2000 steps data. The target entropy is set to 0.01 · log(k).
447
+ Each training step contains 1 iteration and happens after 1
448
+ episode finishes. We use the Adam optimizer with a learning
449
+
450
+ TABLE I: Comparison with baseline ARE planners (100 scenarios for each test set). We report the average and standard
451
+ deviation of the trajectory length to complete exploration (lower is better). For utility-based methods [6], the numbers 1, 10,
452
+ 25 represent the value of λ, which is used to tune exploitation and exploration.
453
+ Nearest
454
+ Utility 1
455
+ Utility 10
456
+ Utility 25
457
+ NBVP
458
+ TARE Local
459
+ CNN
460
+ ARiADNE
461
+ easy
462
+ 772(±253)
463
+ 736(±266)
464
+ 732(±256)
465
+ 764(±258)
466
+ 745(±268)
467
+ 692(±228)
468
+ 779(±281)
469
+ 663(±257)
470
+ medium
471
+ 1248(±295)
472
+ 1266(±311)
473
+ 1179(±300)
474
+ 1227(±307)
475
+ 1217(±271)
476
+ 1170(±275)
477
+ 1169(±319)
478
+ 1130(±334)
479
+ complex
480
+ 1669(±332)
481
+ 1873(±457)
482
+ 1662(±347)
483
+ 1711(±352)
484
+ 1744(±366)
485
+ 1646(±312)
486
+ 1647(±422)
487
+ 1599(±363)
488
+ random
489
+ 1354(±410)
490
+ 1423(±466)
491
+ 1268(±396)
492
+ 1315(±413)
493
+ 1323(±371)
494
+ 1266(±388)
495
+ 1323(±428)
496
+ 1204(±378)
497
+ (a) simple
498
+ (b) medium
499
+ (c) complex
500
+ Fig. 4: Examples scenarios from each different test set.
501
+ rate of 10−5 for both policy and critic networks. The target
502
+ critic network updates every 256 training steps. Our model is
503
+ trained on a workstation equipped with a i9-10980XE CPU
504
+ and an NVIDIA GeForce RTX 3090 GPU. We train our
505
+ model utilizing Ray, a distributed framework for machine
506
+ learning [26], to parallelize and accelerate data collection
507
+ (32 instances in practice). The training needs around 24h to
508
+ converge. We will release our full code upon acceptance.
509
+ V. EXPERIMENT
510
+ A. Comparison Analysis
511
+ Most previous works often only conduct experiments in
512
+ a few scenarios (often less than 10). However, we note
513
+ that the performance of exploration planners exhibits high
514
+ variance in different scenarios. Therefore, we believe a
515
+ convincing comparison should be based on evaluation in
516
+ a large number of testing environments. Although building
517
+ so many testing environments is tricky and time-consuming
518
+ even in ROS, hundreds of simplified scenarios, like the ones
519
+ we used for training, can be generated easily. Therefore, we
520
+ conduct comparison analyses on a fixed set of simplified
521
+ environments, which were never seen by our trained model.
522
+ Testing environments are divided in four sets (100 scenarios
523
+ each), named random, easy, medium, and complex. Easy
524
+ scenarios only contain one room, and complex scenarios
525
+ contain multiple rooms with complicated corridors, while the
526
+ complexity of medium scenarios lies in-between. Random
527
+ scenarios contain a mix of easy, medium, and complex
528
+ scenarios (but no repeated scenario from these test sets).
529
+ We compare ARiADNE with state-of-the-art conventional
530
+ planners, including Nearest Frontier [5], Utility-based Fron-
531
+ tier [6], NBVP [3], and TARE Local [4]. Nearest Frontier
532
+ always drives the robot towards the nearest frontier, while
533
+ Utility-based Frontier evaluates the gain of each frontier
534
+ gi = ui · e−λ·C(ψi) and drives the robot to the frontier with
535
+ the highest gain, where ui is the utility of frontier i, ψi the
536
+ shortest path from the robot’s current position to frontier i,
537
+ and λ a tunable parameter used to balance exploration and
538
+ exploitation. The same function is also used in NBVP to
539
+ evaluate sampled trajectories. We tried a series of values of λ
540
+ for Utility-based Frontier and NBVP, and found that λ = 10
541
+ (a) Trajectory Analysis
542
+ (b) ARiADNE (1618)
543
+ (c) TARE Local (1703)
544
+ (d) NBVP (1922)
545
+ (e) Utility 10 (1793)
546
+ Fig. 5: Visual comparison of our method and baselines
547
+ in an example scenario.
548
+ generally performs best (see Table I). Finally, TARE Local
549
+ refers to the local planner of TARE [4], which explicitly
550
+ plans a full trajectory to cover all frontiers (we do not
551
+ use TARE’s global planner, since its local planning horizon
552
+ already fits our testing environments). NBVP and TARE run
553
+ 300 and 10 iterations for each decision step respectively
554
+ (15 and 1 in default [3], [4]), to make their decisions as
555
+ optimal as possible. In our tests, we adopt our collision-
556
+ free graph as the trajectory space for all baselines except
557
+ NBVP (we found RRTs mostly generate poor zig-zag paths
558
+ due to symmetries in our uniform graph), to alleviate the
559
+ randomness of sampling and ensure a fair comparison. We
560
+ further compare against a CNN-based DRL planner [18].
561
+ Since this CNN-based planner has a fixed observation range,
562
+ it only has a partial observation of the (partial) map, and
563
+ relies on a frontier-based method for exploration when there
564
+ is no nearby frontier in its field-of-view.
565
+ We report the average and variance of the total trajectory
566
+ length to complete exploration in Table I. Our results indicate
567
+ that ARiADNE outperforms all baselines on average, in all
568
+ test sets. We do not report the planning time of baseline
569
+ methods in Table I, since we focused on implementing fun-
570
+ damental inner workings of the baselines, without perfectly
571
+ optimizing their computing time. In addition, we observed
572
+ that the utility/gain computation generally takes 90% of the
573
+ planning time for conventional methods in practice, while
574
+ its computing time is determined by the resolution of the
575
+ map. Therefore, computing times vary greatly in different
576
+ exploration scenarios. Despite this, we note that our method
577
+ can be used in real-time. Under our exploration setting, our
578
+
579
+ Fig. 6: Attention weights visualization of the critic net-
580
+ work decoder. The query vector is the node at the current
581
+ robot’s position (purple) and the keys vector are nodes in the
582
+ augmented graph (blue). Note how the different heads of the
583
+ decoder learn to focus on either local or global dependencies
584
+ of areas in the partial map.
585
+ method takes 0.7s for the observation generation on average
586
+ (utility computation and graph building) and less than 0.02s
587
+ for the neural network inference on a i9-10980XE CPU.
588
+ As discussed in the related work section, the best-tuned
589
+ frontier-based method (Utility 10) performs well in 2D ex-
590
+ ploration tasks (better than NBVP). Despite this, since these
591
+ frontier-based methods are myopic, they are outperformed by
592
+ TARE Local, which plans near-optimal long-term (full) tra-
593
+ jectories on the current partial map. While it only constructs
594
+ paths one viewpoint at a time, our learning-based method
595
+ can not only reason about the whole partial map to construct
596
+ efficient, non-myopic exploration trajectories, while learning
597
+ to predict the potential long-term gain of decisions. We
598
+ believe such an advantage results in the improvement of our
599
+ method over conventional baselines (5% better than TARE
600
+ Local in our random scenarios). Fig. 5 shows an example
601
+ where ARiADNE plans a more efficient trajectory, while
602
+ conventional methods suffer from redundant movements.
603
+ However, it should be noted that considering long-term paths
604
+ and predicting potential gains do not strictly guarantee better
605
+ performance in every scenario (e.g., predictions could be
606
+ wrong). In fact, ARiADNE plans the shortest path for 33
607
+ scenarios in our random tests, while TARE Local, NBVP,
608
+ Utility 10 perform best in 23, 21, 23 scenarios respectively.
609
+ Finally, ARiADNE also outperforms the CNN-based plan-
610
+ ner. We believe that our main advantage stems from the
611
+ attention-based neural network, which efficiently learns fea-
612
+ tures at different scales (as shown in Fig. 6, different heads
613
+ of the decoder learn to focus on either local or global
614
+ dependencies), while CNNs naturally only focus on local
615
+ dependencies. Therefore, our model can better learn depen-
616
+ dencies between different areas to reason about the entire
617
+ partial map and avoid myopic decisions.
618
+ B. Experimental validation
619
+ We validate ARiADNE in a simulation environment for
620
+ exploration provided by [27]. It contains fundamental mod-
621
+ ules (e.g., state estimation and motion control), which allow
622
+ us to consider a real sensor model and a low-level motion
623
+ (a) Ground truth
624
+ (b) Constructed Octomap
625
+ (c) Constructed occupancy grid map
626
+ Fig. 7: Validation of our method in simulation. Note that
627
+ ignoring the small left-down corner is actually a wise deci-
628
+ sion since the objective is to explore 99% of the environment.
629
+ controller. The validation is conducted in a realistic indoor
630
+ environment (approximately 70m × 40m) with long and
631
+ narrow corridors connected with tables, colums, and lobby
632
+ areas (see Fig. 7(a)). We use a wheeled robot equipped with
633
+ a 3D Velodyne Lidar with a 130m sensor range. We convert
634
+ collected data into an Octomap (see Fig. 7(b)) and then
635
+ project it to a occupancy grid map for exploration planning
636
+ (see Fig. 7(c)). The resolution of the grid map is 0.2m.
637
+ We re-plan the path every 0.2s. Although the sensor model
638
+ (i.e., sensor range and sensing frequency) of the robot is
639
+ drastically different from the one used in training, our trained
640
+ model still makes efficient decisions to avoid redundant
641
+ movements for exploration (see the colored trajectory in
642
+ Fig. 7(c), highlighting the generalizability of our approach.
643
+ VI. CONCLUSION
644
+ In this work, we propose ARiADNE, a reinforcement
645
+ learning approach that relies on attention-based deep neural
646
+ network for autonomous exploration. Our approach allows
647
+ the robot to efficiently learn dependencies between different
648
+ areas in its partial map and implicitly predict potential gains,
649
+ thus allowing it to sequence non-myopic movement decisions
650
+ in partially-known environments. In our tests, ARiADNE
651
+ exhibits improvement over state-of-the-art frontier-based,
652
+ sampling-based, and CNN-based exploration planners, in
653
+ terms of average trajectory length to complete exploration.
654
+ We also validate our approach in a high-fidelity ROS simula-
655
+ tion, where we consider a real sensor model and a low-level
656
+ motion controller, towards deployments on real robots.
657
+ Future work will focus on extending our approach to
658
+ autonomous exploration of 3D environments, where frontiers
659
+ are much denser than in 2D. Second, although in this work
660
+ we uniformly distribute nodes to construct a graph, we be-
661
+ lieve a sparser graph containing more informative viewpoints
662
+ may improve performance. Finally, we are also interested in
663
+ explicitly predicting the potential gain during exploration to
664
+ further boost planning performance.
665
+ ACKNOWLEDGMENTS
666
+ This work was supported by Temasek Laboratories
667
+ (TL@NUS) under grant TL/FS/2022/01.
668
+
669
+ L
670
+ LREFERENCES
671
+ [1] A. Hornung, K. M. Wurm, M. Bennewitz, C. Stachniss, and
672
+ W. Burgard, “OctoMap: An efficient probabilistic 3D mapping
673
+ framework based on octrees,” Autonomous Robots, 2013, software
674
+ available at https://octomap.github.io. [Online]. Available: https:
675
+ //octomap.github.io
676
+ [2] J. A. Placed, J. Strader, H. Carrillo, N. Atanasov, V. Indelman,
677
+ L. Carlone, and J. A. Castellanos, “A survey on active simultaneous
678
+ localization and mapping: State of the art and new frontiers,” arXiv
679
+ preprint arXiv:2207.00254, 2022.
680
+ [3] A. Bircher, M. Kamel, K. Alexis, H. Oleynikova, and R. Siegwart,
681
+ “Receding horizon” next-best-view” planner for 3d exploration,” in
682
+ 2016 IEEE international conference on robotics and automation
683
+ (ICRA).
684
+ IEEE, 2016, pp. 1462–1468.
685
+ [4] C. Cao, H. Zhu, H. Choset, and J. Zhang, “Tare: A hierarchical
686
+ framework for efficiently exploring complex 3d environments.” in
687
+ Robotics: Science and Systems, 2021.
688
+ [5] B. Yamauchi, “A frontier-based approach for autonomous exploration,”
689
+ in Proceedings 1997 IEEE International Symposium on Computational
690
+ Intelligence in Robotics and Automation CIRA’97.’Towards New Com-
691
+ putational Principles for Robotics and Automation’.
692
+ IEEE, 1997, pp.
693
+ 146–151.
694
+ [6] H. H. Gonz´alez-Banos and J.-C. Latombe, “Navigation strategies for
695
+ exploring indoor environments,” The International Journal of Robotics
696
+ Research, vol. 21, no. 10-11, pp. 829–848, 2002.
697
+ [7] M. Selin, M. Tiger, D. Duberg, F. Heintz, and P. Jensfelt, “Efficient
698
+ autonomous exploration planning of large-scale 3-d environments,”
699
+ IEEE Robotics and Automation Letters, vol. 4, no. 2, pp. 1699–1706,
700
+ 2019.
701
+ [8] D. Holz, N. Basilico, F. Amigoni, and S. Behnke, “Evaluating the
702
+ efficiency of frontier-based exploration strategies,” in ISR 2010 (41st
703
+ International Symposium on Robotics) and ROBOTIK 2010 (6th Ger-
704
+ man Conference on Robotics).
705
+ VDE, 2010, pp. 1–8.
706
+ [9] M. Kulich, J. Faigl, and L. Pˇreuˇcil, “On distance utility in the
707
+ exploration task,” in 2011 IEEE International Conference on Robotics
708
+ and Automation.
709
+ IEEE, 2011, pp. 4455–4460.
710
+ [10] T. Dang, M. Tranzatto, S. Khattak, F. Mascarich, K. Alexis, and
711
+ M. Hutter, “Graph-based subterranean exploration path planning using
712
+ aerial and legged robots,” Journal of Field Robotics, vol. 37, no. 8,
713
+ pp. 1363–1388, 2020.
714
+ [11] Z. Xu, D. Deng, and K. Shimada, “Autonomous uav exploration
715
+ of dynamic environments via incremental sampling and probabilistic
716
+ roadmap,” IEEE Robotics and Automation Letters, vol. 6, no. 2, pp.
717
+ 2729–2736, 2021.
718
+ [12] S. Arora and S. Scherer, “Randomized algorithm for informative
719
+ path planning with budget constraints,” in 2017 IEEE International
720
+ Conference on Robotics and Automation (ICRA).
721
+ IEEE, 2017, pp.
722
+ 4997–5004.
723
+ [13] G. A. Hollinger and G. S. Sukhatme, “Sampling-based robotic infor-
724
+ mation gathering algorithms,” The International Journal of Robotics
725
+ Research, vol. 33, no. 9, pp. 1271–1287, 2014.
726
+ [14] F. Niroui, K. Zhang, Z. Kashino, and G. Nejat, “Deep reinforcement
727
+ learning robot for search and rescue applications: Exploration in
728
+ unknown cluttered environments,” IEEE Robotics and Automation
729
+ Letters, vol. 4, no. 2, pp. 610–617, 2019.
730
+ [15] L. Schmid, C. Ni, Y. Zhong, R. Siegwart, and O. Andersson, “Fast
731
+ and compute-efficient sampling-based local exploration planning via
732
+ distribution learning,” arXiv preprint arXiv:2202.13715, 2022.
733
+ [16] D. Zhu, T. Li, D. Ho, C. Wang, and M. Q.-H. Meng, “Deep
734
+ reinforcement learning supervised autonomous exploration in office
735
+ environments,” in 2018 IEEE international conference on robotics and
736
+ automation (ICRA).
737
+ IEEE, 2018, pp. 7548–7555.
738
+ [17] H. Li, Q. Zhang, and D. Zhao, “Deep reinforcement learning-based
739
+ automatic exploration for navigation in unknown environment,” IEEE
740
+ transactions on neural networks and learning systems, vol. 31, no. 6,
741
+ pp. 2064–2076, 2019.
742
+ [18] F. Chen, S. Bai, T. Shan, and B. Englot, “Self-learning exploration
743
+ and mapping for mobile robots via deep reinforcement learning,” in
744
+ Aiaa scitech 2019 forum, 2019, p. 0396.
745
+ [19] F. Chen, J. D. Martin, Y. Huang, J. Wang, and B. Englot, “Autonomous
746
+ exploration under uncertainty via deep reinforcement learning on
747
+ graphs,” in 2020 IEEE/RSJ International Conference on Intelligent
748
+ Robots and Systems (IROS).
749
+ IEEE, 2020, pp. 6140–6147.
750
+ [20] Y. Cao, Y. Wang, A. Vashisth, H. Fan, and G. A. Sartoretti,
751
+ “CAtNIPP: Context-Aware Attention-based Network for Informative
752
+ Path Planning,” in Accepted to the 6th Annual Conference on Robot
753
+ Learning, 2022. [Online]. Available: https://openreview.net/forum?id=
754
+ cAIIbdNAeNa
755
+ [21] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N.
756
+ Gomez, Ł. Kaiser, and I. Polosukhin, “Attention is all you need,”
757
+ Advances in neural information processing systems, vol. 30, 2017.
758
+ [22] O. Vinyals, M. Fortunato, and N. Jaitly, “Pointer networks,” Advances
759
+ in neural information processing systems, vol. 28, 2015.
760
+ [23] V. P. Dwivedi and X. Bresson, “A generalization of transformer
761
+ networks to graphs,” arXiv preprint arXiv:2012.09699, 2020.
762
+ [24] P. Christodoulou, “Soft actor-critic for discrete action settings,” arXiv
763
+ preprint arXiv:1910.07207, 2019.
764
+ [25] T. Haarnoja, A. Zhou, K. Hartikainen, G. Tucker, S. Ha, J. Tan,
765
+ V. Kumar, H. Zhu, A. Gupta, P. Abbeel, et al., “Soft actor-critic
766
+ algorithms and applications,” arXiv preprint arXiv:1812.05905, 2018.
767
+ [26] P. Moritz, R. Nishihara, S. Wang, A. Tumanov, R. Liaw, E. Liang,
768
+ M. Elibol, Z. Yang, W. Paul, M. I. Jordan, et al., “Ray: A distributed
769
+ framework for emerging ai applications,” in Proceedings of OSDI,
770
+ 2018, pp. 561–577.
771
+ [27] C. Cao, H. Zhu, F. Yang, Y. Xia, H. Choset, J. Oh, and J. Zhang,
772
+ “Autonomous exploration development environment and the planning
773
+ algorithms,” in 2022 International Conference on Robotics and Au-
774
+ tomation (ICRA).
775
+ IEEE, 2022, pp. 8921–8928.
776
+
0dFJT4oBgHgl3EQfjix9/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
39FKT4oBgHgl3EQfRS0O/content/tmp_files/2301.11770v1.pdf.txt ADDED
@@ -0,0 +1,1644 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11770v1 [math.RA] 27 Jan 2023
2
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
3
+ FROM ASSOCIATIVE ALGEBRAS WITH A ENDOMORPHISM
4
+ OPERATOR, DIFFERENTIAL OPERATOR OR LEFT
5
+ AVERAGING OPERATOR.
6
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
7
+ Abstract. In this paper, we introduce the concepts of a Endomorphism Op-
8
+ erator, Left Averaging Operator, Differential Operator and Rota-Baxter Op-
9
+ erator and we construct examples of these linear maps on associative algebras
10
+ with a left identity, skew-idempotent or idempotent element. Its maps on asso-
11
+ ciative algebra, induces a non-associative algebra structure such as Lie algebra,
12
+ Pre-Lie algebra, Jordan algebra, Flexible Algebra or (left) Leibniz algebra. We
13
+ consider that the construction of non-associative algebras from associative al-
14
+ gebras with Linear Operators as the main results of this work. In this paper
15
+ we give a example of non-associative algebras on subspaces of square matrices
16
+ M(3 × 3, R).
17
+ Introduction
18
+ Linear operators can be defined on different algebraic structures, the weell-known
19
+ operators are the endomorphism operator and differential operator [15, 24, 16]. By
20
+ the 1970’s, new identities for operators have emerged from studies in combinatorics,
21
+ probability and analysis. Gian-Carlo Rota was most interested in the following
22
+ operators:
23
+ Endomorphism operator
24
+ R(x · y) = R(x) · R(y),
25
+ Differential operator
26
+ R(x · y) = R(x) · y + x · R(y),
27
+ Rota-Baxter operator of weight λ
28
+ where λ is a fixed constant,
29
+ R(x) · R(y) = R(x · R(y) + R(x) · y + λx · y),
30
+ Average operator
31
+ R(x) · R(y) = R(x · R(y)),
32
+ Inverse average operator
33
+ R(x) · R(y) = R(R(x) · y),
34
+ Reynolds operator
35
+ R(x) · R(y) = R(x · R(y) + R(x) · y − R(x) · R(y)).
36
+ Received by the editors January 27, 2023 and, in revised form, January, 2023.
37
+ 2020 Mathematics Subject Classification. 17A15;17A32;17A20;17B40;47C05.
38
+ Key words and phrases. Associative Algebras, Lie algebra, Pre-Lie algebra, Jordan algebra,
39
+ Flexible Algebra, (left) Leibniz algebra, Rota-Baxter Operator, Endomorphism operator, Differ-
40
+ ential operator.
41
+ This work was completed with the support of the Universidad del Cauca.
42
+ The author was also supported by the research group “Estructuras Algebraicas, Divulgaci´on
43
+ Matem´atica y Teor´ıas Asociadas. @DiTa”.
44
+ 1
45
+
46
+ 2
47
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
48
+ An endomorphism is a homomorphism from an algebraic structure into itself.
49
+ Let A be a non-unital, associative algebra, α an algebra endomorphism on A and
50
+ define ∗ : A × A −→ A by a ∗ b = α(ab) for all a, b ∈ A.
51
+ Then (A, ∗, α) is a
52
+ hom-associative algebra, see [30].
53
+ The study of averaging operators from an algebraic point of view was started
54
+ by Kamp´e de F´eriet [11] and continued and elaborated by Birkhoff [5]. Averaging
55
+ operators has connection with developments in the theory of turbulence [6, 5], and
56
+ was closely related to the probability theory.
57
+ In his Ph. D. thesis in 2000 [7], Weili Cao studied averaging operators in the
58
+ general context and the algebraic definition. He studied the naturally induced Lie
59
+ algebra structures from averaging operators: Let R : A → A be an Averaging
60
+ Operator on an algebra A, its map permit us to define a Lie bracket operation on
61
+ A, by [x, y] = x · R(y) − y · R(x), ∀x, y ∈ A, see [7, 21].
62
+ Let R : A → A be a Differential Operator on a commutative associative algebra
63
+ A, its map induces a new Lie algebra structure called Witt type Lie algebras [29],
64
+ defined by the bracket [x, y] = R(x)·y−x·R(y), ∀x, y ∈ A. Commutative associative
65
+ algebras with this type of linear maps, permit us to present examples of Lie algebras.
66
+ Rota-Baxter operators were introduced by the mathematician Glenn E. Bax-
67
+ ter [3], in the study of differential equations applied to probability theory, and
68
+ mainly its importance by the works of G.-C. Rota in combinatorics [4, 22, 23].
69
+ A Rota-Baxter algebra, is an associative algebra equipped with a Rota-Baxter
70
+ operator. Recently, noncommutative Rota-Baxter algebras have appeared in a wide
71
+ range of areas in pure mathematics, for example the works of Loday and Ronco on
72
+ dendriform dialgebras and trialgebras, see [18, 17] and too in applied mathematics,
73
+ see [8].
74
+ The following result provides a way to construct a pre-Lie algebra structure from
75
+ Rota-Baxter operator relation on Lie Algebras or pre-Lie algebras. We find that if
76
+ R : A → A es a Rota Baxter-Operator on an Lie Algebra (A, [, ]), its map induces
77
+ a pre-Lie algebra structure, defined by x ∗ y = [R(x), y], ∀x, y ∈ A, see [2].
78
+ In the case of the Rota-Baxter relation on pre-Lie algebras, it is known that
79
+ if (A, ·) is a pre-Lie algebra and R be a Rota-Baxter operator on A. Then R is
80
+ still a Rota-Baxter operator on (A, ∗), and the product given by x ∗ y = [R(x), y]
81
+ = R(x) · y − y · R(x), x, y ∈ A, defines a new pre-Lie algebra (A, ∗) see [27] .
82
+ An element u is said to be skew-idempotent with respect to a product · in
83
+ the algebra if: u · u = −u, and an element u is a right identity if: x · u = x
84
+ for all element x in the algebra. Associative algebras with a left identity, skew-
85
+ idempotent or idempotent element, permit us to build examples of linear maps
86
+ as Endomorphism Operator, Left Averaging Operator, Differential Operator and
87
+ Rota-Baxter Operator. Associative algebras with this type of linear maps, permit
88
+ us to present constructions of non-associative algebras.
89
+ 1. Construction of Lie algebra from Associative Algebras with a
90
+ Endomorphism Operator
91
+ In this section, we present in the Proposition 1.1.3 a Lie algebra structure given
92
+ by the following bracket [x, y] = x · R(y) − y · R(x) where R is a endomorphism
93
+
94
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
95
+ 3
96
+ operator, and R is defined from a right identity on a subalgebra A: Let (A, ·) be an
97
+ algebra, then an element u of H, A ⊆ H, is called a right identity on A if x · u = x
98
+ for all x in A.
99
+ 1.1. Introduction. In the Definition 1.2.1 we define a left and a right identity for
100
+ an associative algebra A and in the Proposition 1.2.3 we give a proof of the build
101
+ of an endomorphism operator with certain properties on A useding a right identity,
102
+ inspired by the well known result of X. Xu, [29], where establish the existence of
103
+ Lie Algebras from an associative algebra A with an Differential Operator on the
104
+ space A, we establish a new connection between an endomorphism operator with
105
+ a construction of Lie algebra structures on A . We start by briefly introducing the
106
+ definition of a Lie Algebra, a left and a right identity for A.
107
+ Definition 1.1.1. A Lie algebra over a field F is a vector space g over F equipped
108
+ with bilinear operation [, ] : g × g → g, called the commutator or (Lie) bracket
109
+ which satisfies the following identities:
110
+ [x, y]
111
+ =
112
+ −[y, x]
113
+ (Antisymmetry)
114
+ (1.1.1)
115
+ [x, [y, z]] + [z, [x, y]] + [y, [z, x]]
116
+ =
117
+ 0
118
+ (Jacobi identity)
119
+ (1.1.2)
120
+ Remark 1.1.2. It is well known that any associative algebra becomes a Lie algebra
121
+ with the Lie bracket given by the commutator: [x, y] = x · y − y · x. Also that the
122
+ dimension of a Lie algebra g is its dimension as a vector space over F and Ado’s
123
+ theorem states that every finite dimensional Lie algebra g over a field F can be
124
+ viewed as a Lie algebra of square matrices with the commutator as bracket.
125
+ Proposition 1.1.3. Let A be an associative algebra and let R : A → A a linear
126
+ map such that R2(x) = R(x) and R(x) · R(y) = R(x · y) for all x, y ∈ A. Then we
127
+ can define a Lie algebra structures on A given by
128
+ (1.1.3)
129
+ [x, y] = x · R(y) − y · R(x) (respectively [x, y] = R(x) · y − R(y) · x)
130
+ Proof. Let x, y, z ∈ A; then, [x, y] = −[y, x] and
131
+ [x, [y, z]] = x · R([y, z]) − [y, z] · R(x)
132
+ = x · R(y · R(z) − z · R(y)) − (y · R(z) − z · R(y)) · R(x)
133
+ = x · (R(y) · R(z) − R(z) · R(y)) − (y · R(z)) · R(x) + (z · R(y)) · R(x)
134
+ = x · (R(y) · R(z)) − x · (R(z) · R(y)) − (y · R(z)) · R(x) + (z · R(y)) · R(x)
135
+ [y, [z, x]] = y · R([z, x]) − [z, x] · R(y)
136
+ = y · R(z · R(x) − x · R(z)) − (z · R(x) − x · R(z)) · R(y)
137
+ = y · (R(z) · R(x) − R(x) · R(z)) − (z · R(x)) · R(y) + (x · R(z)) · R(y)
138
+ = y · (R(z) · R(x)) − y · (R(x) · R(z)) − (z · R(x)) · R(y) + (x · R(z)) · R(y)
139
+ [z, [x, y]] = z · R([x, y]) − [x, y] · R(z)
140
+ = z · R(x · R(y) − y · R(x)) − (x · R(y) − y · R(x)) · R(z)
141
+ = z · (R(x) · R(y) − R(y) · R(x)) − (x · R(y)) · R(z) + (y · R(x)) · R(z)
142
+ = z · (R(x) · R(y)) − z · (R(y) · R(x)) − (x · R(y)) · R(z) + (y · R(x)) · R(z)
143
+ Thus, [x, [y, z]] + [y, [z, x]] + [z, [x, y]] = 0. Therefore, (A, [ , ]) is a Lie algebra.
144
+
145
+
146
+ 4
147
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
148
+ 1.2. Examples of Lie algebras from the endomorphism operator. In this
149
+ subsection we present the relationship between an endomorphism operator and a
150
+ right identity of an associative algebra. In one direction, we show that an associa-
151
+ tive algebra A with a right identity gives an endomorphism operator with certain
152
+ properties on the associative algebra A that allow us to give examples of lie algebras
153
+ from the endomorphism.
154
+ Definition 1.2.1. Let A be an algebra and H a set containing A. An element
155
+ u ∈ H is called a left identity for A if u · x = x for all x ∈ A. Similarly, u ∈ H is
156
+ a right identity for A if x · u = x for all x ∈ A. An element u ∈ A which is both a
157
+ left and a right identity for A is an identity element.
158
+ Remark 1.2.2. Given an operation (function) · : H × A → A, an element u of H is
159
+ called a right identity for · if x · u = x for every element x of A. That is, the map
160
+ A → A given by x · u is the identity function on A.
161
+ The following proposition and its examples introduce the idea of all the main
162
+ results of this paper.
163
+ Proposition 1.2.3. Let ( A, · ) be an associative algebra and H a set containing
164
+ A, and suppose that there exists u ∈ H such that u · x ∈ A and x · u = x for all
165
+ x ∈ A. Then the linear map R : A −→ A defined by R(x) = u · x satisfies
166
+ (1.2.1)
167
+ R(x) · R(y) = R(x · y) for all x, y ∈ A.
168
+ Furthemore, R2(x) = R(x) if u2 = u, or R2(x) = x if u2 = 1.
169
+ Proof. Let x, y ∈ A, then R(x · y) = u · (x · y). On the other hand we have,
170
+ R(x)·R(y) = (u·x)·(u·y) = u·((x·u)·y) = u·(x·y). Therefore R(x)·R(y) = R(x·y)
171
+ for all x, y ∈ A. Now, if u2 = u, then R2(x) = u · (u · x) = (u2 · x) = u · x = R(x).
172
+ Therefore R2(x) = R(x) for all x ∈ A.
173
+
174
+ Example 1.2.4. We consider the subalgebra
175
+ A =
176
+
177
+
178
+
179
+
180
+
181
+ y
182
+ y
183
+ 0
184
+ n
185
+ n
186
+ 0
187
+ r
188
+ r
189
+ 0
190
+
191
+  : r, n, y ∈ R
192
+
193
+
194
+
195
+ under the usual matrix multiplication.
196
+ The element u =
197
+
198
+
199
+ a
200
+ b
201
+ c
202
+ 1 − a
203
+ 1 − b
204
+ −c
205
+ e
206
+ f
207
+ g
208
+
209
+  satisfies x · u = x and u · x ∈ A for all
210
+ x ∈ A.
211
+ Then the linear map R : A −→ A defined by
212
+ R
213
+
214
+
215
+
216
+
217
+ y
218
+ y
219
+ 0
220
+ n
221
+ n
222
+ 0
223
+ r
224
+ r
225
+ 0
226
+
227
+
228
+
229
+  =
230
+
231
+
232
+ a
233
+ b
234
+ c
235
+ 1 − a
236
+ 1 − b
237
+ −c
238
+ e
239
+ f
240
+ g
241
+
242
+  ·
243
+
244
+
245
+ y
246
+ y
247
+ 0
248
+ n
249
+ n
250
+ 0
251
+ r
252
+ r
253
+ 0
254
+
255
+
256
+ =
257
+
258
+
259
+ ay + bn + cr
260
+ ay + bn + cr
261
+ 0
262
+ (1 − a)y + (1 − b)n − cr
263
+ (1 − a)y + (1 − b)n − cr
264
+ 0
265
+ ey + fn + gr
266
+ ey + fn + gr
267
+ 0
268
+
269
+
270
+ satisfies R(x) · R(y) = R(x · y) for all x, y ∈ A.
271
+
272
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
273
+ 5
274
+ Example 1.2.5. We consider the subalgebra
275
+ A =
276
+
277
+
278
+
279
+
280
+
281
+ x
282
+ y
283
+ y
284
+ w
285
+ k
286
+ k
287
+ m
288
+ n
289
+ n
290
+
291
+  : x, w, m, y, k, n ∈ R
292
+
293
+
294
+
295
+ under the usual matrix multiplication.
296
+ The element u =
297
+
298
+
299
+ 1
300
+ 0
301
+ 0
302
+ 0
303
+ 0
304
+ 1
305
+ 0
306
+ 1
307
+ 0
308
+
309
+  satisfies u2 = I,
310
+ x · u = x and u · x ∈ A for all
311
+ x ∈ A.
312
+ Then the linear map R : A −→ A defined by
313
+ R
314
+
315
+
316
+
317
+
318
+ x
319
+ y
320
+ y
321
+ w
322
+ k
323
+ k
324
+ m
325
+ n
326
+ n
327
+
328
+
329
+
330
+  =
331
+
332
+
333
+ x
334
+ y
335
+ y
336
+ m
337
+ n
338
+ n
339
+ w
340
+ k
341
+ k
342
+
343
+
344
+ satisfies R2(x) = x and R(x) · R(y) = R(x · y) for all x, y ∈ A.
345
+ Example 1.2.6. We consider the subalgebra
346
+ A =
347
+
348
+
349
+
350
+
351
+
352
+ y
353
+ y
354
+ 0
355
+ n
356
+ n
357
+ 0
358
+ r
359
+ r
360
+ 0
361
+
362
+  : y, n, r ∈ R
363
+
364
+
365
+
366
+ under the usual matrix multiplication.
367
+ The element u =
368
+
369
+
370
+ 1
371
+ b
372
+ b
373
+ 0
374
+ 1 − b
375
+ −b
376
+ 0
377
+ b − 1
378
+ b
379
+
380
+  satisfies u2 = u,
381
+ x · u = x and u · x ∈ A
382
+ for all x ∈ A.
383
+ Then the linear map R : A −→ A defined by
384
+ R
385
+
386
+
387
+
388
+
389
+ y
390
+ y
391
+ 0
392
+ n
393
+ n
394
+ 0
395
+ r
396
+ r
397
+ 0
398
+
399
+
400
+
401
+  =
402
+
403
+
404
+ 1
405
+ b
406
+ b
407
+ 0
408
+ 1 − b
409
+ −b
410
+ 0
411
+ b − 1
412
+ b
413
+
414
+  ·
415
+
416
+
417
+ y
418
+ y
419
+ 0
420
+ n
421
+ n
422
+ 0
423
+ r
424
+ r
425
+ 0
426
+
427
+
428
+ =
429
+
430
+
431
+ y + bn + br
432
+ y + bn + br
433
+ 0
434
+ n − bn − br
435
+ n − bn − br
436
+ 0
437
+ nb − n + br
438
+ nb − n + br
439
+ 0
440
+
441
+
442
+ satisfies R2(x) = R(x) and R(x) · R(y) = R(x · y) for all x, y ∈ A. Therefore, we
443
+ can define a Lie algebra structures on A given by [x, y] = x · R(y) − y · R(x).
444
+ 2. Construction of Jordan algebra from Commutative Associative
445
+ Algebras with a Endomorphism Operator
446
+ Jordan algebras were introduced in the early 1930’s by a physicist, P.Jordan,
447
+ in an attempt to generalize the formalism of quantum mechanics. Little appears
448
+ to have resulted in this direction, but unanticipated relationships between these
449
+ algebras and Lie groups and the foundations of geometry have been discovered.
450
+ Definition 2.0.1. A (non-commutative) Jordan algebra is a vector space J over
451
+ a field F of characteristic ̸= 2 with a binary operation ◦ satisfying for x, y ∈ J the
452
+ following identity:
453
+ (2.0.1)
454
+ (x ◦ y) ◦ x = x ◦ (y ◦ x)
455
+ and
456
+ ((x ◦ x) ◦ y) ◦ x = (x ◦ x) ◦ (y ◦ x).
457
+
458
+ 6
459
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
460
+ Remark 2.0.2. Given an associative algebra (A, ·) we can modify the product to
461
+ obtain a commutative algebra A+ as follows: To construct A+ we define x ∗ y =
462
+ x · y + y · x. In this new algebra the Jordan identity is satisfied
463
+ (2.0.2)
464
+ ((x ∗ x) ∗ y) ∗ x = (x ∗ x) ∗ (y ∗ x).
465
+ Example 2.0.3. We consider the subalgebra
466
+ A+ =
467
+
468
+
469
+
470
+
471
+
472
+ y
473
+ y
474
+ 0
475
+ n
476
+ n
477
+ 0
478
+ r
479
+ r
480
+ 0
481
+
482
+  : y, n, r ∈ R
483
+
484
+
485
+
486
+ under the product x ∗ y = x · y + y · x is a commutative algebra (non-associative),
487
+ where · is the usual matrix multiplication.
488
+ The element u =
489
+
490
+
491
+ 1
492
+ b
493
+ b
494
+ 0
495
+ 1 − b
496
+ −b
497
+ 0
498
+ b − 1
499
+ b
500
+
501
+  satisfies u2 = u,
502
+ x · u = x and u · x ∈ A+
503
+ for all x ∈ A+.
504
+ Then the linear map R : A+ −→ A+ defined by
505
+ R
506
+
507
+
508
+
509
+
510
+ y
511
+ y
512
+ 0
513
+ n
514
+ n
515
+ 0
516
+ r
517
+ r
518
+ 0
519
+
520
+
521
+
522
+  =
523
+
524
+
525
+ 1
526
+ b
527
+ b
528
+ 0
529
+ 1 − b
530
+ −b
531
+ 0
532
+ b − 1
533
+ b
534
+
535
+  ·
536
+
537
+
538
+ y
539
+ y
540
+ 0
541
+ n
542
+ n
543
+ 0
544
+ r
545
+ r
546
+ 0
547
+
548
+
549
+ =
550
+
551
+
552
+ y + bn + br
553
+ y + bn + br
554
+ 0
555
+ n − bn − br
556
+ n − bn − br
557
+ 0
558
+ nb − n + br
559
+ nb − n + br
560
+ 0
561
+
562
+
563
+ satisfies R2(x) = R(x) and R(x)∗R(y) = R(x∗y) for all x, y ∈ A+. Therefore the
564
+ Jordan identity is satisfied on A+, with the product given by x ◦ y = R(x) ∗ R(y).
565
+ Proposition 2.0.4. Suppose (A, ·) is a Jordan algebra, and R : A → A is a linear
566
+ map, such that
567
+ (2.0.3)
568
+ R2(x) = R(x) y R(x) · R(y) = R(x · y) for all x, y ∈ A.
569
+ Then we can define a new (non-commutative) Jordan algebra structures on A given
570
+ by
571
+ x ◦ y = R(x) · y
572
+ (respectively x ◦ y = x · R(y), x ◦ y = R(x) · R(y)).
573
+ Proof. Let A be a Jordan algebra and R : A → A is a linear map such that
574
+ R2(x) = R(x) y R(x) · R(y) = R(x · y) for all x, y ∈ A. So
575
+ (x ◦ x) ◦ (y ◦ x) = R(R(x) · x) ◦ (R(y) · x)
576
+ = (R(x) · R(x)) · (R(y) · x)
577
+ = ((R(x) · R(x)) · R(y)) · x
578
+ = ((R2(x) · R2(x)) · R(y)) · x
579
+ = R((R(x) · R(x)) · y) · x
580
+ = R((R2(x) · R(x)) · y) · x
581
+ = R(R(R(x) · x) · y) · x
582
+ = ((x ◦ x) ◦ y) ◦ x.
583
+
584
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
585
+ 7
586
+ This means that (x ◦ x) ◦ (y ◦ x) = ((x ◦ x) ◦ y) ◦ x for all x, y ∈ A. Since
587
+ (x ◦ y) ◦ x = R(R(x) · y) · x = (R(x) · R(y)) · x = R(x) · (R(y) · x) = x ◦ (y ◦ x).
588
+ So (x ◦ y) ◦ x = x ◦ (y ◦ x) for all x, y ∈ A. Therefore (A, ◦) is a Jordan algebra.
589
+
590
+ Example 2.0.5. The element u =
591
+
592
+
593
+ 1
594
+ −1
595
+ 1
596
+ 1
597
+ −1
598
+ 1
599
+ 1
600
+ −1
601
+ 1
602
+
603
+  satisfy: u2 = u and x · u = x for
604
+ all x ∈ A. The algebra of matrices
605
+ A =
606
+
607
+
608
+
609
+
610
+
611
+ x
612
+ −x
613
+ x
614
+ w
615
+ −w
616
+ w
617
+ p
618
+ −p
619
+ p
620
+
621
+  : x, w, p ∈ R
622
+
623
+
624
+  ,
625
+ is a associative algebra under the usual matrix multiplication. A is a commutative
626
+ algebra (non-associative) under the product x∗y = x·y +y ·x , where · is the usual
627
+ matrix multiplication. Then the linear map R : A −→ A defined by
628
+ R
629
+
630
+
631
+
632
+
633
+ x
634
+ −x
635
+ x
636
+ w
637
+ −w
638
+ w
639
+ p
640
+ −p
641
+ p
642
+
643
+
644
+
645
+  =
646
+
647
+
648
+ 1
649
+ −1
650
+ 1
651
+ 1
652
+ −1
653
+ 1
654
+ 1
655
+ −1
656
+ 1
657
+
658
+  ·
659
+
660
+
661
+ x
662
+ −x
663
+ x
664
+ w
665
+ −w
666
+ w
667
+ p
668
+ −p
669
+ p
670
+
671
+
672
+ =(x − w + p)
673
+
674
+
675
+ 1
676
+ −1
677
+ 1
678
+ 1
679
+ −1
680
+ 1
681
+ 1
682
+ −1
683
+ 1
684
+
685
+
686
+ satisfies R2(x) = R(x) and R(x) ∗ R(y) = R(x ∗ y) for all x, y ∈ A. Therefore, we
687
+ can define a Jordan algebra structures on A given by x ◦ y = R(x) ∗ R(y), and from
688
+ it we can define a new Jordan algebra structures on A given by x ◦2 y = R(x) ◦ y.
689
+ 3. Construction of (left) Leibniz algebra from Associative Algebras
690
+ with a Endomorphism Operator.
691
+ Leibniz algebras were first introduced by J.-L. Loday in [14] as a non-antisymmetric
692
+ version of Lie algebras, and many results of Lie algebras have been extended to
693
+ Leibniz algebras. Leibniz algebras play a significant role in different areas of math-
694
+ ematics and physics.
695
+ Definition 3.0.1. A (left) Leibniz algebra L is a vector space equipped with a
696
+ bilinear map
697
+ [ , ] : L × L → L
698
+ satisfying the (left) Leibniz identity
699
+ (3.0.1)
700
+ [x, [y, z]] = [[x, y], z] + [y, [x, z]]for all x, y, z ∈ L.
701
+ Remark 3.0.2. We may pass from the right to the left Leibniz algebra by considering
702
+ a new multiplication x ◦ y = [y, x]. For a Leibniz algebra L, we define left multi-
703
+ plication la : L → L by an element a on an element b by la(b) = [a, b]. Similarly,
704
+ right multiplication by an element a on an element b is defined by ra(b) = [b, a].
705
+ An algebra L over F is a left Leibniz algebra if for every x ∈ L the corresponding
706
+ operator lx of left multiplication is a derivation of L, i.e. the mapping lx satisfies
707
+
708
+ 8
709
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
710
+ lx(a · b) = lx(a) · b + a · lx(b), lx ∈ Der(L). Thus, left multiplication is a derivation
711
+ in a left Leibniz algebra while right multiplication is not necessarily a derivation.
712
+ Proposition 3.0.3. Let A be an associative algebra over a field F and let
713
+ R : A → A
714
+ be an endomorphism of A such that R2 = R. Define the binary operation [ , ] on
715
+ A by the following rule: [a, b] = R(a) · b − b · R(a) for all elements a, b ∈ A, Then,
716
+ with respect to the operations + and [ , ], A becomes a Leibniz algebra.
717
+ Proof. See [25].
718
+
719
+ Lemma 3.0.4. Let A be a associative algebra and let R : A → A be a linear map.
720
+ Suppose that R2(x) = R(x) y R(x) · R(y) = R(x · y)
721
+ for all x, y ∈ A. Then there
722
+ exists a Leibniz structures on A given by
723
+ (3.0.2)
724
+ [x, y] = R(x) · y − R(y) · R(x)
725
+ for all x, y ∈ A.
726
+ Proof. Let x, y, z ∈ A, then we have
727
+ [[x, y], z] = R([x, y]) · z − R(z) · R([x, y])
728
+ = R(R(x) · y − R(y) · R(x)) · z − R(z) · R(R(x) · y − R(y) · R(x))
729
+ = (R(x) · R(y) − R(y) · R(x)) · z − R(z) · (R(x) · R(y) − R(y) · R(x))
730
+ [y, [x, z]] = R(y) · [x, z] − R([x, z]) · R(y)
731
+ = R(y) · (R(x) · z − R(z) · R(x)) − R(R(x) · z − R(z) · R(x)) · R(y)
732
+ = R(y) · (R(x) · z − R(z) · R(x)) − (R(x) · R(z) − R(z) · R(x)) · R(y)
733
+ Then
734
+ [[x, y], z] + [y, [x, z]] = (R(x) · R(y) − R(y) · R(x)) · z − R(z) · (R(x) · R(y) − R(y) · R(x))
735
+ + R(y) · (R(x) · z − R(z) · R(x)) − (R(x) · R(z) − R(z) · R(x)) · R(y)
736
+ so
737
+ [[x, y], z] + [y, [x, z]] = (R(x) · R(y)) · z − (R(x) · R(z)) · R(y) − R(y) · (R(z) · R(x))
738
+ + R(z) · (R(y) · R(x))
739
+ On the other hand, we have
740
+ [x, [y, z]] = R(x) · [y, z] − R([y, z]) · R(x)
741
+ = R(x) · (R(y) · z − R(z) · R(y)) − R(R(y) · z − R(z) · R(y)) · R(x)
742
+ = R(x) · (R(y) · z − R(z) · R(y)) − (R(y) · R(z) − R(z) · R(y)) · R(x)
743
+ Note that R2(x) = R(x) y R(x) · R(y) = R(x · y) for all x, y ∈ A, implies
744
+ [x, [y, z]] = [[x, y], z] + [y, [x, z]] for all x, y, z ∈ A.
745
+
746
+ Example 3.0.5. The element u =
747
+
748
+
749
+ −1
750
+ 1
751
+ 1
752
+ −1
753
+ 1
754
+ 1
755
+ −1
756
+ 1
757
+ 1
758
+
759
+  satisfy: u2 = u and x · u = x for
760
+ all x ∈ A. The algebra of matrices
761
+ A =
762
+
763
+
764
+
765
+
766
+
767
+ −y
768
+ y
769
+ y
770
+ −m
771
+ m
772
+ m
773
+ −t
774
+ t
775
+ t
776
+
777
+  : y, m, t ∈ R
778
+
779
+
780
+  ,
781
+
782
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
783
+ 9
784
+ is a associative algebra under the usual matrix multiplication. Then the linear map
785
+ R : A −→ A defined by
786
+ R
787
+
788
+
789
+
790
+
791
+ −y
792
+ y
793
+ y
794
+ −m
795
+ m
796
+ m
797
+ −t
798
+ t
799
+ t
800
+
801
+
802
+
803
+  =
804
+
805
+
806
+ −1
807
+ 1
808
+ 1
809
+ −1
810
+ 1
811
+ 1
812
+ −1
813
+ 1
814
+ 1
815
+
816
+  ·
817
+
818
+
819
+ −y
820
+ y
821
+ y
822
+ −m
823
+ m
824
+ m
825
+ −t
826
+ t
827
+ t
828
+
829
+
830
+ = (−y + m + t)
831
+
832
+
833
+ −1
834
+ 1
835
+ 1
836
+ −1
837
+ 1
838
+ 1
839
+ −1
840
+ 1
841
+ 1
842
+
843
+
844
+ satisfies R2(x) = R(x) and R(x) · R(y) = R(x · y) for all x, y ∈ A. Therefore, we
845
+ can define a Leibniz structures structures on A given by
846
+ [x, y] = R(x) · y − R(y) · R(x)
847
+ 4. Construction of Pre-Lie algebra from Commutative Associative
848
+ Algebras with a Endomorphism Operator
849
+ In this section we present in the Propositions 4.0.3 a construction of Pre-Lie
850
+ algebra structure given by x◦y = R(x)·R(y)−y ·R(x) where R is a endomorphism
851
+ operator:
852
+ Definition 4.0.1. An algebra A over F with a bilinear product ◦ which satisfies
853
+ the following identity:
854
+ (4.0.1)
855
+ (x ◦ y) ◦ z − x ◦ (y ◦ z) = (y ◦ x) ◦ z − y ◦ (x ◦ z) for all x, y, z ∈ A
856
+ is called a Left Pre-Lie algebra.
857
+ Remark 4.0.2. There is a construction of pre-Lie algebras using a commutative
858
+ associative algebra (A, ·) with a derivation D on A, the new product a∗b = a·D(b),
859
+ ∀a, b ∈ A makes (A, ∗) become a Novikov algebra, Novikov algebra is a pre-Lie
860
+ algebra satisfying an additional identity: (xy)z = (xz)y, ∀x, y, z ∈ A. There are
861
+ some generalizations of the previous result for a commutative associative algebra
862
+ (A, ·). If D is a derivation on A , then the new product x ∗a y = x · D(y) + a · x · y,
863
+ ∀x, y ∈ A makes (A, ∗a) become a Novikov algebra for a fixed element a ∈ F or
864
+ a ∈ A ( [10, 28]). In the case of an associative algebra (A, ·) with a Rota-Baxter
865
+ relation of weight 1, it is known that if x ∗ y = R(x) · y − y · R(x) − x · y, ∀x, y ∈ A,
866
+ then the product ∗ defines a pre-Lie algebra on A. ( [9, 13] )
867
+ Proposition 4.0.3. Let A be a commutative associative algebra and let R : A → A
868
+ a linear map such that R2(x) = R(x) and R(x) · R(y) = R(x · y) for all x, y ∈ A.
869
+ Then we can define a Pre-Lie algebra structures on A given by
870
+ (4.0.2) x ◦ y = R(x) · R(y) − y · R(x) (respectively x ◦ y = R(x) · y − R(y) · R(x)).
871
+
872
+ 10
873
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
874
+ Proof. Let x, y, z ∈ A, then we have
875
+ (x ◦ y) ◦ z = (R(x) · R(y) − y · R(x)) ◦ z
876
+ = R(R(x) · R(y) − y · R(x)) · R(z) − z · R(R(x) · R(y) − y · R(x))
877
+ = (R(x) · R(y) − R(y) · R(x)) · R(z) − z · (R(x) · R(y) − R(y) · R(x))
878
+ = 0
879
+ x ◦ (y ◦ z) = x ◦ (R(y) · R(z) − z · R(y))
880
+ = R(x) · R(R(y) · R(z) − z · R(y)) − (R(y) · R(z) − z · R(y)) · R(x)
881
+ = R(x) · (R(y) · R(z) − R(z) · R(y)) − (R(y) · R(z) − z · R(y)) · R(x)
882
+ = −(R(y) · R(z) − z · R(y)) · R(x)
883
+ On the other hand, we have
884
+ (y ◦ x) ◦ z = (R(y) · R(x) − x · R(y)) ◦ z
885
+ = R(R(y) · R(x) − x · R(y)) · R(z) − z · R(R(y) · R(x) − x · R(y))
886
+ = (R(y) · R(x) − R(x) · R(y)) · R(z) − z · (R(y) · R(x) − R(x) · R(y))
887
+ = 0
888
+ y ◦ (x ◦ z) = y ◦ (R(x) · R(z) − z · R(x))
889
+ = R(y) · R(R(x) · R(z) − z · R(x)) − (R(x) · R(z) − z · R(x)) · R(y)
890
+ = R(y) · (R(x) · R(z) − R(z) · R(x)) − (R(x) · R(z) − z · R(x)) · R(y)
891
+ = −(R(x) · R(z) − z · R(x)) · R(y)
892
+ Therefore, (x ◦ y) ◦ z − x ◦ (y ◦ z) = (y ◦ x) ◦ z − y ◦ (x ◦ z).
893
+
894
+ 4.1. Examples of Pre-Lie algebras from commutative associative algebras
895
+ with the endomorphism operator. In this subsection we present in the example
896
+ 4.1.1 a commutative associative algebra A with an unusual matrix multiplication,
897
+ that allow us to give an example of Pre-lie algebras from a endomorphism operator
898
+ with certain properties on the algebra A.
899
+ Example 4.1.1. Let A be the vector space of all 2 × 2 matrices over R.
900
+ A =
901
+ ��
902
+ m
903
+ x
904
+ n
905
+ y
906
+
907
+ : m, n, x, y ∈ R
908
+
909
+ .
910
+ A is a commutative associative algebra with the unusual matrix multiplication
911
+ defined by:
912
+ (4.1.1)
913
+
914
+ m
915
+ x
916
+ n
917
+ y
918
+
919
+
920
+
921
+ p
922
+ z
923
+ r
924
+ w
925
+
926
+ =
927
+
928
+ mp
929
+ xz
930
+ nr
931
+ yw
932
+
933
+ .
934
+ The element I =
935
+ � 1
936
+ 1
937
+ 1
938
+ 1
939
+
940
+ is the multiplicative identity.
941
+ Example 4.1.2. The element u =
942
+ � 1
943
+ 0
944
+ 0
945
+ 0
946
+
947
+ with the usual matrix multiplication
948
+ satisfy: u2 = u, u · x ∈ A and x · u = x for all x ∈ A. The algebra of matrices
949
+ A =
950
+ �� m
951
+ 0
952
+ n
953
+ 0
954
+
955
+ : m, n ∈ R
956
+
957
+ ,
958
+
959
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
960
+ 11
961
+ is a commutative associative under the unusual matrix multiplication defined above
962
+ in 4.1.1. Then the linear map R : A −→ A defined by
963
+ R
964
+ �� m
965
+ 0
966
+ n
967
+ 0
968
+ ��
969
+ =
970
+ � 1
971
+ 0
972
+ 0
973
+ 0
974
+
975
+ ·
976
+ � m
977
+ 0
978
+ n
979
+ 0
980
+
981
+ =
982
+
983
+ m
984
+ 0
985
+ 0
986
+ 0
987
+
988
+ satisfies R2(x) = R(x) and R(x) ∗ R(y) = R(x ∗ y) for all x, y ∈ A. Therefore, we
989
+ can define a Pre-Lie algebra structures on A given by
990
+ x ◦ y = R(x) ∗ R(y) − y ∗ R(x)
991
+ 5. Construction of Pre-Lie algebra from Commutative Associative
992
+ Algebras with a Differential Operator
993
+ We now present in the Propositions 5.0.1 a construction of Pre-Lie algebra struc-
994
+ ture given by x◦y = R(x)·y where R is a differential operator, and we also introduce
995
+ the notion of left zero divisor on A: Let ( H, · ) be a set H with a binary operation
996
+ · on it, then an element u of H is called a left zero divisor on A ⊆ H if x · u = 0 for
997
+ all x in A.
998
+ Proposition 5.0.1. Let A be a commutative associative algebra and let R : A → A
999
+ a linear map such that R2(x) = α. x and R(x)·y+x·R(y) = R(x·y) for all x, y ∈ A.
1000
+ Then we can define a Pre-Lie algebra structures on A given by x ◦ y = R(x) · y.
1001
+ Proof. Let x, y, z ∈ A, then
1002
+ (x ◦ y) ◦ z − x ◦ (y ◦ z) = (R(x) · y) ◦ z − x ◦ (R(y) · z)
1003
+ = R(R(x) · y) · z − R(x) · (R(y) · z)
1004
+ = (R2(x) · y + R(x) · R(y)) · z − R(x) · (R(y) · z)
1005
+ = (R2(x) · y) · z
1006
+ = ((α. x) · y) · z.
1007
+ On the other hand, we have
1008
+ (y ◦ x) ◦ z − y ◦ (x ◦ z) = (R(y) · x) ◦ z − y ◦ (R(x) · z)
1009
+ = R(R(y) · x) · z − R(y) · (R(x) · z)
1010
+ = (R2(y) · x + R(y) · R(x)) · z − R(y) · (R(x) · z)
1011
+ = (R2(y) · x) · z
1012
+ = ((α. y) · x) · z.
1013
+ Therefore, (x ◦ y) ◦ z − x ◦ (y ◦ z) = (y ◦ x) ◦ z − y ◦ (x ◦ z)
1014
+
1015
+ 5.1. Examples of Pre-Lie algebras from commutative associative algebras
1016
+ with a Differential Operator.
1017
+ Proposition 5.1.1. Let ( A, · ) be an associative subalgebra of an algebra H, and
1018
+ suppose that there exists u ∈ H such that u · x ∈ A and x · u = 0 for all x ∈ A .
1019
+ Then the linear map R : A −→ A defined by R(x) = u · x satisfies
1020
+ (5.1.1)
1021
+ R(x) · y + x · R(y) = R(x · y) for all x, y ∈ A.
1022
+
1023
+ 12
1024
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
1025
+ Proof. Let x, y ∈ A, then
1026
+ R(x) · y + x · R(y) = (u · x) · y + x · (u · y)
1027
+ = u · (x · y) + (x · u) · y
1028
+ = u · (x · y) + (0 · y) = u · (x · y).
1029
+ On the other hand, R(x · y) = u · (x · y). Therefore R(x) · y + x · R(y) = R(x · y) for
1030
+ all x, y ∈ A.
1031
+
1032
+ Example 5.1.2. We consider the subalgebra
1033
+ A =
1034
+
1035
+
1036
+
1037
+
1038
+
1039
+ y
1040
+ y
1041
+ 0
1042
+ n
1043
+ n
1044
+ 0
1045
+ r
1046
+ r
1047
+ 0
1048
+
1049
+  : r, n, y ∈ R
1050
+
1051
+
1052
+
1053
+ under the usual matrix multiplication. The element u =
1054
+
1055
+
1056
+ a
1057
+ b
1058
+ c
1059
+ −a
1060
+ −b
1061
+ −c
1062
+ e
1063
+ f
1064
+ g
1065
+
1066
+  satis-
1067
+ fies x · u = 0 and u · x ∈ A for all x ∈ A.
1068
+ Then the linear map R : A −→ A defined by
1069
+ R
1070
+
1071
+
1072
+
1073
+
1074
+ y
1075
+ y
1076
+ 0
1077
+ n
1078
+ n
1079
+ 0
1080
+ r
1081
+ r
1082
+ 0
1083
+
1084
+
1085
+
1086
+  =
1087
+
1088
+
1089
+ a
1090
+ b
1091
+ c
1092
+ −a
1093
+ −b
1094
+ −c
1095
+ e
1096
+ f
1097
+ g
1098
+
1099
+  ·
1100
+
1101
+
1102
+ y
1103
+ y
1104
+ 0
1105
+ n
1106
+ n
1107
+ 0
1108
+ r
1109
+ r
1110
+ 0
1111
+
1112
+
1113
+ =
1114
+
1115
+
1116
+ ay + bn + cr
1117
+ ay + bn + cr
1118
+ 0
1119
+ −ay − bn − cr
1120
+ −ay − bn − cr
1121
+ 0
1122
+ ey + fn + gr
1123
+ ey + fn + gr
1124
+ 0
1125
+
1126
+
1127
+ satisfies R(x) · y + x · R(y) = R(x · y) for all x, y ∈ A.
1128
+ Example 5.1.3. The algebra of matrices
1129
+ A =
1130
+
1131
+
1132
+ α
1133
+
1134
+
1135
+ an
1136
+ ap
1137
+ aq
1138
+ bn
1139
+ bp
1140
+ bq
1141
+ n
1142
+ p
1143
+ q
1144
+
1145
+  : α ∈ R
1146
+
1147
+
1148
+
1149
+ where a = −βb and b, n, p, q ∈ R is a commutative associative algebra.
1150
+ The element u =
1151
+
1152
+
1153
+ a
1154
+ βa
1155
+ λβa
1156
+ b
1157
+ βb
1158
+ λβb
1159
+ 1
1160
+ β
1161
+ λβ
1162
+
1163
+  where λ, β ∈ R, satisfies
1164
+ u2 = (λβ)u,
1165
+ x · u = 0 (⇔ an + bp + q = 0) and u · x ∈ A for all x ∈ A.
1166
+ Then the linear map R : A −→ A defined by
1167
+ R
1168
+
1169
+
1170
+
1171
+
1172
+ an
1173
+ ap
1174
+ aq
1175
+ bn
1176
+ bp
1177
+ bq
1178
+ n
1179
+ p
1180
+ q
1181
+
1182
+
1183
+
1184
+  =
1185
+
1186
+
1187
+ a
1188
+ βa
1189
+ λβa
1190
+ b
1191
+ βb
1192
+ λβb
1193
+ 1
1194
+ β
1195
+ λβ
1196
+
1197
+  ·
1198
+
1199
+
1200
+ an
1201
+ ap
1202
+ aq
1203
+ bn
1204
+ bp
1205
+ bq
1206
+ n
1207
+ p
1208
+ q
1209
+
1210
+
1211
+ = (λβ)
1212
+
1213
+
1214
+ an
1215
+ ap
1216
+ aq
1217
+ bn
1218
+ bp
1219
+ bq
1220
+ n
1221
+ p
1222
+ q
1223
+
1224
+
1225
+ satisfies R2(x) = (λβ)R(x) and R(x) · y + x · R(y) = R(x · y) for all x, y ∈ A.
1226
+ Therefore, we can define a Pre-Lie algebra structures on A given by x◦y = R(x)·y.
1227
+
1228
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
1229
+ 13
1230
+ 6. Construction of flexible algebra from Associative Algebras with
1231
+ a left averaging operator.
1232
+ Definition 6.0.1. A flexible algebra is a vector space J over a field F of charac-
1233
+ teristic ̸= 2 with a binary operation ◦ satisfying for x, y ∈ J the following identity:
1234
+ (6.0.1)
1235
+ (x ◦ y) ◦ x = x ◦ (y ◦ x).
1236
+ Remark 6.0.2. The flexible algebras was initiated by Albert ([1]) and investigated
1237
+ by the authors Myung, Okubo, Laufer, Tomber and Santilli, see for example ([20]).
1238
+ Proposition 6.0.3. Suppose (A, ·) is a flexible algebra, and R : A → A is a linear
1239
+ map, such that
1240
+ (6.0.2)
1241
+ R(x) · R(y) = R(R(x) · y) = R(x · y) for all x, y ∈ A.
1242
+ Then we can define a new flexible algebra structures on A given by
1243
+ x ◦ y = R(x) · y.
1244
+ Proof. Let A be a flexible algebra and R : A → A is a linear map such that
1245
+ R(x) · R(y) = R(R(x) · y) = R(x · y) for all x, y ∈ A. So (x ◦ y) ◦ x = (R(x) · y) ◦ x =
1246
+ R(R(x) · y) · x = (R(x) · R(y)) · x. Since x ◦ (y ◦ x) = x ◦ (R(y) · x) = R(x) · (R(y) · x)
1247
+ and (A, ·) is a flexible algebra, then we have (x ◦ y) ◦ x = x ◦ (y ◦ x) for all x, y ∈ A.
1248
+ Therefore (A, ◦) is a flexible algebra.
1249
+
1250
+ 6.1. Examples of Flexible algebras from associative algebras with a left
1251
+ averaging operator.
1252
+ Proposition 6.1.1. Let ( A, · ) be an associative subalgebra of an algebra H. Sup-
1253
+ pose H has the following property:
1254
+ There exists u ∈ H, such that u · x ∈ A and x · u = u · x for all
1255
+ x ∈ A.
1256
+ Then the linear map R : A −→ A defined by R(a) = u ·x satisfies the left averaging
1257
+ identity
1258
+ (6.1.1)
1259
+ R(a) · R(b) = R(R(a) · b) for all a, b ∈ A.
1260
+ Furthemore, if u2 = u. Then
1261
+ (6.1.2)
1262
+ R(a) · R(b) = R(R(a) · b) = R(a · b) for all a, b ∈ A.
1263
+ Proof. Let x, y ∈ A, by the hypothesis there exists u ∈ H such that u · x ∈ A and
1264
+ x · u = u · x for all x ∈ A, then
1265
+ R(x) · R(y) = (u · x) · (u · y)
1266
+ = u · ((x · u) · y)
1267
+ = u · ((u · x) · y)
1268
+ = R(R(x) · y).
1269
+ If u2 = u, then R(x) · R(y) = u · ((u · x) · y) = u2 · (x · y) = u · (x · y) = R(x · y).
1270
+ Therefore R(x) · R(y) = R(R(x) · y) = R(x · y) for all x, y ∈ A.
1271
+
1272
+ Example 6.1.2. We consider the subalgebra
1273
+ A =
1274
+
1275
+
1276
+
1277
+
1278
+
1279
+ y
1280
+ n
1281
+ 0
1282
+ 0
1283
+ y
1284
+ 0
1285
+ 0
1286
+ 0
1287
+ r
1288
+
1289
+  : r, n, y ∈ R
1290
+
1291
+
1292
+
1293
+
1294
+ 14
1295
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
1296
+ under the usual matrix multiplication.
1297
+ The element u =
1298
+
1299
+
1300
+ 1
1301
+ 0
1302
+ 0
1303
+ 0
1304
+ 1
1305
+ 0
1306
+ 0
1307
+ 0
1308
+ 0
1309
+
1310
+  satisfies u2 = u, x · u = u · x and u · x ∈ A for
1311
+ all x ∈ A. Then the linear map R : A −→ A defined by
1312
+ R
1313
+
1314
+
1315
+
1316
+
1317
+ y
1318
+ n
1319
+ 0
1320
+ 0
1321
+ y
1322
+ 0
1323
+ 0
1324
+ 0
1325
+ r
1326
+
1327
+
1328
+
1329
+  =
1330
+
1331
+
1332
+ 1
1333
+ 0
1334
+ 0
1335
+ 0
1336
+ 1
1337
+ 0
1338
+ 0
1339
+ 0
1340
+ 0
1341
+
1342
+  ·
1343
+
1344
+
1345
+ y
1346
+ n
1347
+ 0
1348
+ 0
1349
+ y
1350
+ 0
1351
+ 0
1352
+ 0
1353
+ r
1354
+
1355
+  =
1356
+
1357
+
1358
+ y
1359
+ n
1360
+ 0
1361
+ 0
1362
+ y
1363
+ 0
1364
+ 0
1365
+ 0
1366
+ 0
1367
+
1368
+
1369
+ satisfies R(x) · R(y) = R(R(x) · y) = R(x · y) for all x, y ∈ A. We have A is a
1370
+ Lie algebra with the product [x, y] = x · R(y) − y · R(x) (see Proposition 1.1.3),
1371
+ Therefore (A, [, ]) is a flexive algebra.
1372
+ 7. Construction of Rota-Baxter Operator
1373
+ In this section we present in the Propositions 7.0.5 constructions of Rota-Baxter
1374
+ Operators of weight λ = 1 and λ = 0 from associative algebra with an element
1375
+ u skew-idempotent or nilpotent of index 2 respectively, and we also introduce the
1376
+ notion of Rota-Baxter Operator of weight (λ, β).
1377
+ We recall from the Introduction:
1378
+ Definition 7.0.1. Let (A, ·) be an associative algebra. A linear map R : A → A
1379
+ is called a Rota-Baxter operator of weight λ on A if R satisfies
1380
+ (7.0.1)
1381
+ R(x) · R(y) = R (R(x) · y + x · R(y) + λ x · y) ,
1382
+ for all x, y ∈ A. A Rota-Baxter algebra (also known as a Baxter algebra) is an
1383
+ associative algebra A with a Rota-Baxter operator.
1384
+ Remark 7.0.2. One importance of the Rota-Baxter Algebra is its close relationship
1385
+ with other algebraic structures. For example pre-Lie algebras come naturally from
1386
+ a Rota Baxter-Operator on an Lie Algebras. [12], [19] .
1387
+ Definition 7.0.3. An elemet u ̸= 0 of an algebra A is called nilpotent if un = 0
1388
+ for some integer n . The least such integer is called the index of u.
1389
+ Definition 7.0.4. An elemet u ̸= 0 of an algebra A is said to be skew-idempotent
1390
+ with respect to a product · in the algebra A if: u · u = −u.
1391
+ Proposition 7.0.5. Let ( A, · ) be an associative algebra and suppose that there
1392
+ exists u ∈ A such that u2 = −u and u · x ∈ A for all x ∈ A. Then the linear map
1393
+ R : A −→ A defined by R(x) = u · x satisfies
1394
+ (7.0.2)
1395
+ R ( R(x) · y + x · R(y) + x · y ) = R(x) · R(y) for all x, y ∈ A.
1396
+ Furthemore, if u2 = 0, then R is a Rota-Baxter operator of weight zero on A.
1397
+ Proof. Let x, y ∈ A, then we have R(x) · R(y) = (u · x) · (u · y). On the other hand,
1398
+ R(R(x) · y + x · R(y) + x · y) = R((u · x) · y + x · (u · y) + x · y)
1399
+ = u · ((u · x) · y + x · (u · y) + x · y)
1400
+ = u2 · (x · y) + (u · x) · (u · y) + u · (x · y)
1401
+ = (u2 + u) · (x · y) + (u · x) · (u · y).
1402
+
1403
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
1404
+ 15
1405
+ Therefore R(R(x)·y +x·R(y)+x·y) = R(x)·R(y) for all x, y ∈ A. Now, if u2 = 0,
1406
+ then
1407
+ R(R(x) · y + x · R(y)) = (u · x) · (u · y).
1408
+ Therefore R(R(x) · y + x · R(y)) = R(x) · R(y) for all x, y ∈ A.
1409
+
1410
+ Example 7.0.6. The element u =
1411
+ � xy
1412
+ −x2
1413
+ y2
1414
+ −xy
1415
+
1416
+ satisfies u2 = 0 and u · x ∈ A for
1417
+ all x in the algebra of matrices
1418
+ A =
1419
+ ��
1420
+ 0
1421
+ a
1422
+ 0
1423
+ b
1424
+
1425
+ : a, b ∈ R
1426
+
1427
+ considered as a subalgebra of B = M2×2 under the usual matrix multiplication. If
1428
+ we define the map R : A −→ A by
1429
+ R(
1430
+
1431
+ 0
1432
+ a
1433
+ 0
1434
+ b
1435
+
1436
+ ) =
1437
+
1438
+ xy
1439
+ −x2
1440
+ y2
1441
+ −xy
1442
+ � �
1443
+ 0
1444
+ a
1445
+ 0
1446
+ b
1447
+
1448
+ =
1449
+
1450
+ 0
1451
+ xya − x2b
1452
+ 0
1453
+ y2a − xyb
1454
+
1455
+ ,
1456
+ then R satisfies R(R(x) · y + y · R(x)) = R(x) · R(y); for all x, y ∈ A.
1457
+ Example 7.0.7. The element u =
1458
+
1459
+ x
1460
+ y
1461
+ −x2−x
1462
+ y
1463
+ −x − 1
1464
+
1465
+ , y ̸= 0 is an skew-idempotent
1466
+ in the algebra of matrices under the usual matrix multiplication, that is u2 = −u.
1467
+ We observe that u · x ∈ A for all x ∈ A. If we define the map R : A −→ A by
1468
+ R(
1469
+
1470
+ 0
1471
+ a
1472
+ 0
1473
+ b
1474
+
1475
+ ) =
1476
+
1477
+ x
1478
+ y
1479
+ −x2−x
1480
+ y
1481
+ −x − 1
1482
+ � �
1483
+ 0
1484
+ a
1485
+ 0
1486
+ b
1487
+
1488
+ =
1489
+
1490
+ 0
1491
+ xa + yb
1492
+ 0
1493
+ ( −x2−x
1494
+ y
1495
+ )a − (x + 1)b
1496
+
1497
+ then R satisfies R(x) · R(y) = R(R(x) · y + x · R(y) + x · y); for all x, y ∈ A.
1498
+ Definition 7.0.8. Let (A, ·) be an associative algebra. A linear map R : A → A
1499
+ is called a Rota-Baxter operador of weight (λ, β) on A if R satisfies
1500
+ (7.0.3)
1501
+ R(x) · R(y) = R
1502
+
1503
+ R(x) · y + x · R(y) + λ x · y
1504
+
1505
+ + β x · y, for all x, y ∈ A.
1506
+ Remark 7.0.9. A Rota-Baxter operador of weight (λ, β) for associative algebras
1507
+ allows to build examples of Dyckm-algebras [26], the main result of this section is
1508
+ the construction of Rota-Baxter operador of weight (λ, β) on associative algebras.
1509
+ Proposition 7.0.10. Let ( A, · ) be an associative algebra and suppose that there
1510
+ exists u ∈ A such that u2 = −λu − β1A and u · x ∈ A for all x ∈ A. Then the
1511
+ linear map R : A −→ A defined by R(x) = u · x satisfies
1512
+ (7.0.4)
1513
+ R ( R(x) · y + x · R(y) + λx · y ) + βx · y = R(x) · R(y) for all x, y ∈ A.
1514
+ Proof. Let x, y ∈ A, then we have
1515
+ R(R(x) · y + x · R(y) + λx · y) + βx · y = R((u · x) · y + x · (u · y) + λx · y) + βx · y
1516
+ = u · ((u · x) · y + x · (u · y) + λx · y) + βx · y
1517
+ = u2 · (x · y) + (u · x) · (u · y) + λu · (x · y) + βx · y
1518
+ = (u2 + λu + β1A) · (x · y) + (u · x) · (u · y)
1519
+ = (u · x) · (u · y)
1520
+ On the other hand, R(x) · R(y) = (u · x) · (u · y). Therefore
1521
+ R(R(x) · y + x · R(y) + λx · y) + βx · y = R(x) · R(y) for all x, y ∈ A
1522
+
1523
+ 16
1524
+ WILSON ARLEY MARTINEZ, SAMIN INGRITH CERON
1525
+
1526
+ Example 7.0.11. The element u =
1527
+
1528
+ x
1529
+ y
1530
+ −x2−λx−β
1531
+ y
1532
+ −x − λ
1533
+
1534
+ , where y ̸= 0 satisfy:
1535
+ u2 = −λu − β1A and u · x ∈ A for all x ∈ A. If we define the map R : A −→ A by
1536
+ R(
1537
+ � 0
1538
+ a
1539
+ 0
1540
+ b
1541
+
1542
+ ) =
1543
+
1544
+ x
1545
+ y
1546
+ −x2−λx−β
1547
+ y
1548
+ −x − λ
1549
+ � � 0
1550
+ a
1551
+ 0
1552
+ b
1553
+
1554
+ =
1555
+
1556
+ 0
1557
+ xa + yb
1558
+ 0
1559
+ ( −x2−λx−β
1560
+ y
1561
+ )a − (x + λ)b
1562
+
1563
+ then R satisfies R(x)·R(y) = R(R(x)·y + x·R(y)+ λx·y)+ βx·y; for all x, y ∈ A.
1564
+ Acknowledgment. We thank to Universidad del Cauca for the support to our
1565
+ research group “Estructuras Algebraicas, Divulgaci´on Matem´atica y Teor´ıas Aso-
1566
+ ciadas. @DiTa” under the research project with ID 5773, entitled ”Aplicaciones de
1567
+ Estructuras Algebraicas”. We also thank to the anonymous referee for their help-
1568
+ ful comments. This work is dedicated to my daughters especially to Clara Isabel
1569
+ Martinez Ceron (January 17, 2017).
1570
+ References
1571
+ 1. A.A. ALBERT, Power associative rings, Trans. Amer. math. Soc. 64 (1948), 552–597.
1572
+ 2. Huihui An and Chengming Bai, From rota–baxter algebras to pre-lie algebras, Journal of
1573
+ Physics A: Mathematical and Theoretical 41 (2008), no. 01.
1574
+ 3. G. Baxter, An analytic problem whose solution follows from a simple algebraic identity, Pacific
1575
+ J. Math. 10 (1960), 731–742.
1576
+ 4.
1577
+ , Baxter algebras and combinatorial identities I, Bull. Amer. Math. Soc. 5 (1969),
1578
+ 325–329.
1579
+ 5. G. BIRKHOFF, “moyennes des fonctions born´ees”, Colloque d’alg`ebre et de th´eorie des
1580
+ nombres 24, pp. 143-153, Paris, 1949.
1581
+ 6.
1582
+ , Averaging operators, Symposium in Lattice Theory, AMS 63 (1960).
1583
+ 7. Weili Cao, An algebraic study of averaging operators, arXiv:1401.7389v1 [math.RA] (2014).
1584
+ 8. A. Connes and D. Kreimer, Renormalization in quantum field theory and the riemann hilbert
1585
+ problem. i. the hopf algebra structure of graphs and the main theorem, Comm. Math. Phys.
1586
+ 210 (2000), no. 1. 249–273.
1587
+ 9. K. Ebrahimi-Fard, Loday-type algebras and the rota-baxter relation, Lett. Math. Phys. 61
1588
+ (2002), 139–147.
1589
+ 10. V.T. Filipov, A class of simple nonassociative algebras, Mat. Zametki 45 (1989), 101–105.
1590
+ 11. J.KAMP´E DE F´ERIET, Sur un probl´eme d’alg´ebre abstraite pos´e par la d´efinition de la
1591
+ moyenne dans la th´eorie de la turbulence, Ann. Soc. Sci. Bruxelles 63 (1949), 156–172.
1592
+ 12. V.V. Sokolov I.Z. Golubchik, Generalized operator yang-baxter equations, integrable odes and
1593
+ nonassociative algebras, J. Nonlinear Math. Phys. 7 (2000), no. 02, 184–197.
1594
+ 13. V.V. Sokolov I.Z. Golubschik, Generalized operator yang-baxter equations, integrable odes and
1595
+ nonassociative algebras, J. Nonlinear Math. Phys. 7 (2000), 184–197.
1596
+ 14. Loday J.-L., “une version non commutative des algebres de lie: les algebres de leibniz”, Les
1597
+ rencontres physiciens-math´ematiciens de Strasbourg 44 (1993), 127–151.
1598
+ 15. E. Kolchin, Differential algebraic groups, Academic Press, Inc., Orlando, FL, 1985. 2.
1599
+ 16. Ronghua Zhang Li Guo, William Y. Sit, Differential type operators and gr¨obner-shirshov
1600
+ bases, Journal of Symbolic Computation 52 (2013), 97–123.
1601
+ 17. J.-L. Loday and M. Ronco, Trialgebras and families of polytopes,, Preprint, math.AT/
1602
+ 0205043, mai 2002.
1603
+ 18. J.L. Loday, Dialgebras, in Dialgebras and related operads, Lecture Notes in Math., 1763
1604
+ (2001), 7–66.(preprint 2001, arXiv:math.QA/0102053).
1605
+
1606
+ CONSTRUCTION OF SOME NON-ASSOCIATIVE ALGEBRAS
1607
+ 17
1608
+ 19. A. Medina, Flat left-invariant connections adapted to the automorphism structure of a lie
1609
+ group, J. Differential Geometry 16 (1981), no. 03, 445–474.
1610
+ 20. H. C. MYUNG, Lie algebras and flexible lie-admissible algebras, Hadronic Press INC,
1611
+ Hadronic Press Monographs in Mathematics, 1, Massachusetts, 1982.
1612
+ 21. Nguyen-Huu-Bong, Some apparent connection between baxter and averaging operators, J.
1613
+ Math. Anal. Appl. 56 (1976), no. 02, 330–345.
1614
+ 22. G. Rota, Baxter operators, an introduction, in: “Gian-Carlo Rota on Combinatorics, Intro-
1615
+ ductory papers and commentaries”, Joseph P.S. Kung, Editor, Birkh¨auser, Boston, 1995.
1616
+ 23. G.-C. Rota and D. Smith, Fluctuation theory and Baxter algebras, Istituto Nazionale di Alta
1617
+ Matematica, IX, 179 (1972), Reprinted in: “Gian–Carlo Rota on
1618
+ Combinatorics : Intro-
1619
+ ductory papers and commentaries”, J.P.S. Kung Ed., Contemp. Mathematicians, Birkh¨auser
1620
+ Boston, Boston, MA, 1995.
1621
+ 24. M. van der Put and M. Singer, Galois theory of linear differential equations, Grundlehren der
1622
+ mathematischen Wissenschaften, 328, Springer, 2003. 2.
1623
+ 25. Aleksandr A. Pypka Vladimir V. Kirichenko, Leonid A. Kurdachenko and Igor Ya Subbotin.,
1624
+ Some aspects of leibniz algebra theory, Algebra and Discrete Mathematics 24 (2017), no. 1,
1625
+ 1–33.
1626
+ 26. E. G. Reyes W. A. Martinez and M. Ronco, Generalizing dendriform algebras:
1627
+ Dyckm-
1628
+ algebras, rotam-algebras, and rota–baxter operators, International Journal of Geometric Meth-
1629
+ ods in Modern Physics. 18 (2021), no. 11.
1630
+ 27. Dongping HOU Xiuxian LI and Chengming BAI, Rota-baxter operators on pre-lie algebras,
1631
+ Journal of Nonlinear Mathematical Physics 14 (2007), no. 2, 269–289.
1632
+ 28. X. Xu, On simple novikov algebras and their irreducible modules, J. Algebra 185 (1996),
1633
+ 905–934.
1634
+ 29.
1635
+ , New generalized simple lie algebras of cartan type over a field with characteristic
1636
+ zero, J. Algebra 224 (2000), 23–58.
1637
+ 30. D. Yau, Hom-algebras and homology, J. Lie Theory 19 (2009), no. 02, 409–421.
1638
+ Martinez, W.A.; Departmento de Matem´aticas, Universidad del Cauca , Popay´an ,
1639
+ Colombia
1640
+ Email address: wamartinez@unicauca.edu.co
1641
+ Ceron, S.I.; Departmento de Matem´aticas, Universidad del Cauca , Popay´an , Colom-
1642
+ bia
1643
+ Email address: sicbravo@gmail.com
1644
+
39FKT4oBgHgl3EQfRS0O/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
39FRT4oBgHgl3EQfozcR/content/tmp_files/2301.13610v1.pdf.txt ADDED
@@ -0,0 +1,1019 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13610v1 [gr-qc] 30 Jan 2023
2
+ Non-Singular Bouncing Model in Energy
3
+ Momentum Squared Gravity
4
+ Z. Yousaf1 ∗, M. Z. Bhatti1 †, H. Aman1 ‡, P.K. Sahoo2 §
5
+ 1Department of Mathematics, University of the Punjab,
6
+ Quaid-i-Azam Campus, Lahore-54590, Pakistan
7
+ 2Department of Mathematics,
8
+ Birla Institute of Technology and Science-Pilani,
9
+ Hyderabad Campus, Hyderabad-500078, India.
10
+ Abstract
11
+ This work is concerned to study the bouncing nature of the universe for an isotropic
12
+ configuration of fluid Tαβ and Friedmann-Lemaˆıtre-Robertson-Walker metric scheme.
13
+ This work is carried out under the novel f(G, TαβT αβ) gravitation by assuming a spe-
14
+ cific model i.e, f(G, T 2) = G + αG2 + 2λT 2 with α and λ are constants, serving as free
15
+ parameters. The terms G and T 2 served as an Gauss-Bonnet invariant and square of
16
+ the energy-momentum trace term as an inclusion in the gravitational action respec-
17
+ tively, and is proportional to T 2 = TαβT αβ. A specific functional form of the Hubble
18
+ parameter is taken to provide the evolution of cosmographic parameters. A well known
19
+ equation of state parameter, ω(t) = − k log(t+ǫ)
20
+ t
21
+ − 1 is used to represent the dynamical
22
+ behavior of energy density, matter pressure and energy conditions. A detailed graph-
23
+ ical analysis is also provided to review the bounce. Furthermore, all free parameters
24
+ are set in a way, to make the supposed Hubble parameter act as the bouncing solution
25
+ and ensure the viability of energy conditions. Conclusively, all necessary conditions for
26
+ a bouncing model are checked.
27
+ Keywords: cosmography; Hubble Parameter; f(G, TαβT αβ).
28
+ PACS: 98.80.-k; 04.20.Cv; 04.50.Kd.
29
+ ∗zeeshan.math@pu.edu.pk
30
+ †mzaeem.math@pu.edu.pk
31
+ ‡huzaifaaman971@gmail.com
32
+ §pksahoo@hyderabad.bits-pilani.ac.in
33
+ 1
34
+
35
+ 1
36
+ Introduction
37
+ According to the big bang hypothesis, the whole universe was created by a single explosion,
38
+ with all matter in the cosmos as an infinite speck [1, 2].
39
+ This hypothesis works well in
40
+ order to study the beginning, but lack to define different cosmological problems.
41
+ These
42
+ problems include the horizon problem, the flatness problem, the singularity problem, etc. In
43
+ order to resolve these big cosmic challenges, different cosmic theories have been developed
44
+ in literature [3–5]. The bouncing hypothesis is one of the major independent theories that
45
+ came up with the answers related to the starting of the universe and should be enough to
46
+ resolve the major cosmic problem of singularity.
47
+ The bouncing cosmology works on the
48
+ scheme of an oscillatory universe, i.e, a universe that came into being from the pre-existing
49
+ universe without undergoing the singularity [6–8]. This whole transition of the universe not
50
+ only explains the big-bang cosmology but also reduces one of the major issues.
51
+ For the
52
+ bouncing, the universe moves into the contraction phase as a matter-dominated the era of
53
+ the universe. After the contraction, the universe starts to expand in a nonsingular manner
54
+ for which gravity dominates the matter [9,10]. Also, density perturbations can be produced
55
+ during the bounce era. This idea of the origination of the universe is highly accepted and
56
+ appreciated in literature.
57
+ General relativity (GR) was presented by Einstein and it was thought to be one of the
58
+ best theories to explain different cosmological issues. It explains the gravity under the fabric
59
+ of space-time. However, to understand gravity much more effectively and to provide the
60
+ answers to the effect of gravity, dark energy, and accelerated expansion of the universe under
61
+ the addition of different scalar fields, different attempts have been made in past to modify
62
+ GR.
63
+ These modifications change the geometric or matter or both parts of the Einstein
64
+ field equations accordingly. These could help to discuss the effects of couplings of matter
65
+ and curvature terms on the above-described items. Roshan and Shojai [11] presented the
66
+ nonlinear form of matter term i.e, T 2 = TαβT αβ, naming it f(R, T ∈). They further indicated
67
+ that the use of nonlinear terms may provide the prevention of early time singularities. Since
68
+ the functional form of curvature terms has helped to introduce new gravitational theories, so
69
+ it was considered to be effective to modify the generic action integral of GR as corrections.
70
+ These modifications give light to the f(G) theory, for which the term G is defined as G =
71
+ RξζαβRξζαβ − 4RξζRξζ + R2. Nojiri and Odintsov [12] introduced this f(G) theory for the
72
+ first time in their work. They tested solar systems for this formalism and reported the phase
73
+ change of acceleration to deceleration for the achievement of phantom line, which cooperated
74
+ to study dark energy.
75
+ Odintsov and Oikonomou [13] considered R + f(G) form of the
76
+ gravitational theory to provide their contribution to the study of gravitational baryogenesis.
77
+ Their work included the higher-order derivatives of Gauss-Bonnet terms that work in order to
78
+ produce the baryon asymmetry. Sharif and Ikram [14] gives rise to a new theory by following
79
+ 2
80
+
81
+ the footsteps of Harko. They coupled the matter part T with the geometric part of the f(G)
82
+ theory, making it f(G, T ) cosmology. They investigated the validity of their theory with the
83
+ help of energy conditions. Later on, Bhatti et al. [15] worked on the f(G, T ) theory to carry
84
+ out the investigation of some physically feasible features of compact star formation. They
85
+ inferred that the compactness of a star model grows at the core whereas the energy conditions
86
+ remain constant. Yousaf and his mates [16] inspired by [17], have recently developed a novel
87
+ f(G, T 2) to present the complexity of structural scalars from the use of Herrera’s method
88
+ of splitting scalars. They considered the exponential coupling of Gauss-Bonnet terms as a
89
+ functional form as f(G, T 2) = αGn(βGm + 1) + ηT 2, to explore the validity of their solutions
90
+ for the Darmois and Israel conditions. They also worked on the non-static complex structures
91
+ under the same theory to describe the effects of an electromagnetic field. They used specific
92
+ model configuration i.e, f(G, T 2) = k1Gm(k2Gn + 1) + λT 2, in their work.
93
+ Bouncing cosmology has gained much reputation over the past few years, because of
94
+ its independent hypothetical nature from different standard comic problems.
95
+ Guth [18]
96
+ during 1980′s, had put forward his inflationary theory to tackle early and late time cosmic
97
+ evolutionary problems. He remained successful in solving some related problems, but the
98
+ answer to the initial singularity is still under concern. One of the best hypotheses to answer
99
+ the singularity problem is the bouncing nature of the universe. The nature of the bouncing
100
+ universe allows a certain universe model to transit from a pre-big crunch (contracted) phase
101
+ into a new big bang (expanded) phase with the exclusion of singularity during the whole event
102
+ [19]. Steinhardt and Ijjas [20] are considered to be the pioneers of the bouncing hypothesis.
103
+ They devised a wedge diagram for a smooth bouncing method to explore the consequences
104
+ of some cosmological problems. Sahoo et al. [21] worked on the non-singular bouncing by
105
+ assuming the specific coupling of R and T as f(R, T ) = R + χRT , for 0 < χ < π
106
+ 4. They
107
+ allowed such a parametric approach for the Hubble parameter to provide no singularity
108
+ during the bounce.
109
+ They used quintom and phantom scalar field configurations for the
110
+ bouncing paradigm. Bamba and his collaborators [22] inspected the singularity-free concept
111
+ of bounce by considering an exponential form of scale factor a(t) = σ exp(λt) + τ exp(λt)
112
+ under the effect of f(G) gravity. They checked the stability of their assumed solution under
113
+ the restricted parametric scheme.
114
+ Yousaf et al. [23, 24] explored the bouncing universe with a specific functional form of
115
+ Hubble parameter by taking exponential f(G, T ) form. Different cosmic models are under
116
+ consideration for the scale factor in order to determine the value of expansion and contraction
117
+ at the current cosmic phase and also to predict the current phase equation of state. These
118
+ models predicted different results in the literature. However, cosmography provided us a
119
+ benefit in processing cosmological data for explaining the universal kinematics without the
120
+ involvement of the gravity model and hence provided that the cosmography can be employed
121
+ with the Taylor expansions as an alternative scheme. Also, the cosmographic analysis for
122
+ 3
123
+
124
+ the FLRW universe, is helpful in such a way that it can put aside the effect of the dy-
125
+ namical field equations [25]. Gruber et al. [26] studied an alternative approach to describe
126
+ cosmography by extending the conventional methodology. They resulted from numerical
127
+ values of the cosmographic parameters by applying the Pad´e approximations. The testing
128
+ of the ΛCDM model had been conveyed by Busti et al. [27] with the use of cosmographical
129
+ analysis. Capozziello et al. provided cosmography as a non-predictive phenomenon when
130
+ the redshift parameter becomes z ≈ 1. They used the pad´e approximations for the fifth
131
+ order and resulted the divergence of data at the higher levels of the approximations. Lobo
132
+ et al. [28] evaluated the dynamics of the redshift drift. They used the expanding FLRW
133
+ universe to produce a general matter and low redshift model with the use of different vari-
134
+ ables. However, the cross-correlation of large-scale quasars can be used and translated with
135
+ the CMB and BAO scale data to produce the best for Hubble parameter H(z) and angular
136
+ diametric distance SA. Also, the cosmic chronometers approach can be done to predict the
137
+ model independent H(z) measurements which have been extensively used for cosmological
138
+ applications [29–31]. The low redshift data set with the inclusion of the megamasers and
139
+ chronometers had been presented by Krishnan and others [32]. They result that the Hubble
140
+ constant H0, showed descending behavior with the redshift and having non-zero slop when
141
+ fitted on the line by statistical means.
142
+ Font et al. [33] studied correlation technique for
143
+ quasars by using Lya absorption and produced the best line of fit for Planck’s data. They
144
+ generated different results on the measurements of the Hubble parameter and the angular
145
+ distance. One important thing is to develop such a cosmic Hubble parameter that comes
146
+ from early to late span in such a way that it changes from a low to a high value. The Gaus-
147
+ sian method helped to predict but provided a non-transitional behavior for both Λ and ω
148
+ epochs. The null energy condition also proved to be an important restriction for the cut-off
149
+ model, when compared with Hubble parameter data [34]. King et al. [35] studied the future
150
+ approximations of the redshift by the inclusion of dark energy. They tested the equation of
151
+ state by the linear parametrization technique. Hu et al. [34] reported different values of the
152
+ Hubble constant by the Gaussian method. Their research produced an effective reduction
153
+ in the Hubble crisis and proposed the non-transitional behavior of the Hubble constant.
154
+ Different dark energy models respective to holography and agegraphy had been conducted
155
+ by Zhang et al. [36]. They produced different energy conditions for different red shift values
156
+ and resulted in an effective role of energy conditions for different cosmic ages.
157
+ In this article, we implemented a functional form of the Hubble parameter that evolves
158
+ periodically with cosmic time t and investigate the bouncing nature of the universe in
159
+ f(G, TαβT αβ) gravity using a flat FLRW peacetime. This analysis of the bouncing uni-
160
+ verse involves one of the most important forms of EoS parameter proposed in the litera-
161
+ ture [37–39]. The outline is given as: Sect.2 provides a brief introduction to f(G, TαβT αβ)
162
+ gravity with the necessary formalism of FLRW metric and modified field equations. Sect.3
163
+ 4
164
+
165
+ builds the Hubble parameter as a bouncing solution for the produced field equations. The
166
+ cosmographic parameters are also evaluated in this section. We provide the mathematical
167
+ expressions of energy density and matter pressure for the assumed EoS parameter form in
168
+ Sect.4. The energy conditions are also formulated in the same fashion. Detailed graphical
169
+ profiles of energy conditions are represented in the same section to discuss the evolution
170
+ of the universe under the influence of restricted free parameters. Finally, the concluding
171
+ remarks are made in Sect.5.
172
+ 2
173
+ f(G, TαβT αβ) Formalism
174
+ The modified action for the f(G, TαβT αβ) gravity theory is defined as [16]
175
+ Af(G,TαβT αβ) =
176
+ √−g
177
+ 2κ2
178
+ ��
179
+ d4x[f(G, TαβT αβ) + R] +
180
+
181
+ d4xLm
182
+
183
+ ,
184
+ (1)
185
+ where R and G symbolize the Ricci scalar and the Gauss-Bonnet scalar terms, respectively
186
+ and are provided as
187
+ R ≡ gαβRαβ,
188
+ G ≡ RξζαβRξζαβ − 4RξζRξζ + R2,
189
+ (2)
190
+ and κ2 = 8πG (G be the gravitational constant) and Lm = −p. Also, the term g implies the
191
+ trace of the metric tensor gαβ with Tαβ, Rξζαβ and Rαβ indicate the stress energy-momentum
192
+ tensor, the Riemannian tensor, and the Ricci tensor respectively. The expression for Tαβ is
193
+ given as
194
+ Tαβ =
195
+ −2
196
+ √−g
197
+ δ(√−gLm)
198
+ δgαβ
199
+ .
200
+ (3)
201
+ Equation (3) yields the following expression, due the dependency of the matter Lagrangian
202
+ Lm on gαβ components
203
+ Tαβ = gαβLm − 2∂Lm
204
+ ∂gαβ .
205
+ (4)
206
+ Now, by taking the variation of Eq.(1) with respect to the term gαβ, we get the following
207
+ field equations for the f(G, TαβT αβ) theory as
208
+ Rαβ − 1
209
+ 2Rgαβ = T eff
210
+ αβ ,
211
+ (5)
212
+ where the term T eff
213
+ αβ takes the following form
214
+ T eff
215
+ αβ
216
+ =
217
+ κ2Tαβ − ΘαβfT 2(G, T 2) + 1
218
+ 2gαβf(G, T 2) − (2RRαβ − 4Rε
219
+ αRεβ − 4RαεβηRεη
220
+ 5
221
+
222
+ +2Rεηδ
223
+ α Rβεηδ)fG(G, T 2) − (2R∇2gαβ − 2R∇α∇β − 4Rαβ∇2 − 4gαβRεη∇ε∇η
224
+ +4Rε
225
+ α∇β∇ε + 4∇ε∇αRε
226
+ β + 4Rαεβη∇ε∇η)fG(G, T 2),
227
+ (6)
228
+ where,
229
+ Θαβ ≡ δ(TµνT µν)
230
+ δgαβ
231
+ = 2T ξ
232
+ α Tβξ − T Tαβ − 4T µν ∂2Lm
233
+ ∂gαβgµν − 2Lm(Tαβ − 1
234
+ 2T gαβ)
235
+ (7)
236
+ T 2 = TαβT αβ,
237
+ ∇2 = ∇α∇α
238
+ (8)
239
+ The terms fG(G, T 2) and fT 2(G, T 2) used above are defined as
240
+ fG(G, T 2) ≡ df(G, T 2)
241
+ dG
242
+ ,
243
+ and fT 2(G, T 2) ≡ df(G, T 2)
244
+ dT 2
245
+ .
246
+ (9)
247
+ The trace of the above-defined field equations is produced as
248
+ T − ΘfT 2(G, T 2) + 2GfG(G, T 2) − 2R∇2fG(G, T 2) + 4Rαβ∇α∇βfG(G, T 2) = 0.
249
+ (10)
250
+ Equation (10) shows the non-conversed situation of the stress energy-momentum tensor.
251
+ Also, the properties of GR can be recovered for f(G, T 2) = 0. Similarly if we put f(G, T 2) =
252
+ f(G), we get the properties of f(G) gravity.
253
+ Now, as we are concerned to study the bouncing nature of the universe, so we consider
254
+ the fluid distribution to be perfect throughout the cosmic evolution. For this, we take
255
+ Tαβ = (ρ + p)VαVβ − pgαβ,
256
+ (11)
257
+ here, the four-vector velocity is defined by V β with
258
+ V β = (1, 0, 0, 0),
259
+ V βVβ = 1 , V β∇ζVζ = 0.
260
+ (12)
261
+ In addition, ρ defines the energy density part and p defines the pressure part of the stress
262
+ energy-momentum tensor. Also the geometric background considered to be in a FLRW
263
+ space time [40], so it implies
264
+ ds2 = dt2 − a2(t)Σidx2
265
+ i ,
266
+ i = 1, 2, 3.
267
+ (13)
268
+ The metric component a(t) symbolizes the scale factor, that contributes to the Hubble
269
+ parameter as H =
270
+ ˙a(t)
271
+ a(t).
272
+ Using Eq.(13) and Eq.(7) in Eq.(5), we get the following field
273
+ equations
274
+ 6
275
+ � ˙a
276
+ a
277
+ �2
278
+ − 24
279
+ � ˙a
280
+ a
281
+ �3
282
+ ˙fG + 24
283
+ �¨a
284
+ a
285
+ � � ˙a
286
+ a
287
+ �2
288
+ fG − f − 2(ρ2 + 3p2 + 4ρp)fT 2 = 2ρκ2,
289
+ (14)
290
+ 6
291
+
292
+ − 2
293
+
294
+ 2¨a
295
+ a +
296
+ � ˙a
297
+ a
298
+ �2�
299
+ + 16
300
+ �¨a˙a
301
+ a2
302
+
303
+ ˙fG + 8
304
+ � ˙a
305
+ a
306
+ �2
307
+ ¨fG − 24
308
+ �¨a
309
+ a
310
+ � � ˙a
311
+ a
312
+ �2
313
+ fG + f = 2pκ2.
314
+ (15)
315
+ To draw the conclusions on the field equations, we just need some functional form of f(G, T 2).
316
+ As, there are many functional forms regarding the interaction of matter with the curvature
317
+ terms, in order to deal with the issues of cosmic evolution. Various coupling models can be
318
+ used to evaluate the formations of both energy density and matter pressure, like one can
319
+ take f(G, T 2) = G + 2f(T 2) that may help to provide an analysis about ΛCDM epoch.
320
+ However, the other choice is f(G, T 2) = f1(G) + f2(T 2) that may be worked as a correction
321
+ to f(G) gravity theory because of f2(T 2).
322
+ Similar forms have been explored in [41, 42]
323
+ and provided some distinct results due to the direct minimal curvature matter coupling.
324
+ Also, f(G, T 2) = f1(G) + f2(G)f3(T 2) can be taken because of an explicit non-minimally
325
+ coupling nature between geometric parameters and matter variables [43]. So, we considered
326
+ the following form to produce the validating results.
327
+ f(G, T 2) = f1(G) + f2(T 2).
328
+ (16)
329
+ To produce a bouncing universe, we need some functional forms of f1 and f2 that not only
330
+ describe the accelerating expansion of the universe but also explain inflation to a great
331
+ extent. For this, the higher power curvature terms perform well to eliminate such issues.
332
+ Elizalde [44] introduced the power forms of the curvature scalar as ηRn (n ≥ 1) and produced
333
+ the cosmological dynamics, so we consider the specific form of the f1 as the quadratic power
334
+ model, so
335
+ f1(G) = G + αG2.
336
+ (17)
337
+ Also, we take χ2 as
338
+ f2(T 2) = 2λT 2.
339
+ (18)
340
+ So, by using Eq.s (17) and (18) in the field equations, we get
341
+ 6H2 − 48αH3G ˙G + αG2 = 2κ2ρ + 6λρ2 + 18λp2 + 16λρp,
342
+ (19)
343
+ and
344
+ −2(2 ˙H + 3H2) + 32( ˙H + H2)αG ˙G + 16αH2( ˙G2 + G ¨G) − αG2 = 2κ2p − 2λρ2 − 6λp2.
345
+ (20)
346
+ In order to reduce the complexity of the Eq.(19) and Eq.(20), we utilize p = ωρ, as the EoS
347
+ used in [37–39]. So we get the relations,
348
+ (3λ + 9λω2 + 8λω)ρ2 + κ2ρ − (3H2 − 24αH3G ˙G + α
349
+ 2 G2) = 0
350
+ (21)
351
+ 7
352
+
353
+ and
354
+ (− λ
355
+ ω2 − 3λ)p2 + κ2p + ((2 ˙H + 3H2) − 16( ˙H + H2)αG ˙G − 8αH2( ˙G2 + G ¨G) + α
356
+ 2 G2) = 0. (22)
357
+ where, G = 24H2( ˙H + H2). Yousaf and his collaborators checked the stability of cosmic
358
+ models in various modified gravity theories [45–48].
359
+ 3
360
+ Hubble Parameter and Cosmography
361
+ This section mainly focuses on describing the evolutionary behavior of these above-described
362
+ dynamical terms. Hence, we consider a trigonometric form of the H(t) which feasibly provides
363
+ a bounce solution [44,49], as follows
364
+ H(t) = ζ sin(φt)h(t).
365
+ (23)
366
+ This parameterized form of H(t) includes ζ and φ, which are considered to be constants
367
+ here. The choice of h(t) depends on the periodic values of the function sin(φt), so the form
368
+ of h(t) can be chosen as periodic, that cooperates with the non-vanishing values of the above
369
+ trigonometric function. This artificial approach of choosing such an ansatz can be considered
370
+ as a numerical analysis of making the bouncing solution. One interesting feature is possessed
371
+ by the term ζ, which can work well as a phase changer for the value of H(t). We consider
372
+ h(t) as
373
+ h(t) = exp(ϕt),
374
+ (24)
375
+ where ϕ acts as a constant. Finally, we have
376
+ H(t) = ζ sin(φt) exp(ϕt).
377
+ (25)
378
+ This functional form of the Hubble parameter is helpful to study cosmic evolutionary expan-
379
+ sion and contraction. This form of the Hubble parameter gives us the bounce at t = 313,
380
+ depending upon the values of ϕ = 0.001 and φ = 0.01 provided in Fig.1.
381
+ We have re-
382
+ stricted the values of H(t) in the positive era of time. The basic scale factor form for this
383
+ parameterized Hubble parameter becomes
384
+ a(t) = exp
385
+ �ζ exp(ϕt)(ϕ sin(φt) − φ sin(φt))
386
+ ϕ2 + φ2
387
+
388
+ .
389
+ (26)
390
+ Similarly, the set of dynamical parameters that are derived from the Taylor series expansion
391
+ of the scale factor is termed as cosmographic factors. These factors helped to obtain the
392
+ 8
393
+
394
+ cosmological concordance with the assumptions of the universal homogeneity and isotropy
395
+ on large cosmic scales [27,50]. These include deceleration, jerk and snap parameters. These
396
+ factors allow us to check the compatibility of the scale factor and the Hubble parameter.
397
+ The negative value of the deceleration parameter q describes the accelerated expansion of
398
+ the universe. Similarly, jerk j and snap s determine the expansion rate of the toy universe
399
+ model. The mathematical interpretation for these cosmography elements are defined as
400
+ q = − 1
401
+ H2
402
+ 1
403
+ a
404
+ d2a
405
+ dt2 = −1 − 1
406
+ ζ (e−ϕt csc(φt)(φ cot(φt) + ϕ)),
407
+ (27)
408
+ j = 1
409
+ H3
410
+ 1
411
+ a
412
+ d3a
413
+ dt3
414
+ =
415
+ 1 + 1
416
+ ζ2(e−2ϕt csc(φt)(3ζeϕt(φ cot(φt) + ϕ)
417
+ + csc(φt)(2ϕφ cot(φt) + ϕ2 − φ2))),
418
+ (28)
419
+ and
420
+ s = 1
421
+ H4
422
+ 1
423
+ a
424
+ d4a
425
+ dt4 = −
426
+ 1
427
+ 3ζ(3ζeϕt + 2 csc(φt)(φ cot(φt) + ϕ))(2e−ϕt csc(φt)(csc(φt)
428
+ (3ζϕeϕt sin(φt) + ϕ2 − φ2) + φ cot(φt)(3ζeϕt + 2ϕ csc(φt)))).
429
+ (29)
430
+ Fig.1 shows the progression of the Hubble (left panel) and scale parameters (right panel)
431
+ along the positive time axis. Similarly, the development of jerk (left panel) and snap factors
432
+ (right panel) are provided in the fig.2. The evolution of the deceleration parameter towards
433
+ the negative value i.e, q → −1, before the bouncing point, provided in fig.6, shows the
434
+ accelerating universe.
435
+ 4
436
+ Energy Conditions under the EoS Parameter
437
+ For a specific cosmology model, energy conditions play an important role to make its val-
438
+ idation for the restricted free parameters. These energy conditions help to maintain the
439
+ specifications of the certain cosmic model [51–55]. Similarly, these energy conditions also
440
+ work for the bouncing cosmology and provide a reasonable approach to validate the proce-
441
+ dure for our toy bouncing model. These conditions are described as
442
+ • Dominant energy condition (DEC)⇔ ρ ≥ 0 , ρ ± p ≥ 0.
443
+ • Strong energy condition (SEC)⇔ ρ + 3p ≥ 0 , ρ + p ≥ 0.
444
+ • Weak energy condition (WEC)⇔ ρ ≥ 0 , ρ + p ≥ 0.
445
+ 9
446
+
447
+ H � 0
448
+ Bouncing
449
+ H �
450
+ H � 0
451
+ 300
452
+ 305
453
+ 310
454
+ 315
455
+ 320
456
+ 0.0
457
+ 0.2
458
+ 0.4
459
+ 0.6
460
+ 0.8
461
+ 1.0
462
+ t
463
+ a
464
+ a�t� � 0
465
+ 0
466
+ 50
467
+ 100
468
+ 150
469
+ 200
470
+ 250
471
+ 300
472
+ 350
473
+ �0.5
474
+ 0.0
475
+ 0.5
476
+ 1.0
477
+ 1.5
478
+ 2.0
479
+ t
480
+ a
481
+ Figure 1: The illustrations of Hubble parameter and scale factor with fixed values of ϕ =
482
+ 0.001 and φ = 0.01.
483
+ 280
484
+ 290
485
+ 300
486
+ 310
487
+ 320
488
+ 330
489
+ 340
490
+ �4
491
+ �2
492
+ 0
493
+ 2
494
+ 4
495
+ t
496
+ j
497
+ 300
498
+ 310
499
+ 320
500
+ 330
501
+ 340
502
+ �1.0
503
+ �0.5
504
+ 0.0
505
+ 0.5
506
+ 1.0
507
+ t
508
+ s
509
+ 0
510
+ 50
511
+ 100
512
+ 150
513
+ 200
514
+ 250
515
+ 300
516
+ 350
517
+ �1.0
518
+ �0.5
519
+ 0.0
520
+ 0.5
521
+ 1.0
522
+ t
523
+ s
524
+ Figure 2: The illustration of jerk and snap factors with fixed values of ϕ = 0.001 and
525
+ φ = 0.01.
526
+ 10
527
+
528
+ 6F
529
+ -=1
530
+ 2=0.8
531
+ ■=0.6
532
+ M5=0.4
533
+ ■2=0.2
534
+ 0
535
+ 100
536
+ 200
537
+ 300
538
+ 400
539
+ 500H
540
+ 量5=0.8
541
+ 拉2=0.6
542
+ 2=0.4
543
+ =0.2
544
+ 0
545
+ 100
546
+ 200
547
+ 300
548
+ 400
549
+ 500
550
+ 600
551
+ t• Null energy condition (N EC)⇔ ρ + p ≥ 0.
552
+ • Trace energy condition (T EC)⇔ ρ − 3p ≥ 0.
553
+ The positivity of DEC, SEC and WEC passes on the validity and necessity of the bouncing
554
+ concept. However, the violation of N EC has a major role. This violation is different in the
555
+ GR context. Universal bouncing scenario is one of those ideas that provides a chance to
556
+ discuss the singularity-free universal beginning. Many proposals in the literature suggested
557
+ avoiding this singularity through quantum aspects, but these don’t have such reliability to fit
558
+ in the gravitational theory. So, at this point gravitational theories allow a specific mechanism
559
+ to check the validity of the bounce model and as well its own. Null energy condition is one
560
+ such tool to help achieve the task. Also, it has been proved that in the context of GR, the
561
+ violation of N EC is extremely difficult to be achieved for local-field models. So, effective
562
+ field theories provide a chance to recognize the violation of the N EC and to allow a non-
563
+ singular bounce [56–59].
564
+ One such effective field is f(G, TαβT αβ) theory that provides a
565
+ chance to study the quadratic nature of the energy terms i.e, energy density and matter
566
+ pressure [16, 60].
567
+ However, it also allows getting a non-singular bounce for the assumed
568
+ gravity model form. For an excellent bouncing model, the value of H(t) turns out to be
569
+ ˙H = −4Gρπ(1 + ω) > 0 for the formulation of GR. However, if the N EC gets violated,
570
+ we have the surety to get a bouncing scenario. To provide the mathematical formulation
571
+ of the energy conditions, we consider Eqs.
572
+ (21) and (22).
573
+ Also, the EoS parameter in
574
+ the negative regime provides the present cosmic evolution [61–63] and becomes favorable in
575
+ the bouncing context with ω(t) ≈ −1. However, bouncing cosmology provides the possible
576
+ geodesic evolution of the universe by avoiding the singularity along with the resolution of the
577
+ horizon problem, flatness problem, entropy problem and many more [5]. For the modified
578
+ gravity, EoS parameter enables us to study the universal dynamics. In this study, we used
579
+ EoS parameter [44] to obtain the possible chance of obtaining a bounce solution in f(G, T 2)
580
+ as
581
+ ω(t) = −k log(t + ǫ)
582
+ t
583
+ − 1,
584
+ (30)
585
+ here k is assumed to be a constant. This particular form of the EoS parameters allows us to
586
+ study the contracting and expanding behavior without involving the Hubble parameter as
587
+ well as the scale factor. Elizalde et al. [44] produces cosmological dynamics by considering
588
+ R2 gravity and logarithmic trace terms. They checked the effects of the λ parameter in the
589
+ gravity model f(R, T ) = R+λR2+2β ln(T ) along with the bouncing solution depending on
590
+ the two EOS parameters. Our work first described the choice of Hubble parameter and its
591
+ effects on the dynamical field equations and then involves the EOS parameter. We only took
592
+ one of the ω(t) value, because this state factor after the bouncing point remains negative and
593
+ 11
594
+
595
+ becomes ω(t) ≈ −1. Also, the current cosmic expansion and Λ − CDM can be verified by
596
+ this state factor. However, the dynamic properties are greatly affected under the influence
597
+ of this EoS parameter form. Hence, the general forms of the Eqs.(21) and (22), under the
598
+ influence of Eq.30, are presented as
599
+ ρ
600
+ =
601
+
602
+ 1
603
+ 2λ(9ω2 + 8ω + 3)(κ2 + (κ4 − 12ζ2λ(9ω2 + 8ω + 3)e2ϕt sin2(φt)(2304αζ7e7ϕt sin4(φt)
604
+ (sin(φt)(ζeϕt sin(φt) + ϕ) + φ cos(φt))(4ζϕeϕt sin3(φt) + 2ζφeϕt sin(2φt) sin(φt)
605
+
606
+ (φ2 − 3ϕ2) sin2(φt) + 2φ2 cos2(φt) + 3ϕφ sin(2φt)) − 96αζ4e4ϕt sin2(φt)
607
+ (sin(φt)(ζeϕt sin(φt) + ϕ) + φ cos(φt))2 − 1))
608
+ 1
609
+ 2
610
+ (31)
611
+ p
612
+ =
613
+ 1
614
+ 2(3λω2 + λ)(κ2ω2 + (κ4ω4 + 4ζω2(3λω2 + λ)eϕt(18432αζ9e9tϕ(2ϕ(2ϕ + 1) − φ2)
615
+ sin10(tφt) + 4608αζ8e8tϕ(ϕ2(25ϕ + 22) − (13ϕ + 2)φ2) sin9(φt) + 9216αζ7φ3e7ϕt
616
+ sin5(φt) cos3(φt)(7ζeϕt sin(φt)10ϕ + 8) + 288αζ7e7ϕt(144ϕ4 + 320ϕ3 − 16(9ϕ + 4)
617
+ ϕφ2 − 1) sin8(φt) + 576αζ6φ4e6ϕt sin4(2φt)(ζeϕt + 2 csc(φt)) + 576αζ6ϕe6ϕt
618
+ (48ϕ3 − 16ϕφ2 − 1) sin7(φt) − 96αζ5ϕ(3ϕ − 8)e5ϕt sin6(φt) + 192αζ4e4ϕt(3ϕ2 − φ2)
619
+ sin5(φt) + 2 sin(φt)(5760αζ6ϕφ3e6ϕt sin3(2φt) + 48αζ4φ2e4ϕt sin2(2φt) − ϕ) + 288α
620
+ ζ5φ2e5ϕt sin4(φt) cos2(φt)(192ζ4e4ϕt sin4(φt) + 32ζ3(31ϕ + 10)e3ϕt sin3(φt)
621
+ +16ζ2e2ϕt(ϕ(45ϕ + 56) − 7φ2) sin2(φt) + 32ζeϕt(17ϕ2 − φ2) sin(φt) − 1) − 2φ cos(φt)
622
+ (−18432αζ9(4ϕ + 1)e9ϕt sin9(φt) − 2304αζ8e8ϕt(ϕ(75ϕ + 44) − 11φ2) sin8(φt) − 9216αζ7
623
+ e7ϕt(3ϕ2(3ϕ + 5) − (4ϕ + 1)φ2) sin7(φt) − 288αζ6e6ϕt(192ϕ3 − 32ϕφ2 − 1)
624
+ sin6(φt) + 96αζ5(3ϕ − 4)e5ϕt sin5(φt) − 576αζ4ϕe4ϕt sin4(φt) + 1)
625
+ −3ζeϕt sin2(φt)))
626
+ 1
627
+ 2
628
+ (32)
629
+ Now, the profiles of energy density and pressure under the presence of Eq.(30), are provided
630
+ in fig.3. The plots indicate that the energy density suffers a positive behavior for the assumed
631
+ values of free parameters. Similarly, the negative behavior for the pressure term indicates
632
+ that the universe is in the accelerated expansion phase. However, the positive density proves a
633
+ strong validation for the verification of the energy conditions. Also, one can get the positive
634
+ and alternate trends of the both terms for different time periods due to the oscillatory
635
+ behavior of the assumed Hubble parameter. We restrict our work for the positive density
636
+ and negative pressure behavior to ascertain the energy conditions. The evolutionary profiles
637
+ of the energy conditions are provided in the figs. 4 and 5. The N EC plot shows the violation
638
+ with in the bouncing regime and confirms the major verification for the universe to attain
639
+ 12
640
+
641
+ Ζ
642
+ t
643
+ Ρ
644
+ Ζ
645
+ t
646
+ p
647
+ Figure 3: The illustration of energy density and matter pressure with fixed values of α =
648
+ 0.005, k = 0.5, ϕ = 0.001, ǫ = 0.001, φ = 0.01, κ = 1 and λ = −0.005.
649
+ a bounce with in the framework of FLRW spacetime. The violated WEC and SEC are
650
+ given in the left plots of the figs. 3 and 4. The violated SEC also maintains the recent
651
+ observations for the accelerating universe [52]. One important energy condition i.e, T EC has
652
+ also been given in this recent study. The positive profiles for the DEC and T EC are given
653
+ in the fig.5. The evolution of these energy conditions is strictly dependent on the values
654
+ of the free parameters used in this study. However, one can get another configuration of
655
+ these physical factors by implementing the different free parameters. The evolution of EoS
656
+ parameter is provided in fig.6 to encounter the negative value i.e, ω(t) ≈ −1, for the current
657
+ expansion phase of the universe.
658
+ 5
659
+ Discussions
660
+ This work involves the study of bouncing cosmology for an isotropic configuration of fluid
661
+ Tαβ and FLRW metric. We comprehend this work under f(G, TαβT αβ) theory of gravitation
662
+ by assuming a specific model i.e, f(G, T 2) = G + αG2 + 2λT 2 with α and λ are constants,
663
+ serving as free parameters. This is the first-ever attempt to cover bouncing cosmology in
664
+ the f(G, TαβT αβ) theory. By the consideration of a specific functional form of the Hubble
665
+ parameter, we discuss the evolution of cosmographic parameters.
666
+ The assumption of a
667
+ well-known equation of state (EoS) parameter, ω(t) = −k log(t+ǫ)
668
+ t
669
+ − 1, is used as a direct
670
+ implementation to represent the dynamical behavior of energy density, matter pressure, and
671
+ energy conditions. The free parameters are restricted to the special values provided in each
672
+ 13
673
+
674
+ -51
675
+ 52
676
+ 1.0
677
+ 53
678
+ 54
679
+ 54
680
+ 100
681
+ 200
682
+ 300
683
+ 20.048
684
+ 46
685
+ 44
686
+ 1.0
687
+ 42
688
+ 20.5
689
+ 40
690
+ 100
691
+ 38
692
+ 200
693
+ 300
694
+ 0.0Ρ � p
695
+ t
696
+ Ζ
697
+ Ρ � 3 p
698
+ t
699
+ Ζ
700
+ Figure 4: The illustration of N EC and SEC with fixed values of α = 0.005, k = 0.5,
701
+ ϕ = 0.001, ǫ = 0.001, φ = 0.01, κ = 1 and λ = −0.005.
702
+ Ρ � p
703
+ Ζ
704
+ t
705
+ Ρ � 3 p
706
+ t
707
+ Ζ
708
+ Figure 5: The illustration of DEC and T EC with fixed values of α = 0.005, k = 0.5,
709
+ ϕ = 0.001, ǫ = 0.001, φ = 0.01, κ = 1 and λ = −0.005.
710
+ 14
711
+
712
+ 204
713
+ 202
714
+ 305
715
+ 1.0
716
+ 200
717
+ 2005
718
+ 195
719
+ 198
720
+ 70.5
721
+ 100
722
+ 196
723
+ 200
724
+ 300
725
+ 0.098
726
+ 96-
727
+ 96
728
+ 94
729
+ 100
730
+ 200
731
+ 300
732
+ 30.0105
733
+ -110
734
+ 110
735
+ 1.0
736
+ 115
737
+ 120
738
+ 120
739
+ 100
740
+ 125
741
+ 200
742
+ 300
743
+ 0.01.0
744
+ 10
745
+ 0.5
746
+ -15
747
+ 100
748
+ 200
749
+ 00
750
+ 0.00
751
+ 50
752
+ 100
753
+ 150
754
+ 200
755
+ 250
756
+ 300
757
+ 350
758
+ �2.0
759
+ �1.5
760
+ �1.0
761
+ �0.5
762
+ 0.0
763
+ t
764
+
765
+ 290
766
+ 300
767
+ 310
768
+ 320
769
+ 330
770
+ �10
771
+ �5
772
+ 0
773
+ 5
774
+ 10
775
+ t
776
+ q
777
+ 0
778
+ 50
779
+ 100
780
+ 150
781
+ 200
782
+ 250
783
+ 300
784
+ 350
785
+ �10
786
+ �5
787
+ 0
788
+ 5
789
+ 10
790
+ t
791
+ q
792
+ Figure 6: The illustration of EoS and deceleration parameters with fixed values of k = 0.5
793
+ and ǫ = 0.001.
794
+ graph plot and are used for H(t) to act as the bouncing solution. The viability of energy
795
+ conditions is studied with the help of a graphical approach. Following are the concluding
796
+ remarks for this present work.
797
+ • The Hubble parameter H(t) used in this study is considered to have a trigonomet-
798
+ ric functional form. The evolutionary behavior of different cosmographic factors is
799
+ described under the same form of H(t). This parameterized form of H(t) depends
800
+ on the periodic values of the function sin(φt) and h(t). We considered this h(t) as
801
+ a nonvanishing function for the periodic values of sin(φt). A perfect bouncing model
802
+ allows the Hubble parameter to show the contraction phase i.e, H < 0, and when the
803
+ universe expands it becomes H > 0. During this expansion and contraction phase,
804
+ there is the point in between, at where H(t) becomes zero. So, in order to produce
805
+ such a scenario, we have arranged the constants (φ and ϕ) in the Hubble parameter
806
+ (H(t) = ζ sin(φt) exp(ϕt)) to some specific values and notice the bounce at t = 313.
807
+ However, t = 313 is significant in such a way that all the energy conditions necessary
808
+ for the bounce, get satisfied accordingly till t = 313, depending on the values of φ
809
+ and ϕ. One can also produce other values of t for bounce by restricting other values
810
+ of φ and ϕ. The plot of H(t) is given in fig.1. The Hubble parameter gives us the
811
+ bounce at t = 313 which is the future singularity in the scale factor, see fig.1. The
812
+ mathematical forms of deceleration, jerk, and snap are evaluated with the same H(t).
813
+ The deceleration parameter tends to have a negative trend i.e, q(t) approaches −1,
814
+ which can be seen in fig.6. Similarly, the trends of jerk and snaps are given in fig.2
815
+ with j(t) approaches to 1 and s(t) approaches to 0. All these values show a deflection
816
+ 15
817
+
818
+ at the bouncing point, that fits in for the bouncing universe.
819
+ • We ensure the configuration of the bouncing cosmology by studying energy conditions.
820
+ These energy conditions are provided in terms of energy density and matter pressure
821
+ derived from the modified field equations. We assumed a specific EoS parameter in the
822
+ form ω(t) = −k log(t+ǫ)
823
+ t
824
+ − 1. This EoS parameter helped to maintain the positive and
825
+ negative growth of energy density and matter pressure for the limited bouncing time
826
+ period. The profiles of ρ and p are provided in the fig.3. However, the mathematical
827
+ expression for these terms is evaluated in Eqs.(31) and (32).
828
+ • Under the restricted values of the free parameters, α = 0.005, k = 0.5, ϕ = 0.001,
829
+ ǫ = 0.001, φ = 0.01, κ = 1 and λ = −0.005, we get the violation of the N EC and SEC.
830
+ The violated N EC derives the bouncing nature of the universe. However, the violated
831
+ SEC and WEC provide the phase of cosmic expansion. suitable with the observational
832
+ data. The left plots of figs.3 and 4 shows the violated SEC and WEC. Similarly, the
833
+ positive behavior of DEC and T EC assure that the assumed model configuration is
834
+ valid. Figure 5 represents the illustration of DEC and T EC. Also, the evolution of EoS
835
+ can be seen in fig.6, showing that ω(t) → −1. This value of ω(t) favors the current
836
+ accelerated expansion phase of the universe [61–63].
837
+ • The above discussion provides that the bouncing evolution of the universe, studied in
838
+ the framework of f(G, T 2) = G + αG2 + 2λT 2 and agrees with the recent astronomical
839
+ observations [64, 65] i.e, all the energy conditions are fully satisfied, a great negative
840
+ pressure behavior had been observed and provided help to study the late time acceler-
841
+ ated universe [44]. However, this study can be used in the future for different models
842
+ of the scale factors and Hubble parameters.
843
+ • We finally conclude that the bouncing evolution of the universe can be studied effec-
844
+ tively with the oscillating nature of the scale factor under the flat FLRW regime.
845
+ References
846
+ [1] C. J. Hogan, The little book of the big bang: A cosmic primer. Springer Science &
847
+ Business Media, 1998.
848
+ [2] A. H. Guth, “Eternal inflation,” Ann. N. Y. Acad. Sci., vol. 950, no. 1, pp. 66–82, 2001.
849
+ 16
850
+
851
+ [3] T. Padmanabhan and T. R. Seshadri, “Does inflation solve the horizon problem?,”
852
+ Class. Quantum Gravity, vol. 5, no. 1, p. 221, 1988.
853
+ [4] J. Earman and J. Mosterin, “A critical look at inflationary cosmology,” Philos. Sci.,
854
+ vol. 66, no. 1, pp. 1–49, 1999.
855
+ [5] A. Ijjas and P. J. Steinhardt, “Bouncing cosmology made simple,” Class. Quantum
856
+ Grav., vol. 35, no. 13, p. 135004, 2018.
857
+ [6] E. Alesci, G. Botta, F. Cianfrani, and S. Liberati, “Cosmological singularity resolution
858
+ from quantum gravity: The emergent-bouncing universe,” Phys. Rev. D, vol. 96, no. 4,
859
+ p. 046008, 2017.
860
+ [7] P. Das, S. Pan, S. Ghosh, and P. Pal, “Cosmological time crystal: Cyclic universe with
861
+ a small cosmological constant in a toy model approach,” Phys. Rev. D, vol. 98, no. 2,
862
+ p. 024004, 2018.
863
+ [8] J. Mielczarek, M. Kamionka, A. Kurek, and M. Szyd�lowski, “Observational hints on the
864
+ big bounce,” J. Cosmol. Astropart. Phys., vol. 2010, no. 07, p. 004, 2010.
865
+ [9] Y.-F. Cai, R. Brandenberger, and P. Peter, “Anisotropy in a non-singular bounce,”
866
+ Class. Quantum Gravity, vol. 30, no. 7, p. 075019, 2013.
867
+ [10] Y.-F. Cai and X. Zhang, “Evolution of metric perturbations in a model of nonsingular
868
+ inflationary cosmology,” J. Cosmol. Astropart., vol. 2009, no. 06, p. 003, 2009.
869
+ [11] M. Roshan and F. Shojai, “Energy-momentum squared gravity,” Phys. Rev. D, vol. 94,
870
+ no. 4, p. 044002, 2016.
871
+ [12] S. Nojiri and S. D. Odintsov, “Modified Gauss–Bonnet theory as gravitational alterna-
872
+ tive for dark energy,” Phys. Lett. B, vol. 631, no. 1-2, pp. 1–6, 2005.
873
+ [13] A. V. Astashenok, S. D. Odintsov, and V. K. Oikonomou, “Modified gauss–bonnet
874
+ gravity with the lagrange multiplier constraint as mimetic theory,” Class. Quantum
875
+ Gravity, vol. 32, no. 18, p. 185007, 2015.
876
+ [14] M. Sharif and A. Ikram, “Energy conditions in f (G, T) gravity,” Eur. Phys. J. C .,
877
+ vol. 76, no. 11, pp. 1–13, 2016.
878
+ [15] M. Z. Bhatti, M. Y. Khlopov, Z. Yousaf, and S. Khan, “Electromagnetic field and
879
+ complexity of relativistic fluids in f (G) gravity,” Mon. Not. Roy. Astron. Soc., vol. 506,
880
+ pp. 4543–4560, 2021.
881
+ 17
882
+
883
+ [16] Z. Yousaf, M. Z. Bhatti, S. Khan, and P. K. Sahoo, “f (G, TαβTαβ) theory and complex
884
+ cosmological structures,” Phys. Dark Universe, p. 101015, 2022.
885
+ [17] N. Katırcı and M. Kavuk, “f(R, TµνT µν) gravity and cardassian-like expansion as one
886
+ of its consequences,” Eur. Phys. J. Plus, vol. 129, no. 8, pp. 1–12, 2014.
887
+ [18] A. H. Guth, “Eternal inflation and its implications,” J. Phys. A, vol. 40, no. 25, p. 6811,
888
+ 2007.
889
+ [19] P. J. Steinhardt and N. Turok, “Cosmic evolution in a cyclic universe,” Phys. Rev. D,
890
+ vol. 65, p. 126003, 2002.
891
+ [20] A. Ijjas and P. J. Steinhardt, “Fully stable cosmological solutions with a non-singular
892
+ classical bounce,” Phys. Lett. B, vol. 764, pp. 289–294, 2017.
893
+ [21] S. Bhattacharjee and P. K. Sahoo, “Comprehensive analysis of a non-singular bounce
894
+ in f (R, T) gravitation,” Phys. Dark Universe, vol. 28, p. 100537, 2020.
895
+ [22] K. Bamba, A. N. Makarenko, A. N. Myagky, and S. D. Odintsov, “Bouncing cosmology
896
+ in modified gauss–bonnet gravity,” Phys. Lett. B, vol. 732, pp. 349–355, 2014.
897
+ [23] Z. Yousaf, M. Z. Bhatti, and H. Aman, “Cosmic bounce with α(e−βG−1)+2λ T model,”
898
+ Phys. Scr., vol. 97, no. 5, p. 055306, 2022.
899
+ [24] Z. Yousaf, M. Z. Bhatti, and H. Aman, “The bouncing cosmic behavior with logarithmic
900
+ law f(G, T) model,” Chin. J. Phys., vol. 79, pp. 275–286, 2022.
901
+ [25] M. Visser, “Jerk, snap and the cosmological equation of state,” Class. Quantum Gravity,
902
+ vol. 21, no. 11, p. 2603, 2004.
903
+ [26] C. Gruber and O. Luongo, “Cosmographic analysis of the equation of state of the
904
+ universe through pad´e approximations,” Phys. Rev. D, vol. 89, no. 10, p. 103506, 2014.
905
+ [27] V. C. Busti, A. de la Cruz-Dombriz, P. K. Dunsby, and D. Saez-Gomez, “Is cosmography
906
+ a useful tool for testing cosmology?,” Phys. Rev. D, vol. 92, no. 12, p. 123512, 2015.
907
+ [28] F. S. N. Lobo, J. P. Mimoso, J. Santiago, and M. Visser, “Dynamical analysis of the
908
+ redshift drift in f l r w universes,” 2022.
909
+ [29] Moresco et al., “A 6% measurement of the hubble parameter at z 0.45: direct evidence
910
+ of the epoch of cosmic re-acceleration,” J. Cosmol. Astropart. Phys., vol. 2016, no. 05,
911
+ p. 014, 2016.
912
+ 18
913
+
914
+ [30] J. P. Hu, F. Y. Wang, and Z. G. Dai, “Measuring cosmological parameters with
915
+ a luminosity-time correlation of gamma-ray bursts,” Mon. Not. Roy. Astron. Soc.,
916
+ vol. 507, no. 1, pp. 730–742, 2021.
917
+ [31] F. Y. Wang, J. P. Hu, G. Q. Zhang, and Z. G. Dai, “Standardized long gamma-ray
918
+ bursts as a cosmic distance indicator,” Astrophys. J., vol. 924, no. 2, p. 97, 2022.
919
+ [32] Krishnan et al., “Is there an early universe solution to hubble tension?,” Phys. Rev. D,
920
+ vol. 102, no. 10, p. 103525, 2020.
921
+ [33] Font-Riberan et al., “Quasar-lyman α forest cross-correlation from boss dr11: Baryon
922
+ acoustic oscillations,” J. Cosmol. Astropart. Phys., vol. 2014, no. 05, p. 027, 2014.
923
+ [34] J.-P. Hu and F.-Y. Wang, “Revealing the late-time transition of ho: relieve the hubble
924
+ crisis,” Mon. Not. Royal Astron. Soc., vol. 517, no. 1, pp. 576–581, 2022.
925
+ [35] A. L. King, T. M. Davis, K. D. Denney, M. Vestergaard, and D. Watson, “High-redshift
926
+ standard candles: predicted cosmological constraints,” Mon. Not. Roy. Astron. Soc.,
927
+ vol. 441, no. 4, pp. 3454–3476, 2014.
928
+ [36] M.-J. Zhang, C. Ma, Z.-S. Zhang, Z.-X. Zhai, and T.-J. Zhang, “Cosmological con-
929
+ straints on holographic dark energy models under the energy conditions,” Phys. Rev.
930
+ D, vol. 88, no. 6, p. 063534, 2013.
931
+ [37] E. Babichev, V. Dokuchaev, and Y. Eroshenko, “Dark energy cosmology with general-
932
+ ized linear equation of state,” Class. Quantum Grav., vol. 22, no. 1, p. 143, 2004.
933
+ [38] J. Haro and E. Elizalde, “Gravitational particle production in bouncing cosmologies,”
934
+ J. Cosmol. Astropart. Phys., vol. 2015, no. 10, p. 028, 2015.
935
+ [39] A. P. Bacalhau, N. Pinto-Neto, and S. D. P. Vitenti, “Consistent scalar and tensor
936
+ perturbation power spectra in single fluid matter bounce with dark energy era,” Phys.
937
+ Rev. D, vol. 97, no. 8, p. 083517, 2018.
938
+ [40] F. Melia, “The Friedmann–Lemaˆıtre–Robertson–Walker metric,” Mod. Phys. Lett. A,
939
+ vol. 37, no. 03, p. 2250016, 2022.
940
+ [41] Z. Yousaf, K. Bamba, and M. Z. Bhatti, “Causes of irregular energy density in f(R, T)
941
+ gravity,” Phys. Rev. D, vol. 93, p. 124048, 2016.
942
+ [42] M. F. Shamir, “Bouncing universe in f (G, T) gravity,” Phys. Dark Universe, vol. 32,
943
+ p. 100794, 2021.
944
+ 19
945
+
946
+ [43] S. Nojiri, S. D. Odintsov, and V. K. Oikonomou, “Modified gravity theories on a nut-
947
+ shell: inflation, bounce and late-time evolution,” Phys. Rep., vol. 692, pp. 1–104, 2017.
948
+ [44] E. Elizalde, N. Godani, and G. C. Samanta, “Cosmological dynamics in R2 gravity with
949
+ logarithmic trace term,” Phys. Dark Universe, vol. 30, p. 100618, 2020.
950
+ [45] M. Sharif and Z. Yousaf, “Instability of meridional axial system in f(R) gravity,” Eur.
951
+ Phys. J. C, vol. 75, p. 194, 2015.
952
+ [46] M. Z. Bhatti, Z. Yousaf, and M. Ilyas, “Existence of wormhole solutions and energy
953
+ conditions in f (R,T) gravity,” J. Astrophys. Astron., vol. 39, p. 69, 2018.
954
+ [47] Z. Yousaf, “Definition of complexity factor for self-gravitating systems in Palatini f(R)
955
+ gravity,” Phys. Scr., vol. 95, p. 075307, 2020.
956
+ [48] M.
957
+ M.
958
+ M.
959
+ Nasir,
960
+ M.
961
+ Z.
962
+ Bhatti,
963
+ and
964
+ Z.
965
+ Yousaf,
966
+ “Influence
967
+ of
968
+ EMSG
969
+ on
970
+ complex systems:
971
+ Spherically symmetric,
972
+ static case,”
973
+ Int. J. Mod. Phys. D,
974
+ p. 10.1142/S0218271823500098.
975
+ [49] M. F. Shamir, “Bouncing cosmology in gravity with logarithmic trace term,” Adv. As-
976
+ tron., vol. 2021, p. 8852581, 2021.
977
+ [50] J. P. Hu and F. Y. Wang, “High-redshift cosmography: Application and comparison
978
+ with different methods,” Astron. Astrophys., vol. 661, p. A71, 2022.
979
+ [51] S. W. Hawking and G. F. R. Ellis, The large scale structure of space-time, vol. 1.
980
+ Cambridge university press, 1973.
981
+ [52] M. Visser, “Energy conditions in the epoch of galaxy formation,” Science, vol. 276,
982
+ no. 5309, pp. 88–90, 1997.
983
+ [53] S. Nojiri and S. D. Odintsov, “Effective equation of state and energy conditions in
984
+ phantom/tachyon inflationary cosmology perturbed by quantum effects,” Phys. Lett.
985
+ B, vol. 571, no. 1-2, pp. 1–10, 2003.
986
+ [54] O. Bertolami and M. C. Sequeira, “Energy conditions and stability in f (R) theories of
987
+ gravity with nonminimal coupling to matter,” Phys. Rev. D, vol. 79, no. 10, p. 104010,
988
+ 2009.
989
+ [55] L. Balart and E. C. Vagenas, “Regular black hole metrics and the weak energy condi-
990
+ tion,” Phys. Lett. B, vol. 730, pp. 14–17, 2014.
991
+ 20
992
+
993
+ [56] Larson et al., “Seven-year wilkinson microwave anisotropy probe (WMAP*) obser-
994
+ vations: power spectra and WMAP-derived parameters,” Astrophys. J., Suppl. Ser,
995
+ vol. 192, no. 2, p. 16, 2011.
996
+ [57] R. R. Caldwell, “A phantom menace?
997
+ cosmological consequences of a dark energy
998
+ component with super-negative equation of state,” Phys. Lett. B, vol. 545, no. 1-2,
999
+ pp. 23–29, 2002.
1000
+ [58] U. Alam, V. Sahni, T. Deep Saini, and A. A. Starobinsky, “Is there supernova evidence
1001
+ for dark energy metamorphosis?,” Mon. Not. Roy. Astron. Soc., vol. 354, no. 1, pp. 275–
1002
+ 291, 2004.
1003
+ [59] V. K. Onemli and R. P. Woodard, “Quantum effects can render w < −1 on cosmological
1004
+ scales,” Phys. Rev. D, vol. 70, no. 10, p. 107301, 2004.
1005
+ [60] Z. Yousaf, M. Z. Bhatti, and S. Khan, “Non-static charged complex structures in
1006
+ f(G, TαβT αβ) gravity,” Eur. Phys. J. Plus, vol. 137, no. 3, pp. 1–19, 2022.
1007
+ [61] J. Hogan, “Unseen universe: Welcome to the dark side,” Nature, vol. 448, no. 7151,
1008
+ pp. 240–246, 2007.
1009
+ [62] Corasaniti et al., “Foundations of observing dark energy dynamics with the wilkinson
1010
+ microwave anisotropy probe,” Phys. Rev. D, vol. 70, no. 8, p. 083006, 2004.
1011
+ [63] J. Weller and A. M. Lewis, “Large-scale cosmic microwave background anisotropies and
1012
+ dark energy,” Mon. Not. R. Astron. Soc, vol. 346, no. 3, pp. 987–993, 2003.
1013
+ [64] S. Carloni, P. K. Dunsby, S. Capozziello, and A. Troisi, “Cosmological dynamics of rn
1014
+ gravity,” Class. Quantum Gravity, vol. 22, no. 22, p. 4839, 2005.
1015
+ [65] S. Fay, R. Tavakol, and S. Tsujikawa, “f(R) gravity theories in Palatini formalism:
1016
+ Cosmological dynamics and observational constraints,” Phys. Rev. D, vol. 75, no. 6,
1017
+ p. 063509, 2007.
1018
+ 21
1019
+
39FRT4oBgHgl3EQfozcR/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4tFAT4oBgHgl3EQfFByL/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6871b1844bc90cb05a3e9f8d22eefd3b86c7e3f8bb090f6a5360e48b419b072f
3
+ size 1179693
89E3T4oBgHgl3EQfSAmG/content/tmp_files/2301.04428v1.pdf.txt ADDED
@@ -0,0 +1,1133 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04428v1 [math.QA] 11 Jan 2023
2
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF
3
+ THE JORDAN PLANE
4
+ K. A. BROWN AND J. T. STAFFORD
5
+ Abstract. The Hopf algebra D which is the subject of this paper can be
6
+ viewed as a Drinfeld double of the bosonisation of the Jordan plane. Its prime
7
+ and primitive spectra are completely determined. As a corollary of this anal-
8
+ ysis it is shown that D satisfies the Dixmier-Moeglin Equivalence, leading to
9
+ the formulation of a conjecture on the validity of this equivalence for pointed
10
+ Noetherian Hopf algebras.
11
+ 1. Introduction
12
+ 1.1. Throughout, k will denote an algebraically closed field of characteristic 0.
13
+ The Hopf k-algebra D of the title was defined and some initial properties were
14
+ derived in [2], with further results in [1, 3]. Our focus here is on the prime and
15
+ primitive spectra of D, which we completely determine. The Hopf algebra D is a
16
+ pointed affine noetherian domain of Gelfand-Kirillov dimension 6 whose definition
17
+ is recalled in §2.1. It is a beautiful algebra with a number of striking properties
18
+ which make it worthy of study from several perspectives, three of which we briefly
19
+ outline in §§1.3-1.5. First we summarise our results and explain where they are
20
+ located.
21
+ 1.2. Results. It was proved in [1, Theorem 4.10], and explained in detail here
22
+ in Lemma 2.1 and Theorem 2.2(iv), that the centre Z(D) of D is generated by
23
+ elements z, ω and θ with zθ = ω2. Thus Maxspec(Z(D)) has one singular point,
24
+ namely m0 := ⟨z, ω, θ⟩. There is one other distinctive maximal ideal of the centre,
25
+ namely
26
+ m+ := Z(D) ∩ D+ = ⟨z − 16, ω + 16, θ − 16⟩,
27
+ where D+ is the augmentation ideal of D. Finally, let K denote the kernel of the
28
+ Hopf algebra surjection π : D −→ U(sl(2, k)), mentioned in §1.3, so K is a Hopf
29
+ ideal which is described in Theorem 2.2(i),(ii).
30
+ The main results of this paper are given by the following theorems and give a
31
+ complete description of the prime and primitive ideals of D.
32
+ Theorem 1.1. Retain the above notation. The primitive ideals of D are:
33
+ (I) the maximal ideals mD for m ∈ Maxspec(Z(D)), with m ̸= m0, m+;
34
+ (II) the primitive ideals containing m+D, namely m+D itself together with
35
+ P := π−1(Privspec(U(sl(2, k))));
36
+ 2010 Mathematics Subject Classification. Primary 16T05, 16D25; Secondary 16T20, 16S40,
37
+ 17B37.
38
+ Both authors are partially supported by Leverhulme Emeritus Fellowships, respectively EM-
39
+ 2017-081 and EM-2019-015. The first author thanks Nicolas Andruskiewitsch, Ivan Angiono and
40
+ Hector Pena Pollastri for helpful comments and for sharing early versions of their work.
41
+ 1
42
+
43
+ 2
44
+ K. A. BROWN AND J. T. STAFFORD
45
+ (III) the unique prime ideal P0 containing m0D, which has m0D = (P0)2 ⊊ P0.
46
+ Theorem 1.2. In the above notation, the non-primitive prime ideals of D are:
47
+ (A) {0}, K;
48
+ (B) the principal prime ideals pD for every height one prime p of Z(D) except
49
+ p1 = ⟨z, ω⟩ and p2 = ⟨θ, ω⟩;
50
+ (C) height one primes P1, P2, with piD = P 2
51
+ i ⊊ Pi for i = 1, 2, with each Pi
52
+ generated by a normal (but not central) element. Moreover, P1 + P2 = P0.
53
+ Theorem 1.3. Retain the above notation.
54
+ (a) Every non-primitive prime is completely prime.
55
+ Every primitive ideal is
56
+ completely prime, except the co-Artinian maximal ideals (other than the
57
+ counit), which form a subset of P.
58
+ (b) Every prime ideal P, apart from the co-Artinian maximal ideals and (pos-
59
+ sibly) P0, has D/P birationally equivalent to a Weyl algebra An(K), where
60
+ 1 ≤ n ≤ 2 and K is a field of transcendence degree at most 2 over k.
61
+ (c) D satisfies the Dixmier-Moeglin Equivalence.
62
+ Theorem 1.1 is proved in Section 4, see in particular Subsection 4.5, while Theo-
63
+ rem 1.2 is proved in Theorem 5.3. Finally, Theorem 1.3 is proved in Subsection 5.2.
64
+ Some questions and a conjecture (Conjecture 5.5) are scattered through the paper.
65
+ 1.2. Hopf algebras in duality. The full Drinfeld double D(H) = H ⊲⊳ H◦ of an
66
+ infinite dimensional Hopf algebra H may often be unwieldy due to H having “too
67
+ many” finite dimensional representations and thus leading to an unmanageably
68
+ large finite dual H◦. This has generated significant recent interest in constructing
69
+ doubles D(H) := H ⊲⊳ H′ where H′ is some suitable Hopf subalgebra of H◦; see
70
+ for example [9, 20] and the papers listed in §1.1. Much is at present unclear: for
71
+ example, what is an appropriate definition of a “suitable” Hopf subalgebra H′; and
72
+ does a suitable algebra H′ always exist? The double D of the Jordan plane is a test
73
+ case for these and other questions. In particular, some of the desirable properties
74
+ exhibited by D may form a paradigm for what one might aim for in defining doubles
75
+ in more general settings.
76
+ 1.3. Representation theory. A striking feature of the representation theory of
77
+ D is the fact, proved in [1, Theorem 3.11] and recalled here in Theorem 2.2(iii), that
78
+ U(sl(2, k)) is a quotient Hopf algebra of D and the finite dimensional irreducible D-
79
+ modules are precisely the finite dimensional irreducible U(sl(2, k))-modules. This
80
+ immediately suggests a plethora of questions, some of which are addressed in [3],
81
+ where Verma D-modules are introduced. But many others remain untouched: for
82
+ instance, what can be said about the category of locally finite dimensional D-
83
+ modules, and for each primitive ideal P of D can one find a canonical irreducible
84
+ module (hopefully a factor of a Verma module) whose annihilator equals P? The
85
+ first step in these questions is to classify the primitive ideals of D, as we do here.
86
+ 1.4.
87
+ Dixmier-Moeglin equivalence.
88
+ The validity of the Dixmier-Moeglin
89
+ Equivalence for an algebra R yields simultaneous representation-theoretic, alge-
90
+ braic and topological characterisations of the primitive ideals amongst the prime
91
+ ideals of R. This equivalence is a feature of some but not all Hopf k-algebras; see,
92
+ for example, [5,6] for discussions of when it holds for a noetherian (Hopf) algebra.
93
+ As we prove in Theorem 1.2, D satisfies the equivalence. See §5.2 for the details,
94
+
95
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
96
+ 3
97
+ where we also give a rather ambitious Conjecture 5.5, proposing a general result
98
+ encompassing all affine Noetherian pointed Hopf C-algebras.
99
+ Notation. Throughout, all vector spaces and all unadorned tensor products are
100
+ understood to be over the base field k. We denote the comultiplication of a Hopf
101
+ algebra H by ∆ and its augmentation ideal by H+. The Gelfand-Kirillov, or GK
102
+ dimension of an object X is denoted by GKdim(X), while the global (homological)
103
+ dimension, respectively injective dimension of a ring R is denoted by gldim(R),
104
+ respectively injdim(R). For precision, we specify that in the Ore extension T =
105
+ S[v; σ, ∂], multiplication is defined by
106
+ (1.1)
107
+ vs = sσv + ∂(s)
108
+ for s ∈ S.
109
+ It follows that ∂ is a σ-derivation in the sense that ∂(ab) = aσ∂(b) + ∂(a)b. This
110
+ follows the conventions of, for example, [17, p.34].
111
+ 2. Preliminaries
112
+ 2.1. Definitions and notation. The following definitions and notation from [1])
113
+ will remain in play throughout the paper. First, the Jordan plane is
114
+ J := k⟨x, y : [y, x] = − 1
115
+ 2x2⟩,
116
+ with bosonization
117
+ H := J#C∞ = J#⟨g±1⟩, where gxg−1 = x, gyg−1 = y + x.
118
+ Then the Drinfeld double of J is defined to be D := H⟨u, v, ζ⟩, with additional
119
+ relations as follows:
120
+ [u, v] = 1
121
+ 2u2; [ζ, v] = −v; [ζ, u] = −u; [u, y] = 1 − g;
122
+ [v, x] = 1 − g + xu; [v, y] = yu − gζ; [v, g] = gu; [ζ, y] = y; [ζ, x] = x;
123
+ [x, u] = [x, g] = [u, g] = [ζ, g] = 0.
124
+ The coalgebra structure, which will mostly not concern us here, is determined for
125
+ H by specifying that g is grouplike and x and y are (g, 1)−primitive; and then
126
+ extended to D by setting u and ζ to be primitive and ∆(v) = v ⊗ 1 + 1 ⊗ v + ζ ⊗ u.
127
+ Observe that K := k⟨u, v, ζ⟩ is a Hopf subalgebra of D and in fact, as one can
128
+ see from the PBW theorem for D as described in [2, Proposition 2.3(ii)], D =
129
+ J ⊗k K as vector spaces. As noted in [2, Lemma 2.2] there is a non-degenerate
130
+ skew pairing between J and K which yields the multiplication relations between
131
+ these subalgebras as in [14].
132
+ 2.2. Initial results. We gather together in Theorem 2.2 some of the main results
133
+ of [2] and [1]. We must first define some elements of D, as follows. Set
134
+ (2.1)
135
+ q := ux + 2(1 + g),
136
+ and s := xv + uy + (−1
137
+ 2ux + g − 1)ζ − 2(g + 1).
138
+ The following lemma is partly explicit, partly implicit, in [1, §4]. Given a k-algebra
139
+ automorphism σ of a k-algebra H, we say that the element h of H is σ-normal if
140
+ ha = σ(a)h for all a ∈ H.
141
+ Lemma 2.1. Keep the above notation.
142
+
143
+ 4
144
+ K. A. BROWN AND J. T. STAFFORD
145
+ (i) q and s are both σ-normal, where σ is the automorphism of D defined by
146
+ σ(y) = y + 1
147
+ 2x, σ(v) = v − 1
148
+ 2u,
149
+ with σ acting as the identity on the other generators of D.
150
+ (ii) σ2 equals conjugation by g on D; that is, σ2(h) = ghg−1 for all h ∈ D.
151
+ (iii) The elements z := q2g−1, θ := s2g−1 and ω := qsg−1 are in the centre
152
+ Z(D) of D.
153
+ Proof. (i) and (ii) are easy checks, and (iii) is immediate from (i) and (ii).
154
+
155
+ Theorem 2.2. Retain the notation introduced above.
156
+ (i) [2, Proposition 2.7(i)] O(G) := k⟨x, u, g±1⟩ is a normal commutative Hopf
157
+ subalgebra of D, with G = ((k, +) × (k, +)) ⋊ (k∗, ×).
158
+ (ii) [2, Proposition 2.7(ii)] DO(G)+ is a Hopf ideal of D, with an isomorphism
159
+ of Hopf algebras
160
+ (2.2)
161
+ D/DO(G)+ ∼= U(sl2(k)).
162
+ (iii) [1, Theorem 3.11] The finite dimensional irreducible D-modules are the finite
163
+ dimensional irreducible U(sl2(k))-modules given by the epimorphism (2.2).
164
+ (iv) [1, Theorem 4.10] With the notation from Lemma 2.1, the centre of D is
165
+ (2.3)
166
+ Z(D) = k⟨z, ω, θ : zθ = ω2⟩,
167
+ (v) [1, Remark 2.2] D is pointed.
168
+
169
+ We’ll need the following labelling of the maximal ideals of Z(D). Note that here
170
+ there are two maximal ideals of Z(D) which require particular attention.
171
+ Notation 2.3. (i) By Theorem 2.2((iv), Maxspec(Z(D)) consists of
172
+ {m(α,γ) := ⟨z −α2γ−1, ω −α, θ −γ⟩ : α ∈ k, γ ∈ k∗} ˙∪ {mβ := ⟨z −β, ω, θ⟩ : β ∈ k}.
173
+ Note that m(α,γ) can be simplified to m(α,γ) = ⟨ω − α, θ − γ⟩, while mβ = ⟨z − β, ω⟩
174
+ when β ̸= 0.
175
+ (ii) It is easy to calculate using the definition of the counit that
176
+ D+ ∩ Z(D) = O(G)+D ∩ Z(D) = m(−16,16).
177
+ We thus denote m(−16,16) by m+.
178
+ (iii) It is clear that the singular locus of Z(D) is {m0}.
179
+ 3. Ring-theoretic preparations
180
+ In this section we assemble some properties needed in the analysis of the primitive
181
+ spectrum of D. The proofs are most easily approached by viewing D as an iterated
182
+ Hopf Ore extension starting not from the base field k but from the commutative
183
+ normal Hopf subalgebra O(G) = k⟨x, u, g±1⟩ of Theorem 2.2(i). More precisely:
184
+ Proposition 3.1. D is an iterated Ore extension
185
+ (3.1)
186
+ D = O(G)[y; δ1][ζ; δ2][v; τ, δ3],
187
+ where the derivations δ1 and δ2, the automorphism τ and the τ-derivation δ3 can
188
+ be read off from the defining relations of D given in Subsection 2.1.
189
+ In particular, D is a noetherian domain.
190
+
191
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
192
+ 5
193
+ Proof. Use the proof of [2, Proposition 1.6] to show that D has basis
194
+ {gaxbucydζevf : a ∈ Z, b, . . . , f ∈ N}.
195
+ Then the form of the relations (2.1) combined with [12, Theorem 1, p.438] show
196
+ that it is indeed an Ore extension.
197
+
198
+ Although it will be not needed in this paper, the description (3.1) even describes
199
+ D as an Iterated Hopf Ore Extension (IHOE), in the sense that each extension in
200
+ that formula is itself a Hopf algebra. It also shows that, by setting
201
+ deg x = deg u = deg g = deg g−1 = 0;
202
+ deg y = deg ζ = deg v = 1,
203
+ one obtains a filtration F on D with associated graded algebra
204
+ (3.2)
205
+ grF D = O(G)[y, ζ, v].
206
+ So grF D is a commutative polynomial algebra in 6 variables with one variable
207
+ inverted.
208
+ 3.1. Homological properties. In this subsection we note that D has certain use-
209
+ ful homological properties, and we begin with the relevant definitions. A ring A
210
+ is called Auslander Gorenstein if it has finite injective dimension and satisfies the
211
+ Gorenstein condition: if p < q are non-negative integers and M is a finitely gener-
212
+ ated A-module, then Extp
213
+ A(N, A) = 0 for every submodule N of Extq
214
+ A(M, A). The
215
+ ring A is Auslander regular if it is Auslander Gorenstein of finite global dimension.
216
+ Set jA(M) = min{r : Extr
217
+ A(M, A) ̸= 0} for the homological grade of M. Then an
218
+ Auslander Gorenstein ring A of finite GK dimension is called GK-Cohen-Macaulay
219
+ (or just CM), provided that jA(M)+ GKdim(M) = GKdim(A) holds for each such
220
+ M. Obviously affine commutative regular rings are both Auslander regular and
221
+ CM.
222
+ Proposition 3.2.
223
+ (i) D is Auslander regular and CM.
224
+ (ii) D is AS regular in the sense of, say, [19].
225
+ (iii) GKdim(D) = 6 = gldim(D).
226
+ (iv) GK dimension is an exact function on finitely generated D-modules.
227
+ Proof. (i) By [7, Remark, p.157] the filtration F is Zariskian and so the result
228
+ follows from [7, Theorems 3.8, 3.9 and Remark, p. 165].
229
+ (ii) This is immediate from (i) and [11, Lemma 6.1].
230
+ (iii) By [22, Corollary 1.4], GKdim(D) = GKdim(grF(D)) = 6.
231
+ By Proposition 3.1 and [21, Theorem 7.5.3(i)], we have gldim(D) ≤ 6.
232
+ By
233
+ [1, Theorem 3.11] D has a finite dimensional module, say M and the CM condition
234
+ implies that M has homological dimension ≥ 6. Hence gldim(D) = 6.
235
+ (iv) Since jD is exact on finitely generated D-modules by [19, Theorem 2.3], this
236
+ follows from the CM condition.
237
+
238
+
239
+ 6
240
+ K. A. BROWN AND J. T. STAFFORD
241
+ 3.2. Key lemma. The following lemma will be crucial in our analysis of the prim-
242
+ itive spectrum of D. In its proof, given an ideal B of a noetherian ring S, we denote
243
+ by
244
+
245
+ B the ideal of S such that
246
+
247
+ B/B is the nilradical of S/B.
248
+ Lemma 3.3. Let M be a finitely generated (right or left) D-module such that either
249
+ Annk[x](M) ̸= 0 or Annk[u](M) ̸= 0. Then
250
+ (i) there exists r ≥ 1 such that
251
+ (m+D)r ⊆ (O(G)+D)r ⊆ AnnD(M);
252
+ (ii) GKdim(M) ≤ 3.
253
+ Proof. (i) Let I := AnnD(M), an ideal of D. Assume that I ∩ k[x] ̸= 0, the proof
254
+ in the other case being exactly similar, but with k⟨u, v⟩ replacing J. One easily
255
+ confirms that every non-zero prime ideal of the Jordan plane J = k⟨x, y⟩ contains x.
256
+ Therefore, since I ∩k[x] ̸= 0, there exists N ≥ 1 such that xN ∈ I ∩k[x] ⊆ I ∩O(G).
257
+ Since O(G) is commutative,
258
+ (3.3)
259
+ x ∈
260
+
261
+ (I ∩ O(G)).
262
+ Since I is an ideal of D, [v, I] ⊆ I; moreover, from the defining relations of D and
263
+ the fact that O(G) = k⟨x, u, g±1⟩, [v, O(G)] ⊆ O(G). Therefore
264
+ (3.4)
265
+ [v, I ∩ O(G)] ⊆ I ∩ O(G).
266
+ Since k has characteristic 0 it follows from (3.4) and [17, Lemma 3.20] that
267
+ (3.5)
268
+ [v,
269
+
270
+ (I ∩ O(G))] ⊆
271
+
272
+ (I ∩ O(G)).
273
+ By (3.3) and (3.5)
274
+ [v, x] = 1 − g + xu ∈
275
+
276
+ (I ∩ O(G)),
277
+ so that (1 − g) ∈
278
+
279
+ (I ∩ O(G)). Then
280
+ [v, g − 1] = [v, g] = gu ∈
281
+
282
+ (I ∩ O(G)),
283
+ so that u ∈
284
+
285
+ (I ∩ O(G)). Since O(G)+ is generated by x, u and g − 1 we deduce
286
+ that O(G)+D ⊆
287
+
288
+ I, proving (i).
289
+ (ii) By (i) M is a finitely generated D/(O(G)+D)r-module for some r ≥ 1. Since
290
+ D/O(G)+D ∼= U(sl(2, k) by Theorem 2.2(ii), and so has GK dimension 3, (ii)
291
+ follows from this and Proposition 3.2(iv).
292
+
293
+ 3.3. Ore localisations of D. To help in the analysis of its primitive spectrum we
294
+ need four Ore localisations of D. The first of these is described in [1, Theorem 4.8],
295
+ and the others are similar. These sets are described as follows:
296
+ Definition 3.4. Label the following four subsets of D:
297
+ A := {qi : i ≥ 0} ˙∪ {xj : j ≥ 0},
298
+ B := {si : i ≥ 0} ˙∪ {xj : j ≥ 0},
299
+ C := {qi : i ≥ 0} ˙∪ {uj : j ≥ 0},
300
+ D := {si : i ≥ 0} ˙∪ {uj : j ≥ 0}.
301
+ Lemma 3.5. (1) The elements x and u act ad-locally-nilpotently on D. Conse-
302
+ quently, {xi : i ≥ 0} and {ui : i ≥ 0} are Ore sets in D.
303
+ (2) For each Ω ∈ {A, B, C, D} the set Ω is an Ore set of regular elements of D,
304
+ and we write the corresponding localisation as D(Ω).
305
+
306
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
307
+ 7
308
+ Proof. (1) For x this is proved in [1, Lemma 4.3(i)]. The claim for u is a similar
309
+ easy consequence of the defining relations of D.
310
+ (2) Localising at the powers of q is the same as localising at the powers of q2 or
311
+ even at the powers z = q2g−1, since g is a unit. Thus, for Ω = A or Ω = C and
312
+ appealing to Lemma 2.1(iii), we can replace q by the central element z. Similarly
313
+ in the other two cases we can replace s by the central element θ. Thus in each
314
+ case we wish to localise at one central and one locally ad-nilpotent element in the
315
+ domain D. Thus it is indeed an Ore set of regular elements.
316
+
317
+ Thus each of the four rings D(Ω) is a subalgebra of the quotient division algebra
318
+ Q(D) of D that contains D. As we next show, each of these rings is a localisation
319
+ of the second Weyl algebra over a commutative ring.
320
+ Notation 3.6. (i) In D(A), set pA := −2q−1x−1y,
321
+ qA := q,
322
+ tA := qx−1, and
323
+ ηA := −xq−1ζ.
324
+ (ii) In D(B), set pB := −2s−1x−1y, qB := s, tB := sx−1. ηB := −xs−1ζ.
325
+ (iii) In D(C), set pC := 2q−1u−1v, qC := q, tC := q−1u−1, ηC := −uqζ.
326
+ (iv) In D(D), set pD := 2s−1u−1v, qD := s, tD := s−1u−1, ηD := usζ.
327
+ We further set zΩ := z for Ω = A and Ω = C but zΩ := θ when Ω = B, D.
328
+ The motivation behind the above definitions becomes clear from the following
329
+ lemma. For Ω = A, this was obtained in the proof of [1, Theorem 4.8]. The claims
330
+ regarding the other elements can be checked by a similar direct calculation.
331
+ Lemma 3.7. Let Ω ∈ {A, B, C, D}. Then we have the following relations in Q(D):
332
+ [pΩ, qΩ] = 1 = [ηΩ, tΩ], with all other brackets being zero;
333
+
334
+ When Ω = A the following result is given in [1, Theorem 4.8], although we give
335
+ a proof that works for all 4 cases simultaneously.
336
+ Theorem 3.8. For each Ω ∈ {A, B, C, D}, the localisation D(Ω) is a localised Weyl
337
+ algebra over its centre. More precisely:
338
+ D(Ω) = A(Ω)
339
+ 2
340
+ (k) ⊗ S(Ω),
341
+ where A(Ω)
342
+ 2
343
+ (k) denotes the localisation of the second Weyl algebra over k with gen-
344
+ erators pΩ, q±1
345
+ Ω , ηΩ, t±1
346
+ Ω , while S(Ω) is the commutative ring S(Ω) = k[z±1
347
+ Ω , ω].
348
+ Proof. The generators z, ω and θ of Z(D) are given in Lemma 2.1(iii), from which
349
+ it follows that the subalgebra S(Ω) of Q(D) is contained in the centre Z(D(Ω)).
350
+ Therefore we can consider the subalgebra
351
+ (3.6)
352
+ E(Ω) := S(Ω)⟨pΩ, qΩ, tΩ, ηΩ⟩ ⊆ D(Ω).
353
+ We claim that the inclusion (3.6) is an equality. In order to prove this, check that
354
+ given generators of DΩ are contained in E(Ω). Thus, for example, when Ω = A, one
355
+ shows that {q−1, x±1, y, ζ, g±1, u, v} ⊂ E(A), and similarly in the other cases. Thus,
356
+ E(Ω) = D(Ω), as claimed. As noted in the proof of Lemma 3.5 the localisation of
357
+ D at Ω involves inverting one central and one ad-nilpotent element of D. Thus,
358
+ by Proposition 3.2(iii) and [18, Lemma 4.7], GKdim(D(Ω) = GKdim(D) = 6. We
359
+ conclude that GKdim(E(Ω)) = GKdim(D) = 6.
360
+ On the other hand, by Lemma 3.7 E(Ω) is a factor of the ring
361
+ V(Ω) := S(Ω) ⊗k A(Ω)
362
+ 2
363
+ (k),
364
+
365
+ 8
366
+ K. A. BROWN AND J. T. STAFFORD
367
+ which is also a domain of GK-dimension 6. So if E(Ω) were a proper factor of V(Ω),
368
+ then [21, Corollary 8.3.6] would imply that GKdim(E(Ω)) < 6, giving a contradic-
369
+ tion.
370
+ So the only possibility is that E(Ω) ∼= V(Ω) = S(Ω) ⊗k A(Ω)
371
+ 2
372
+ (k), as required.
373
+
374
+ 4. The primitive spectrum of D
375
+ In this section we describe the primitive spectrum of D. This splits naturally
376
+ into several cases:
377
+ • the primitive ideals not containing m+ or m0; these are the generic ones;
378
+ • the ideal m+D, which is also primitive;
379
+ • the ideal m0D, for which √m0D is a unique prime ideal P0;
380
+ • finally, P0 is also maximal.
381
+ The details are given in the next four subsections with the results being combined
382
+ in Subsection 4.5.
383
+ In this section and in Section 5.1 we will without further reference use of the
384
+ yoga for prime ideals of Noetherian rings under Ore localisation as described in,
385
+ for example, [17, Theorems 10.18 and 10.20]. We use Notation 2.3 to describe the
386
+ maximal ideals of Z(D) and Definition 3.4 to define Ore sets in D.
387
+ 4.1. The generic minimal primitives. We begin by looking at the generic case.
388
+ Theorem 4.1. Let m be a maximal ideal of Z(D) with m ̸= m+ and m ̸= m0. Then
389
+ the following are true.
390
+ (i) mD is a completely prime maximal ideal of D.
391
+ (ii) The localisation of D/mD at the powers of (the image of) either x or u is
392
+ isomorphic to a localised Weyl algebra A(Ω)
393
+ 2
394
+ (k), where Ω ∈ {A, B, C, D}.
395
+ (iii) GKdim(D/mD) = 4.
396
+ (iv) mD is generated by a central regular sequence of length 2.
397
+ (v) D/mD is CM and is Auslander Gorenstein with injdim(D/mD) < 4.
398
+ Proof. (i), (ii) By Notation 2.3, m = ⟨z − α, ω − β, θ − γ⟩ with α, β, γ ∈ k and
399
+ αγ = β2. Moreover, thanks to the hypothesis on m, either (a) α ̸= 0 or (b) γ ̸= 0.
400
+ Assume (a). We prove (ii) for the localisation at the powers of x. (The arguments
401
+ for powers of u are exactly similar, but using the Ore sets C and D rather than A
402
+ and B.) Using the notation of §3.3 and applying Theorem 3.8, we see that mD(A)
403
+ is a maximal ideal of D(A). Observe that, since A := {qi, xj : i, j ≥ 0} and
404
+ z = q2g−1 ≡ α ̸= 0 mod(mD),
405
+ A(A)
406
+ 2
407
+ (k) is isomorphic to the localisation of D/mD at the powers of x. Define
408
+ Pm := mD(A) ∩ D,
409
+ so that Pm is a completely prime ideal of D with mD ⊆ Pm. By definition of Pm,
410
+ (4.1)
411
+ mD(A) = PmD(A).
412
+ We claim that in fact
413
+ (4.2)
414
+ Pm = mD.
415
+
416
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
417
+ 9
418
+ Since D is (left) noetherian there exist e1, . . . , et ∈ Pm such that Pm = mD +
419
+ �t
420
+ i=1 Dei. By (4.1), for each i = 1, . . . , t there exist fi ∈ mD and si ∈ Z≥0 such
421
+ that
422
+ (4.3)
423
+ ei = fix−si.
424
+ Define s := max{si : 1 ≤ i ≤ t} ∈ Z≥0, and
425
+ I := {τ ∈ D : Pmτ ⊆ mD}.
426
+ Thus I is an ideal of D containing mD and, by (4.3), xs ∈ I. If s = 0 then I = D;
427
+ otherwise we see from Lemma 3.3 that (m+)r ⊂ I for some r ≥ 1. Since also m ⊆ I
428
+ and m ̸= m+ by hypothesis, it follows that I = D, and (4.2) is proved.
429
+ In case (a) it remains only to prove that Pm is a maximal ideal of D. Suppose
430
+ then that J is an ideal of D with Pm ⊊ J. Then JD(A) = D(A) by the maximality
431
+ of the ideal PmD(A) of D(A). Again using the fact that q + mD is a unit of D/mD
432
+ we see that xs ∈ J for some s ≥ 1. Then, as before, Lemma 3.3 implies that J = D.
433
+ Suppose that (b) holds rather than (a). Then the element s is a unit mod mD,
434
+ so we use the same argument as for (a), but working with D(C) rather than D(A).
435
+ (iii) By (ii) and [18, Example 3.7 and Theorem 4.9] the localisation of D/mD at
436
+ the powers of x has GK dimension 4. Since ad(x) acts nilpotently on D/mD by
437
+ Lemma 3.5, it follows from [18, Theorem 4.9] that GKdim(D/mD) = 4.
438
+ (iv) Again we assume (a) that z−α ∈ m for α ∈ k\{0}, the proof in case (b) being
439
+ similar. We can begin a regular central sequence in mD with z − α. Since D is CM
440
+ of GK-dimension 6 by Proposition 3.2(i, iii), it follows from [16, Theorem 7.2(b)]
441
+ that D/(z − α)D is CM of GK-dimension 5. Moreover, by [19, Remark 2.4] the
442
+ CM property ensures that D/(z − α)D is GK-homogeneous; that is, it contains no
443
+ non-zero ideal with GK-dimension strictly less than 5. Since Z(D)/(z − α)Z(D) is
444
+ a polynomial algebra we can choose y ∈ m such that m = ⟨z − α, y⟩. If y + (z − α)D
445
+ is a zero divisor in D/(z − α)D we obtain a non-zero ideal of D/(z − α)D killed
446
+ by mD, contradicting the GK-homogeneity of D/(z − α)D in view of (iii). Thus
447
+ {z − α, y} is a regular central sequence in mD.
448
+ (v) Since D is CM by Proposition 3.2(i), R = D/mD is CM with GKdim(R) = 4
449
+ by (iv) and two applications of [16, Theorem 7.2(b)]. The Auslander Gorenstein
450
+ property is given by (iv) and [19, §3.4, Remark (3)]. As R is simple it cannot have a
451
+ finite dimensional module. Hence injdim(R) < 4 follows from the next lemma.
452
+
453
+ The following observation is well-known.
454
+ Lemma 4.2. Let R be a noetherian, Auslander Gorenstein, CM ring and write
455
+ GKdim(R) = m. Then injdim(R) ≤ m. Moreover injdim(R) = m ⇐⇒ R has a
456
+ finite dimensional representation.
457
+ Proof. Let n = injdim(R) and pick a finitely generated R-module M such that
458
+ Extn
459
+ R(M, R) ̸= 0. By the Auslander condition and the spectral sequence [19, The-
460
+ orem 2.2] j(Enn(M)) = n for Enn = Extn(Extn(M, R), R). By the CM property
461
+ GKdim(Enn(M)) = m − n and the result follows easily.
462
+
463
+
464
+ 10
465
+ K. A. BROWN AND J. T. STAFFORD
466
+ 4.2. Non-generic minimal primitives (I) - m+. The next case to consider is mD
467
+ for m = m+, as we do here. Recall from Notation 2.3(ii) that m+ = D+ ∩ Z(D) =
468
+ ⟨ω + 16, θ − 16⟩.
469
+ We start with a subsidiary result, which works for any field k of characteristic
470
+ zero.
471
+ Theorem 4.3. D is a Jacobson ring that satisfies the Nullstellensatz, in other
472
+ words:
473
+ (i) every prime ideal of D is an intersection of primitive ideals;
474
+ (ii) for every simple D-module M, EndD(M) is algebraic over k. In particular,
475
+ every primitive ideal of D contains a maximal ideal of Z(D).
476
+ Proof. By (3.2), D has a filtration F such that the associated graded ring grF(D) is
477
+ a commutative affine ring. Hence by [22, Corollary 1.7] there is a second filtration
478
+ G by finite dimensional k-subspaces of D such that grF(D) is also a commutative
479
+ and affine ring. The result now follows from [4, Theorem 0.4].
480
+
481
+ Theorem 4.4.
482
+ (i) m+D is a completely prime, primitive ideal of D.
483
+ (ii) The localisation of D/m+D at the powers of x or the powers of u is a
484
+ localisation of the Weyl algebra A2(k) at powers of a generator.
485
+ (iii) m+D is generated by a regular central sequence of length 2.
486
+ (iv) D/m+D is Auslander Gorenstein and CM with
487
+ GKdim(D/m+D) = 4 = injdim(D/m+D).
488
+ (v) Every prime ideal P of D which strictly contains m+D satisfies
489
+ O(G)+D ⊆ P,
490
+ so the space of such primes P is homeomorphic to Spec(U(sl(2, k)).
491
+ Proof. Recall that qA = q. Since q2 ≡ 16g ̸≡ 0 mod(m+D), Theorem 3.8 implies
492
+ that m+D(A) is a maximal ideal of D(A), with D/m+D(A) ∼= A(A)
493
+ 2
494
+ (k). Therefore,
495
+ defining P+ := m+D(A) ∩ D, we deduce that P+ is a completely prime ideal of D
496
+ with
497
+ (4.4)
498
+ m+D ⊆ P+.
499
+ We will eventually show that (4.4) is an equality.
500
+ As in the proofs of Theorem 4.1(i),(ii), let I be the right annihilator in D of
501
+ P+/m+D. Then I contains m+D and a power of x, and hence, by Lemma 3.3,
502
+ (4.5)
503
+ (O(G)+D)r ⊆ I
504
+ for some r ∈ Z≥1,
505
+ In particular, GKdim(D/I) ≤ 3 by Lemma 3.3(ii).
506
+ Therefore, by [18, Proposi-
507
+ tion 5.1(d)]
508
+ (4.6)
509
+ GKdim(P+/m+D) ≤ 3.
510
+ Recall that GKdim(A(A)
511
+ 2
512
+ (k)) = 4 by [18, Example 7.3 and Theorem 4.9], so that
513
+ (4.7)
514
+ GKdim(D/P+) = 4
515
+ by [18, Theorem 4.9]. Thus, from (4.6), (4.7) and Proposition 3.2(iv) it follows that
516
+ (4.8)
517
+ GKdim(D/m+D) = 4.
518
+
519
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
520
+ 11
521
+ By Proposition 3.2, D is CM and Auslander regular, with gldim(D) = 6 =
522
+ GKdim(D). It therefore follows from the CM property of D together with (4.8)
523
+ that
524
+ (4.9)
525
+ jD(D/m+D) = 6 − 4 = 2.
526
+ From (4.9) and [8, Proposition 3.6] we deduce that the maximum length of a reg-
527
+ ular sequence of elements of m+ on D is precisely 2; in particular any choice of
528
+ a generating pair of elements of m+, for example, {z − 16, ω + 16}, is a regular
529
+ sequence on D. Therefore, by two applications of [16, Theorem 7.2(b)],
530
+ (4.10)
531
+ D/m+D is CM of GK-dimension 4.
532
+ Similarly, two applications of [19, §3.4, Remark (3)] show that D/m+D is Auslander
533
+ Gorenstein. By Lemma 3.3(i) and Theorem 2.2(ii), U(sl(2, k)) ∼= D/DO(G)+ is a
534
+ factor of D/m+D and so D/m+D has a non-zero finite dimensional module, M.
535
+ Thus, by Lemma 4.2, injdim(D/m+D) = 4.
536
+ By [19, Remark 2.4], again, the CM property for D/m+D implies that D/m+D
537
+ is GK-homogeneous. Therefore we may conclude from (4.6) that P+ does indeed
538
+ equal m+D.
539
+ This proves (i) - (iv), with the exception of showing that m+D is
540
+ primitive.
541
+ (v) Let Q be a prime ideal of D with m+D ⊊ Q. As already noted, q is congruent
542
+ to a unit mod m+D. Then QD(A) = D(A) by (ii), so Q must contain a power of x.
543
+ Hence, by Lemma 3.3, O(G)+D ⊆ Q, as required.
544
+ Finally, to see that m+D is primitive note that (v) shows that it is locally closed.
545
+ Hence it is primitive by Theorem 4.3(i).
546
+
547
+ 4.3. Non-generic minimal primitives (II) - m0. In this subsection we begin
548
+ our study of the ideal m0D.
549
+ Recall the definition of q, s from (2.1) and, from
550
+ Notation 2.3(iii), that m0 := ⟨q2g−1, qsg−1, s2g−1⟩ is the unique singular point of
551
+ Maxspec(Z(D)). Clearly the right ideal
552
+ (4.11)
553
+ P0 := qD + sD
554
+ is a two-sided ideal of D since q and s are normal in D by Lemma 2.1. Moreover,
555
+ m0D = P 2
556
+ 0 ⊂ P0 ⊆
557
+
558
+ m0D.
559
+ As part of the next proposition we see that P0 is completely prime, so the second
560
+ inclusion above is an equality.
561
+ In fact P0 is a maximal ideal, but this is more
562
+ difficult to prove, and is delayed until §4.4.
563
+ Proposition 4.5. Retain the above notation, and set T := D/P0.
564
+ (i) T is a localisation of a 4-step iterated Ore extension of k, namely
565
+ T =
566
+
567
+ (k[u, x]⟨(ux + 2)−1⟩)[y; ∂1]
568
+
569
+ [v; σ, ∂2],
570
+ where u and x commute,
571
+ ∂1(u) = − 1
572
+ 2ux − 2,
573
+ ∂1(x) = − 1
574
+ 2x2,
575
+ ∂2(u) = − 1
576
+ 2u2,
577
+ ∂2(x) = 3
578
+ 2ux + 2,
579
+ ∂2(y) = 3
580
+ 2uy − 2,
581
+ and σ(y) = y + 1
582
+ 2x, with σ(x) = x and σ(u) = u.
583
+ (ii) {q, s} forms a regular normal sequence of generators of P0.
584
+ (iii) gldim(T ) ≤ 4 = GKdim(T ).
585
+
586
+ 12
587
+ K. A. BROWN AND J. T. STAFFORD
588
+ (iv) T is CM and is an Auslander regular domain.
589
+ Proof. Throughout the proof we abuse notation by simply denoting the image in
590
+ T of an element ω of D by ω when no confusion seems likely.
591
+ (i),(ii) Since q := ux + 2(1 + g) and q ≡ 0 mod(P0), we can write
592
+ (4.12)
593
+ g ≡ − 1
594
+ 2(ux + 2) mod(P0),
595
+ so that
596
+ (4.13)
597
+ ux + 2 is a unit in T.
598
+ Using (4.12) we find that, mod(P0),
599
+ s := xv + uy + (− 1
600
+ 2ux + g − 1)ζ − 2(g + 1) ≡ xv + uy + 2gζ − 2g − 2,
601
+ so that, since s ∈ P0,
602
+ (4.14)
603
+ ζ ≡ − 1
604
+ 2g−1(ux + xv + uy)
605
+ mod(P0)
606
+ It follows from (4.12), (4.13) and (4.14) that
607
+ (4.15)
608
+ T = k⟨u, x, (ux + 2)−1, y, v⟩.
609
+ The relations for D given in §2.1 immediately imply the following relations for the
610
+ generators for T listed in (4.15)
611
+ [u, x] = 0,
612
+ [y, x] = − 1
613
+ 2x2,
614
+ [v, x] = 3
615
+ 2ux + 2,
616
+ [y, u] = − 1
617
+ 2ux − 2,
618
+ [v, u] = − 1
619
+ 2u2,
620
+ [v, y] = 3
621
+ 2uy + 1
622
+ 2xv ��� 2.
623
+ Clearly the iterated Ore extension of k[u, x]⟨(ux + 2)−1⟩ defined in (i), which we
624
+ temporarily label �T, satisfies precisely these relations, so there is an algebra epi-
625
+ morphism Φ from �T onto T .
626
+ We next show that Φ is an isomorphism, which we do by computing GKdim(T ).
627
+ First note that GKdim( �T) = 4 by [18, Theorem 12.3.1], since it is a PBW extension
628
+ in 2 variables of k[u, x]⟨(ux + 2)−1⟩. Thus, certainly GKdim(T ) ≤ 4. On the other
629
+ hand D is CM of GK-dimension 6 by Proposition 3.2(i, iii). Hence, because q is
630
+ a regular normal element of D by Lemma 2.1, D/qD is CM of GK-dimension 5
631
+ by [16, Theorem 7.2(b) and its proof]. Moreover D/qD is GK-homogeneous by
632
+ [19, Remark 2.4]. Since GKdim(T ) ≤ 4, this ensures that
633
+ (4.16)
634
+ s cannot be a zero-divisor mod qD.
635
+ Since P0 := qD + sD, a second application of [16, Theorem 7.2(b) and its proof]
636
+ yields GKdim(T ) = 4 and also shows that
637
+ (4.17)
638
+ T is CM.
639
+ Since �T is a domain, the equality GKdim( �T) = 4 = GKdim(T ), combined with
640
+ [18, Proposition 3.15], shows that �T = T . Thus (i) is proved, with (ii) also following
641
+ thanks to (4.16).
642
+ (iii) By (i), T is a 2-step iterated Ore extension of k[u.x]⟨(ux + 2)−1⟩, and so two
643
+ applications of [21, Theorem 7.5.3(i)] gives gldim(T ) ≤ 4.
644
+ (iv) That T is a domain is clear from (i), while the CM property was proved in
645
+ (4.17). The Auslander Gorenstein property holds for D by Proposition 3.2(i). Thus,
646
+ by (ii) and two applications of [16, Theorem 7.2(a)], T is also Auslander Gorenstein
647
+ and it is then Auslander regular by (iii).
648
+
649
+
650
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
651
+ 13
652
+ We remark that, by Lemma 4.2 and Theorem 2.2(iii) it follows that gldim(T ) < 4.
653
+ We do not know the exact value of gldim(T ).
654
+ 4.4. Maximality of P0. Let T := D/P0 as in Proposition 5.3. Define also the
655
+ following subalgebras of T :
656
+ R := k⟨u, x, (ux + 2)−1⟩, and S := R[y; ∂1],
657
+ so that T = S[v; σ, ∂2]. It is important to note that, by the formulæ in Proposi-
658
+ tion 4.5, R is preserved by the σ-derivation ∂2. Moreover, since σ|R is the identity,
659
+ ∂2 actually restricts to a derivation on R.
660
+ It is much easier to determine when an Ore extension is simple if the ring is a
661
+ differential operator ring, in the sense that the defining automorphism is actually
662
+ the identity. Thus we will reduce to that case. The idea follows from Lemma 2.1
663
+ which shows that σ2 is given by the inner automorphism τg in the sense that
664
+ σ(s) = τg(s) = gsg−1 for suitable g ∈ S. We will therefore extend R, S and T by
665
+ √g and show that σ is then inner, and so can be removed. The details are given in
666
+ the next few results, culminating in Proposition 4.9.
667
+ Notation 4.6. In the algebraic closure of R, set h = (ux + 2)− 1
668
+ 2 . Write �R =
669
+ R⟨h⟩ = k⟨u, x, h, h−1⟩. We extend the ∂i to derivations on �R by the usual rules for
670
+ fractional powers:
671
+ ∂(h) = (−1
672
+ 2)(ux + 2)−1h∂(ux + 2),
673
+ for ∂ = ∂1, ∂2. Set �S = �R[y; ∂1]. Finally, we can extend σ to �R and �S by setting
674
+ σ(h) = h. Then both σ and ∂2 are naturally defined on �S as an automorphism,
675
+ respectively σ-derivation and so �T = �S[v; σ, ∂2] is a well-defined Ore extension of
676
+ �S.
677
+ The following observation will prove useful.
678
+ Lemma 4.7. �S is a free left and right S module on basis {1, h}. Similarly, �T is a
679
+ free left and right T module on basis {1, h}.
680
+ Proof. As h2 = (ux + 2)−1 ∈ R, the construction of �R ensures that �R is a free left
681
+ and right R-module on basis {1, h}. We can then write
682
+ �S =
683
+
684
+
685
+ i=0
686
+ �Ryi =
687
+
688
+ Ryi ⊕
689
+
690
+ Rhyi =
691
+
692
+ Ryi ⊕
693
+
694
+ Ryih.
695
+ Collecting terms shows that �S = S ⊕ Sh. As S is a domain this is necessarily a
696
+ direct sum of free modules. The same argument works for �T.
697
+
698
+ Lemma 4.8. On �S, σ is the inner automorphism τh−1; thus σ(f) = h−1fh for
699
+ f ∈ �S.
700
+ Proof. Since �R is a commutative ring on which σ is the identity, the lemma holds
701
+ trivially on �R. It therefore just remains to check that the automorphisms agree on
702
+ y. To prove this, we rewrite h−1yh as follows.
703
+
704
+ 14
705
+ K. A. BROWN AND J. T. STAFFORD
706
+ h−1yh = (ux + 2)
707
+ 1
708
+ 2 y(ux + 2)− 1
709
+ 2
710
+ = (ux + 2)
711
+ 1
712
+ 2 (ux + 2)− 1
713
+ 2 y + (ux + 2)
714
+ 1
715
+ 2 · ∂1
716
+
717
+ (ux + 2)− 1
718
+ 2 �
719
+ = y + (ux + 2)
720
+ 1
721
+ 2 (− 1
722
+ 2)(ux + 2)− 3
723
+ 2 · ∂1((ux + 2))
724
+ = y −
725
+ 1
726
+ 2(ux + 2)−1�
727
+ (− 1
728
+ 2ux − 2)x − u( 1
729
+ 2x2)
730
+
731
+ = y −
732
+ 1
733
+ 2(ux + 2)−1�
734
+ −(ux + 2)x
735
+
736
+ = y + 1
737
+ 2x = σ(y);
738
+ as required.
739
+
740
+ Proposition 4.9. Set α = hv. Then �T is the Ore extension �T = �S[α; �∂2] where �∂2
741
+ is the derivation of �S defined by �∂2(s) = h∂2(s) for s ∈ �S; thus
742
+ �∂2(u) = − 1
743
+ 2hu2,
744
+ �∂2(x) = h( 3
745
+ 2ux + 2)
746
+ and
747
+ �∂2(y) = h(( 3
748
+ 2uy − 2).
749
+ As such, �T is a noetherian domain.
750
+ Proof. This is a formal computation. Indeed, for s ∈ �S, Lemma 4.8 implies that
751
+ σ(s) = h−1sh. Equivalently,
752
+ (4.18)
753
+ αs = hvs = hσ(s)v + h∂2(s)
754
+ = hh−1shv + h∂2(s) = sα + h∂2(s).
755
+ Therefore, since �T = �S[v; σ, ∂2] = � �Svi, we see that �T = � �Sαi. Since �T is a
756
+ domain, combining this with (4.18) and [12, Theorem 1, p.438] gives the desired
757
+ conclusion.
758
+
759
+ Our next aim will be to show that the ring �T is a simple domain, after which it
760
+ is easy to prove the same conclusion for T . We start with some preparatory results.
761
+ Lemma 4.10. If there exists a non-zero (∂1, �∂2)-invariant ideal I in �R, then there
762
+ exists a non-zero (∂1, �∂2)-invariant prime ideal P in �R.
763
+ Proof. Using [17, Lemma 3.18(b)] twice, clearly I �S is a proper non-zero ideal of �S
764
+ and then I �T is a proper nonzero ideal of �T. Pick a prime ideal Q ⊇ I �T. Then, by
765
+ [17, Lemmata 3.18 and 3.21], twice, Q1 = Q ∩ �S is a �∂2-invariant prime ideal of �S
766
+ and hence Q2 = Q1 ∩ �R is a ∂1-invariant prime ideal of �R. However, since �R and
767
+ Q1 are both �∂2-invariant, so is Q2. Thus, P = Q2 is the desired prime ideal.
768
+
769
+ Proposition 4.11. There is no proper, non-zero (∂1, �∂2)-invariant ideal I in �R.
770
+ Proof. Suppose that there exists such an ideal I. By Lemma 4.10 we can and will
771
+ assume that I is a prime ideal. Suppose, first, that (xu + λ) ∈ I, for some λ ∈ k.
772
+ Then
773
+ I ∋ ∂1(xu + λ) = (− 1
774
+ 2ux − 2)x − ( 1
775
+ 2x2)u = −(ux + 2)x
776
+ and
777
+ I ∋ �∂2(xu + λ) = h
778
+
779
+ − 1
780
+ 2u2x + ( 3
781
+ 2ux + 2)u
782
+
783
+ = h
784
+
785
+ ux2 + 2u
786
+
787
+ = h(ux + 2)u.
788
+
789
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
790
+ 15
791
+ As (xu + 2)−1 = h2 ∈ �R, clearly λ ̸= 2 and so the two equations imply that x ∈ I,
792
+ respectively u ∈ I. Thus, I = x �R + u �R. But, now I ∋ ∂1(u) = − 1
793
+ 2ux − 2 and so
794
+ I = �R, a contradiction. We conclude that
795
+ (4.19)
796
+ I ∩ C = ∅
797
+ for C = {(xu + λ) : λ ∈ k∗}
798
+ Since I is a prime ideal it follows that C ⊆ C(I) and hence that IC is a proper prime
799
+ ideal of the localisation �RC.
800
+ Next, if IC ∋ f = f(u) for some f(u) ∈ k[u], then IC ∋ ∂1(f) = − 1
801
+ 2(ux + 4) df
802
+ du.
803
+ Hence df
804
+ du ∈ IC. By induction on deg f, this implies that IC = �RC, a contradiction.
805
+ Thus IC ∩ k[u]∗ = ∅ and so we can further localise at S = k[u]∗ and conclude that
806
+ ICS is a proper prime ideal of �RCS. Now consider �RCS. We have �R = k⟨u, x, h, h−1⟩
807
+ and h−2 = (ux + 2) whence x = u−1(h−2 − 2). Thus �RCS = �RSC is a localisation
808
+ of k(u)[h, h−1].
809
+ The advantage of working in �RCS is that we can simplify our derivation �∂2. On
810
+ �R and �RCS write ∂u =
811
+
812
+ ∂u and ∂x =
813
+
814
+ ∂x. Then, as derivations on either ring,
815
+ ∂1 = −( 1
816
+ 2xu + 2)∂u −
817
+ 1
818
+ 2x2∂x
819
+ while
820
+ �∂2 = − 1
821
+ 2hu2∂u + h( 3
822
+ 2ux + 2)∂x.
823
+ We now set µ := −hu2(ux + 4)−1 and take
824
+ �∂′
825
+ 2 := �∂2 + µ∂1 =
826
+
827
+ − 1
828
+ 2hu2 + µ(− 1
829
+ 2ux − 2)
830
+
831
+ ∂u +
832
+
833
+ h( 3
834
+ 2ux + 2) − 1
835
+ 2x2µ
836
+
837
+ ∂x.
838
+ This element µ has been chosen so that the coefficient of ∂u in �∂′
839
+ 2 is
840
+ − 1
841
+ 2(ux + 4)−1�
842
+ hu2(ux + 4) − (ux + 4)hu2�
843
+ = 0.
844
+ Therefore,
845
+ �∂′
846
+ 2 =
847
+
848
+ h( 3
849
+ 2ux + 2) +
850
+ 1
851
+ 2hx2u2(ux + 4)−1�
852
+ ∂x
853
+ = (ux + 4)−1h
854
+
855
+ ( 3
856
+ 2ux + 2)(ux + 4) + 1
857
+ 2x2u2�
858
+ ∂x
859
+ = (ux + 4)−1h
860
+
861
+ 2u2x2 + 8ux + 8
862
+
863
+ ∂x
864
+ = β∂x
865
+ for
866
+ β := 2(xu + 4)−1(ux + 2)2h.
867
+ Since ICS is invariant under both ∂1 and �∂2, it is also invariant under �∂′
868
+ 2. Since
869
+ β is a unit in �RCS, it follows that
870
+ (4.20)
871
+ ICS is also invariant under β−1 �∂′
872
+ 2 = ∂x.
873
+ Thus, by (4.20) and the expression given above for ∂1, ICS is invariant under
874
+ ( 1
875
+ 2ux + 2)∂u, and therefore under ∂u since 1
876
+ 2ux + 2 is a unit. So ICS is invariant
877
+ under ∂u and ∂x. Since �RCS is a localisation of k[u, x] this forces ICS = �RCS, giving
878
+ the required contradiction.
879
+
880
+ In order to pass between T and �T we need:
881
+ Lemma 4.12. If �T is a simple ring then so is T .
882
+
883
+ 16
884
+ K. A. BROWN AND J. T. STAFFORD
885
+ Proof. Suppose that T has a proper ideal J. Then X = �T/J �T is a (T, �T)-bimodule.
886
+ Moreover, by Lemma 4.7 �T is a finitely generated left T -module and so X is a
887
+ finitely generated left T -module; say X = �r
888
+ i=1 T xi. Then, as �T is an Ore domain,
889
+ ann �
890
+ T (X) = �
891
+ i ann �
892
+ T (xi) ̸= 0. Since �T is a simple ring this implies that ann �
893
+ T (X) =
894
+ �T and hence that X = 0. In other words, J �T = �T.
895
+ On the other hand, by Lemma 4.7, �T = T + T h is a free left T -module and so
896
+ J �T = J ⊕ Jh ̸= �T. This contradiction proves the lemma.
897
+
898
+ We now put everything together and prove the main result of this subsection.
899
+ Theorem 4.13. T is a simple ring.
900
+ Proof. By Lemma 4.12 it suffices to prove that �T is simple. By [21, Theorem 1.8.4]
901
+ applied to �T = �S[α; �∂2], we need to prove
902
+ (a) �∂2 is not an inner derivation on �S, and
903
+ (b) �S has no proper �∂2-invariant ideals.
904
+ Now, as ∂1(x) = − 1
905
+ 2x2, the right ideal x�S is a proper two-sided ideal of �S. As
906
+ such, it is preserved by any inner derivation of �S. But �∂2(x) = h( 3
907
+ 2ux + 2) ̸∈ x�S,
908
+ this means �∂2 cannot be an inner derivation of �S and so (a) holds.
909
+ Suppose that �S has a proper �∂2-invariant ideal I. Then, by [17, Lemma 3.18],
910
+ K = I ∩ �R is a ∂1-invariant ideal of �R, while by [17, Lemma 3.19], K ̸= 0. Since
911
+ both I and �R are both �∂2-invariant, so is K. In other words, K is a proper (∂1, �∂2)-
912
+ invariant ideal of �R. This contradicts Proposition 4.11. Thus (b) holds and so
913
+ [21, Theorem 1.8.4] implies that �T is simple.
914
+
915
+ Remark 4.14. We end the subsection by noting that �T is obviously birational to
916
+ the Weyl algebra A2. We do not know if the same is true for T itself.
917
+ 4.5. The shape of the primitive spectrum of D. In this subsection we combine
918
+ the earlier results of this section to prove Theorem 1.1. By Theorem 4.3, every
919
+ primitive ideal P of D contains a maximal ideal of Z(D). Thus Privspec(D) is the
920
+ disjoint union
921
+ (4.21)
922
+ Privspec(D) =
923
+ ˙�
924
+ m∈Maxspec(Z(D))V(m)
925
+ where V(m) = {P ∈ Privspec(D) : m ⊆ P}. There are thus 3 cases, corresponding
926
+ to §§4.1, 4.2 and 4.3.
927
+ (I) V(m), where m ∈ Maxspec(Z(D)) with m ̸= m+ and m ̸= m0. By Theorem 4.1,
928
+ V(m) = {mD} is a single generic maximal ideal of D. Moreover D/mD is bira-
929
+ tionally equivalent to the second Weyl algebra, with other properties as listed in
930
+ that theorem.
931
+ (II) V(m+). By Theorem 4.4, this consists of m+D, together with
932
+ V(O(G)+D) := {P ∈ Privspec(D) : O(G)+D ⊂ P},
933
+ which is homeomorphic to Privspec(U(sl(2, k))) by Theorem 2.2(ii).
934
+ Recall that Privspec(U(sl(2, k))) is composed of the co-Artinian maximal ideals
935
+ {Mn : n ∈ Z≥1}, where Mn = Ann(Vn), Vn being the n-dimensional irreducible
936
+
937
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
938
+ 17
939
+ U(sl2(k))−module, together with the minimal primitives of U(sl(2, k)); that is, the
940
+ ideals (Ω − λ)U(sl(2, k)) : λ ∈ k}, where Ω is the Casimir element. Each Mn
941
+ contains one such minimal primitive and each minimal primitive is contained in
942
+ at most one Mn; the remaining minimal primitives are also maximal. Note that
943
+ O(G)+D is prime but not primitive since D/O(G)+D ∼= U(sl(2, k)) and this domain
944
+ satisfies the Nullstellensatz and has non-trivial centre k[Ω].
945
+ (III) V(m0). This is the singleton {P0 = qD + sD = √m0}, by Proposition 4.5 and
946
+ Theorem 4.13.
947
+ 5. Prime ideals and the Dixmier-Moeglin equivalence
948
+ In this section we prove Theorem 1.2 from the introduction, which describes the
949
+ prime ideals of D, and we discuss the Dixmier-Moeglin equivalence for D.
950
+ 5.1. The prime spectrum of D. We need the following lemmas for the proof of
951
+ the main result, Theorem 5.3.
952
+ Lemma 5.1. Let P be a nonzero prime ideal of D. Then P ∩ Z(D) ̸= {0}.
953
+ Proof. If xi ∈ P for some i ≥ 0 then O(G)+D ⊆ P by Lemma 3.3 applied with
954
+ M = D/P, and therefore m+ = O(G)+D ∩ Z(D) ⊆ P, proving the lemma for P.
955
+ So we may assume that {xi : i ≥ 0} ∩ P = ∅. Similarly, we may assume that
956
+ {qj : j ≥ 0} ∩ P = ∅, since otherwise 0 ̸= qng−2n ∈ P ∩ Z(D) for some n ≥ 0 and
957
+ again the result follows for P.
958
+ Hence, using Notation 3.6 and Theorem 3.8, PD(A) survives as a non-zero proper
959
+ ideal of D(A) = D⟨q−1, x−1⟩ = A(A)
960
+ 2
961
+ (k) ⊗k S(A), where A(A)
962
+ 2
963
+ (k) is a localised Weyl
964
+ algebra and S(A) = k[z±1, ω]. In particular,
965
+ (5.1)
966
+ PD(A) = (PD(A) ∩ S(A))D(A).
967
+ By [17, Theorem 10.20] and the discussion in the first paragraph of this proof,
968
+ P = PD(A) ∩ D, and therefore
969
+ (5.2)
970
+ P ∩ Z(D) = PD(A) ∩ Z(D) = (PD(A) ∩ S(A)) ∩ Z(D).
971
+ Since the Z(D)-module S(A)/Z(D) is {zi}-torsion, that is {qig−2i}-torsion, it fol-
972
+ lows from (5.1) and (5.2) that P ∩ Z(D) ̸= {0} as required.
973
+
974
+ Note that, since k is algebraically closed of characteristic 0, the defining relation
975
+ zθ = ω2 of Z(D) can be rewritten using a linear change of variables as the quadratic
976
+ form X2 + Y 2 = Z2. Thus a proof of the next result can be found at [15, p.51 and
977
+ Proposition 11.4].
978
+ Lemma 5.2. All height one primes of Z(D) are principal except p1 := ⟨z, ω⟩ and
979
+ p2 := ⟨θ, ω⟩.
980
+
981
+ Here is the main result of this section, using in (ii) the notation of Lemma 5.2.
982
+ This proves Theorem 1.2 from the introduction.
983
+ Theorem 5.3. Let P be a prime but not primitive ideal of D.
984
+ (i) There are the following three possibilities for P.
985
+ (a) P = {0}.
986
+ (b) P = O(G)+D.
987
+
988
+ 18
989
+ K. A. BROWN AND J. T. STAFFORD
990
+ (c) P has height one and is minimal over (P ∩ Z(D))D for a height one
991
+ prime ideal P ∩ Z(D) of Z(D).
992
+ (ii) In case (c), if P ∩ Z(D) = pi for i = 1, resp. i = 2, then P = qD, resp.
993
+ P = sD. The remaining primes in case (c) are precisely the set
994
+ {P : P = fD},
995
+ as f ranges through the equivalence classes of irreducible elements of Z(D)
996
+ other than the associates of z, ω, θ.
997
+ Proof. Note first that {0} is completely prime by Proposition 3.1, and is not prim-
998
+ itive, because D satisfies the Nullstellensatz by Theorem 4.3 and Z(D) ̸= k. This
999
+ covers case (a).
1000
+ Let P be a non-zero prime but not primitive ideal of D. By Lemma 5.1,
1001
+ {0} ̸= p := P ∩ Z(D).
1002
+ If p = m+ then Theorem 4.4 together with the discussion at §4.5(II) shows that
1003
+ the only possibility is P = O(G)+D, which is completely prime but is again not
1004
+ primitive thanks to the Nullstellensatz, since Z(U(sl(2, k))) ̸= k. This is case (b).
1005
+ If p = m0 then P = P0, which is maximal by Theorem 4.13, so this case can’t
1006
+ happen. Similarly, p is any maximal ideal of Z(D) apart from m+ or m0, then P =
1007
+ pD is a maximal ideal of D by Theorem 4.1(i), which again gives a contradiction.
1008
+ So we are left with the case when p has height one. Assume first that p = fZ(D)
1009
+ is principal. Then, by Lemma 5.2, z = q2g−1 /∈ P, and {xi : i ≥ 0} ∩ P = ∅ by
1010
+ Lemma 3.2 Therefore, using Notation 3.6 and Theorem 3.8
1011
+ pD(A) = (P ∩ S(A))D(A) = PD(A).
1012
+ We claim that P = pD.
1013
+ To see this, note that pD = fD is principal, so that
1014
+ D/pD is CM of GK-dimension 5, by [16, Theorem 7.2(b) and its proof], and GK-
1015
+ homogeneous by [19, §3.4, Remark (3)]. Now P/pD it is killed by pD and by a
1016
+ power of q or a power of x, and so has GK-dimension less than 5, respectively by
1017
+ Theorem 4.1(iii) and 4.4(iv) or by Lemma 3.2. This forces P/pD = {0} and so
1018
+ P = pD, as claimed.
1019
+ Suppose finally that p = p1 or p = p2. In the first case, since q is a normal
1020
+ element of D by Lemma 2.1, q ∈ √pD. Thus
1021
+ (5.3)
1022
+ qD ⊆ P.
1023
+ We claim that (5.3) is an equality. To see this, note that s /∈ P, since otherwise
1024
+ P ∩Z(D) = m0, which is ruled out by hypothesis. Moreover {xj : j ≥ 0}∩P = ∅ by
1025
+ Lemma 3.2. So we can localise at the Ore set B = {sixj : i, j ≥ 0} of Definition 3.4
1026
+ and pass to the localised Weyl algebra D(B) = A(B)
1027
+ 2
1028
+ (k) ⊗ S(B) of Theorem 3.8.
1029
+ However, PD(B) and qD(B) have the same intersection with the centre S(B), namely
1030
+ ωθ−1S(B) = p1S(B). Therefore PD(B) = qD(B) since the ideals of D(B) are centrally
1031
+ generated. Therefore P/qD is B-torsion, so, if it is not zero, it contains a nonzero
1032
+ element which is either killed by q and by s, or by q and x. As in the previous
1033
+ paragraph D/qD is GK-homogeneous of GK-dimension 5, and so has no such non-
1034
+ zero torsion submodule, proving that (5.3) is an equality.
1035
+ If p = p2 then the argument to show that P = sD is similar, but using the Ore
1036
+ set A; it is left to the reader.
1037
+
1038
+
1039
+ THE PRIME SPECTRUM OF THE DRINFELD DOUBLE OF THE JORDAN PLANE
1040
+ 19
1041
+ 5.2. The Dixmier-Moeglin equivalence. The following gives evidence in favour
1042
+ of [6, Conjecture 1.3], which proposes that an affine noetherian Hopf C-algebra of
1043
+ finite GK dimension should satisfy the Dixmier-Moeglin equivalence. See [5,10] for
1044
+ definitions and background.
1045
+ Corollary 5.4. D satisfies the Dixmier-Moeglin equivalence.
1046
+ Proof. We check first using the description of the primitive spectrum in §4.5 that
1047
+ every primitive ideal is locally closed. For classes (I) and (III) this is clear since
1048
+ all these primitive ideals are maximal. The primitive ideals in (II) are homeomor-
1049
+ phic to the primitive spectrum of U(sl(2, k)), and the latter algebra satisfies the
1050
+ equivalence by [23]. Thus, by [10, Lemma II.7.15], it only remains to show that
1051
+ every rational prime ideal P is primitive, where P is rational if the centre of the
1052
+ Goldie quotient algebra of D/P is k. The non-primitive prime ideals are listed in
1053
+ Theorem 5.3 and it is easy to check case by case that none of them is rational.
1054
+
1055
+ Corollary 5.4 proves Theorem 1.3(c). With one exception, parts (a) and (b) of
1056
+ that theorem are proved in the results of the last two sections that describe the
1057
+ prime ideals of D. The exception is the claim that all the completely prime factors
1058
+ of D (with the possible exception of D/P0, as noted in Remark 4.14) are birationally
1059
+ equivalent to Weyl algebras. For the primitive ideals P strictly containing O(G)+D
1060
+ this follows from [13, Remarque 7.1]. For the other prime ideals, this is clear from
1061
+ the description of the prime ideals in the last two sections.
1062
+ Based on little more than the known results and counterexamples for group
1063
+ algebras and enveloping algebras, the theorem [6] for the cocommutative case, the
1064
+ recent work of Sierra and Walton on the noetherian property for enveloping algebras
1065
+ [25], together with the above result and other isolated examples, we are tempted
1066
+ to propose the following conjecture as a strengthening in the pointed setting of [6,
1067
+ Conjecture 1.3], as much in the hope of stimulating the discovery of counterexamples
1068
+ as in expectation of a positive result.
1069
+ Conjecture 5.5. Let H be an affine noetherian pointed Hopf C-algebra. Then the
1070
+ following are equivalent:
1071
+ (1) GKdim(H) is finite.
1072
+ (2) H satisfies the Dixmier-Moeglin Equivalence.
1073
+ (3) The group G(H) of grouplikes of H is nilpotent-by-finite.
1074
+ Thanks to a famous result of Roseblade [24] for group algebras, the implication
1075
+ (2) =⇒ (3) fails when k is a finite field.
1076
+ References
1077
+ [1] N. Andruskiewitsch, F. Dumas, and H. M. Pena Pollastri, On the double of the Jordan plane,
1078
+ Ark. Mat. 60 (2022), 213-229.
1079
+ [2] N. Andruskiewitsch and H. M. Pena Pollastri, On the restricted Jordan plane in odd charac-
1080
+ teristic, J. Algebra Appln. 20 (2021), no. 2140012.
1081
+ [3]
1082
+ , On the finite-dimensional representations of the double of the Jordan plane,
1083
+ arXiv2211.01581 (2022).
1084
+ [4] M. Artin, L. W. Small, and J. J. Zhang, Generic flatness for strongly noetherian rings, J.
1085
+ Algebra 221 (1999), 579-610.
1086
+ [5] J. Bell, On the importance of being primitive, Rev. Colombiana Mat. 53 (2019), 87-112.
1087
+ [6] J. Bell and W. H. Leung, The Dixmier-Moeglin equivalence for cocommutative Hopf Algebras
1088
+ of finite Gelfand-Kirillov Dimension, Alg. Rep. Theory 17 (2014), 1843-1852.
1089
+
1090
+ 20
1091
+ K. A. BROWN AND J. T. STAFFORD
1092
+ [7] J.-E. Bjork, The Auslander condition on noetherian rings, Seminaire Malliavin, Lecture Notes
1093
+ in Math. 1404 (1989), 137-173.
1094
+ [8] K. A. Brown, Unruffled extensions and flatness over central subalgebras, J. Algebra 284
1095
+ (2005), 771-800.
1096
+ [9] K. A. Brown, M. Couto, and A. Jahn, The finite dual of commutative-by-finite Hopf algebras,
1097
+ Glasgow Math. J. (2022), 1-28.
1098
+ [10] K. A. Brown and K. R. Goodearl, Lectures on Algebraic Quantum Groups, Advanced Courses
1099
+ in Math. CRM Barcelona, Birkhauser, 2002.
1100
+ [11] K. A. Brown and J. J. Zhang, Dualising complexes and twisted Hochschild (co)homology for
1101
+ noetherian Hopf algebras, J. Algebra 320 (2008), 1814-1850.
1102
+ [12] P. M. Cohn, Algebra, Vol. II, Wiley, 1977.
1103
+ [13] J. Dixmier, Quotients simples de l’alg`ebre enveloppante de sl2, J. Algebra 24 (1973), 551-564.
1104
+ [14] Y. Doi and M. Takeuchi, Multiplication alteration by two-cocycles - the quantum version,
1105
+ Comm. in Algebra 22 (1994), 5715-5732.
1106
+ [15] R. M. Fossum, The Divisor Class Group of a Krull Domain, Ergebnisse der Mathematik und
1107
+ ihrer Grenzgebiete, vol. 74, Springer, 1973.
1108
+ [16] K. R. Goodearl and T. L. Lenagan, Primitive ideals in quantum SL3 and GL3, Contemp.
1109
+ Math. 562 (2012), 115-140.
1110
+ [17] K. R. Goodearl and R. W. Warfield, An Introduction to Noncommutative Noetherian rings,
1111
+ Second edition, London Math. Soc. Student Texts, vol. 61, Cambridge University Press, 2004.
1112
+ [18] G. R. Krause and T. H. Lenagan, Growth of Algebras and Gelfand-Kirillov Dimension, Re-
1113
+ vised Edition, Graduate Studies in Math., vol. 22, Amer. Math. Soc., 2000.
1114
+ [19] T. Levasseur, Some properties of non-commutative regular graded rings, Glasgow Math. J.
1115
+ 34 (1992), 277-300.
1116
+ [20] K. Li and G. Liu, The finite duals of affine prime regular Hopf algebras of GK-dimension
1117
+ one, arXiv2103.00495 (2021).
1118
+ [21] J. C. McConnell and J. C. Robson, Noncommutative Noetherian rings, Revised edition, Grad-
1119
+ uate Studies in Mathematics, vol. 30, Amer. Math. Soc., Providence, RI, 2001.
1120
+ [22] J. C. McConnell and J. T. Stafford, Gelfand-Kirillov dimension and associated graded mod-
1121
+ ules, J. Algebra 125 (1989), 197-214.
1122
+ [23] C. Moeglin, Id´eaux primitifs d´es alg`ebres enveloppantes, J. Math. Pures Appl. 59 (1980),
1123
+ 265-336.
1124
+ [24] J. E. Roseblade, Group rings of polycyclic groups, J. Pure Appl. Algebra 3 (1973), 307-328.
1125
+ [25] S. Sierra and C. Walton, The universal enveloping algebra of the Witt algebra is not noether-
1126
+ ian, Adv. Math. 262 (2014), 239-260.
1127
+ School of Mathematics and Statistics, University of Glasgow, Glasgow G12 8QQ,
1128
+ Scotland
1129
+ Email address: ken.brown@glasgow.ac.uk
1130
+ School of Mathematics, The University of Manchester, Manchester M13 9PL, Eng-
1131
+ land
1132
+ Email address: Toby.Stafford@manchester.ac.uk
1133
+
89E3T4oBgHgl3EQfSAmG/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dE3T4oBgHgl3EQfqgpk/content/tmp_files/2301.04652v1.pdf.txt ADDED
@@ -0,0 +1,983 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ESTIMATE DEFORMATION CAPACITY OF
2
+ NON-DUCTILE RC SHEAR WALLS USING
3
+ EXPLAINABLE BOOSTING MACHINE
4
+ Zeynep Tuna Deger (1*), Gulsen Taskin Kaya (1), John W. Wallace (2)
5
+ (1) Istanbul Technical University, (2) University of California, Los Angeles
6
+ (*) corresponding author
7
+ {zeynep.tuna@itu.edu.tr, gulsen.taskin@itu.edu.tr, wallacej@ucla.edu}
8
+ Abstract
9
+ Machine learning is becoming increasingly prevalent for tackling challenges in earthquake
10
+ engineering and providing fairly reliable and accurate predictions. However, it is mostly
11
+ unclear how decisions are made because machine learning models are generally highly
12
+ sophisticated, resulting in opaque black-box models. Machine learning models that are
13
+ naturally interpretable and provide their own decision explanation, rather than using an
14
+ explanatory, are more accurate in determining what the model actually computes. With
15
+ this motivation, this study aims to develop a fully explainable machine learning model
16
+ to predict the deformation capacity of non-ductile reinforced concrete shear walls based
17
+ on experimental data collected worldwide. The proposed Explainable Boosting Machines
18
+ (EBM)-based model is an interpretable, robust, naturally explainable glass-box model, yet
19
+ provides high accuracy comparable to its black-box counterparts. The model enables the
20
+ user to observe the relationship between the wall properties and the deformation capacity
21
+ by quantifying the individual contribution of each wall property as well as the correlations
22
+ among them. The mean coefficient of determination R2 and the mean ratio of predicted
23
+ to actual value based on the test dataset are 0.92 and 1.05, respectively. The proposed
24
+ predictive model stands out with its overall consistency with scientific knowledge, practicality,
25
+ and interpretability without sacrificing high accuracy.
26
+ Keywords: Explainable boosting machine, glass-box model, feature selection, general additive model, reinforced
27
+ concrete shear wall, deformation capacity, interpretability
28
+ 1
29
+ Introduction
30
+ Shear walls are typically utilized as the primary elements to resist lateral loads in reinforced concrete buildings.
31
+ Towards capacity design assumptions, shear walls are designed to exhibit ductile behavior by providing
32
+ adequate reinforcement and proper detailing. However, experimental studies have shown that walls with an
33
+ aspect ratio smaller than 1.5 (i.e., squat walls) and those with poor reinforcement and detailing, despite
34
+ their higher aspect ratio, end up showing brittle failure (e.g., diagonal tension, web crushing) [1, 2, 3]. Such
35
+ walls are often observed in buildings not designed according to modern seismic codes and are prone to severe
36
+ damage [4, 5]. As the performance-based design and assessment approach has gained importance concordant
37
+ arXiv:2301.04652v1 [cs.LG] 11 Jan 2023
38
+
39
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
40
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
41
+ with hazard mitigation efforts, there has been an increasing need and demand for reliable models to predict
42
+ structural behavior under seismic actions. This objective is particularly important for walls that exhibit
43
+ shear behavior as the nonlinear deformation capacity of such walls is assumed to be zero, potentially leading
44
+ to technical and economical over-conservation. More realistic solutions can be achieved if their behavior is
45
+ accurately estimated and considered in seismic performance evaluation.
46
+ The prediction of structural behavior has been achieved through the use of predictive equations or models that
47
+ are developed based on available experimental data. Recently, machine learning (ML) methods have gained
48
+ significant attention structural/earthquake engineering field and have demonstrated promising results despite
49
+ the scarcity of data (compared to much larger data available in fields such as computer vision and image
50
+ processing). Black-box models, with their high complexity and nonlinearity, often represent the input-output
51
+ relationship better than the interpretable models in classification and regression applications. However, they
52
+ are not necessarily consistent with true physical behavior. There are examples of misleading conclusions of
53
+ black-box models in scientific and engineering applications [6, 7, 8]. Therefore, despite the high accuracy
54
+ they achieve, black-box models are not completely accepted in earthquake engineering society. To leverage
55
+ the advantages of the developments in artificial intelligence without ignoring the physical behavior, there has
56
+ been recent research efforts that incorporates black-box machine learning methods with physical knowledge
57
+ [8, 9, 10, 11]. This study takes this issue a step further and integrates an explainable machine learning
58
+ approach (versus black-box) with existing physics-based understanding of seismic behavior to estimate the
59
+ deformation capacity of non-ductile shear walls.
60
+ 2
61
+ Literature Review
62
+ Research efforts in the literature to estimate wall deformation capacity have produced empirical models, some
63
+ recently adopted by building codes [12]; however, they are relatively limited compared to other behavior
64
+ features such as shear strength or failure mode. Earlier models were mainly developed using a limited number
65
+ of experimental results [13, 14] or were trained using a single dataset; that is, they were not trained and tested
66
+ based on unmixed data [12, 15]. Over time, as machine learning is embraced in the earthquake engineering
67
+ field [16, 17, 18, 19, 20, 11] and new experiments are conducted, more advanced models have been developed.
68
+ Yet, two main issues are encountered: (i) Some models used simple approaches such as linear regression
69
+ for the sake of interpretability [21] and sacrificed overall accuracy (or had large dispersion). One might
70
+ think that accurate models that predict relatively complicated behavior attributes can only be achieved
71
+ by increasing model complexity; however, literature studies have shown that this may cause problems with
72
+ the structure and distribution of the data [22, 23]. More importantly, urging the model to develop complex
73
+ relationships to achieve higher performance typically leads to black-box models where internal mechanisms
74
+ include highly nonlinear, complex relations. (ii) Such black-box models achieve high overall accuracy at
75
+ the cost of explainability [18]. Researchers that acknowledge the significance of interpretability employed
76
+ model-agnostic, local or global explanation methods (e.g., SHapley Additive exPlanation, Local Interpretable
77
+ Model-agnostic Explanations) to interpret the decision mechanism of their models [11]. Such algorithms are
78
+ not fully verified [24, 25]; besides, they are approximate approaches. Moreover, despite their broadening
79
+ use and high accuracy, the black-box models are not entirely accepted in the earthquake engineering society
80
+ as their internal relations are opaque and, in some cases, not entirely reliable [26]. Therefore, it is critical
81
+ to understand how the model makes the decision/estimation to (i) verify that the model is physically
82
+ meaningful, (ii) develop confidence in the predictive model, and (iii) broaden existing scientific knowledge
83
+ with new insights.This study addresses this need and fills this important research gap by using domain-specific
84
+ knowledge to evaluate and validate the decisions made by ML methods. Unlike the existing ML-based
85
+ predictive models ([11, 18]), the proposed model aims particularly at the deformation capacity of non-ductile
86
+ shear walls and is naturally transparent and interpretable.
87
+ Concerns regarding the trustworthiness and transparency of the black-box models motivated the development
88
+ of a relatively new research area known as explainable artificial intelligence (XAI) [27, 28]. The XAI aims to
89
+ provide a set of machine learning (ML) techniques for building more comprehensible and understandable
90
+ models while maintaining a high level of learning performance. The strategies used in XAI are divided
91
+ 2
92
+
93
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
94
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
95
+ into two main categories: explaining existing black-box models (post-hoc explainability) and generating
96
+ glass-box (transparent) models. In the former, interpretability is confined to the usage of certain so-called
97
+ explanatory algorithms that are employed to explain a black-box model, while in the latter, a predictive
98
+ model is fully comprehensible and interpretable by humans. A model should have certain qualities to be
99
+ considered a transparent model such as decomposability, algorithmic transparency, and simulatability [29]. The
100
+ decomposability relates to the ability to explain each model component in terms of the inputs’ contributions
101
+ or correlations, whereas simulatability refers to the number of parameters (input) in the model representation
102
+ (the less is the more understandable). The algorithmically transparent models enable a clear comprehension
103
+ of the model’ behavior for predicting any given output from its input data. Therefore, transparent models
104
+ are highly needed approaches in fields where decisions are critical, but their performances are typically very
105
+ low. Machine learning models that can maintain the tradeoff between performance and explainability, i.e.,
106
+ converging to the performance of black-box models while still providing explainability, would significantly
107
+ address the demands in earthquake engineering society. In this context, explainable boosting machine (EBM)
108
+ [30], a recently developed method belonging to the family of Generalized Additive Models (GAMs) [31], is a
109
+ highly accurate and transparent ML method delivering an explicit and fully explainable predictive model.
110
+ The EBM has been utilized in the literature to solve a variety of problems, including detecting common flaws
111
+ in data [32], diagnosing COVID-19 using blood test variables [33], predicting diseases such as Alzheimer [34],
112
+ or Parkinson [35], and has shown to outperform black-box models with the additional benefit of being an
113
+ inherently explainable predictive model.
114
+ In this study, the EBM is used for the first time in the earthquake engineering field to construct an EBM-
115
+ based predictive model for estimating deformation capacity on non-ductile RC shear walls. The inputs of
116
+ the predictive model are designated as the shear wall design properties (e.g., wall geometry, reinforcing
117
+ ratio), whereas the output is one of the constitutive components of the nonlinear wall behavior, that is, the
118
+ deformation capacity. The main contributions of this research are highlighted as follows:
119
+ • A fully transparent and interpretable predictive model is developed to estimate the deformation
120
+ capacity of RC shear walls that are failed in pure shear or shear-flexure interaction.
121
+ • The proposed model meets all desired properties, i.e., decomposability, algorithmic transparency,
122
+ and simulatability, without compromising high performance.
123
+ • This study integrates novel computational methods (i.e., EBM) and domain-based knowledge to
124
+ formalize complex engineering knowledge. The proposed model’s overall consistency with a physics-
125
+ based understanding of seismic behavior is verified.
126
+ 3
127
+ The RC Shear Wall Database
128
+ The experimental data used in this research is a sub-assembly of the wall test database utilized in Deger
129
+ and Taskin (2022) [19] with 30 additional data [36, 37]. As the main focus is to estimate the deformation
130
+ capacity of walls governed by shear or shear-flexure interaction, walls that did not show so-called shear failure
131
+ indications are excluded from the database, resulting in 286 specimens of use for this research. All specimens
132
+ were tested under quasi-static cyclic loading, whereas none was retrofitted and re-tested. The database
133
+ consists of wall design parameters, which are herein designated as the input variables of the machine learning
134
+ problem, namely: wall geometry (tw, lw, hw), shear span ratio (M/V lw), concrete compressive strength
135
+ (fc), longitudinal and transverse reinforcing ratios at web (fyl, fyt), longitudinal and transverse reinforcing
136
+ ratios at boundary elements (fybl, fysh), axial load ratio (P/Agfc), shear demand (or strength) at the section
137
+ (Vmax), cross-section type (rectangular, barbell-shape, or flanged), curvature type (single or double). It is
138
+ noted that single curvature and double curvature correspond to the end conditions of the specimen, i.e.,
139
+ cantilever and fixed-fixed, respectively. Distributions of the input variables are presented in Fig.1 along with
140
+ their box plots (shown in blue).
141
+ The output variable of the ML problem, the deformation capacity, is taken directly as the reported ultimate
142
+ displacement prior to its failure if the specimen is tested until failure. Otherwise, it is assumed as the
143
+ displacement corresponding to 0.8Vmax as suggested by Park, 1989. It is noted that failure displacement
144
+ 3
145
+
146
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
147
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
148
+ 0.5
149
+ 1.0
150
+ 1.5
151
+ 2.0
152
+ 2.5
153
+ 3.0
154
+ 3.5
155
+ 4.0
156
+ MVlw
157
+ 0.5
158
+ 1.0
159
+ 1.5
160
+ 2.0
161
+ 2.5
162
+ 3.0
163
+ 3.5
164
+ 4.0
165
+ hw/lw
166
+ 0.0
167
+ 0.1
168
+ 0.2
169
+ 0.3
170
+ 0.4
171
+ 0.5
172
+ P/Agfc
173
+ 0
174
+ 1
175
+ 2
176
+ 3
177
+ 4
178
+ 5
179
+ 6
180
+ rol
181
+ 0.5
182
+ 1.0
183
+ 1.5
184
+ 2.0
185
+ 2.5
186
+ rot
187
+ 0
188
+ 2
189
+ 4
190
+ 6
191
+ 8
192
+ 10
193
+ rosh
194
+ 0
195
+ 5
196
+ 10
197
+ 15
198
+ 20
199
+ 25
200
+ robl
201
+ 20
202
+ 40
203
+ 60
204
+ 80
205
+ 100
206
+ 120
207
+ 140
208
+ fc
209
+ 50
210
+ 100
211
+ 150
212
+ 200
213
+ 250
214
+ 300
215
+ tw
216
+ 0
217
+ 500
218
+ 1000
219
+ 1500
220
+ 2000
221
+ 2500
222
+ Vmax
223
+ Figure 1: Distribution of the input variables in the database.
224
+ was taken as the total wall top displacement and was not separated into shear and flexural deformation
225
+ components.
226
+ 4
227
+ Explainable Boosting Machines
228
+ Explainable Boosting Machines (EBM) is a state-of-the-art machine learning technique designed as accurately
229
+ as random forests and boosted trees while also being simple to understand [30, 38]. The EBM delivers a
230
+ complete explainable learning model that belongs to the family of Generalized Additive Models (GAMs) [39]:
231
+ g(f(x1, . . . , xn)) = f0 + f1(x1) + f2(x2) + . . . , fn(xn)
232
+ (1)
233
+ where f0 is an intercept, and each fj is called a shape function, representing the individual effect of the
234
+ xj-th variable on the model output, f(x1, . . . , xn). The g is utilized as a link function, adapting the model to
235
+ different settings, e.g., identity function for regression and logistic function for classification. The intercept, f0,
236
+ is calculated as the mean response of all the outputs. Because the shape functions are trained independently
237
+ for each input variable, the model is additive (decomposable), allowing to separately analyze the effect of
238
+ each input variable on the model output. The EBM is designed to improve the performance of the standard
239
+ GAM while maintaining its interpretability.
240
+ Generalized Additive Models are more comprehensible than black-box models, but the analytical form of the
241
+ shape functions is typically unknown, making it unsuitable for machine learning purposes. Although other
242
+ analytical functions, such as splines or orthogonal polynomials, can be offered for defining shape functions,
243
+ they are frequently less accurate when representing a nonlinear model [40]. The EBM uses shallow trees to
244
+ construct the shape functions; therefore, it easily captures the nonlinearity of the data. Each input variable
245
+ (xi) is modeled with ensemble trees such as bagging and gradient boosting. As a result, rather than employing
246
+ the spline method, which is prevalent in traditional GAMs, the function associated with each input variable
247
+ or interaction is produced from a vast set of shallow trees.
248
+ The EBM offers both local and global explanations of the learning model as each variable importance is
249
+ estimated as the average absolute value of the predicted score. Moreover, each shape function can be visualized
250
+ (algorithmically transparent); therefore, it is possible to observe the effects of the particular feature at certain
251
+ intervals. In the inference phase, all the terms in Eq.1 are added up and passed through the link function to
252
+ g to compute the final prediction as shown in Fig. 2. In other words, individual predictions are generated
253
+ using the shape functions, fi, which act as a lookup table.
254
+ To demonstrate which feature had the largest impact on the individual forecast, the contributions can be
255
+ sorted and shown using the principles of additivity and modularity.
256
+ The EBM’s performance can be improved by including pairwise effects between variables in the model
257
+ representation. For better performance, additional interactions can be incorporated; however, this may result
258
+ in a more complex model with lower generalization performance due to the increased number of model
259
+ parameters to be trained. The pairwise interactions are included in GA2Ms [41], which is a second-order
260
+ 4
261
+
262
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
263
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
264
+ Inference Phase
265
+ Intercept +
266
+ +
267
+ +
268
+ +
269
+ E B M P r e d i c t i o n M o d e l
270
+ f0
271
+ +
272
+ f1(x1)
273
+ f2(x2)
274
+ f3(x3)
275
+ +
276
+ +
277
+ +
278
+ f12(x1, x5)
279
+ x1
280
+ x2
281
+ x3
282
+ x1
283
+ x5
284
+ score
285
+ score
286
+ score
287
+ score
288
+ Figure 2: Inference phase of EBM.
289
+ additive model:
290
+ g(E[y])) = f0 +
291
+ n
292
+
293
+ i=1
294
+ fi(xi) +
295
+ K
296
+
297
+ i=1
298
+ fk(xk1, xk2)
299
+ (2)
300
+ where K pairs of features (k1, k2) are chosen greedily (FAST algorithm) [42]. The pairwise interaction
301
+ fij(xi, xj) could be rendered as a heatmap on the two-dimensional xi, xj - plane, still providing high
302
+ intelligibility. Even though adding more interactions does not affect the model’s explainability, the final
303
+ prediction model may be less comprehensible due to a large number of interactions (less simulatability).
304
+ 5
305
+ Development of the Predictive Model
306
+ 5.1
307
+ Overall Performance of EBM
308
+ To assess whether the method compromises accuracy for the sake of interpretability, the performance of the
309
+ EBM model is compared to three state-of-the-art black-box machine learning models, namely: XGBoost [43],
310
+ Gradient Boost [44], Random Forest [45], and two glass-box models, namely Ridge Linear Regression [46],
311
+ Decision Tree [47]. All the implementations are carried out in a Python environment. For all ML models, the
312
+ entire database, including all twelve input variables (ten variables from Fig.1 and two binary coded variables
313
+ for curvature type and cross-section type), is randomly split into training and test datasets with a ratio of
314
+ 90% and 10%, respectively.
315
+ Tunning of the hyperparameters, such as learning rate, number of leaves, number of interactions, and so
316
+ on, typically affects the performance of the corresponding regression model. For hyperparameter tuning, a
317
+ 10-fold cross-validation technique (Fig. 3) is used, wherein a subset of the data is kept as validation data,
318
+ and the model’s performance is evaluated using various hyperparameter settings on the validation set. This
319
+ method prevents the tuning from overfitting the training dataset.
320
+ Training Phase
321
+ Split Training dataset into k-folds
322
+ Validation
323
+ Training
324
+ Validation
325
+ Training
326
+ Validation
327
+ Training
328
+ Validation
329
+ Training
330
+ Validation
331
+ Training
332
+ Training
333
+ Training
334
+ Training
335
+ Hyperparameter tuning
336
+ Model Evalution on validation data
337
+ R^2, RE, PA
338
+ Figure 3: Illustration of k-fold cross-validation technique, where k is set to 5.
339
+ For performance evaluations, the following three metrics are used over “unseen” (i.e., not used in the training
340
+ process) test data sets of ten random train-test data splittings: coefficient of determination (R2), relative
341
+ 5
342
+
343
+ 60
344
+ 40
345
+ Score
346
+ 20
347
+ 0
348
+ 2
349
+ m60
350
+ 40
351
+ Score
352
+ 20
353
+ 0
354
+ -20
355
+ 50
356
+ 100
357
+ 150
358
+ 200
359
+ 25060
360
+ 40
361
+ Score
362
+ 20
363
+ -20
364
+ 0
365
+ 0.1
366
+ 0.2
367
+ 0.3
368
+ 0.4
369
+ 0.5300
370
+ 60
371
+ 250
372
+ 40
373
+ 200
374
+ 20
375
+ 150
376
+ 0
377
+ 100
378
+ -20
379
+ 50
380
+ 2
381
+ 4
382
+ MVIWDeger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
383
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
384
+ Table 1: Mean performance scores based on the test datasets over ten random splittings.
385
+ Black-box
386
+ Glass-box
387
+ EBM
388
+ XGBoost
389
+ GB
390
+ RF
391
+ RLR
392
+ DT
393
+ R2
394
+ 0.83
395
+ 0.80
396
+ 0.79
397
+ 0.83
398
+ 0.41
399
+ 0.67
400
+ RE (%)
401
+ 0.41
402
+ 0.40
403
+ 0.32
404
+ 0.28
405
+ 0.67
406
+ 0.47
407
+ PA
408
+ 1.21
409
+ 1.17
410
+ 1.20
411
+ 1.15
412
+ 2.0
413
+ 1.9
414
+ error (RE), and prediction accuracy (PA), as given in Eqs. 3, 4, and 5, respectively.
415
+ R2
416
+ =
417
+ 1 −
418
+
419
+ i(yi − ˆyi)2
420
+
421
+ i(yi − ¯y)2
422
+ (3)
423
+ RE
424
+ =
425
+
426
+ i | ˆyi − yi|
427
+
428
+ i |yi|
429
+ | × 100%
430
+ (4)
431
+ PA
432
+ =
433
+
434
+ i
435
+ yi
436
+ ˆyi
437
+ (5)
438
+ where yi, ¯y, ˆyi, and m refer to the actual output, the mean value of yis, predicted output of corresponding
439
+ regression model, and a number of samples in the test dataset, respectively.
440
+ Mean performance scores of the ML models are summarized in Table 1, along with their dispersion demon-
441
+ strated in box plots in Fig. 4. The results indicate that EBM achieves comparable performance with its
442
+ black-box counterparts, with a correlation of determination of R2 = 0.83, a relative error of 0.41%, and a
443
+ PA = 1.21. As seen in Fig. 4, the low R2, RE, and PA deviations of EBM imply that reliable predictions can
444
+ be achieved regardless of the selected train-test splitting and verify the model’s robustness. Mean prediction
445
+ accuracy (PA) shows around 20% of overestimation for EBM and the black-box methods, suggesting that
446
+ some input variables are potentially noisy. Compared to transparent models, the EBM outperforms both
447
+ the Decision Tree (DT) and Ridge Linear Regression (RLR) across all three metrics, indicating that it is far
448
+ superior to the traditional glass-box approaches.
449
+ The most remarkable advantage of the EBM method over the others is that it provides full explainability
450
+ without sacrificing accuracy. Unlike other methods, EBM enables the user to understand how the prediction
451
+ is made and which parameters are essential in the decision-making process. Therefore, the EBM method is
452
+ selected as the baseline algorithm for the rest of the analysis to propose a prediction model for estimating the
453
+ deformation capacity based on the following criteria: developing a model with fewer input variables (high
454
+ simulatability), achieving high accuracy, and ensuring physical consistency.
455
+ 5.2
456
+ The Proposed EBM-based Predictive Model
457
+ The importance of the wall properties in predicting the deformation capacity is evaluated based on additive
458
+ term contributions visualized in Fig.5. Results reveal that tw and M/V lw (or hw/lw) have the greatest
459
+ impact on individual predictions. This is consistent with the mechanics of the behavior as walls with smaller
460
+ thickness are shown to be more susceptible to lateral stiffness degradation due to concrete spalling, leading
461
+ to a failure caused by lateral instabilities or out-of-plane buckling [48, 49]. The shear span ratio (or aspect
462
+ ratio), on the other hand, both have a significant impact on deformation capacity as the higher the shear
463
+ span ratio gets, the slender the wall is, and the higher deformations it typically can reach prior to its failure.
464
+ The least important wall parameters, on the other hand, are identified as curvature type, cross-section type,
465
+ and concrete compressive strength.
466
+ Another critical aspect considered in this study is to develop the predictive model with as few input variables
467
+ as possible. With that, the computational workload is aimed to be reduced, and a more practical and
468
+ interpretable model is proposed for potential users. To achieve this, knowledge-based-selected combinations
469
+ 6
470
+
471
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
472
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
473
+ Figure 4: Comparison of performance scores of ML methods for test samples based on ten random train
474
+ splittings.
475
+ Figure 5: EBM Global interpretation for twelve features included
476
+ of four-to-five features are exhaustively evaluated to reach performance scores as high as when twelve features
477
+ are included.
478
+ EBM can achieve similar performance scores using four features: M/V lw, P/Agfc, tw, and Vmax. Including
479
+ additional features (e.g., ρl, ρbl, ρsh) deemed impactful by EBM as well as experimental results [50, 51]
480
+ has only a modest effect on the overall performance. The performances of other methods are close to their
481
+ benchmark model (including twelve features), whereas the glass-box methods are affected by the reduction of
482
+ input size and show much lower performances. The mean R2 drops to 0.33 for the Ridge Linear Regression,
483
+ imparting that the input-output relation is not linear.
484
+ The proposed EBM-based predictive model is selected to achieve the highest R2 with a prediction accuracy
485
+ as close to 1.0 as possible. The correlation plots are presented in Fig. 6 for training and test data sets, where
486
+ 7
487
+
488
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
489
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
490
+ scattered data are concentrated along the y = x line, demonstrating that the proposed model can make
491
+ accurate predictions. It should be noted that the distribution of the residuals is concentrated around zero.
492
+ (a)
493
+ (b)
494
+ (a)
495
+ (b)
496
+ Training Dataset
497
+ Test Dataset
498
+ Prediction
499
+ Prediction
500
+ Actual
501
+ Actual
502
+ Figure 6: Correlations of the model outputs with the actual values for (a) training and (b) test datasets
503
+ As discussed above, the proposed model is an additive model in which each relevant feature is designated a
504
+ quantitative term contribution. The EBM allows the user to explore the contribution of each feature to the
505
+ model by plotting their shape functions (Fig.7a-d). As discussed above, the EBM method employs multiple
506
+ decision-tree learning models; therefore, inclines and declines are undertaken with jump-looking piece-wise
507
+ constant functions (versus smooth curves). The values, called scores, are read from these functions, and those
508
+ from heat maps (Fig.7e-f) representing pairwise interactions (i.e., between two features) are summed up to
509
+ calculate the prediction. The gray zones along the shape functions designate error bars that indicate the
510
+ model’s uncertainty and data sensitivity. This typically occurs in cases of sparsity or the presence of outliers
511
+ within the associated region.
512
+ The shape functions in Fig.7 also indicate their correlations with the output in a graphical representation. For
513
+ example, nonlinear patterns that can not be observed in linear approaches can be easily interpreted [52], which
514
+ provides new insights to broaden existing experimental-based knowledge. For example, the shear demand
515
+ Vmax (Fig.7d) reduces ductility; thus deformation capacity, as demonstrated by experimental results [53] and
516
+ suggested by ASCE 41-17 acceptance criteria. Yet, a highly nonlinear pattern is observed when relevant
517
+ experimental data are gathered [11, 21]. This nonlinearity can be observed in the shape function suggested
518
+ by the proposed method. Other input variables (tw, P/Agfc, M/V lw), on the other hand, demonstrate an
519
+ almost-linear trend. The interpretation of EBM for these variables is consistent with experimental results
520
+ 8
521
+
522
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
523
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
524
+ ���
525
+
526
+ ���
527
+
528
+ ���
529
+
530
+ ���
531
+
532
+ ���
533
+
534
+ ��
535
+ ��
536
+ ��
537
+ ������������
538
+ �������������
539
+ ������������
540
+ �����������
541
+ �����������
542
+ �����������
543
+ ����������
544
+ ����������
545
+ �����������
546
+ �����������
547
+ �����������
548
+ ����������
549
+
550
+ ��
551
+ ��
552
+ ��
553
+ ����
554
+ �����
555
+ �������
556
+ ��
557
+ ���
558
+ ���
559
+ ���
560
+ ���
561
+ ���
562
+ ���
563
+
564
+ ��
565
+ ��
566
+ ��
567
+ ���������
568
+ �����������
569
+ ���������
570
+ ��������
571
+ ���������
572
+ ���������
573
+ ���������
574
+ ���������
575
+ ���������
576
+ ���������
577
+ ���������
578
+ ���������
579
+
580
+ ��
581
+ ��
582
+ ��
583
+ ��
584
+ �����
585
+ �������
586
+
587
+ ���
588
+ ���
589
+ ���
590
+ ���
591
+ ���
592
+ ���
593
+
594
+ ��
595
+ ��
596
+ ��
597
+ ����������
598
+ ���������������
599
+ ��������������
600
+ �������������
601
+ �������������
602
+ �������������
603
+ �������������
604
+ �������������
605
+ �������������
606
+ �������������
607
+ �������������
608
+ �������������
609
+ �����������
610
+
611
+ ��
612
+ ���
613
+ ������
614
+ �����
615
+ �������
616
+ ���
617
+ ����
618
+ ����
619
+ ����
620
+ ����
621
+ ���
622
+
623
+ ��
624
+ ��
625
+ ��
626
+ ����������
627
+ ���������
628
+ ���������
629
+ ���������
630
+ �����������
631
+ ������������
632
+ ������������
633
+ �������������
634
+ ������������
635
+ ������������
636
+ �������������
637
+ �������������
638
+
639
+ ��
640
+ ��
641
+ ��
642
+ ����
643
+ �����
644
+ �������
645
+
646
+
647
+
648
+
649
+ ��
650
+ ���
651
+ ���
652
+ ���
653
+ ���
654
+ ���
655
+ ���
656
+
657
+ ��
658
+ ��
659
+ ��
660
+ ���������
661
+ ����
662
+ ��
663
+
664
+
665
+
666
+
667
+ ���
668
+ ����
669
+ ����
670
+ ����
671
+ ����
672
+ ���
673
+
674
+ ��
675
+ ��
676
+ ��
677
+ �����������
678
+ ����
679
+ ����
680
+ ,
681
+ ,
682
+ (a)
683
+ (b)
684
+ (c)
685
+ (d)
686
+ (e)
687
+ (f)
688
+ Figure 7: EBM shape functions (a-d) and pairwise interaction plots (e-f) for the proposed model. Note that
689
+ the intercept f0= 35.528.
690
+ in the literature, such that M/V lw (Fig.7a) and tw (Fig.7b) have a positive impact, as discussed above,
691
+ whereas P/Agfc (Fig.7c) has an adverse influence [54, 55]. The reason for M/V lw and tw (Fig.7b) suggesting
692
+ an inverse effect up to a certain point (M/V lw ≈ 1.2, tw ≈ 60 cm, P/Agfc ≈ 0.08) is because the model
693
+ has an intercept value (f0, Eq.2) and specimens with smaller deformation capacities (f0 less than 35.528)
694
+ are predicted adding up negative values. The unexpected jumps in tw are likely because there is an abrupt
695
+ accumulation of data at tw = 100 mm and tw = 200 mm (64 and 44 specimens, respectively), which probably
696
+ causes difficulty in decision making.
697
+ It is noted that the EBM method offers controllability over the structure of the model proposed by, for
698
+ instance, modifying the number of pairwise interactions. This allows the method to suggest more than one
699
+ 9
700
+
701
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
702
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
703
+ −30
704
+ −20
705
+ −10
706
+ 0
707
+ 10
708
+ 20
709
+ 30
710
+ Vmax (421.58)
711
+ MVlw x tw
712
+ MVlw x P/Agfc
713
+ P/Agfc (0.00)
714
+ tw (200.00)
715
+ MVlw (2.08)
716
+ Intercept
717
+ Predicted (81.9) | Actual (81.8)
718
+ −30
719
+ −20
720
+ −10
721
+ 0
722
+ 10
723
+ 20
724
+ 30
725
+ MVlw x tw
726
+ Vmax (445.60)
727
+ MVlw x P/Agfc
728
+ tw (130.00)
729
+ P/Agfc (0.50)
730
+ MVlw (2.00)
731
+ Intercept
732
+ Predicted (58.7) | Actual (67.2)
733
+ x
734
+ x
735
+ x
736
+ x
737
+ (a)
738
+ (b)
739
+ Figure 8: Variable contribution estimates for (a) well-predicted, (b) averagely-predicted samples.
740
+ model for the same input-output configuration for a particular train-test dataset. Reducing the number
741
+ of interactions brings simplicity to the model; however, it typically loses accuracy as EBM relies on its
742
+ automatically-determined interactions in the decision-making process. Given this trade-off, the number of
743
+ interactions is set to two for the proposed model.
744
+ 5.3
745
+ Sample-Based Explanation
746
+ This section presents the prediction of deformation capacity for two example specimens using the proposed
747
+ EBM-based predicted model. One specimen is predicted with excellent accuracy (almost zero error; Fig.8a),
748
+ whereas the other is predicted with around 15% error (Fig.8b).
749
+ Variable contribution estimates for each specimen are presented such that the intercept is constant and shown
750
+ in gray, the additive terms with positive impact are marked in orange, and additive terms decreasing the output
751
+ are shown in blue. Each contribution estimate is extracted from the shape functions and two-dimensional
752
+ heat maps (Fig.7) based on the input values of a specific specimen. Overall, the model is consistent with
753
+ physical knowledge, except Vmax has an unexpected positive impact on the output for the relatively worse
754
+ prediction (Fig.8b). This is an excellent advantage of EBM; that is, the user can prudently understand
755
+ how the prediction is made for a new sample and develop confidence in the predictive model (versus blind
756
+ acceptation in black-box models).
757
+ 5.4
758
+ Comparisons with Current Code Provisions
759
+ ASCE 41-17 and ACI 369-17 [56] provide recommended deformation capacities for nonlinear modeling purposes,
760
+ where shear walls are classified into the following two categories based on their aspect ratio: shear-controlled
761
+ (hw/lw > 1.5) and flexure-controlled (hw/lw > 3.0). The deformation capacity of shear-controlled walls is
762
+ identified as drift ratio such that ∆u/hw = 1.0 if the wall axial load level is greater than 0.5 and ∆u/hw = 2.0
763
+ otherwise.
764
+ Deformation capacity predictions based on the proposed EBM model are compared to ASCE 41-17/ACI
765
+ 369-17 provisions in Fig. 9. Predicted-to-actual ratios are 1.06 ± 0.49 and 6.42 ± 3.17 for EBM-based
766
+ model and code predictions, respectively. The results imply that traditional approaches may lead to the
767
+ overestimation of deformation capacities and cause unsafe assessments.
768
+ 10
769
+
770
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
771
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
772
+ 0
773
+ 5
774
+ 10
775
+ 15
776
+ 20
777
+ 25
778
+ 30
779
+ Specimen number
780
+ 10 0
781
+ 10 1
782
+ 10 2
783
+ 10 3
784
+ 10 4
785
+ 10 5
786
+ Ultimate displacement (mm)
787
+ Test (actual)
788
+ EBM-based model prediction
789
+ ASCE 41/ACI 369 prediction
790
+ Figure 9: Comparisons of EBM-based model predictions with code provisions.
791
+ 6
792
+ Conclusions
793
+ A fully transparent predictive model is developed to estimate the deformation capacity of reinforced concrete
794
+ shear walls that are failed in pure shear or shear-flexure interaction. To achieve this, a state-of-the-art machine
795
+ learning method, Explainable Boosting Machines (EBM), designed as accurately as random forests and
796
+ boosted trees, is utilized. The EBM provides an additive model such that each relevant feature is designated
797
+ a quantitative term contribution. The input-output configuration of the model is designated as the shear wall
798
+ design properties (e.g., wall geometry, axial load ratio) and ultimate wall displacement, respectively. The
799
+ conclusions derived from this study are summarized as follows:
800
+ • The importance of the wall properties in predicting the deformation capacity is evaluated based
801
+ on additive term contributions. tw and M/V lw (or hw/lw) have the greatest effect on individual
802
+ predictions, whereas the least relevant ones are identified as curvature type, cross-section type, and
803
+ concrete compressive strength.
804
+ • Compared to three black-box models (XGBoost, Gradient Boost, Random Forest), the EBM achieves
805
+ similar or better performance in terms of correlation of determination (R2), relative error (RE), and
806
+ prediction accuracy (PA; the ratio of predicted to the actual value). The EBM achieves a mean
807
+ R2 of 0.83 and a mean RE of 0.41% using twelve input variables based on ten random train-test
808
+ splittings.
809
+ • Compared to two glass-box methods (Decision Tree (DT) and Ridge Linear Regression (RLR)), the
810
+ EBM outperforms both methods across all three metrics.
811
+ • The dispersion of performance metrics of EBM is small, implying that the model is robust and the
812
+ performance is relatively less data-dependent.
813
+ • Compared to the developed model when all the available features are used, the EBM achieves
814
+ competitive performance scores using only four input variables: M/V lw, P/Agfc, tw, and Vmax.
815
+ Using these four features, the proposed EBM-based model achieves R2 of 0.92 and PA of 1.05 based
816
+ on the test dataset. Using fewer variables ensures that the model is less simulatable, more practical,
817
+ more comprehensible, and reduces the computational cost.
818
+ • It is important to note that the decision-making process developed by the proposed EBM-based model
819
+ has overall consistency with scientific knowledge despite several exceptions detected in sample-based
820
+ inferences. This is an excellent advantage of the proposed model; that is, the user can assess and
821
+ evaluate the prediction process before developing confidence in the result (versus blindly accepting as
822
+ in black-box models).
823
+ 11
824
+
825
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
826
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
827
+ • This model delivers exact intelligibility, i.e., there is no need to use local explanation methods (e.g.,
828
+ SHAP, LIME) to interpret the learning model, which obviates the uncertainties associated with their
829
+ approximations.
830
+ The proposed EBM-based model is valuable in that it is simultaneously accurate, explainable, and consistent
831
+ with scientific knowledge. The EBM’s ability to provide interpretable and transparent results would allow
832
+ engineers to better understand the factors that affect the deformation capacity of non-ductile RC shear walls
833
+ and make informed design decisions. The use of the EBM to estimate deformation capacity would improve the
834
+ reliability and efficiency of structural analysis and design processes, leading to safer and more cost-effective
835
+ buildings.
836
+ 12
837
+
838
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
839
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
840
+ References
841
+ [1] ASCE-41. ASCE Standard, ASCE/SEI, 41-17, Seismic Evaluation and Retrofit of Existing Buildings.
842
+ American Society of Civil Engineers, 2017.
843
+ [2] Leonardo M Massone and John W Wallace. Load-deformation responses of slender reinforced concrete
844
+ walls. Structural Journal, 101(1):103–113, 2004.
845
+ [3] Chadchart Sittipunt, Sharon L Wood, Panitan Lukkunaprasit, and Pichai Pattararattanakul. Cyclic
846
+ behavior of reinforced concrete structural walls with diagonal web reinforcement. Structural Journal,
847
+ 98(4):554–562, 2001.
848
+ [4] John W Wallace, Leonardo M Massone, Patricio Bonelli, Jeff Dragovich, René Lagos, Carl Lüders, and
849
+ Jack Moehle. Damage and implications for seismic design of rc structural wall buildings. Earthquake
850
+ Spectra, 28(1_suppl1):281–299, 2012.
851
+ [5] C Arnold, B Bolt, D Dreger, E Elsesser, R Eisner, W Holmes, G McGavin, and C Theodoropoulos.
852
+ Fema 454: Design for earthquakes: A manual for architects, 2006.
853
+ [6] David Lazer, Ryan Kennedy, Gary King, and Alessandro Vespignani. The parable of google flu: traps in
854
+ big data analysis. Science, 343(6176):1203–1205, 2014.
855
+ [7] John Douglas and Hideo Aochi. A survey of techniques for predicting earthquake ground motions for
856
+ engineering purposes. Surveys in geophysics, 29(3):187–220, 2008.
857
+ [8] Anuj Karpatne, Ramakrishnan Kannan, and Vipin Kumar. Knowledge Guided Machine Learning:
858
+ Accelerating Discovery using Scientific Knowledge and Data. CRC Press, 2022.
859
+ [9] Huan Luo and Stephanie German Paal. Artificial intelligence-enhanced seismic response prediction of
860
+ reinforced concrete frames. Advanced Engineering Informatics, 52:101568, 2022.
861
+ [10] Siyang Zhou, Shanglin Liu, Yilan Kang, Jie Cai, Haimei Xie, and Qian Zhang. Physics-based machine
862
+ learning method and the application to energy consumption prediction in tunneling construction.
863
+ Advanced Engineering Informatics, 53:101642, 2022.
864
+ [11] Muneera A Aladsani, Henry Burton, Saman A Abdullah, and John W Wallace. Explainable machine
865
+ learning model for predicting drift capacity of reinforced concrete walls. ACI Structural Journal, 119(3),
866
+ 2022.
867
+ [12] Saman A Abdullah and John W Wallace. Drift capacity of reinforced concrete structural walls with
868
+ special boundary elements. ACI Structural Journal, 116(1):183, 2019.
869
+ [13] T Paulay, MJN Priestley, and AJ Synge. Ductility in earthquake resisting squat shearwalls. In Journal
870
+ Proceedings, volume 79, pages 257–269, 1982.
871
+ [14] İlker Kazaz, Polat Gülkan, and Ahmet Yakut. Deformation limits for structural walls with confined
872
+ boundaries. Earthquake Spectra, 28(3):1019–1046, 2012.
873
+ [15] Sofia Grammatikou, Dionysis Biskinis, and Michael N Fardis. Strength, deformation capacity and failure
874
+ modes of rc walls under cyclic loading. Bulletin of earthquake engineering, 13(11):3277–3300, 2015.
875
+ [16] Sujith Mangalathu, Hansol Jang, Seong-Hoon Hwang, and Jong-Su Jeon. Data-driven machine-learning-
876
+ based seismic failure mode identification of reinforced concrete shear walls. Engineering Structures,
877
+ 208:110331, 2020.
878
+ [17] De-Cheng Feng, Wen-Jie Wang, Sujith Mangalathu, and Ertugrul Taciroglu. Interpretable xgboost-shap
879
+ machine-learning model for shear strength prediction of squat rc walls. Journal of Structural Engineering,
880
+ 147(11):04021173, 2021.
881
+ [18] Haoyou Zhang, Xiaowei Cheng, Yi Li, and Xiuli Du.
882
+ Prediction of failure modes, strength, and
883
+ deformation capacity of rc shear walls through machine learning. Journal of Building Engineering,
884
+ 50:104145, 2022.
885
+ [19] Zeynep Tuna Deger and Gulsen Taskin. A novel gpr-based prediction model for cyclic backbone curves
886
+ of reinforced concrete shear walls. Engineering Structures, 255:113874, 2022.
887
+ 13
888
+
889
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
890
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
891
+ [20] Zeynep Tuna Deger and Gulsen Taskin Kaya. Glass-box model representation of seismic failure mode
892
+ prediction for conventional reinforced concrete shear walls. Neural Computing and Applications, pages
893
+ 1–13, 2022.
894
+ [21] Zeynep Tuna Deger and Cagri Basdogan. Empirical expressions for deformation capacity of reinforced
895
+ concrete structural walls. ACI Structural Journal, 116(6), 2019.
896
+ [22] Justin M Johnson and Taghi M Khoshgoftaar. Survey on deep learning with class imbalance. Journal of
897
+ Big Data, 6(1):1–54, 2019.
898
+ [23] Bhavya Kailkhura, Brian Gallagher, Sookyung Kim, Anna Hiszpanski, and T Han.
899
+ Reliable and
900
+ explainable machine-learning methods for accelerated material discovery. npj Computational Materials,
901
+ 5(1):1–9, 2019.
902
+ [24] I Elizabeth Kumar, Suresh Venkatasubramanian, Carlos Scheidegger, and Sorelle Friedler. Problems
903
+ with shapley-value-based explanations as feature importance measures. In International Conference on
904
+ Machine Learning, pages 5491–5500. PMLR, 2020.
905
+ [25] Cynthia Rudin. Stop explaining black box machine learning models for high stakes decisions and use
906
+ interpretable models instead. Nature Machine Intelligence, 1(5):206–215, 2019.
907
+ [26] Christoph Molnar. Interpretable machine learning. Lulu. com, 2020.
908
+ [27] Amina Adadi and Mohammed Berrada. Peeking inside the black-box: a survey on explainable artificial
909
+ intelligence (xai). IEEE access, 6:52138–52160, 2018.
910
+ [28] Zachary C Lipton. The mythos of model interpretability: In machine learning, the concept of inter-
911
+ pretability is both important and slippery. Queue, 16(3):31–57, 2018.
912
+ [29] Alejandro Barredo Arrieta, Natalia Díaz-Rodríguez, Javier Del Ser, Adrien Bennetot, Siham Tabik,
913
+ Alberto Barbado, Salvador García, Sergio Gil-López, Daniel Molina, Richard Benjamins, et al. Explainable
914
+ artificial intelligence (xai): Concepts, taxonomies, opportunities and challenges toward responsible ai.
915
+ Information fusion, 58:82–115, 2020.
916
+ [30] Harsha Nori, Samuel Jenkins, Paul Koch, and Rich Caruana. Interpretml: A unified framework for
917
+ machine learning interpretability. arXiv preprint arXiv:1909.09223, 2019.
918
+ [31] Trevor Hastie, Robert Tibshirani, and Jerome Friedman. Additive models, trees, and related methods.
919
+ In The Elements of Statistical Learning, pages 295–336. Springer, 2009.
920
+ [32] Zhi Chen, Sarah Tan, Harsha Nori, Kori Inkpen, Yin Lou, and Rich Caruana. Using explainable boosting
921
+ machines (ebms) to detect common flaws in data. In Joint European Conference on Machine Learning
922
+ and Knowledge Discovery in Databases, pages 534–551. Springer, 2021.
923
+ [33] Lucas M Thimoteo, Marley M Vellasco, Jorge Amaral, Karla Figueiredo, Cátia Lie Yokoyama, and Erito
924
+ Marques. Explainable artificial intelligence for covid-19 diagnosis through blood test variables. Journal
925
+ of Control, Automation and Electrical Systems, 33(2):625–644, 2022.
926
+ [34] Alessia Sarica, Andrea Quattrone, and Aldo Quattrone. Explainable boosting machine for predicting
927
+ alzheimer’s disease from mri hippocampal subfields. In International Conference on Brain Informatics,
928
+ pages 341–350. Springer, 2021.
929
+ [35] Alessia Sarica, Andrea Quattrone, and Aldo Quattrone. Explainable machine learning with pairwise
930
+ interactions for the classification of parkinson’s disease and swedd from clinical and imaging features.
931
+ Brain Imaging and Behavior, pages 1–11, 2022.
932
+ [36] R Tokunaga and T Nakachi. Experimental study on edge confinement of reinforced concrete core walls.
933
+ In Fifteenth World Conference on Earthquake Engineering, Lisbon, pages 1–5, 2012.
934
+ [37] Masaya Hirosawa. Past experimental results on reinforced concrete shear walls and analysis on them.
935
+ Kenchiku Kenkyu Shiryo, 6:33–34, 1975.
936
+ [38] Harsha Nori, Rich Caruana, Zhiqi Bu, Judy Hanwen Shen, and Janardhan Kulkarni. Accuracy, inter-
937
+ pretability, and differential privacy via explainable boosting. In International Conference on Machine
938
+ Learning, pages 8227–8237. PMLR, 2021.
939
+ 14
940
+
941
+ Deger ZT, Kaya GT, Wallace JW. ESTIMATE DEFORMATION CAPACITY OF NON-DUCTILE RC
942
+ SHEAR WALLS USING EXPLAINABLE BOOSTING MACHINE,Preprint.
943
+ [39] Trevor Hastie and Robert Tibshirani. Generalized additive models: some applications. Journal of the
944
+ American Statistical Association, 82(398):371–386, 1987.
945
+ [40] Mathew W McLean, Giles Hooker, Ana-Maria Staicu, Fabian Scheipl, and David Ruppert. Functional
946
+ generalized additive models. Journal of Computational and Graphical Statistics, 23(1):249–269, 2014.
947
+ [41] Yin Lou, Rich Caruana, and Johannes Gehrke. Intelligible models for classification and regression. In
948
+ Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining,
949
+ pages 150–158, 2012.
950
+ [42] Simon N Wood. Fast stable direct fitting and smoothness selection for generalized additive models.
951
+ Journal of the Royal Statistical Society: Series B (Statistical Methodology), 70(3):495–518, 2008.
952
+ [43] Tianqi Chen and Carlos Guestrin. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd
953
+ acm sigkdd international conference on knowledge discovery and data mining, pages 785–794, 2016.
954
+ [44] Jerome H Friedman. Greedy function approximation: a gradient boosting machine. Annals of statistics,
955
+ pages 1189–1232, 2001.
956
+ [45] Leo Breiman. Random forests. Machine learning, 45(1):5–32, 2001.
957
+ [46] Trevor Hastie, Robert Tibshirani, Jerome H Friedman, and Jerome H Friedman. The elements of
958
+ statistical learning: data mining, inference, and prediction, volume 2. Springer, 2009.
959
+ [47] Leo Breiman, Jerome H Friedman, Richard A Olshen, and Charles J Stone. Classification and regression
960
+ trees. Routledge, 2017.
961
+ [48] Jose Miguel Vallenas, Vitelmo Victorio Bertero, and Egor Paul Popov. Hysteric behavior of reinforced
962
+ concrete structural walls. NASA STI/Recon Technical Report N, 80:27533, 1979.
963
+ [49] RG Oesterle, AE Fiorato, LS Johal, JE Carpenter, HG Russell, and WG Corley. Earthquake resistant
964
+ structural walls-tests of isolated walls. Research and Development Construction Technology Laboratories,
965
+ Portland Cement Association, 1976.
966
+ [50] AA Tasnimi. Strength and deformation of mid-rise shear walls under load reversal. Engineering Structures,
967
+ 22(4):311–322, 2000.
968
+ [51] MA Hube, A Marihuén, Juan Carlos de la Llera, and Bozidar Stojadinovic. Seismic behavior of slender
969
+ reinforced concrete walls. Engineering Structures, 80:377–388, 2014.
970
+ [52] Patrick Zschech, Sven Weinzierl, Nico Hambauer, Sandra Zilker, and Mathias Kraus. Gam (e) changer
971
+ or not? an evaluation of interpretable machine learning models based on additive model constraints.
972
+ arXiv preprint arXiv:2204.09123, 2022.
973
+ [53] WG Corley, AE Fiorato, and RG Oesterle. Structural walls. Special Publication, 72:77–132, 1981.
974
+ [54] Ioannis D Lefas, Michael D Kotsovos, and Nicholas N Ambraseys. Behavior of reinforced concrete
975
+ structural walls: strength, deformation characteristics, and failure mechanism. Structural Journal,
976
+ 87(1):23–31, 1990.
977
+ [55] Firooz Emamy Farvashany, Stephen J Foster, and B Vijaya Rangan. Strength and deformation of
978
+ high-strength concrete shearwalls. ACI structural journal, 105(1):21, 2008.
979
+ [56] ACI Committee 369. Standard Requirements for Seismic Evaluation and Retrofit of Existing Concrete
980
+ Buildings (ACI 369-17) and Commentary. ACI (American Concrete Institute), Farmington Hills, MI,
981
+ 2017.
982
+ 15
983
+
8dE3T4oBgHgl3EQfqgpk/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BNFIT4oBgHgl3EQf_iwr/content/tmp_files/2301.11415v1.pdf.txt ADDED
@@ -0,0 +1,1343 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk
2
+ Markov Decision Processes
3
+ Yifan Lin 1 Enlu Zhou 1
4
+ Abstract
5
+ We consider infinite-horizon Markov Decision
6
+ Processes where parameters, such as transition
7
+ probabilities, are unknown and estimated from
8
+ data.
9
+ The popular distributionally robust ap-
10
+ proach to addressing the parameter uncertainty
11
+ can sometimes be overly conservative. In this
12
+ paper, we utilize the recently proposed formu-
13
+ lation, Bayesian risk Markov Decision Process
14
+ (BR-MDP), to address parameter (or epistemic)
15
+ uncertainty in MDPs (Lin et al., 2022). To solve
16
+ the infinite-horizon BR-MDP with a class of con-
17
+ vex risk measures, we propose a computationally
18
+ efficient approach of approximate bilevel differ-
19
+ ence convex programming (ABDCP). The opti-
20
+ mization is performed offline and produces the
21
+ optimal policy that is represented as a finite state
22
+ controller with desirable performance guarantees.
23
+ We also demonstrate the empirical performance
24
+ of the infinite-horizon BR-MDP formulation and
25
+ proposed algorithms.
26
+ 1. Introduction
27
+ In a Markov decision process (MDP), an agent must make
28
+ decisions in a sequence while facing uncertainty. In this
29
+ situation, some parameters of the MDP, such as the transi-
30
+ tion probabilities and costs, may be unknown and must be
31
+ estimated from available data. The problem then becomes
32
+ how to determine the best course of action, given the limited
33
+ or possibly absent data, in order to minimize the expected
34
+ total cost and optimize the decision-making process under
35
+ these uncertain parameters.
36
+ An alternative approach to addressing the epistemic uncer-
37
+ tainty in MDP is through the use of distributionally robust
38
+ MDPs (DR-MDPs, (Xu & Mannor, 2010)). This method
39
+ considers the unknown parameters as random variables and
40
+ assumes that their distributions belong to an ambiguity set
41
+ 1H. Milton Stewart School of Industrial and Systems Engineer-
42
+ ing, Georgia Institute of Technology, Atlanta, GA, USA. Corre-
43
+ spondence to: Enlu Zhou <enlu.zhou@isye.gatech.edu>.
44
+ Preliminary work.
45
+ determined by the available data. The optimal policy is
46
+ then found by minimizing the expected total cost using the
47
+ most adversarial distribution within this ambiguity set. How-
48
+ ever, these distributionally robust approaches may lead to
49
+ overly conservative solutions that do not perform well in
50
+ scenarios that are more likely to occur than the worst case.
51
+ Additionally, the DR-MDP framework does not explicitly
52
+ incorporate the dynamics of the problem, as the distribu-
53
+ tion of the unknown parameters does not depend on the
54
+ data process, and is therefore not time consistent, as noted
55
+ in (Shapiro, 2021). In light of these limitations, (Lin et al.,
56
+ 2022) proposes a Bayesian risk MDP (BR-MDP) framework
57
+ to address epistemic uncertainty in MDPs. This approach
58
+ stems from the static stochastic optimization literature (Wu
59
+ et al., 2018; Zhou & Xie, 2015) and involves using a nested
60
+ risk functional based on the Bayesian posterior distributions,
61
+ which are updated using all available data at each stage in
62
+ the process. However, the alpha-function approximation
63
+ algorithm proposed in (Lin et al., 2022) only applies to
64
+ finite-horizon MDPs and provides an upper bound on the
65
+ exact value, without any theoretical guarantee on the gap.
66
+ In this paper, we reformulate the considered problem as a
67
+ bilevel difference convex programming (DCP) such that we
68
+ can employ the powerful optimization methods for DCP to
69
+ solve infinite-horizon BR-MDP. Since the space of poste-
70
+ rior distributions (beliefs) is uncountably infinite, we ap-
71
+ proximate the bilevel DCP by considering only a subset of
72
+ posterior distributions. Although the DCP is approximate,
73
+ we show that its solution is a lower bound on the optimal
74
+ exact value function. Using the representation of a finite
75
+ state controller of the resulting policy, we further show an
76
+ upper bound on the optimal exact value function. We then
77
+ develop an iterative approach to reduce the gap between
78
+ upper and lower bounds by incrementally generating new
79
+ sets of posterior distributions, and show the convergence of
80
+ the proposed algorithm.
81
+ To summarize, the contributions of this paper are two folds.
82
+ First, we analyze the infinite-horizon MDP with epistemic
83
+ uncertainty under the framework of BR-MDP via a Bayesian
84
+ perspective and show the existence and uniqueness of sta-
85
+ tionary optimal policy. Second, we propose an approxi-
86
+ mate difference convex programming algorithm to solve
87
+ the proposed formulation, and show the convergence of the
88
+ arXiv:2301.11415v1 [eess.SY] 26 Jan 2023
89
+
90
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
91
+ proposed algorithm.
92
+ The rest of the paper is organized as follows. We conduct
93
+ literature review and introduce the BR-MDP framework
94
+ in Section 2. We show the existence and uniqueness of a
95
+ stationary optimal policy to the infinite-horizon BR-MDP
96
+ in Section 3.1. We provide a bilevel DCP solution to the
97
+ infinite-horizon BR-MDP in Section 3.2. A computation-
98
+ ally efficient approximate DCP algorithm is then shown in
99
+ Section 3.3. We verify the theoretical results and demon-
100
+ strate the performance of our algorithms via numerical ex-
101
+ periments in Section 4. Finally, we conclude the paper in
102
+ Section 5.
103
+ 2. Background
104
+ 2.1. Related Literature
105
+ If the data used to estimate the true but unknown underlying
106
+ MDP are not sufficient, the estimated MDP may signifi-
107
+ cantly differ from the true MDP, leading to poor policy per-
108
+ formance. This discrepancy (between the estimated MDP
109
+ and the true MDP) can be seen tightly linked to the epistemic
110
+ uncertainty about the model. There have been numerous
111
+ approaches that address epistemic uncertainty in MDPs,
112
+ with robust MDP (Nilim & Ghaoui, 2004; Iyengar, 2005;
113
+ Delage & Mannor, 2010; Wiesemann et al., 2013; Petrik &
114
+ Russel, 2019) being one of the most widely used methods.
115
+ In robust MDPs, the optimal decisions are made based on
116
+ their performance under the most unfavorable conditions
117
+ within a known set of possible parameter values, known as
118
+ the ambiguity set.
119
+ In consideration of the overly conservativeness in the robust
120
+ MDP approach, risk-averse approach has been proposed to
121
+ address the epistemic uncertainty. Risk-averse approach is
122
+ originally proposed to address the aleatoric uncertainty that
123
+ is due to the inherent stochasticity of the underlying MDP
124
+ (Howard & Matheson, 1972; Ruszczy´nski, 2010; Petrik &
125
+ Subramanian, 2012; Osogami, 2012). It replaces the risk-
126
+ neutral expectation by some general risk measures, such as
127
+ conditional value-at-risk (CVaR, (Rockafellar & Uryasev,
128
+ 2000)). However, most of the existing approaches assume
129
+ the agent has access to the true underlying MDP, and op-
130
+ timize some risk measures such as CVaR in that single
131
+ MDP (Chow & Ghavamzadeh, 2014; Tamar et al., 2015a;b;
132
+ Sharma et al., 2019). In this paper, we consider the offline
133
+ planning problem in MDPs, where we only have access to
134
+ a prior belief distribution over MDPs that is constructed
135
+ by the offline data. It should be noted that offline planning
136
+ problem has also been considered in (Duff, 2002), where the
137
+ author proposes a Bayes-adaptive MDP (BA-MDP) formu-
138
+ lation with an augmented state composed of the underlying
139
+ MDP state and the posterior distribution of the unknown
140
+ parameters. When the agent is equipped with the learned
141
+ optimal policy and placed in a real environment, it behaves
142
+ as if it is adapting to its surroundings. Mostly close to the
143
+ problem setting in this work are (Rigter et al., 2021; Lin
144
+ et al., 2022). (Rigter et al., 2021) optimizes a CVaR risk
145
+ functional over the total cost and simultaneously addresses
146
+ both epistemic and aleatoric uncertainty, while (Lin et al.,
147
+ 2022) considers a nested risk functional to ensure the time
148
+ consistency of the obtained optimal policy.
149
+ While there are many works proposing different models and
150
+ frameworks to address the epistemic uncertainty, developing
151
+ computationally efficient solutions is also of great interest.
152
+ In robust MDPs, with some mild conditions on the ambigu-
153
+ ity set such as rectangularity, the proposed formulation can
154
+ be solved by a second-order cone program when the horizon
155
+ is finite, or policy iteration when the horizon is infinite (Man-
156
+ nor & Xu, 2019). In BA-MDP and its variants, (Rigter et al.,
157
+ 2021) proposes an approximate algorithm based on Monte
158
+ Carlo tree search and Bayesian optimization. (Lin et al.,
159
+ 2022) develops an α-function approximation algorithm us-
160
+ ing the convexity of the CVaR risk measure. However, the
161
+ aforementioned works consider a finite-horizon MDP and
162
+ do not generalize well to the infinite-horizon setting.
163
+ Compared to standard MDPs, our considered problem has
164
+ two distinct features that make it difficult to apply value
165
+ iteration, policy iteration, or linear programming (Puterman,
166
+ 2014). First is the resulting continuous-state MDP due to the
167
+ augmented belief state. We note that this continuous-state
168
+ MDP is similar to a belief-MDP, which is the equivalent way
169
+ to represent a partially observable MDP (POMDP) by treat-
170
+ ing the posterior distribution of the hidden state as a belief
171
+ state. Second is the risk measure taken with respect to the
172
+ unknown parameters in the MDPs. In this work, we propose
173
+ an optimization-based method to solve the infinite-horizon
174
+ BR-MDPs. It has been empirically shown in (Alagoz et al.,
175
+ 2015) that linear programming can efficiently solve a signif-
176
+ icant number of MDPs in comparison to standard dynamic
177
+ programming methods, such as value iteration and policy
178
+ iteration. Furthermore, linear programming requires less
179
+ memory and can handle MDPs with a larger number of
180
+ states and still achieve optimality. Works that are most re-
181
+ lated to our proposed optimization-based approach include
182
+ (Poupart et al., 2015) who proposes an approximate lin-
183
+ ear programming algorithm for the risk-neutral constrained
184
+ POMDPs, and (Ahmadi et al., 2021) who proposes a differ-
185
+ ence convex programming (DCP) for the constrained risk-
186
+ averse MDPs. Our approach for infinite-horizon BR-MDP
187
+ significantly differs from the above approaches in two as-
188
+ pects. First, compared to the linear programming approach
189
+ for risk-neutral POMDPs in (Poupart et al., 2015), we use
190
+ bilevel DCP, due to the additional risk measure that is used
191
+ for mitigating the epistemic uncertainty. Our considered risk
192
+ measure brings additional challenge to exactly evaluating
193
+ the policy, whereas policy evaluation can be easily solved
194
+
195
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
196
+ by a system of linear equations in (Poupart et al., 2015).
197
+ Second, compared to the DCP for the risk-averse MDP with
198
+ aleatoric uncertainty in (Ahmadi et al., 2021), the resulting
199
+ continuous-state MDP in our problem has an infinite number
200
+ of constraints, and thus requires appropriate approximation
201
+ to make the problem computationally feasible.
202
+ 2.2. Preliminary: Bayesian Risk MDPs
203
+ Consider
204
+ an
205
+ infinite-horizon
206
+ MDP
207
+ defined
208
+ as
209
+ (S, A, P, C, γ), where S is the state space, A is the
210
+ action space, P is the transition probability with P(s′|s, a)
211
+ denoting the probability of transitioning to state s′ from
212
+ state s when action a is taken, C is the cost function with
213
+ C(s, a, s′) denoting the cost when action a is taken and
214
+ state transitions from s to s′, 0 ≤ γ < 1 is the discount
215
+ factor. We assume the state space and action space are finite.
216
+ A Markovian deterministic policy π is a function mapping
217
+ from S to A. Given an initial state s, the goal is to find an
218
+ optimal policy that minimizes the expected discounted total
219
+ cost:
220
+ min
221
+ π Eπ,P,C ��∞
222
+ t=1 γt−1C (st, at, st+1) |s1 = s
223
+
224
+ ,
225
+ where Eπ,P,C is the expectation with policy π when the
226
+ transition probability is P and the cost is C. In practice, P
227
+ and C are often unknown and estimated from data.
228
+ BR-MDP is a recently proposed framework that deals with
229
+ the epistemic uncertainty in MDPs (Lin et al., 2022). It is
230
+ assumed that the state transition is specified by the state
231
+ equation s′ = g(s, a, ξ′) with a known transition function
232
+ g, which involves state s ∈ S ⊆ Rs, action a ∈ A ⊆ Ra,
233
+ and randomness ξ ∈ Ξ ⊆ Rk, where s, a, k are the di-
234
+ mensions of the state, action, and randomness, respec-
235
+ tively. The state equation together with the distribution of ξ
236
+ uniquely determines the transition probability of the MDP,
237
+ i.e., P(s′ ∈ S′|s, a) = P({ξ ∈ Ξ : g(s, a, ξ) ∈ S′}|s, a),
238
+ where S′ is a measurable set in S. The cost is assumed to
239
+ be a function of state s, action a, and randomness ξ, i.e.,
240
+ C(s, a, ξ). The distribution of ξ, denoted by f(·; θc), is
241
+ assumed to belong to a parametric family {f(·; θ)|θ ∈ Θ},
242
+ where Θ ⊆ Rd is the parameter space, d is the dimension
243
+ of the parameter θ, and θc ∈ Θ is the true but unknown
244
+ parameter value. Many problems meet the requirement of
245
+ having a parametric assumption. For example, it is com-
246
+ monly assumed that the demand of customers follows a
247
+ Poisson distribution with an unknown arrival rate in inven-
248
+ tory control.
249
+ We begin by assuming a prior distribution, denoted by µ,
250
+ over the parameter space Θ. This prior accounts for the
251
+ uncertainty of the parameter estimate that comes from an
252
+ initial set of data, and it can also take expert opinions into
253
+ consideration. Then, given an observed realization of the
254
+ data process, we update the posterior distribution µ accord-
255
+ ing to the Bayes’ rule. Let the policy be a sequence of
256
+ mappings from state s and posterior µ to the action space,
257
+ i.e., π = {π : S × M → A}, where M is the space of
258
+ posterior distributions. Note that this representation im-
259
+ plies the policy is stationary. Now we present the BR-MDP
260
+ formulation below.
261
+ min
262
+ π
263
+ ρµ1Eθ1
264
+
265
+ C1(s1, a1, ξ1) + · · ·
266
+ + γt−1ρµtEθt
267
+
268
+ Ct(st, at, ξt) + · · ·
269
+
270
+ |s1 = s, µ1 = µ
271
+
272
+ (1)
273
+ s.t. st+1 = g(st, at, ξt), t = 1, 2, · · · ;
274
+ (2)
275
+ µt+1(θ) =
276
+ µt(θ)f (ξt; θ)
277
+
278
+ Θ µt(θ)f (ξt; θ) dθ , t = 1, 2, · · · ,
279
+ (3)
280
+ where ρ is a risk measure, at = π(st, µt), θt is a random
281
+ vector following distribution µt, Eθt denotes the expectation
282
+ with respect to ξt ∼ f(·; θt) conditional on θt, and ρµt de-
283
+ notes a risk functional with respect to θt ∼ µt. Equation (2)
284
+ is the transition of the state st, and without loss of generality
285
+ we assume the initial state s1 takes a deterministic value s.
286
+ Equation (3) is the updating of the posterior µt.
287
+ 2.3. Preliminary: Risk Measure
288
+ Let (Ω, F, P) be a probability space and Z be a linear space
289
+ of F-measurable functions Z : Ω → R. A risk measure is
290
+ a function ρ : Z → R which assigns to a random variable
291
+ Z a real number representing its risk. It is said that risk
292
+ measure ρ is convex if it possesses the properties of con-
293
+ vexity, monotonicity, and translation invariance (F¨ollmer &
294
+ Schied, 2002). In this paper we consider a class of convex
295
+ risk measures which can be represented in the following
296
+ parametric form: ρµ(Z) := infφ∈Φ Eµ[Ψ(Z, φ)],, where
297
+ Φ ⊂ Rm and Ψ : R × Φ → R is a real-valued func-
298
+ tion. There is a large class of risk measures which can
299
+ be represented in the parametric form. For example, con-
300
+ ditional value-at-risk (CVaR), defined as CVaRα(X) =
301
+ minφ∈R
302
+
303
+ φ +
304
+ 1
305
+ 1−αE [(X − φ)+]
306
+
307
+ where (·)+ stands for
308
+ max(0, ·), is widely used (Rigter et al., 2021; Chow et al.,
309
+ 2015). Another example is risk measures constructed from
310
+ φ-divergence ambiguity sets (see Example 3 in (Guigues
311
+ et al., 2021)). We refer the readers to (Shapiro et al., 2021)
312
+ for a comprehensive discussion.
313
+ 3. Algorithm and Theoretical Analysis
314
+ 3.1. Bellman Equation and Optimality
315
+ We can write the value function under policy π of BR-MDP
316
+ in the following recursive forms.
317
+ V π(s, µ) = ρµEθ
318
+
319
+ C(s, a, ξ) + γV π(s′, µ′)
320
+
321
+ s.t. s′ = g(s, a, ξ), a = π(s, µ);
322
+ µ′(θ) =
323
+ µ(θ)f (ξ; θ)
324
+
325
+ Θ µ(θ)f (ξ; θ) dθ.
326
+ We refer the readers to (Lin et al., 2022) for a discussion
327
+
328
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
329
+ on the preference of dynamic risk measure over static risk
330
+ measure in consideration of time consistency and derivation
331
+ of the Bellman equation. For simplicity we only consider
332
+ deterministic policies, but all the analysis below can be ex-
333
+ tended to stochastic policies. As a consequence of Theorem
334
+ 5.5.3b in (Puterman, 2014), it is sufficient to consider the
335
+ Markovian policy. The optimal value function is then de-
336
+ noted as V ∗(s, µ) = minπ∈ΠMD V π(s, µ), where ΠMD is
337
+ the set of Markovian deterministic policies. In the following,
338
+ we derive the intermediate results to show V ∗ is the unique
339
+ optimal value function to the infinite-horizon BR-MDP.
340
+ Definition 3.1 (Bellman Operator). Let B(S, M) be the
341
+ space of real-valued bounded measurable functions on (S ×
342
+ M). For any bounded value function V ∈ B(S, M), define
343
+ an operator T : B(s, µ) → B(s, µ) as:
344
+ (T V )(s, µ) = min
345
+ a∈A ρµ [Eθ [C(s, a, ξ) + γV (s′, µ′)]] .
346
+ Also let T π : B(s, µ) → B(s, µ), where
347
+ (T πV )(s, µ) = ρµ [Eθ [C(s, π(s, µ), ξ) + γV (s′, µ′)]] .
348
+ The next two lemmas show the above Bellman operators are
349
+ monotonic and contraction mappings. Proofs can be found
350
+ in the appendix.
351
+ Lemma 3.2 (Monotonicity). The operators T π and T are
352
+ monotonic, in the sense that V ≤ V ′ implies T πV ≤ T πV ′
353
+ and T V ≤ T V ′.
354
+ Lemma 3.3 (Contraction Mapping). The operators T π and
355
+ T are γ contraction for || · ||∞ norm. That is, for any two
356
+ bounded value functions V, V ′ ∈ B(S, M), we have
357
+ ||T πV − T πV ′||∞ ≤ γ||V − V ′||∞.
358
+ The following proposition shows that sub-solutions and
359
+ super-solutions of the optimality equations V = T V pro-
360
+ vide lower and upper bounds on V ∗. As a result, when
361
+ a solution is obtained, both bounds are satisfied, meaning
362
+ that the solution must be equivalent to V ∗. Additionally,
363
+ this outcome serves as an important algorithmic tool for
364
+ optimization-based methods.
365
+ Proposition 3.4. For any V ∈ B(S, M), (i) if V ≥ T V ,
366
+ then V ≥ V ∗; (ii) if V ≤ T V , then V ≤ V ∗.
367
+ According to Proposition 3.4, we have V ∗ = T V ∗. By
368
+ Banach fixed-point theorem, V ∗ is the unique optimal value
369
+ function to the infinite horizon BR-MDP. We also have that
370
+ the value V of a stationary policy π is the unique bounded
371
+ solution of the equation V = T πV . Similar analysis shows
372
+ the existence and uniqueness of the optimal stationary policy
373
+ π∗ that satisfies V ∗ = T π∗V ∗.
374
+ Applying the operator T on any initial value function V , we
375
+ have the value iteration algorithm for the infinite-horizon
376
+ BR-MDP problem. The following corollary of convergence
377
+ rate is similar to the standard with the contraction property.
378
+ Corollary 3.5. For any initial bounded value function
379
+ V , the convergence rate is shown to be ||(T kV )(s, µ) −
380
+ V ∗(s, µ)||∞ ≤ γk||V (s, µ) − V ∗(s, µ)||∞.
381
+ 3.2. Bilevel Difference Convex Programming
382
+ The main challenge of executing the value iteration algo-
383
+ rithm (and similarly policy iteration algorithm) lies in the
384
+ continuous augmented state. In this work, we propose an
385
+ optimization-based method to solve the infinite-horizon BR-
386
+ MDPs. According to Proposition 3.4, the infinite-horizon
387
+ BR-MDP can be solved as follows:
388
+ max
389
+ V
390
+
391
+ s∈S,µ∈M
392
+ α(s, µ)V (s, µ)
393
+ s.t. V (s, µ) ≤ ρµEθ[C(s, a, ξ) + γV (s′, µ′)]
394
+ ∀a ∈ A, s ∈ S, µ ∈ M,
395
+ where we choose α(s, µ) to be positive scalars which satisfy
396
+
397
+ s∈S,µ∈M α(s, µ) = 1. For the considered class of convex
398
+ risk measures, we can rewrite the above formulation as a
399
+ bilevel difference convex program:
400
+ min
401
+ V
402
+
403
+
404
+ s∈S,µ∈M
405
+ α(s, µ)V (s, µ)
406
+ (4)
407
+ s.t.V (s, µ) − min
408
+ φ Eµ[Ψ(Eθ[C(s, a, ξ) + γV (s′, µ′)], φ)] ≤ 0
409
+ ∀a ∈ A, s ∈ S, µ ∈ M.
410
+ Since Ψ(z, φ) is convex in (z, φ), it remains to be con-
411
+ vex in z after taking the minimum over φ. Thus, (4) is
412
+ a bilevel difference convex program (see (Horst & Thoai,
413
+ 1999) for the definition of DCP). It should be noted that
414
+ (Ahmadi et al., 2021) shows that the minimum over φ can
415
+ be absorbed into the overall minimum problem, and φ is
416
+ treated as a single variable. However, it is clear that the
417
+ minimum is achieved at different φ for different augmented
418
+ state (s, µ), thus turning (4) into a bilevel optimization prob-
419
+ lem. When the lower-level problem is convex and satisfies
420
+ certain regularity conditions, we can use the Karush-Kuhn-
421
+ Tucker (KKT) conditions to reformulate the lower-level
422
+ optimization problem, which allows us to transform the
423
+ original bilevel optimization problem into a single-level
424
+ (constrained) optimization problem.
425
+ After being reduced to a single-level DCP problem, (4)
426
+ can be solved by the convex-concave procedure (see (Lipp
427
+ & Boyd, 2016) for such procedure), wherein the concave
428
+ terms are replaced by a convex upper bound. We employ
429
+ the method of disciplined convex-concave programming
430
+ (DCCP, (Shen et al., 2016), with Python package available
431
+ at https://github.com/cvxgrp/dccp), which converts a DCP
432
+ problem into a disciplined convex program and subsequently
433
+ into an equivalent cone program. However, one problem
434
+ remains to be solved: the number of constraints in (4) is
435
+
436
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
437
+ infinite, due to the continuous belief state. To tackle this
438
+ problem, we take a similar approach as (Poupart et al., 2015).
439
+ The main idea is to start with a finite posterior set (belief
440
+ space) ˆ
441
+ M, and then problem (4) can be solved efficiently
442
+ by DCCP, where the posterior distribution (belief point) not
443
+ in the set ˆ
444
+ M is replaced by some convex combination of
445
+ the points in ˆ
446
+ M. We then iteratively add to the posterior
447
+ set new posterior distributions that are reachable from the
448
+ current one and re-solve (4). We formally introduce the
449
+ approximate bilevel DCP algorithm in the next section.
450
+ 3.3. Approximate Bilevel Difference Convex
451
+ Programming
452
+ Let ˆ
453
+ M be the current posterior set. Let µsas′ be the one-step
454
+ posterior distribution with observed randomness ξ indicated
455
+ by state transition s′ = g(s, a, ξ) and current posterior µ.
456
+ Initially the posterior set is constructed from corner (de-
457
+ generate) points. In case the parameter space Θ is finite,
458
+ the corner points are (1, 0, · · · , 0), (0, 1, 0, · · · ), · · · , and
459
+ (0, · · · , 0, 1). In case the parameter space is continuous, it
460
+ is impossible to express one-step posterior distribution (i.e.,
461
+ µsas′) as a convex combination of those degenerate points.
462
+ Therefore, we assume the parameter space is finite, which is
463
+ practical in many real-world problems. It can also be viewed
464
+ as a discrete approximation of a continuous parameter set,
465
+ and the discretization can be chosen of any precision.
466
+ To interpolate all µsas′ that can be reached from some µi ∈
467
+ ˆ
468
+ M in one step, we use some convex combination of points
469
+ µi in ˆ
470
+ M. Let w(µi, µsas′) be the weight wi associated with
471
+ µi when interpolating µsas′. We can use this interpolation
472
+ weight to define an approximate transition probability for
473
+ posterior as:
474
+ ˜P(µ′|s, a, µ, θ) =
475
+
476
+ s′∈S
477
+ P(s′|s, a, θ)w(µ′, µsas′).
478
+ A sanity check that
479
+ ˜P(µ′|s, a, µ, θ) is indeed a tran-
480
+ sition probability:
481
+
482
+ µ′∈ ˆ
483
+ M ˜P(µ′|s, a, µ, θ)
484
+ =
485
+ 1 and
486
+ ˜P(µ′|s, a, µ, θ) ≥ 0. We choose the convex combination
487
+ that minimizes the weighted Euclidean norm of the differ-
488
+ ence between µ and each µi by solving the following linear
489
+ program:
490
+ min
491
+ w
492
+
493
+ i
494
+ wi||µi − µsas′||2
495
+ (5)
496
+ s.t.
497
+
498
+ i
499
+ wiµi(θ) = µsas′(θ), ∀θ ∈ Θ
500
+
501
+ i
502
+ wi = 1, wi ≥ 0, ∀i.
503
+ With the approximation in the constraint in (4), we obtain
504
+ the following approximate bilevel DCP algorithm for a
505
+ given posterior set. For ease of notation, we denote by
506
+ C(s, a, θ) = Eθ[C(s, a, ξ)] the average cost at state s when
507
+ action a is taken, under the parameter value θ.
508
+ Algorithm 1 Approximate Bilevel DCP
509
+ input: posterior set ˆ
510
+ M
511
+ output: policy ˆπ∗, value function ˆV ∗
512
+ 1. Solve the following approximate bilevel DCP:
513
+ min
514
+ V
515
+
516
+
517
+ s∈S,µ∈M
518
+ α(s, µ)V (s, µ)
519
+ (6)
520
+ s.t. V (s, µ) ≤ min
521
+ φ
522
+
523
+ θ∈Θ
524
+ µ(θ)[Ψ(γ
525
+
526
+ µ′∈ ˆ
527
+ M,s′∈S
528
+ P(s′|s, a, θ)
529
+ w(µ′, µsas′)V (s′, µ′) + C(s, a, θ), φ)], ∀a ∈ A, s ∈ S, µ ∈ ˆ
530
+ M
531
+ where w(µ′, µsas′) is obtained by solving (5).
532
+ 2. Obtain the policy
533
+ ˆπ∗(s, µ) = arg min
534
+ a∈A
535
+ ρµEθ[C(s, a, ξ) + γ ˆV ∗(s′, µ′)].
536
+ Since the policy returned by Algorithm 1 is based on an ap-
537
+ proximate transition probability, there is a need to evaluate
538
+ the obtained policy. Next we show the approximate value
539
+ function obtained by Algorithm 1 is a lower bound on the
540
+ exact optimal value function V ∗.
541
+ Theorem 3.6. The approximate optimal value function ˆV ∗
542
+ found by running Algorithm 1 is a lower bound on the exact
543
+ optimal value function V ∗.
544
+ We also develop an upper bound on the exact optimal value
545
+ function, using the obtained policy from Algorithm 1. The
546
+ obtained policy is a finite state controller (see (Hansen,
547
+ 2013) for the definition of finite state controller). Let N be
548
+ the set of nodes in the controller such that we associate a
549
+ node ns,µ to each (s, µ) pair. The action chosen in node
550
+ ns,µ is determined by the policy ˆπ∗(a|s, µ). For a given
551
+ parameter θ, the transition probability to the next node
552
+ is P(ns′,µ′|ns,µ, a) = w(µ′, µsas′)P(s′|s, a). The value
553
+ function of the finite state controller can be computed by
554
+ ˆV ˆπ∗(ns,µ) = min
555
+ φ
556
+
557
+ θ∈Θ
558
+ µ(θ)[Ψ(c(s, a, θ) + γ
559
+
560
+ ns′,µ′∈N
561
+ w(µ′, µsas′)P(s′|s, a, θ) ˆV ˆπ∗(ns′,µ′), φ)].
562
+ Similar to (Ahmadi et al., 2021), the value function can be
563
+ solved efficiently by DCP. It is also known from (Hansen,
564
+ 2013) that the value function obtained by the finite state
565
+ controller ˆV ˆπ∗ serves as an upper bound for the optimal
566
+ value function.
567
+ Note that the inequality ˆV ∗ ≤ V ∗ ≤ ˆV ˆπ∗ provides infor-
568
+ mation about how well the optimal value function V ∗ is
569
+
570
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
571
+ approximated. As the posterior set ˆ
572
+ M gets closer to the true
573
+ one, the gap between the approximate value function and
574
+ the optimal value function gets smaller.
575
+ Next we incrementally add new posterior distributions to
576
+ the posterior set ˆ
577
+ M. Different methods can be employed to
578
+ produce new posterior distributions that are added to the set
579
+ ˆ
580
+ M at each iteration. We take a similar approach as (Poupart
581
+ et al., 2015), which is based on envelope techniques. It
582
+ considers the posterior distributions that can be reached in
583
+ one step from any posterior distribution in ˆ
584
+ M by executing
585
+ the policy ˆπ∗. As the number of posterior distributions to
586
+ be added might be excessive, we can prioritize them by
587
+ including the n reachable posterior distributions with the
588
+ largest weighted Euclidean distance to the posterior distri-
589
+ butions in ˆ
590
+ M, as determined by the interpolation outlined
591
+ in (5). Note that the point-based value iteration approach
592
+ in (Pineau et al., 2003) shares the similar idea, that is, to
593
+ include new posterior distribution that improves the worst-
594
+ case density as rapidly as possible, where density is defined
595
+ as the maximum distance from any posterior distribution to
596
+ ˆ
597
+ M. We summarize the new posterior set generation in the
598
+ following algorithm.
599
+ Algorithm 2 New Posterior Set Generation
600
+ input: policy ˆπ∗, posterior set ˆ
601
+ M, n
602
+ output: newly added posterior set ˆ
603
+ M′
604
+ for each (s, µ) ∈ (S × ˆ
605
+ M) and s′ ∈ S do
606
+ µ′(θ) ∝ µ(θ)f(ξ|θ), where s′ = g(s, ˆπ∗(a|s, µ), ξ)
607
+ distµ′ ←− distance of µ′ to ˆ
608
+ M � ˆ
609
+ M′
610
+ if distµ′ > 0 (i.e., µ′ not in ˆ
611
+ M � ˆ
612
+ M′) then
613
+ ˆ
614
+ M′ ←− ˆ
615
+ M′ �{µ′}
616
+ end if
617
+ if | ˆ
618
+ M′| > n (to reduce the size of ˆ
619
+ M′) then
620
+ for each µ′ ∈ ˆ
621
+ M′ do
622
+ distµ′ ←− distance of µ′ to ˆ
623
+ M � ˆ
624
+ M′\{µ′}
625
+ ˆ
626
+ M′ ←− ˆ
627
+ M′\{arg minµ′∈ ˆ
628
+ M′ distµ′}
629
+ end for
630
+ end if
631
+ end for
632
+ Algorithm 3 Approximate Bilevel DCP for Infinite-horizon
633
+ BR-MDPs
634
+ input: threshold ϵ, n, initial augmented state (s1, µ1)
635
+ output: policy ˆπ∗
636
+ initialization: ˆ
637
+ M ←− {degenerate beliefs} �{µ1}
638
+ repeat
639
+ obtain (ˆπ∗, ˆV ∗) by running Algorithm 1
640
+ evaluate policy ˆπ∗ by solving a DCP and obtain ˆV ˆπ∗
641
+ ˆ
642
+ M ←− ˆ
643
+ M � ˆ
644
+ M′ generated by Algorithm 2
645
+ until ˆV ˆπ∗(s1, µ1) − ˆV ∗(s1, µ1) ≤ ϵ
646
+ Combining Algorithm 1 and Algorithm 2, we now present
647
+ the full algorithm below (ABDCP), which iteratively add
648
+ to the new posterior set and solve a bilevel difference con-
649
+ vex program at each iteration. We are now ready to show
650
+ Algorithm 3 converges to a near-optimal policy.
651
+ Theorem 3.7. Algorithm 3 converges to a near-optimal
652
+ policy ˆπ∗, i.e., V ˆπ∗(s1, µ1) − V ∗(s1, µ1) ≤ ϵ, where ϵ is
653
+ the desired threshold.
654
+ 4. Numerical Experiments
655
+ We illustrate the performance of the infinite-horizon BR-
656
+ MDP formulation with different choices of risk measures
657
+ and the proposed approximate bilevel DCP algorithm with
658
+ two offline planning problems. Code for the experiments is
659
+ included in the supplementary material. All algorithms are
660
+ implemented in Python and run on a 1.4 GHz Intel Core i5
661
+ processor with 8 GB memory. Implementing details can be
662
+ found in the appendix.
663
+ • Path Planning
664
+ In the offline path planning prob-
665
+ lem, an autonomous car (agent) navigates a two-
666
+ dimensional terrain map represented by a 10 by 10 grid
667
+ along roads to the destination. The agent chooses from
668
+ four actions {up, down, left, right}. There are four
669
+ types of roads: {highway, main road, street, lane}. The
670
+ traffic time ξT
671
+ i in each type of road is assumed to be
672
+ independent and follows exponential distribution with
673
+ different rate, denoted by θT
674
+ i , i = 1, · · · , 4, where T
675
+ stands for traffic time. The parameter value is assumed
676
+ to be within the finite set. ξA
677
+ i ∈ {0, 1}, i = 1, · · · , 4
678
+ denotes whether there is car accident in each type of
679
+ road, where A stands for accident. The probability
680
+ of car accident happening in each type of road is also
681
+ assumed to be independent, denoted by θA
682
+ i . The param-
683
+ eter value is assumed to be within the finite set. When
684
+ there is an car accident, the agent receives a constant
685
+ cost TA and makes no transition. Otherwise, the agent
686
+ transitions to the next road depending on the action it
687
+ takes and receives the cost, which is the traffic time for
688
+ traversing that type of road. The agent stops when it
689
+ reaches the destination. The discount factor γ = 0.95.
690
+ The agent is given a historical dataset H0 containing
691
+ past traffic times and car accident logs.
692
+ • Multi-item Inventory Control
693
+ In the offline multi-
694
+ item inventory control problem, the warehouse man-
695
+ ager decides how much to replenish from the set
696
+ {0, 1, · · · , Si − si} for each item i ∈ [K] at each time
697
+ stage, where Si is the storage capacity for item i, si is
698
+ the current inventory level for item i. The customer de-
699
+ mand is a random vector ξ = (ξ1, · · · , ξK) with each
700
+ ξi following a Poisson distribution with parameter θi.
701
+ The state transition is given by st+1 = max(st + at −
702
+ ξt, 0), the cost function is given by C(st, at, ξt) =
703
+ h · max(st + at − ξt, 0) + p · max(ξt − st − at, 0),
704
+
705
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
706
+ where h is the holding cost and p is the penalty cost.
707
+ The discount factor γ = 0.95. The warehouse manager
708
+ is given a historical dataset consisting of past customer
709
+ demands.
710
+ We adapt two methods to our offline planning problem and
711
+ evaluate their performances.
712
+ The first method (CALP)
713
+ comes from (Poupart et al., 2015) with a risk-neutral
714
+ POMDP formulation.
715
+ The second method (DR-MDP)
716
+ comes from (Xu & Mannor, 2010) with a distributionally
717
+ robust MDP formulation. Note that the BPO approach from
718
+ (Lee et al., 2018) solves a risk-neutral BA-MDP formula-
719
+ tion, where two separate encoders for the physical state and
720
+ belief state are designed to deal with the continuous latent
721
+ parameter space. It could have been a good benchmark if
722
+ its encoder design were made available. Apart from the two
723
+ benchmarks, we also compare with the nominal approach
724
+ (MLE), where a maximal likelihood estimator for the param-
725
+ eter is computed from the given dataset and then a policy is
726
+ obtained by solving the MDP with the plugged-in parameter
727
+ value. In our proposed algorithm (ABDCP) for the infinite-
728
+ horizon BR-MDP formulation, we consider two particular
729
+ risk measures, namely expectation and CVaR with different
730
+ risk levels α. It should be noted that when the considered
731
+ risk measure is expectation, our algorithm can be modified
732
+ and reduced to CALP. Similar observation is verified in
733
+ (Poupart et al., 2006), where the BA-MDP formulation is
734
+ transformed into a POMDP formulation.
735
+ For each of the considered algorithms, we obtain the cor-
736
+ responding optimal policy with the same dataset. It should
737
+ be noted that the calculations are carried out offline. The
738
+ obtained policy is then applied for risk-averse path planning
739
+ and evaluated on the true system, i.e., MDP with the true
740
+ parameter. This is referred to as one replication, and we
741
+ repeat the experiments for 200 replications on different in-
742
+ dependent datasets. Results for the path planning problem
743
+ can be found in Table 1 and Table 2, with different data
744
+ size N = 10 and N = 1000. Results for the multi-item
745
+ inventory control problem can be found in Table 3 and Ta-
746
+ ble 4, with different data size N = 10 and N = 1000.
747
+ The columns report the running time, expected performance
748
+ (cost), and the CVaR performance (cost) of our proposed al-
749
+ gorithm and benchmarks over the 200 replications. ABDCP-
750
+ EXP stands for our proposed algorithm ABDCP with ex-
751
+ pectation as the risk measure. ABDCP-CVaR stands for our
752
+ proposed algorithm ABDCP with CVaR as the risk measure.
753
+ We also show the histogram of the actual performance over
754
+ 200 replications for our proposed algorithm and the nominal
755
+ benchmark on the path planning problem in Figure 1. We
756
+ summarize the main observations for the path planning prob-
757
+ lem. Similar observations can be made for the multi-item
758
+ inventory control problem. We include more observations
759
+ in the appendix.
760
+ BR-MDP hedges against epistemic uncertainty: in each
761
+ replication, data points are randomly sampled from the true
762
+ distribution. While facing the epistemic uncertainty, BR-
763
+ MDP formulation optimizes over a dynamic risk measure
764
+ that provides robustness. Table 1 shows that our proposed
765
+ ABDCP algorithm is the most robust in the sense of balanc-
766
+ ing the mean and variability of the actual cost. The CVaR
767
+ cost of our proposed algorithm is also lower than the other
768
+ benchmarks, showing that it avoids large costs. In contrast,
769
+ the nominal approach performs badly when the data size is
770
+ small, e.g. N = 5, indicating that it is not robust against the
771
+ epistemic uncertainty and suffers from the scarcity of data.
772
+ On the other hand, DR-MDP is overly conservative, even
773
+ though it has the smallest variability. This conservativeness
774
+ comes from two aspects. First, it always chooses to optimize
775
+ over the worst-case scenario, which rarely happens in the
776
+ true system. Second, the static worst-case risk measure pre-
777
+ vents it from adapting to the data realizations, which is one
778
+ of the motivations for the dynamic risk measure considered
779
+ in the BR-MDP formulation.
780
+ Convergence of ABDCP: the running time for a single
781
+ replication on the path planning problem using our pro-
782
+ posed ABDCP algorithm is affordable, and the proposed
783
+ algorithm solves the infinite-horizon BR-MDP in finite time.
784
+ In contrast, the infinite-horizon BR-MDP is intractable with
785
+ standard value iteration or policy iteration.
786
+ 5. Conclusions
787
+ In this paper, we consider the offline planning problem
788
+ in MDPs with epistemic uncertainty, where we only have
789
+ access to a prior belief distribution over MDPs that is con-
790
+ structed by the offline data. We consider the infinite-horizon
791
+ BR-MDP that produces a time-consistent formulation and
792
+ provides the robustness against epistemic uncertainty. We
793
+ develop an efficient optimization-based approximation algo-
794
+ rithm that converges to the optimal policy. Our experiment
795
+ results demonstrate the efficiency of the proposed approxi-
796
+ mate algorithm, and show the robustness and the adaptivity
797
+ to future data realization of the infinite-horizon BR-MDP
798
+ formulation.
799
+ One of the future directions is to study the sample complex-
800
+ ity of the proposed algorithm. In its current form, we show
801
+ the convergence of the proposed algorithm without analysis
802
+ of the convergence rate. Another interesting direction is to
803
+ utilize function approximation to improve the scalability of
804
+ the proposed approach to more complex domains. Separate
805
+ encoders for the physical state and belief state have been
806
+ proposed in (Lee et al., 2018) to reduce the dimension of
807
+ the considered BA-MDP formulation, and adaptation from
808
+ the risk-neutral BA-MDP formulation to our risk averse BR-
809
+ MDP formulation with the designed policy network could
810
+ be interesting.
811
+
812
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
813
+ Approach
814
+ time (sec)
815
+ expected cost
816
+ CVaR (α = 0.95) cost
817
+ CVaR (α = 0.8) cost
818
+ ABDCP-EXP (CALP)
819
+ 969.13(0.18)
820
+ 70.06(0.51)
821
+ 85.72
822
+ 82.06
823
+ ABDCP-CVaR (α = 0.95)
824
+ 2639.38(0.22)
825
+ 67.51(0.24)
826
+ 75.67
827
+ 73.72
828
+ ABDCP-CVaR (α = 0.8)
829
+ 2545.74(0.24)
830
+ 66.02(0.38)
831
+ 79.97
832
+ 75.50
833
+ DR-MDP
834
+ 62.34(0.11)
835
+ 79.43(0.15)
836
+ 81.64
837
+ 80.60
838
+ Nominal
839
+ 61.44(0.08)
840
+ 82.59(0.59)
841
+ 94.10
842
+ 92.46
843
+ Table 1. Results for path planning problem. Running time for each replication, expected cost, and CVaR cost at different risk levels α are
844
+ reported for different algorithms. Standard errors are reported in parentheses. Number of data points is N = 10.
845
+ Approach
846
+ time (sec)
847
+ expected cost
848
+ CVaR (α = 0.95) cost
849
+ CVaR (α = 0.8) cost
850
+ ABDCP-EXP (CALP)
851
+ 967.25(0.17)
852
+ 64.15(0.05)
853
+ 66.34
854
+ 65.97
855
+ ABDCP-CVaR (α = 0.95)
856
+ 2642.26(0.21)
857
+ 65.18(0.03)
858
+ 66.14
859
+ 65.76
860
+ ABDCP-CVaR (α = 0.8)
861
+ 2643.48(0.25)
862
+ 65.17(0.04)
863
+ 66.26
864
+ 65.84
865
+ DR-MDP
866
+ 63.15(0.09)
867
+ 65.22(0.03)
868
+ 66.43
869
+ 66.01
870
+ Nominal
871
+ 62.47(0.08)
872
+ 64.31(0.12)
873
+ 67.55
874
+ 65.59
875
+ Table 2. Results for path planning problem. Running time for each replication, expected cost, and CVaR cost at different risk levels α are
876
+ reported for different algorithms. Standard errors are reported in parentheses. Number of data points is N = 1000.
877
+ Approach
878
+ time (sec)
879
+ expected cost
880
+ CVaR (α = 0.95) cost
881
+ CVaR (α = 0.8) cost
882
+ ABDCP-EXP (CALP)
883
+ 1374.59(0.24)
884
+ 3478.92(15.03)
885
+ 4363.56
886
+ 4025.23
887
+ ABDCP-CVaR (α = 0.95)
888
+ 4109.21(0.35)
889
+ 3072.84(10.24)
890
+ 3651.75
891
+ 3472.44
892
+ ABDCP-CVaR (α = 0.8)
893
+ 4087.14(0.32)
894
+ 2831.12(12.37)
895
+ 3782.04
896
+ 3517.30
897
+ DR-MDP
898
+ 140.76(0.13)
899
+ 3963.56(9.21)
900
+ 4424.69
901
+ 4231.12
902
+ Nominal
903
+ 139.89(0.08)
904
+ 3987.50(18.39)
905
+ 4974.57
906
+ 4611.16
907
+ Table 3. Results for multi-item inventory control problem. Running time for each replication, expected cost, and CVaR cost at different
908
+ risk levels α are reported for different algorithms. Standard errors are reported in parentheses. Number of data points is N = 10.
909
+ Approach
910
+ time (sec)
911
+ expected cost
912
+ CVaR (α = 0.95) cost
913
+ CVaR (α = 0.8) cost
914
+ ABDCP-EXP (CALP)
915
+ 1377.27(0.22)
916
+ 1806.45(0.57)
917
+ 1825.06
918
+ 1823.71
919
+ ABDCP-CVaR (α = 0.95)
920
+ 4114.93(0.34)
921
+ 1819.92(0.16)
922
+ 1823.63
923
+ 1821.70
924
+ ABDCP-CVaR (α = 0.8)
925
+ 4002.62(0.33)
926
+ 1817.21(0.19)
927
+ 1824.97
928
+ 1822.39
929
+ DR-MDP
930
+ 138.26(0.11)
931
+ 1826.03(0.12)
932
+ 1828.80
933
+ 1827.62
934
+ Nominal
935
+ 136.38(0.10)
936
+ 1802.34(1.28)
937
+ 1836.04
938
+ 1828.99
939
+ Table 4. Results for multi-item inventory control problem. Running time for each replication, expected cost, and CVaR cost at different
940
+ risk levels α are reported for different algorithms. Standard errors are reported in parentheses. Number of data points is N = 1000.
941
+ (a) ABDCP-EXP
942
+ (b) ABDCP-CVaR(α = 0.95)
943
+ (c) ABDCP-CVaR(α = 0.8)
944
+ (d) Nominal
945
+ Figure 1. Histogram of the actual performance over 200 replications for different algorithms. Number of data points is set to N = 10.
946
+
947
+ 25
948
+ Mean: 70.06
949
+ CVaR: 85.72
950
+ requency
951
+ 20
952
+ 15
953
+ 10
954
+ 5
955
+ 60
956
+ 7075
957
+ 8
958
+ 85
959
+ costMean: 67.51
960
+ CVaR: 75.67
961
+ 50
962
+ 30
963
+ 20
964
+ 10
965
+ 62.5
966
+ 每.067.570.072.575.077.5
967
+ costMean: 66.02
968
+ CVaR: 79.97
969
+ 40
970
+ 10
971
+ 60
972
+ 70
973
+ 75
974
+ 80
975
+ cost.597
976
+ OT'
977
+ 25
978
+ : 82.
979
+ CVaR: 94.
980
+ -ue
981
+ uanbr
982
+ 15
983
+ 10
984
+ 5
985
+ 70
986
+ 80
987
+ 90
988
+ costApproximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
989
+ References
990
+ Ahmadi, M., Rosolia, U., Ingham, M. D., Murray, R. M.,
991
+ and Ames, A. D. Constrained risk-averse Markov deci-
992
+ sion processes. In Proceedings of the AAAI Conference
993
+ on Artificial Intelligence, volume 35, pp. 11718–11725,
994
+ 2021.
995
+ Alagoz, O., Ayvaci, M. U., and Linderoth, J. T. Optimally
996
+ solving markov decision processes with total expected
997
+ discounted reward function: Linear programming revis-
998
+ ited. Computers & Industrial Engineering, 87:311–316,
999
+ 2015.
1000
+ Chow, Y. and Ghavamzadeh, M. Algorithms for CVaR
1001
+ optimization in MDPs.
1002
+ In Ghahramani, Z., Welling,
1003
+ M., Cortes, C., Lawrence, N. D., and Weinberger, K. Q.
1004
+ (eds.), Advances in Neural Information Processing Sys-
1005
+ tems, 2014.
1006
+ Chow, Y., Tamar, A., Mannor, S., and Pavone, M. Risk-
1007
+ sensitive and robust decision-making: a CVaR optimiza-
1008
+ tion approach. In Cortes, C., Lee, D. D., Sugiyama, M.,
1009
+ and Garnett, R. (eds.), Advances in Neural Information
1010
+ Processing Systems, 2015.
1011
+ Delage, E. and Mannor, S.
1012
+ Percentile optimization for
1013
+ Markov decision processes with parameter uncertainty.
1014
+ Operations research, 58(1):203–213, 2010.
1015
+ Duff, M. O. Optimal Learning: Computational procedures
1016
+ for Bayes-adaptive Markov decision processes. Ph.D.
1017
+ diss., University of Massachusetts Amherst, 2002.
1018
+ F¨ollmer, H. and Schied, A. Convex measures of risk and
1019
+ trading constraints. Finance and stochastics, 6(4):429–
1020
+ 447, 2002.
1021
+ Guigues, V., Shapiro, A., and Cheng, Y. Risk-averse stochas-
1022
+ tic optimal control: an efficiently computable statistical
1023
+ upper bound. arXiv preprint arXiv:2112.09757, 2021.
1024
+ Hansen, E. A. Solving POMDPs by searching in policy
1025
+ space. arXiv preprint arXiv:1301.7380, 2013.
1026
+ Hauskrecht, M. Value-function approximations for partially
1027
+ observable Markov decision processes. Journal of artifi-
1028
+ cial intelligence research, 13:33–94, 2000.
1029
+ Horst, R. and Thoai, N. V. DC programming: overview.
1030
+ Journal of Optimization Theory and Applications, 103(1):
1031
+ 1–43, 1999.
1032
+ Howard, R. A. and Matheson, J. E. Risk-sensitive Markov
1033
+ decision processes. Management science, 18(7):356–369,
1034
+ 1972.
1035
+ Iyengar, G. N. Robust dynamic programming. Mathematics
1036
+ of Operations Research, 30(2):257–280, 2005.
1037
+ Lee, G., Hou, B., Mandalika, A., Lee, J., Choudhury, S., and
1038
+ Srinivasa, S. S. Bayesian policy optimization for model
1039
+ uncertainty. arXiv preprint arXiv:1810.01014, 2018.
1040
+ Lin, Y., Ren, Y., and Zhou, E. Bayesian risk Markov de-
1041
+ cision processes. In Advances in Neural Information
1042
+ Processing Systems, 2022.
1043
+ Lipp, T. and Boyd, S.
1044
+ Variations and extension of the
1045
+ convex–concave procedure. Optimization and Engineer-
1046
+ ing, 17(2):263–287, 2016.
1047
+ Mannor, S. and Xu, H. Data-driven methods for Markov
1048
+ decision problems with parameter uncertainty. In Oper-
1049
+ ations Research & Management Science in the Age of
1050
+ Analytics, pp. 101–129. INFORMS, 2019.
1051
+ Nilim, A. and Ghaoui, L. Robustness in Markov decision
1052
+ problems with uncertain transition matrices. In Thrun, S.,
1053
+ Saul, L., and Sch¨olkopf, B. (eds.), Advances in Neural
1054
+ Information Processing Systems, 2004.
1055
+ Osogami, T. Robustness and risk-sensitivity in Markov
1056
+ decision processes. In Pereira, F., Burges, C. J. C., Bottou,
1057
+ L., and Weinberger, K. Q. (eds.), Advances in Neural
1058
+ Information Processing Systems, 2012.
1059
+ Petrik, M. and Russel, R. H. Beyond confidence regions:
1060
+ Tight Bayesian ambiguity sets for robust mdps. In Wal-
1061
+ lach, H., Larochelle, H., Beygelzimer, A., d'Alch´e-Buc,
1062
+ F., Fox, E., and Garnett, R. (eds.), Advances in Neural
1063
+ Information Processing Systems, volume 32, 2019.
1064
+ Petrik, M. and Subramanian, D. An approximate solution
1065
+ method for large risk-averse Markov decision processes.
1066
+ In de Freitas, N. and Murphy, K. (eds.), Proceedings of
1067
+ the Twenty-Eighth Conference on Uncertainty in Artificial
1068
+ Intelligence, pp. 805–814, 2012.
1069
+ Pineau, J., Gordon, G., Thrun, S., et al. Point-based value
1070
+ iteration: An anytime algorithm for POMDPs. In IJCAI,
1071
+ volume 3, pp. 1025–1032, 2003.
1072
+ Poupart, P., Vlassis, N., Hoey, J., and Regan, K. An ana-
1073
+ lytic solution to discrete Bayesian reinforcement learning.
1074
+ In Proceedings of the 23rd International Conference on
1075
+ Machine Learning, pp. 697–704, 2006.
1076
+ Poupart, P., Malhotra, A., Pei, P., Kim, K.-E., Goh, B., and
1077
+ Bowling, M. Approximate linear programming for con-
1078
+ strained partially observable Markov decision processes.
1079
+ In Proceedings of the AAAI Conference on Artificial In-
1080
+ telligence, volume 29, 2015.
1081
+ Puterman, M. L.
1082
+ Markov decision processes: discrete
1083
+ stochastic dynamic programming. John Wiley & Sons,
1084
+ 2014.
1085
+
1086
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
1087
+ Rigter, M., Lacerda, B., and Hawes, N. Risk-averse bayes-
1088
+ adaptive reinforcement learning. In Ranzato, M., Beygelz-
1089
+ imer, A., Dauphin, Y., Liang, P., and Vaughan, J. W. (eds.),
1090
+ Advances in Neural Information Processing Systems, pp.
1091
+ 1142–1154, 2021.
1092
+ Rockafellar, R. T. and Uryasev, S. Optimization of condi-
1093
+ tional value-at-risk. Journal of Risk, 2:21–41, 2000.
1094
+ Ruszczy´nski, A. Risk-averse dynamic programming for
1095
+ Markov decision processes. Mathematical programming,
1096
+ 125(2):235–261, 2010.
1097
+ Shapiro, A. Tutorial on risk neutral, distributionally robust
1098
+ and risk averse multistage stochastic programming. Eu-
1099
+ ropean Journal of Operational Research, 288(1):1–13,
1100
+ 2021.
1101
+ Shapiro, A., Dentcheva, D., and Ruszczynski, A. Lectures
1102
+ on stochastic programming: modeling and theory. SIAM,
1103
+ 2021.
1104
+ Sharma, A., Harrison, J., Tsao, M., and Pavone, M. Robust
1105
+ and adaptive planning under model uncertainty. In Ak-
1106
+ shat Kumar, Sylvie Thi´ebaux, P. V. and Yeoh, W. (eds.),
1107
+ Proceedings of the 29th International Conference on Au-
1108
+ tomated Planning and Scheduling, pp. 410–418, 2019.
1109
+ Shen, X., Diamond, S., Gu, Y., and Boyd, S. Disciplined
1110
+ convex-concave programming. In 2016 IEEE 55th Con-
1111
+ ference on Decision and Control (CDC), pp. 1009–1014.
1112
+ IEEE, 2016.
1113
+ Tamar, A., Chow, Y., Ghavamzadeh, M., and Mannor, S.
1114
+ Policy gradient for coherent risk measures. In Cortes,
1115
+ C., Lee, D. D., Sugiyama, M., and Garnett, R. (eds.), Ad-
1116
+ vances in Neural Information Processing Systems, 2015a.
1117
+ Tamar, A., Glassner, Y., and Mannor, S. Optimizing the
1118
+ CVaR via sampling. In Twenty-Ninth AAAI Conference
1119
+ on Artificial Intelligence, 2015b.
1120
+ Wiesemann, W., Kuhn, D., and Rustem, B. Robust Markov
1121
+ decision processes. Mathematics of Operations Research,
1122
+ 38(1):153–183, 2013.
1123
+ Wu, D., Zhu, H., and Zhou, E. A Bayesian risk approach
1124
+ to data-driven stochastic optimization: Formulations and
1125
+ asymptotics. SIAM Journal on Optimization, 28(2):1588–
1126
+ 1612, 2018.
1127
+ Xu, H. and Mannor, S. Distributionally robust Markov
1128
+ decision processes. In Lafferty, J., Williams, C., Shawe-
1129
+ Taylor, J., Zemel, R., and Culotta, A. (eds.), Advances in
1130
+ Neural Information Processing Systems, 2010.
1131
+ Zhou, E. and Xie, W. Simulation optimization when facing
1132
+ input uncertainty. In Yilmaz, L., Chan, W. K. V., Moon,
1133
+ I., Roeder, T. M. K., Macal, C., and Rossetti, M. D. (eds.),
1134
+ Proceedings of the 2015 Winter Simulation Conference,
1135
+ pp. 3714–3724, 2015.
1136
+
1137
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
1138
+ A. Technical Proof
1139
+ Proof of Lemma 3.2. Note that
1140
+ (T πV )(s, µ) = ρµ1Eθ1[C(s1, a1.ξ1) + γρµ2Eθ2[C(s2, a2, ξ2) + · · · + γV (sk, µk)]]
1141
+ for all positive integer k. As the terminal value function V (sk, µk) ≤ V ′(sk, µk) for all sk ∈ S, µk ∈ M, and using the
1142
+ monotonicity of the convex risk measure ρ(X) ≤ ρ(Y ) if X(ω) ≤ Y (ω), ∀ω ∈ Ω, we have (T πV )(s, µ) ≤ (T πV ′)(s, µ).
1143
+ Same analysis works for operator T .
1144
+ Proof of Lemma 3.3. Let Cmax = maxs∈S,µ∈M |V (s, µ) − V ′(s, µ)|, we have
1145
+ V (s, µ) − Cmax ≤ V ′(s, µ) ≤ V (s, µ) + Cmax
1146
+ (7)
1147
+ Applying T π on inequality (7), we have
1148
+ (T πV )(s, µ) − γCmax ≤ (T πV ′)(s, µ) ≤ (T πV )(s, µ) + γCmax,
1149
+ which is justified by the translation invariance of the convex risk measure. Then we have
1150
+ max
1151
+ s∈S,µ∈M |(T πV )(s, µ) − (T πV ′)(s, µ)| ≤ γ
1152
+ max
1153
+ s∈S,µ∈M |V (s, µ) − V ′(s, µ)|,
1154
+ i.e., ||T πV − T πV ′||∞ ≤ γ||V − V ′||∞. Same analysis works for operator T .
1155
+ Proof of Proposition 3.4. (i) Let π be the policy for which
1156
+ V ≥ T πV.
1157
+ (8)
1158
+ Note that such policy exists as one can choose π that yields low current cost. Applying operator T πV to both sides of
1159
+ inequality (8) and using Lemma 3.2, we have V ≥ (T π)tV , t = 1, 2, · · · . Note that the right hand side of the above
1160
+ inequality represents the cost of a finite horizon problem with stationary policy π and with final value function V . Also note
1161
+ that
1162
+ (T π)tV = ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γV (st+1, µt+1)]
1163
+ ≥ ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γρµtEθt[C(st, at, ξt)]].
1164
+ Let t → ∞, we get V ≥ V π, where V π is the value function under policy π. Since V ∗ = minπ V π, we have V ≥ V ∗.
1165
+ (ii) Consider an arbitrary policy π and a finite horizon problem with terminal cost V (st+1, µt+1). We have under the policy
1166
+ π,
1167
+ ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γV (st+1, µt+1)] = ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γρµtEθt[C(st, at, ξt) + γV (st+1, µt+1)]].
1168
+ Note that ρµtEθt[C(st, at, ξt) + γV (st+1, µt+1)] ≥ T V (st, µt) ≥ V (st, µt). Therefore, we have
1169
+ ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γV (st+1, µt+1)] ≥ ρµ1Eθ1[C(s1, a1, ξ1) + · · · + ρµt−1Eθt−1[C(st−1, at−1, ξt−1) + γV (st, µt)]].
1170
+ Continuing, we have
1171
+ ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γV (st+1, µt+1)] ≥ V (s, µ).
1172
+ Let Cmax be an upper bound on |V (s, µ)|, ∀s ∈ S, µ ∈ M, we have
1173
+ ρµ1Eθ1[C(s1, a1, ξ1) + · · · + γρµtEθt[C(st, at, ξt)]] ≥ V (s, µ) − Cmaxγt.
1174
+ Passing to the limit t → ∞, we have for any policy π, V π(s, µ) ≥ V (s, µ). Therefore, the infimum over all policy π is
1175
+ bounded from below by V (s, µ), i.e., V ∗ ≥ V .
1176
+
1177
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
1178
+ Proof of Theorem 3.6. We first show V π(s, µ) is concave in µ for any policy π. Note that
1179
+ V π(s, µ) = min
1180
+ φ Eµ[Ψ(Eθ[C(s, a, ξ) + γV π(s′, µ′)], φ)].
1181
+ For 0 ≤ t ≤ 1 and any µ1, µ2 ∈ M,
1182
+ V π(s, tµ1 + (1 − t)µ2)
1183
+ = min
1184
+ φ Etµ1+(1−t)µ2[Ψ(Eθ[C(s, a, ξ) + γV π(s′, µ′)], φ)]
1185
+ = min
1186
+ φ {Eµ1[Ψ(Eθ[C(s, a, ξ) + γV π(s′, µ′)], φ)] + (1 − t)Eµ2[Ψ(Eθ[C(s, a, ξ) + γV π(s′, µ′)], φ)]}
1187
+ ≥t min
1188
+ φ1 {Eµ1[Ψ(Eθ[C(s, a, ξ) + γV π(s′, µ′)], φ1)]} + (1 − t) min
1189
+ φ2 {Eµ2[Ψ(Eθ[C(s, a, ξ) + γV π(s′, µ′)], φ2)]}
1190
+ =tV π(s, µ1) + (1 − t)V π(s, µ2).
1191
+ The same analysis works for the optimal value function V ∗. Consider running Algorithm 1 with posterior set ˆ
1192
+ M and the
1193
+ entire posterior set M. Now applying Jensen’s inequality and by Theorem 12 in (Hauskrecht, 2000), we have ˆV ∗ ≤ V ∗. Note
1194
+ that originally in (Hauskrecht, 2000), the proof is based on the fact that value function in partially observable Markov decision
1195
+ process is convex in belief and the linear programming formulation has constraint V (b) ≥ R(s, a) + γ �
1196
+ b′ P(b′|b, a)V (b′),
1197
+ where R is the reward function. Since V is convex and by linear interpolation, applying Jensen’s inequality to the right
1198
+ hand side of the constraint leads to ˆV (b) greater than V (b). Now we are in an opposite direction, by Jensen’s inequality and
1199
+ concavity of V , we have ˆV ∗ ≤ V ∗.
1200
+ Proof of Theorem 3.7. First we show Algorithm 3 terminates in finite time. Suppose not, i.e., ˆV ˆπ∗(s1, µ1)− ˆV ∗(s1, µ1) > ϵ.
1201
+ As the number of iterations increases,
1202
+ ˆ
1203
+ M will contain an increasing number of reachable posterior distributions, since
1204
+ Algorithm 3 is guaranteed to generate new reachable posterior distributions unless the current approximate optimal policy ˆπ∗
1205
+ is evaluated accurately. As the number of iterations goes to infinity, ˆ
1206
+ M will eventually contain enough posterior distributions
1207
+ to accurately evaluate all policies ˆπ∗ that Algorithm 3 produces infinitely often. Since Algorithm 3 terminates as soon as
1208
+ Algorithm 1 produces a policy that is evaluated accurately, we reach a contradiction.
1209
+ Nest we show the algorithm converges to V ∗. Suppose that the algorithm terminates, but it converges to a suboptimal policy
1210
+ ˜π. By Theorem 3.6, we know that ˆV ∗ ≤ V ∗, since V ∗ ≤ ˆV ˜π and the algorithm terminates when ˆV ˜π − ˆV ∗ ≤ ϵ. Then we
1211
+ have ˆV ˜π − V ∗ ≤ ϵ, which reaches a contradiction. Thus the algorithm must converge to V ∗.
1212
+ B. Implementation Details
1213
+ B.1. Offline Path Planning
1214
+ Figure 2. Path planning terrain
1215
+ map. Colors indicate the road
1216
+ types as follows–blue: high-
1217
+ way, red: main road, orange:
1218
+ street, green: lane.
1219
+ An autonomous car (agent) navigates a two-dimensional terrain map represented by a
1220
+ 10 by 10 grid along roads to the destination, as shown in Figure 2. The agent chooses
1221
+ from four actions {up, down, left, right}, as long it remains on the road. There are
1222
+ four types of roads: {highway, main road, street, lane}. The traffic time ξT
1223
+ i in each
1224
+ type of road is assumed to be independent and follows exponential distribution with dif-
1225
+ ferent rate, denoted by θT
1226
+ i , i = 1, · · · , 4, where T stands for traffic time. Specifically,
1227
+ the true rates are θT
1228
+ 1 = 1, θT
1229
+ 2 = 0.5, θT
1230
+ 3 = 0.2, and θT
1231
+ 4 = 0.1 but unknown to the
1232
+ agent. We view the parameter as a random variable, whose value is assumed to be within
1233
+ the following finite set {0.05, 0.1, 0.2, 0.25, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1, 1.5, 2, 2.5}.
1234
+ ξA
1235
+ i
1236
+ ∈ {0, 1}, i = 1, · · · , 4 denotes whether there is car accident in each type of road,
1237
+ where A stands for accident. The probability of car accident happening in each type of road
1238
+ is also assumed to be independent, denoted by θA
1239
+ i . Specifically, the true probabilities are
1240
+ θA
1241
+ 1 = 0.3, θA
1242
+ 1 = 0.2, θA
1243
+ 1 = 0.1 and θA
1244
+ 1 = 0.05 but unknown to the agent. We view the
1245
+ parameter as a random variable, whose value is assumed to be within the following finite set
1246
+ {0.05, 0.1, 0.15, 0.2, 0.25, 0.3, 0.35, 0.4, 0.45, 0.5}. When there is an car accident, the agent
1247
+ receives a constant cost TA = 10 and makes no transition. Otherwise, the agent transitions
1248
+ to the next road depending on the action it takes and receives the cost, which is the traffic
1249
+ time for traversing that type of road. The agent stops when it reaches the destination. The
1250
+
1251
+ origin
1252
+ destinationApproximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
1253
+ discount factor γ = 0.95. The agent is given a historical dataset H0 of size N containing past traffic times and car accident
1254
+ logs, and uses the given dataset to construct the prior for the transition rate and probability of car accident. Other parameters
1255
+ are as follows: number of points to be added at each iteration n = 20, threshold ϵ = 0.1.
1256
+ B.2. Multi-item Inventory Control
1257
+ The warehouse manager (agent) decides how much to replenish from the set {0, 1, · · · , Si − si} for each item i ∈ [K]
1258
+ at each time stage, where K = 5 is the number of different items, Si = 100 is the storage capacity for each item i, si
1259
+ is the current inventory level for each item i. The customer demand is a random vector ξ = (ξ1, · · · , ξK) with each ξi
1260
+ following a Poisson distribution with parameter θi. The true parameter is θ1 = 10, θ2 = 15, θ3 = 20, θ4 = 25, and
1261
+ θ5 = 30 but unknown to the agent. We view the parameter as a random variable, whose value is assumed to be within
1262
+ the following finite set {5, 6, 7, · · · , 33, 34, 35}. The state transition is given by st+1 = max(st + at − ξt, 0), where at
1263
+ is the amount of inventory to be replenished. Inventory level is not allowed to drop below zero (no backlog). When the
1264
+ customer demand is higher than the supply, there is a penalty cost p for each unit of unsatisfied demand. When the customer
1265
+ is lower than the supply, there is a holding cost h for each unit of overstock. In particular, for different items, p1 = 4,
1266
+ p2 = 5, p3 = 6, p4 = 7, p5 = 8, h1 = 2, h2 = 3, h3 = 4, h4 = 5, h5 = 6. The cost function at each stage is then given by
1267
+ C(st, at, ξt) = hT · max(st + at − ξt, 0) + pT · max(ξt − st − at, 0). The discount factor γ = 0.95. The agent starts with
1268
+ 0 inventory and is given a historical dataset H0 of size N containing past customer demands for different items, and uses the
1269
+ given dataset to construct the prior for the rate parameter. Other parameters are as follows: number of points to be added at
1270
+ each iteration n = 20, threshold ϵ = 0.1.
1271
+ B.3. DR-MDP Details
1272
+ The DR-MDP approach, or Distributionally Robust Markov Decision Process, is a method for decision making under
1273
+ uncertainty where the ambiguity set, or the set of possible distributions for the uncertain parameters, is constructed using
1274
+ prior knowledge about the probabilistic information. However, this prior knowledge is not always readily available from a
1275
+ given data set, making the construction of the ambiguity set difficult in some cases.
1276
+ We note that the Bayesian Risk Optimization (BRO) approach has a distributionally robust optimization (DRO) interpretation.
1277
+ In particular, for a static stochastic optimization problem, it has been shown in (Wu et al., 2018) that the BRO formulation
1278
+ with the risk functional taken as Value-at-Risk (VaR) with a confidence level of 100% is equivalent to a DRO formulation with
1279
+ the ambiguity set constructed for the uncertain parameter, θ. This means that BRO and DRO can be used interchangeably,
1280
+ depending on the problem at hand and the level of uncertainty and prior knowledge about the parameters. Therefore, for a
1281
+ given problem when prior knowledge about the probabilistic information is not readily available, we adapt DR-MDP to
1282
+ our considered problem as follows: we use samples of the uncertain parameter, θ, drawn from the posterior distribution
1283
+ computed from a given data set. This allows us to construct an ambiguity set for θ using the available data, instead of relying
1284
+ on prior knowledge. Once we have samples of θ, we can obtain the optimal policy that minimizes the total expected cost
1285
+ under the most adversarial θ among the samples.
1286
+ B.4. Bilevel Optimization
1287
+ We show the bilevel DCP can be reduced to a single-level DCP. Specifically, we show this transformation for the exact
1288
+ bilevel DCP in (4), and the same technique can be applied to the approximate algorithm.
1289
+ Consider a general bilevel optimization problem:
1290
+ min
1291
+ xu,xl F(xu, xl)
1292
+ (9)
1293
+ s.t. xl ∈ arg min
1294
+ xl
1295
+ {f(xu, xl) : g(xu, xl) ≤ 0}
1296
+ G(xu, xl) ≤ 0
1297
+ where xu is the upper-level variable, xl is the lower-level variable, G denotes the upper-level constraints, g denotes the
1298
+ lower-level constraints, F denotes the upper-level objective function, f denotes the lower-level objective function. The
1299
+ Karush-Kuhn-Tucker (KKT) conditions are a set of necessary and sufficient conditions for a solution to be optimal in a
1300
+ convex optimization problem. When the lower-level problem in a bilevel optimization problem is convex and sufficiently
1301
+ regular, the KKT conditions can be used to reformulate the problem as a single-level constrained optimization problem,
1302
+
1303
+ Approximate Bilevel Difference Convex Programming for Bayesian Risk Markov Decision Processes
1304
+ which is typically easier to solve. The general bilevel optimization problem 9 can then be reduced to the following
1305
+ single-level optimization:
1306
+ min
1307
+ xu,xl F(xu, xl)
1308
+ s.t. G(xu, xl) ≤ 0
1309
+ ∇xlL(xu, xl, λ) = 0
1310
+ g(xu, xl) ≤ 0
1311
+ λg(xu, xl) = 0
1312
+ λ ≥ 0
1313
+ where L(xu, xl, λ) = f(xu, xl) + λg(xu, xl) is the Lagrangian function. In the bilevel DCP (4), V is the upper-level
1314
+ variable and φ is the lower-level variable. The constraint in (4) can be rewritten as:
1315
+ φ ∈ arg min
1316
+ φ∈Φ
1317
+ Eµ[Ψ(Eθ[C(s, a, ξ) + γV (s′, µ′)], φ)]
1318
+ V (s, µ) − Eµ[Ψ(Eθ[C(s, a, ξ) + γV (s′, µ′)], φ)] ≤ 0.
1319
+ Since the lower-level problem is convex, we can reformulate the bilevel DCP (4) as a single-level DCP problem.
1320
+ min
1321
+ V
1322
+
1323
+
1324
+ s∈S,µ∈M
1325
+ α(s, µ)V (s, µ)
1326
+ s.t.V (s, µ) − Eµ[Ψ(Eθ[C(s, a, ξ) + γV (s′, µ′)], φ)] ≤ 0
1327
+ ∇φEµ[Ψ(Eθ[C(s, a, ξ) + γV (s′, µ′)], φ)] = 0
1328
+ ∀a ∈ A, s ∈ S, µ ∈ M.
1329
+ B.5. Additional Observations
1330
+ We show additional observations for the path planning problem on Table 1 and Table 2.
1331
+ Larger data size reduces epistemic uncertainty: when there are more data, the posterior distribution used in BR-MDP
1332
+ formulation and the MLE estimator used in the nominal approach converges to the true parameter, which reduces to solving
1333
+ an MDP with known transition probability and cost function. Therefore, the optimal policies and the actual costs tend to be
1334
+ the same.
1335
+ Effect of risk measures: although both risk measures (expectation and CVaR) result in time-consistent optimal policy
1336
+ for each considered formulation, they provide different levels of robustness. Even though the expectation case is faster to
1337
+ compute, it provides the least robustness, especially when the data size is small. For the CVaR risk measure, different risk
1338
+ level α also affects the robustness. As α increases, the agent is more risk-averse, and the CVaR cost is smaller since it avoids
1339
+ more severe costs, as is shown in Figure 1(b) and Figure 1(c). But this comes with a price: its expected cost is higher. It is
1340
+ intuitive: even though the agent avoids severe costs, it also forfeits a chance to traverse a path that is likely to have less
1341
+ traffic, even though the likelihood is small. This is shown as a right-shift of the actual performance distribution from Figure
1342
+ 1(c) and Figure 1(b).
1343
+
BNFIT4oBgHgl3EQf_iwr/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9E4T4oBgHgl3EQffg1w/content/tmp_files/2301.05108v1.pdf.txt ADDED
@@ -0,0 +1,1716 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Serenity: Library Based Python Code Analysis for
2
+ Code Completion and Automated Machine Learning
3
+ Wenting Zhao
4
+ Department of Computer Science
5
+ Cornell University
6
+ wzhao@cs.cornell.edu
7
+ Ibrahim Abdelaziz
8
+ Thomas J. Watson Research Center
9
+ IBM Research
10
+ Ibrahim.abdelaziz1@ibm.com
11
+ Julian Dolby
12
+ Thomas J. Watson Research Center
13
+ IBM Research
14
+ dolby@us.ibm.com
15
+ Kavitha Srinivas
16
+ Thomas J. Watson Research Center
17
+ IBM Research
18
+ Kavitha.Srinivas@ibm.com
19
+ Mossad Helali
20
+ Department of Computer Science
21
+ Concordia University
22
+ mossad.helali@concordia.ca
23
+ Essam Mansour
24
+ Department of Computer Science
25
+ Concordia University
26
+ essam.mansour@concordia.ca
27
+ Abstract
28
+ Dynamically typed languages such as Python have become
29
+ very popular1. Among other strengths, Python’s dynamic na-
30
+ ture and its straightforward linking to native code have made
31
+ it the de-facto language for many research areas such as Ar-
32
+ tificial Intelligence. This flexibility, however, makes static
33
+ analysis very hard. While creating a sound, or a soundy,
34
+ analysis for Python remains an open problem, we present in
35
+ this work Serenity, a framework for static analysis of Python
36
+ that turns out to be sufficient for some tasks. The Serenity
37
+ framework exploits two basic mechanisms: (a) reliance on
38
+ dynamic dispatch at the core of language translation, and (b)
39
+ extreme abstraction of libraries, to generate an abstraction
40
+ of the code. We demonstrate the efficiency and usefulness of
41
+ Serenity’s analysis in two applications: code completion and
42
+ automated machine learning. In these two applications, we
43
+ demonstrate that such analysis has a strong signal, and can
44
+ be leveraged to establish state-of-the-art performance, com-
45
+ parable to neural models and dynamic analysis respectively.
46
+ Keywords: Python, Static Analysis, Code completion, Au-
47
+ toML
48
+ 1
49
+ Introduction
50
+ Static analysis of Python is hard, due in part to features often
51
+ regarded as strengths: its dynamic nature and its straightfor-
52
+ ward linking to native code. Python is dynamically typed,
53
+ so the aid static types provide to analysis of e.g. Java is not
54
+ available. Python has a dynamic object structure; methods
55
+ can be freely assigned and modified complicating resolving
56
+ calls. Even basic constructs such as method calls and ob-
57
+ ject creations can be ambiguous in the basic syntax. Beyond
58
+ the language itself, many of the rich collection of Python li-
59
+ braries, especially the math-heavy libraries used in machine
60
+ learning, are implemented in native code, which makes analy-
61
+ sis require cross-language support. For these reasons among
62
+ 1https://www.techrepublic.com/article/programming-languages-pythons-
63
+ growth-is-absolutely-explosive-says-anaconda-ceo-and-not-slowing-
64
+ down/
65
+ others, to our knowledge, there is a lack of widely-used anal-
66
+ ysis frameworks for Python, despite the value such analysis
67
+ would have, for instance, for tools.
68
+ However, while creating a sound, or a soundy, analysis for
69
+ Python remains an open problem, we demonstrate Serenity2,
70
+ a framework that turns out to be sufficient for some tasks.
71
+ Beyond a relatively direct translation of Python Abstract
72
+ Syntax Tree (AST) into a Control Flow Graph (CFG), Serenity
73
+ exploits two basic mechanisms:
74
+ 1. Reliance on dynamic dispatch at the core of language
75
+ translation. It is not possible, always, even to tell whether
76
+ a construct is an object creation or a function call, and
77
+ this is just one example. Our approach to such situ-
78
+ ations is to turn them into dynamic dispatches over
79
+ types representing constituent constructs. We detail
80
+ how many subtleties of Python can be modeled in this
81
+ way.
82
+ 2. Extreme abstraction of libraries. User code often makes
83
+ heavy use of APIs to create and operate upon domain
84
+ objects, such as arrays in numpy, but these objects are
85
+ often fairly opaque to the user code. As such, we find
86
+ it often suffices to treat libraries by just tracking the
87
+ objects they create and methods called upon them. This
88
+ is not, nor is it designed to be, soundy, let alone sound.
89
+ We show however that this enables useful modeling
90
+ of user code.
91
+ We first discuss how Python is modeled and how the library
92
+ abstraction still provides a useful analysis of user code. We
93
+ then demonstrate that this analysis is useful where we fo-
94
+ cus on two applications that depend on the outputs of such
95
+ analysis:
96
+ Code Completion is a core functionality expected in
97
+ all IDEs, where the goal is to suggest methods and
98
+ functions to call given prior code. We show how our
99
+ dataflow analysis allows us to focus on relevant code
100
+ at a point of completion, which when combined with
101
+ 2With apologies to Reinhold Niebuhr, "give us courage to model what must
102
+ be modeled, serenity to accept what cannot be modeled, and the insight to
103
+ know the one from the other."
104
+ 1
105
+ arXiv:2301.05108v1 [cs.PL] 5 Jan 2023
106
+
107
+ , ,
108
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
109
+ local program context prior to the function call pro-
110
+ duces much better code completion performance than
111
+ the context alone.
112
+ Automated Machine Learning which takes a given dataset
113
+ in the form of a structured table, and creates an effec-
114
+ tive machine learning pipeline to learn to predict some
115
+ columns based on other columns. Prior approaches
116
+ have been based on dynamic analysis, and we show
117
+ static analysis does just as well. Static analysis is more
118
+ practical, as actually running these pipelines is an ardu-
119
+ ous and expensive task; and one can mine large open
120
+ repositories to populate such databases using analysis.
121
+ In the rest of the paper, we first describe Serenity’s tech-
122
+ niques for modeling Python based on a running example
123
+ (Sections 2 and 3). We then validate our analysis with two
124
+ applications in code completion (Section 4) and automated
125
+ machine learning (AutoML) (Section 5). We finally survey
126
+ related work in Section 6 and conclude in Section 7.
127
+ 2
128
+ A Running Example
129
+ Figure 1 shows the running example for this paper, a snip-
130
+ pet of Python code adapted from the multi_class_svm.py
131
+ script of ETH150K [35] benchmark. Our modification (lines
132
+ 1 to 10) is to add some debugging options to illustrate com-
133
+ plexities in Python. The variable fitit is assigned one of
134
+ two functions depending on debug_level: either a closure
135
+ or a function with an added assertion. The code loads a digits
136
+ dataset (line 20), reads specific fields of the dataset (line 21),
137
+ manipulates the dataset (line 22), splits the data into train
138
+ and test splits (line 23), and finally creates X_train_bias
139
+ (line 26. The code then creates machine learning models
140
+ FrankWolfeSSVM (line 42) and LinearSVC (line 72). The code
141
+ then calls them: a fitit call on a LinearSVC (line 74) takes
142
+ the model (line 26), and fitit is called on FrankWolfeSVC
143
+ with X_train_bias (line 79). Note that the call to the con-
144
+ structor FrankWolfeSSVM is on line 42, and the fitit call
145
+ on the object is on line 79, reflecting a property of most code
146
+ - it is non-local.
147
+ 3
148
+ Analysis
149
+ 3.1
150
+ Background: call graph framework
151
+ Grove et al. [18] provide a framework for expressing call
152
+ graph algorithms for object-oriented languages. It encapsu-
153
+ lates the bulk of the algorithm, parameterizing the algorithms
154
+ with functions that determine how to add context sensitivity.
155
+ The details of the framework are beyond the scope of this
156
+ paper, but we depend on two details:
157
+ • First, we will rely later on something called the Proce-
158
+ dure Key Selection Function (PKS), which is essentially
159
+ a way to specify when called functions should be ana-
160
+ lyzed in a context-sensitive manner.
161
+ • Second, the framework distinguishes between function
162
+ call sites and object creation sites, which, as we shall
163
+ 1
164
+ debug_level = 3
165
+ 2
166
+ 3
167
+ if debug_level > 5:
168
+ 4
169
+ def fd(model, test, train):
170
+ 5
171
+ assert len(test) < 500
172
+ 6
173
+ model.fit(train, test)
174
+ 7
175
+ fitit = fd
176
+ 8
177
+ 9
178
+ else:
179
+ 10
180
+ fitit = lambda model, test, train:
181
+ model.fit(train, test)
182
+ ↩→
183
+ 11
184
+ 15
185
+ from sklearn.svm import LinearSVC
186
+ 16
187
+ 17
188
+ from pystruct.models import MultiClassClf
189
+ 18
190
+ from pystruct.learners import (NSlackSSVM,
191
+ OneSlackSSVM, SubgradientSSVM,
192
+ FrankWolfeSSVM)
193
+ ↩→
194
+ ↩→
195
+ 19
196
+ 20
197
+ digits = load_digits()
198
+ 21
199
+ X, y = digits.data, digits.target
200
+ 22
201
+ X = X / 16.
202
+ 23
203
+ X_train, X_test, y_train, y_test =
204
+ train_test_split(X, y)
205
+ ↩→
206
+ 24
207
+ 25
208
+ # we add a constant 1 feature for the bias
209
+ 26
210
+ X_train_bias = np.hstack([X_train,
211
+ np.ones((X_train.shape[0], 1))])
212
+ ↩→
213
+ 41
214
+ 42
215
+ fw_bc_svm = FrankWolfeSSVM(model, C=.1,
216
+ max_iter=50)
217
+ ↩→
218
+ 71
219
+ 72
220
+ libsvm =
221
+ LinearSVC(multi_class='crammer_singer',
222
+ C=.1)
223
+ ↩→
224
+ ↩→
225
+ 73
226
+ start = time()
227
+ 74
228
+ fitit(libsvm, X_train, y_train)
229
+ 75
230
+ time_libsvm = time() - start
231
+ 76
232
+ print("Score with sklearn and libsvm: %f
233
+ (took %f seconds)" %
234
+ (libsvm.score(X_test, y_test),
235
+ time_libsvm))
236
+ ↩→
237
+ ↩→
238
+ ↩→
239
+ 77
240
+ 78
241
+ start = time()
242
+ 79
243
+ fitit(fw_bc_svm, X_train_bias, y_train)
244
+ Figure 1. A Running example
245
+ see in Figure 3, is not possible in general in Python.
246
+ Hence, we combine the two sets into a single one.
247
+ The framework paper defines relevant program features
248
+ at the top of page 694, which we excerpt here in Figure 2.
249
+ We need two minor changes:
250
+ InstVariables is taken to be the set of strings possibly
251
+ used as field names, rather than a set of declared field
252
+ names, which it is in the original framework. While
253
+ 2
254
+
255
+ Serenity: Library Based Python Code Analysis for Code Completion and Automated Machine Learning
256
+ , ,
257
+ field names can be defined in Python, this is entirely
258
+ optional so we ignore such definitions.
259
+ NewSites becomes the same as the set CallSites to effect
260
+ the second item above; that is, there is one set that
261
+ combines all possible call sites and creation sites. This
262
+ represents the fact that every site can potentially see
263
+ both classes and functions.
264
+ Class all class declarations in the program
265
+ InstVariable all instance variable declara-
266
+ tions of the program
267
+ Procedure all procedure declarations of the
268
+ program
269
+ Variable all variable names used in the pro-
270
+ gram
271
+ CallSite all call sites in the program
272
+ NewSite all new sites in the program
273
+ LoadSite all loads of instance variables in
274
+ the program
275
+ StoreSite all stores to instance variables in
276
+ the program
277
+ Figure 2. Program features from [18]
278
+ 3.2
279
+ Language modeling
280
+ Figure 3 illustrates the kind of dynamism with which anal-
281
+ ysis of Python must contend, in this case 5 different options
282
+ for the meaning of X() on line 45 based on the value supplied
283
+ as sys.argv[1] and sometimes sys.argv[2]:
284
+ class1 class X (line 4) defines an ordinary class named
285
+ X, of which line 45 creates an instance.
286
+ class2 class X (line 11) defines a class named X that
287
+ redefines the new operator, so line 45 just returns 0.
288
+ def1 def X (line 16) defines a function named X, and
289
+ calling it at line 45 returns 1.
290
+ def2 X = lambda. . . (line 20) creates a closure and
291
+ assigns it to X; calling the closure at line 45 returns 2.
292
+ import The module X (line 23) overrides default module
293
+ behavior to become callable and return 3 at line 45.
294
+ method static X (line 32) is assigned the static method
295
+ s of class X (line 28) which returns 5 at line 45.
296
+ method instance X (line 41) gets a bound instance method
297
+ (i.e. a closure over y) i of class X (list 35), returning 4
298
+ at line 45).
299
+ Note that all of these definitions of X can flow to the same call
300
+ at line 45, so there is literally no syntactic distinction between
301
+ different kinds of allocations, calls, and even modules in some
302
+ cases. And class and function names are all first class. Thus
303
+ analysis must handle these basic operations in a dynamic
304
+ manner, unlike e.g. Java, where calls, allocations and imports
305
+ have clear syntactic distinctions. Note further that even basic
306
+ method calls require closures to handle line 41.
307
+ 1
308
+ import sys
309
+ 2
310
+ 3
311
+ if sys.argv[1] == "class1" or sys.argv[1] == "inst":
312
+ 4
313
+ class X:
314
+ 5
315
+ pass
316
+ 6
317
+ 7
318
+ if sys.argv[1] == "inst":
319
+ 8
320
+ X = X()
321
+ 9
322
+ 10
323
+ elif sys.argv[1] == "class2":
324
+ 11
325
+ class X:
326
+ 12
327
+ def __new__(*args):
328
+ 13
329
+ return 0
330
+ 14
331
+ 15
332
+ elif sys.argv[1] == "def1":
333
+ 16
334
+ def X():
335
+ 17
336
+ return 1
337
+ 18
338
+ 19
339
+ elif sys.argv[1] == "def2":
340
+ 20
341
+ X = lambda: 2
342
+ 21
343
+ 22
344
+ elif sys.argv[1] == "import":
345
+ 23
346
+ import X
347
+ 24
348
+ 25
349
+ elif sys.argv[1] == "method":
350
+ 26
351
+ 27
352
+ if sys.argv[2] == "static":
353
+ 28
354
+ class X:
355
+ 29
356
+ def s():
357
+ 30
358
+ return 5
359
+ 31
360
+ 32
361
+ X = X.s
362
+ 33
363
+ 34
364
+ elif sys.argv[2] == "instance":
365
+ 35
366
+ class X:
367
+ 36
368
+ v = 4
369
+ 37
370
+ def i(self):
371
+ 38
372
+ return self.v
373
+ 39
374
+ 40
375
+ y = X()
376
+ 41
377
+ X = y.i
378
+ 42
379
+ 43
380
+ 44
381
+ print(str(X))
382
+ 45
383
+ print(str(X()))
384
+ Figure 3. Dynamic code examples
385
+ The X() at line 45 is a call on X, and this allows us to
386
+ use standard dynamic dispatch to model all of this behavior,
387
+ using synthetic "methods" where needed to handle language
388
+ semantics. We will use a similar "dispatch" at field accesses
389
+ to handle the difference between class and instance fields,
390
+ which again can only be known from the object accessed. We
391
+ shall make use of these indirections to define our framework
392
+ model in Section 3.3.
393
+ 3
394
+
395
+ , ,
396
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
397
+ We adopt the terminology of Grove et al. [18] to present
398
+ our work as extensions to standard object-oriented call graph
399
+ construction. To fit our dynamic Python context, we make
400
+ a few changes to the core definitions of that work. These
401
+ changes reflect that Python does not require that fields be
402
+ declared in order to be used, and it makes no syntactic dis-
403
+ tinction between calls and allocations. Furthermore, as is
404
+ standard for representing first-class entities in an object-
405
+ oriented framework, we have one class for each first-class
406
+ entity. As Figure 3 shows, classes, functions, methods and
407
+ modules are all first-class, so our set of classes for analysis
408
+ includes the following:
409
+ 𝐶𝑐𝑙𝑎𝑠𝑠 a class representing program class C
410
+ 𝐶𝑖𝑛𝑠𝑡 a class representing instances of class C
411
+ 𝑀𝑖𝑛𝑠𝑡 a class representing instances of module M
412
+ 𝐷𝑖𝑛𝑠𝑡 a class representing instances of function D
413
+ 𝑆𝑖𝑛𝑠𝑡 a class representing the instance of script S
414
+ Now most of the irregularities of Python calls and creations
415
+ are handled by treating every call site as a CallSite for each
416
+ receiver type ∗𝑖𝑛𝑠𝑡 and as a NewSite for every receiver type
417
+ ∗𝑐𝑙𝑎𝑠𝑠. The site on line 45 in Figure 3 would have some types
418
+ handled by each mechanism. Fields are also handled seam-
419
+ lessly: on line 32, X is a 𝐶𝑐𝑙𝑎𝑠𝑠, and on line 41 X is a 𝐶𝑖𝑛𝑠𝑡, so
420
+ static and instance state are handled by making static fields
421
+ be instance fields of the class object.
422
+ Call graph construction starts with a root stub that creates
423
+ an instance of the main script 𝑆𝑖𝑛𝑠𝑡 and calls it.
424
+ 3.3
425
+ Framework modeling
426
+ In many situations, it is difficult or impossible to find actual
427
+ code for Python imports: there is no fixed relationship be-
428
+ tween names in import statements and locations of actually
429
+ source code. Even if there were, the structure of Python li-
430
+ braries is such that large amounts of the code is native and
431
+ hence a Python analysis framework is not applicable. Even
432
+ if it were possible to find Python code, many libraries are
433
+ large enough to make precise analysis challenging. In our
434
+ case, we are interested in the behavior of application code
435
+ rather than library internals, so we minimize these issues by
436
+ largely not analyzing framework code.
437
+ Our model, called Turtles3, abstracts Python frameworks
438
+ to capture how the framework interacts with user code and
439
+ to ignore all of its internal details. Specifically, we model
440
+ four aspects, all using the indirections of Section 3.2:
441
+ 1. We model import statements as returning a new frame-
442
+ work, denoted by the name of the imported module.
443
+ The framework is an opaque object with no function-
444
+ ality beyond implementing the model.
445
+ 2. Calls to framework functions and methods typically
446
+ return something, which is then possibly used by the
447
+ user code. We model every call to the framework as
448
+ 3from "turtles all the way down". This phrase is of unknown origin, see
449
+ https://en.wikipedia.org/wiki/Turtles_all_the_way_down
450
+ returning a new object from it; this model is transitive,
451
+ so calls on those objects return further new objects
452
+ from the framework. We label these objects with the
453
+ path by which they are accessed.
454
+ 3. Accesses to fields of framework objects have little
455
+ meaning in our model since we do not model the frame-
456
+ work state at all. However, user code typically expects
457
+ that a field access return something, so we model all
458
+ such field accesses as returning the container object.
459
+ 4. Arguments to turtle methods are mostly ignored, since
460
+ we do not model what the framework does to them;
461
+ however, sometimes functions are passed as parame-
462
+ ters, and we assume that the framework might call it.
463
+ Since we do not model internal framework state, the
464
+ model invokes callbacks from where they are passed
465
+ as arguments.
466
+ The framework of Grove et al. [18] provides the customiza-
467
+ tion support needed to implement this model. We start by
468
+ introducing a new type of class, 𝑇𝑝𝑎𝑡ℎ, that represents a tur-
469
+ tle, i.e. an opaque model object. Item 1 is implemented by
470
+ modeling import M statements as a call to a synthetic import
471
+ procedure with M as its argument. This call is modeled as
472
+ returning a 𝑇𝑀. Item 2 is implemented as a Procedure Key
473
+ Selection Function (PKS) which takes the receiver of a type
474
+ 𝑇𝑝𝑎𝑡ℎ and the name 𝑛 of the called procedure and returns a
475
+ new turtle of 𝑇𝑝𝑎𝑡ℎ.𝑛. Item 3 is implemented by simply re-
476
+ turning self when reading any field of any 𝑇𝑝𝑎𝑡ℎ type. Item 4
477
+ is implemented as a PKS that generates calls for every argu-
478
+ ment that is of a function type (this is not illustrated in our
479
+ example).
480
+ 3.4
481
+ Inheritance from Turtles
482
+ One wrinkle in our data is that application classes often
483
+ inherit from turtle classes, meaning that method calls on
484
+ self should logically be turtle methods when the method
485
+ read is never assigned. That is, if a read of self is to a field
486
+ or method that is never assigned and the class inherits from
487
+ a turtle, the read should return a new turtle object to capture
488
+ unknown superclass behavior. However, this is tricky to do
489
+ because, since methods and fields can be assigned anywhere
490
+ in the code, it is not in general possible to know if one will not
491
+ be assigned until analysis terminates. What we need to do
492
+ is record such reads and, when analysis terminates, process
493
+ them as turtle reads and restart analysis. This restarting itself
494
+ may need to be repeated, since reading one turtle could make
495
+ more code reachable.
496
+ 3.5
497
+ Analysis of running example
498
+ When this analysis is applied to the running example (Fig-
499
+ ure 1), the result is the dataflow graph shown in Figure 4. To
500
+ illustrate our framework model, observe the import call of
501
+ LinearSVC on line 15; as an import, this returns an object of
502
+ type 𝐿𝑖𝑛𝑒𝑎𝑟𝑆𝑉𝐶𝑖𝑛𝑠𝑡, that is, an instance of the module. When
503
+ 4
504
+
505
+ Serenity: Library Based Python Code Analysis for Code Completion and Automated Machine Learning
506
+ , ,
507
+ load_digits
508
+ digits.data
509
+ digits.target
510
+ X
511
+ y
512
+ X/16
513
+ train_test_split
514
+ X_train
515
+ X_test
516
+ y_train
517
+ y_test
518
+ hstack
519
+ fit (fd)
520
+ fit (fd)
521
+ LinearSVC
522
+ FrankWolfeSSVM
523
+ Invocations
524
+ arg 0, flow
525
+ arg > 0
526
+ Reads
527
+ fit (lambda)
528
+ fit (lambda)
529
+ Figure 4. Dataflow graph for the running example
530
+ this is called (line 72), it returns a turtle of type 𝑇𝐿𝑖𝑛𝑒𝑎𝑟𝑆𝑉𝐶,
531
+ illustrated by the green node labeled LinearSVC. When fit
532
+ is called on this object in the fitit functions (line 74),
533
+ item 2 means it returns a derived turtle of type𝑇𝐿𝑖𝑛𝑒𝑎𝑟𝑆𝑉𝐶.𝑓 𝑖𝑡,
534
+ shown as a green node labeled fit. Since fit is called on
535
+ LinearSVC, a black data flow edge connects them. On the
536
+ other hand, the other non-self arguments to fit are shown
537
+ with red arrows. Other turtle functions are shown similarly:
538
+ load_digits, train_test_split, hstack, FrankWolfeSSVM.
539
+ Note that analysis has no idea what these functions do, just
540
+ that they pass data. Note that fitit is a variable holding one
541
+ of two first-class functions, and it is called for both of the ML
542
+ models created. To get the precise results shown in Figure 4
543
+ requires analysis infrastructure that handles first-class func-
544
+ tions and also does context-sensitive analysis. In particular,
545
+ the model objects and the data flow to both the normal and
546
+ debugging functions assigned to fit, since both potentially
547
+ flow to fitit. In the figure, the nodes are distinguished with
548
+ labels of the function in which they occur.
549
+ Other nodes in Figure 4 represent local dataflow. The top-
550
+ most two blue nodes represent reads of the data and target
551
+ fields of data, so they have edges from the load_digits call
552
+ and edges to their respective variables X and y. X is scaled
553
+ by 16, shown by the nodes labeled X/16. X/16 and y then
554
+ flow to train_test_split with red edges since they are
555
+ arguments.
556
+ This graph focuses on data flow, which captures patterns
557
+ of how the various turtle APIs are used across programs.
558
+ This allows us to learn patterns that enable our applications.
559
+ 3.6
560
+ Implementation
561
+ Our analysis is implemented using WALA and its support
562
+ for both Python 2 and Python 3 using the Jython system.
563
+ WALA is built to be extensible, and we used several features
564
+ to ease our implementation work.
565
+ The main extension is for handling turtles. For item 1, we
566
+ override the model function that handles import to return a
567
+ synthetic object with a turtle type named for the given mod-
568
+ ule. For item 2, we override the selection of called methods
569
+ for turtle classes so that any call goes to a synthetic method
570
+ that creates and returns a turtle with the appropriate ex-
571
+ tended turtle name. For item 2, this synthetic method mostly
572
+ ignores its arguments, except generating a call to each one to
573
+ handle callbacks. For item 3, we override the code handling
574
+ field reads to simply return the container if it is of turtle
575
+ type.
576
+ The other configuration is to add aggressive context sen-
577
+ sitivity for all turtle types. Since the synthetic methods are
578
+ trivial anyway, it is cheap to ensure that every call site is
579
+ analyzed separately.
580
+ 4
581
+ Code Completion Application
582
+ The core research question we ask is how useful Serenity’s
583
+ analysis is and whether it can help other applications, de-
584
+ spite the challenges in modeling dynamic languages such as
585
+ Python accurately. As a first application, we examine a code
586
+ completion use case, which we cover below in detail. By code
587
+ completion, we refer to the problem where, when given a
588
+ snippet of a program, the problem is to predict a function
589
+ call, analogous to what an IDE does for method suggestions.
590
+ We do not refer to code generation given natural language
591
+ descriptions of code requirements, as in the Codex model
592
+ that powers GitHub Co-Pilot [8] or even models that gener-
593
+ ate entire functions in a generative style based on function
594
+ signatures or snippets of code, such as CodeT5 [41]. Our
595
+ observation is that for code completion, the analysis require-
596
+ ment is that the methods be callable from a specific type, and
597
+ so analysis for code completion is focused on detecting the
598
+ types of objects. For languages such as Python, type infer-
599
+ ence is hard, but our hypothesis is that code completion can
600
+ benefit significantly from the data flow analysis that Serenity
601
+ produces, simply because data flow can provide a focused
602
+ context for code completion.
603
+ Recently, there have been a plethora of neural models of
604
+ code such as [13], [19], [22], [41] trained with the objective
605
+ of either predicting randomly masked tokens in code, or
606
+ predicting the very next token, which one might assume is
607
+ consistent with the task of code completion. Our research
608
+ question is whether one can leverage the extensive training
609
+ of these models on millions of programs to perform code
610
+ completion. Specifically, we asked whether data flow analy-
611
+ sis provided by Serenity can improve code completion when
612
+ combined with these neural models. If data flow analysis
613
+ does provide any signal from Serenity, it should improve per-
614
+ formance on code completion task even with the extensive
615
+ training these language models already had. We therefore
616
+ 5
617
+
618
+ , ,
619
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
620
+ 1
621
+ print("Score with pystruct subgradient
622
+ ssvm: %f (took %f seconds)" %
623
+ (np.mean(y_pred == y_test),
624
+ time_subgradient_svm))
625
+ ↩→
626
+ ↩→
627
+ ↩→
628
+ 2
629
+ 3
630
+ # the standard one-vs-rest multi-class
631
+ 4
632
+ # would probably be as good and faster
633
+ 5
634
+ # but solving a different model
635
+ 6
636
+ libsvm =
637
+ LinearSVC(multi_class='crammer_singer',
638
+ C=.1)
639
+ ↩→
640
+ ↩→
641
+ 7
642
+ start = time()
643
+ 8
644
+ libsvm.fit(X_train, y_train)
645
+ 9
646
+ time_libsvm = time() - start
647
+ 10
648
+ print("Score with sklearn and libsvm: %f
649
+ (took %f seconds)" %
650
+ (libsvm.score(X_test, y_test),
651
+ time_libsvm))
652
+ ↩→
653
+ ↩→
654
+ ↩→
655
+ 11
656
+ 12
657
+ 13
658
+ start = time()
659
+ 14
660
+ fw_bc_svm.?
661
+ Figure 5. Code snippet used for prediction
662
+ 1
663
+ from sklearn.cross_validation import
664
+ train_test_split
665
+ ↩→
666
+ 2
667
+ from pystruct.models import MultiClassClf
668
+ 3
669
+ from pystruct.learners import (NSlackSSVM,
670
+ OneSlackSSVM,
671
+ ↩→
672
+ 4
673
+ digits = load_digits()
674
+ 5
675
+ digits.data
676
+ 6
677
+ digits.target
678
+ 7
679
+ X = X / 16.
680
+ 8
681
+ train_test_split(X, y)
682
+ 9
683
+ X_train_bias = np.hstack([X_train,
684
+ np.ones((X_train.shape[0], 1))])
685
+ ↩→
686
+ 10
687
+ model =
688
+ MultiClassClf(n_features=X_train_bias.shape[1],
689
+ n_classes=10)
690
+ ↩→
691
+ ↩→
692
+ 11
693
+ fw_bc_svm = FrankWolfeSSVM(model, C=.1,
694
+ max_iter=50)
695
+ ↩→
696
+ 12
697
+ fw_bc_svm.?
698
+ Figure 6. Code snippet corresponding to a slice from the
699
+ analysis graph
700
+ modeled code completion as a fine tuning task, and varied
701
+ the training inputs of fine tuning to be one of the three
702
+ conditions shown below:
703
+ • All code as text prior to the function call
704
+ • A slice of the code restricted to source expressions that
705
+ are relevant to a function call in data flow
706
+ • Both code as text, as well as the slice, separated by a
707
+ token to distinguish the two inputs.
708
+ For all text code prior to a function call, there are limits on
709
+ how many tokens modern language models can fit. That is,
710
+ when the code goes beyond the limit, truncation is needed
711
+ in order for the models to run. A widely-used truncation
712
+ strategy is to only keep 𝑛 tokens prior to the prediction point,
713
+ where 𝑛 is the maximum sequence length, which can lead to
714
+ fairly local information, as shown in Figure 5 for our running
715
+ example shown in Figure 1. The key prediction in Figure 5
716
+ is to predict what method will be called on fw_bc_svm, but
717
+ notice that the construction of fw_bc_svm is out of the scope
718
+ of the truncation4.
719
+ For obtaining the slice restricted purely to dataflow, given
720
+ a program and its corresponding dataflow graph, to predict
721
+ the function call, we start at a node that we would like to
722
+ predict, reverse all edges coming into the node, and find
723
+ all reachable nodes. Each node in the reachability set corre-
724
+ sponds to a source expression in the original program, and
725
+ we only include the expressions that are not sub-expressions
726
+ of any other expressions as features. Then, we order these
727
+ expressions according to their positions in the source files,
728
+ and add in variable names from the analysis artifacts so the
729
+ code looks more or less like real code that the language mod-
730
+ els have been trained on. Figure 6 shows an example of such
731
+ a dataflow based slice looks for the code in Figure 1. Here we
732
+ start the fw_bc_svm.fit call in Figure 4, reverse all edges
733
+ coming into the node, and perform a reachability analysis,
734
+ to gather the slice, adding variable names such as digits =
735
+ load_digits(). In this example, dataflow analysis does give
736
+ important information useful for predicting the function call,
737
+ because the slice brings in non-local but relevant code such
738
+ as the definition of fw_bc_svm into the scope of text that
739
+ can be fed to a neural model.
740
+ 4.1
741
+ Dataset
742
+ We used the popular benchmark of ETH150K [35], which
743
+ comes with 100K programs used for training, and the re-
744
+ maining 50K used as a testing set. ETH150K was analyzed
745
+ using Serenity, and 147,288 of 150,000 files were successfully
746
+ analyzed. For the analyzed files, we parsed each file with a
747
+ Python AST parser, and gathered all function calls. For each
748
+ function call identified by the AST, we examined whether
749
+ we could find the function in the analysis output, and if it
750
+ was found in the output, we checked if the source location of
751
+ the call matched that in the AST. Our observation has been
752
+ that the Jython source mappings can be wrong sometimes,
753
+ so we used both metrics to measure the completeness of the
754
+ analysis. The analysis found 58.77% of function calls in the
755
+ AST with matching source locations, and 67.36% of function
756
+ calls when the requirements to match source was relaxed.
757
+ Manual inspection on a few cases where source locations did
758
+ not match indicated that the problem was indeed mapping
759
+ 4In this example, truncation was set to 1024 tokens, as per the requirements
760
+ of one of the CuBERT models [22]
761
+ 6
762
+
763
+ Serenity: Library Based Python Code Analysis for Code Completion and Automated Machine Learning
764
+ , ,
765
+ 1
766
+ def f_Hp(self, pars, p, inpt, target):
767
+ 2
768
+ eps = 1E-6
769
+ 3
770
+ deriv = self.fprime(pars, inpt,
771
+ target)
772
+ ↩→
773
+ 4
774
+ offseted = self.fprime(pars + p *
775
+ eps, inpt, target)
776
+ ↩→
777
+ 5
778
+ return (offseted - deriv) / eps
779
+ Figure 7. Example of code where a leaf node is an expression
780
+ being incorrect in Jython. Further investigation revealed that
781
+ many of the missing calls are instances of Python primitives
782
+ that Serenity does not model and treats as no-ops, such as
783
+ repr and FutureWarning. A small fraction was found to
784
+ be genuinely dead code, especially when Python files were
785
+ integral parts of a larger application, as they often are in
786
+ ETH150K.
787
+ To generate the slices, we started with leaf nodes, and
788
+ restricted ourselves to cases where the nodes had at least a
789
+ depth of 1 when the edges were reversed. We note that in a
790
+ majority of cases, leaf nodes were actually expressions, as
791
+ shown in the example code in Figure 7. We ignored these
792
+ in creating our dataset because we were focused on a prob-
793
+ lem that cannot be solved by a pure lexical analysis of code.
794
+ When we restricted ourselves to nodes that were potentially
795
+ function calls rather than expressions, we generated slices
796
+ from 65.35% of the programs where there existed at least one
797
+ slice where the leaf node was likely a function call. For the
798
+ train and test sets of programs, we generated 334,415 slices
799
+ and 162,847 slices respectively by iterating over all the leaf
800
+ nodes in dataflow graphs. Once we consider leaf nodes as
801
+ nodes for our prediction, there were a total of over 65K labels
802
+ that were generated across train and test sets for code com-
803
+ pletion. Figure 8 plots the cumulative frequency distribution
804
+ of labels against the number of labels. As shown in the Figure,
805
+ the distribution of labels follows the usual power law, but we
806
+ note that the most popular label appeared across train and
807
+ test only 1.7% of the time, and the top 10 labels cumulatively
808
+ appeared only 11.0% of the time. In other words, this is a
809
+ difficult classification problem5. We note that this method
810
+ of declaring code completion is more realistic compared to
811
+ other means for code completion (such as measuring next
812
+ token prediction), in the sense that this is often the case that
813
+ IDEs focus on.
814
+ 4.2
815
+ Language model selection
816
+ To decide on the best neural model to use as a basis for our
817
+ code completion experiments, we tested a number of code
818
+ related language models including CodeBERT [13], Graph-
819
+ CodeBERT [19], CuBERT [22] and CodeT5 [41]. CodeBERT[13]
820
+ 5We will make the datasets and code for all the work reported in this section
821
+ available as open source.
822
+ 0
823
+ 0.1
824
+ 0.2
825
+ 0.3
826
+ 0.4
827
+ 0.5
828
+ 0.6
829
+ 0.7
830
+ 0.8
831
+ 0.9
832
+ 1
833
+ 1
834
+ 4
835
+ 16
836
+ 64
837
+ 256
838
+ 1024
839
+ 4096
840
+ 16384
841
+ Cumulative Frequency
842
+ No. of Labels
843
+ Cumulative frequency of labels
844
+ Figure 8. Distribution of labels for the classification task
845
+ is a bimodal model trained on datasets with natural lan-
846
+ guage (NL) -programming language (PL) pairs (e.g. docu-
847
+ mentation/code pairs) across six programming languages
848
+ (Python, Java, JavaScript, PHP, Ruby, and Go). Similarly,
849
+ GraphCodeBERT uses NL-PL pairs for pretraining a code
850
+ language model, but based on local data flow graphs ex-
851
+ tracted from Abstract Syntax Trees. CuBERT [22] is another
852
+ BERT-based model fine-tuned on multiple classification tasks
853
+ such as checking the presence of certain bugs and predicting
854
+ exception types. CuBERT is trained only on Python code,
855
+ and furthermore uses language level tokens as inputs to the
856
+ model. CodeT5 [41] is an encoder-decoder model based on
857
+ T5 architecture [33] with code-specific knowledge trained
858
+ to distinguish which tokens are identifiers and recover them
859
+ when they are masked out. CodeT5 is fine-tuned using multi-
860
+ ple CodeXGLUE benchmarks including understanding tasks
861
+ such as code defect detection and clone detection, and gen-
862
+ eration tasks like code summarization and translation.
863
+ Figure 9 shows the performance of these different models
864
+ on the code completion task with no fine tuning for the top-1
865
+ and top-5 cases. We modeled code completion as a mask pre-
866
+ diction task, with the function call to be predicted being the
867
+ masked token. As shown in the Figure 9, the best performing
868
+ model was CuBERT on this task, which is not surprising
869
+ because it was the only model trained exclusively on Python
870
+ and used language level tokens unlike the other models. We
871
+ note that the performance of CodeT5 was surprisingly poor,
872
+ but we think this may in part be due to the fact that it is
873
+ trained on NL-PL pairs and it is strictly a generative model,
874
+ 7
875
+
876
+ , ,
877
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
878
+ 21
879
+ 19
880
+ 13
881
+ 2.7
882
+ 33
883
+ 27
884
+ 23
885
+ 3.1
886
+ 0
887
+ 5
888
+ 10
889
+ 15
890
+ 20
891
+ 25
892
+ 30
893
+ 35
894
+ 40
895
+ CuBERT
896
+ CodeBERT
897
+ GraphCodeBert
898
+ CodeT5
899
+ Accuracy
900
+ Complete (Top1)
901
+ Complete (Top5)
902
+ Figure 9. Accuracy on top-5 and top-1 test data for base lan-
903
+ guage models. Performance on CuBERT for slices is based on
904
+ 150,739 and 137,987 examples for complete and slice, respec-
905
+ tively because of tokenization issues. For all other systems
906
+ the number of testing examples was 167,816.
907
+ for which we needed to specify a length of generation. It
908
+ also needed the most tuning in terms of specifying different
909
+ search strategies for final token prediction, so it is possible
910
+ that we did not choose the optimal search strategy for it. For
911
+ our purposes though, we chose CuBERT as a base, primarily
912
+ because we expected to benefit most from fine tuning. We
913
+ point out that given our label distribution, for the language
914
+ model to provide even 21% performance on complete for
915
+ top-1 and 33% for top-5 is quite good.
916
+ We turn now to the problem of fine tuning CuBERT with
917
+ training inputs to see if analysis does in fact improve code
918
+ completion as we defined it. Note that CuBERT’s pretraining
919
+ was performed by feeding the model the logical lines of 5
920
+ million programs - so at the minimal, some fine tuning for
921
+ the code context where the function call is to be predicted
922
+ is needed. As stated earlier, we contrasted three different
923
+ training conditions:
924
+ • complete: where we gave the model text starting from
925
+ the call, backwards, as shown in Figure 5
926
+ • slice: where we used a backwards slice as shown in
927
+ Figure 6
928
+ • combined where the text from complete and slice
929
+ were concatenated as input to the model using a sepa-
930
+ rator token.
931
+ The test was on complete text, or combined. We chose
932
+ these conditions because we observed from examples that
933
+ for the problem of code generation, data flow is not sufficient
934
+ by itself. Figure 10 shows such an example. In this code, lines
935
+ 5 and 15 contain the clue needed to make the prediction
936
+ of id, but they are unrelated to the receiver for which the
937
+ call is being made on line 22. Yet, the local pattern of code
938
+ has the same variable names, and the same set of calls are
939
+ repeated across functions, suggesting that id may be a good
940
+ candidate label. By contrast, the corresponding slice con-
941
+ tains minimal information as shown in Figure 11, since the
942
+ 1
943
+ response.json.return_value = dict(response,
944
+ total_count=3, limit=0, offset=0)
945
+ ↩→
946
+ 2
947
+ projects =
948
+ self.redmine.project.all()
949
+ ↩→
950
+ 3
951
+ self.assertEqual(projects.limit, 0)
952
+ 4
953
+ self.assertEqual(projects.offset,
954
+ 0)
955
+ ↩→
956
+ 5
957
+ self.assertEqual(projects[0].id, 1)
958
+ 6
959
+ self.assertEqual(projects[1].id, 2)
960
+ 7
961
+ self.assertEqual(projects[2].id, 3)
962
+ 8
963
+ 9
964
+ def test_offset_limit(self):
965
+ 10
966
+ response_with_limit_offset =
967
+ {'total_count': 2, 'limit': 3,
968
+ 'offset': 1, 'projects':
969
+ response['projects'][1:3]}
970
+ ↩→
971
+ ↩→
972
+ ↩→
973
+ 11
974
+ self.response.json.return_value =
975
+ response_with_limit_offset
976
+ ↩→
977
+ 12
978
+ projects =
979
+ self.redmine.project.all()[1:3]
980
+ ↩→
981
+ 13
982
+ self.assertEqual(projects.limit, 3)
983
+ 14
984
+ self.assertEqual(projects.offset,
985
+ 1)
986
+ ↩→
987
+ 15
988
+ self.assertEqual(projects[0].id, 2)
989
+ 16
990
+ self.assertEqual(projects[1].id, 3)
991
+ 17
992
+ 18
993
+ def test_offset_limit_mimic(self):
994
+ 19
995
+ projects =
996
+ self.redmine.project.all()[1:3]
997
+ ↩→
998
+ 20
999
+ self.assertEqual(projects.limit, 3)
1000
+ 21
1001
+ self.assertEqual(projects.offset,
1002
+ 1)
1003
+ ↩→
1004
+ 22
1005
+ self.assertEqual(projects[0].?
1006
+ Figure 10. Code snippet where local text can help prediction
1007
+ 1
1008
+ from tests import unittest, mock, Redmine,
1009
+ URL
1010
+ ↩→
1011
+ 2
1012
+ Redmine(self.url)
1013
+ 3
1014
+ projects = self.redmine.project.all()[1:3]
1015
+ 4
1016
+ self.assertEqual(projects[0].?
1017
+ Figure 11. Code where data flow lacks sufficient context
1018
+ receiver projects[0] was defined just within the function
1019
+ test_offset_limit_mimic.
1020
+ We note however that sometimes the slice can help even
1021
+ when the truncation does not cut off key information for
1022
+ prediction. Figure 12 shows one such example. The predicted
1023
+ function is partial is imported in line 3, but the actual call
1024
+ is on line 28. On the other hand, in Figure 13, the import is
1025
+ the only call prior to the line, so the slice can make relevant
1026
+ information proximal, such that the neural model can pay
1027
+ greater attention to proximal elements of the code.
1028
+ 8
1029
+
1030
+ Serenity: Library Based Python Code Analysis for Code Completion and Automated Machine Learning
1031
+ , ,
1032
+ 1
1033
+ import sys
1034
+ 2
1035
+ import logging
1036
+ 3
1037
+ from functools import partial
1038
+ 4
1039
+ from datetime import datetime
1040
+ 5
1041
+ from abc import ABCMeta, abstractmethod
1042
+ 6
1043
+ import json
1044
+ 7
1045
+ from _config import AttrDict
1046
+ 8
1047
+ 9
1048
+ __all__ = ['multikey_getter_gen',
1049
+ 'unescape_json', 'LogParser',
1050
+ 'JSONParser', 'LogLine',
1051
+ ↩→
1052
+ ↩→
1053
+ 10
1054
+ 'AccessLog', 'CommonLogFormat',
1055
+ 'uWSGIParser']
1056
+ ↩→
1057
+ 11
1058
+ 12
1059
+ def multikey_getter_gen(parser, keys,
1060
+ is_indices=False, delimiter="\t"):
1061
+ ↩→
1062
+ 13
1063
+ """Generator meta-function to return a
1064
+ function
1065
+ ↩→
1066
+ 14
1067
+ parsing a logline and returning
1068
+ multiple keys (tab-delimited)"""
1069
+ ↩→
1070
+ 15
1071
+ if is_indices:
1072
+ 16
1073
+ keys = map(int, keys)
1074
+ 17
1075
+ 18
1076
+ def multikey_getter(line, parser,
1077
+ keyset):
1078
+ ↩→
1079
+ 19
1080
+ data = parser(line.strip())
1081
+ 20
1082
+ return
1083
+ delimiter.join((unicode(data[k])
1084
+ for k in keyset))
1085
+ ↩→
1086
+ ↩→
1087
+ 21
1088
+ 22
1089
+ def multiindex_getter(line, parser,
1090
+ keyset):
1091
+ ↩→
1092
+ 23
1093
+ data = parser(line.strip())
1094
+ 24
1095
+ return delimiter.join((unicode(
1096
+ data.by_index( idx-1,
1097
+ raw=True)) for idx in keys))
1098
+ ↩→
1099
+ ↩→
1100
+ 25
1101
+ 26
1102
+ if is_indices is True:
1103
+ 27
1104
+ # Field indices
1105
+ 28
1106
+ return ?
1107
+ Figure 12. Example of where complete text may have text
1108
+ relevant to the prediction, but distant from call site
1109
+ 1
1110
+ partial = #!/usr/bin/env python #
1111
+ 2
1112
+ from functools import partial
1113
+ 3
1114
+ keys = map(int, keys)
1115
+ 4
1116
+ return ?
1117
+ Figure 13. Example of where dataflow is very focused
1118
+ 4.3
1119
+ Model details
1120
+ We use the CuBERT model released by [22]6, which has 24
1121
+ layers with 16 attention heads and 1024 hidden units and
1122
+ 6The CuBERT model can be accessed at github.com/google-research/google-
1123
+ research/tree/master/cubert
1124
+ was pretrained on 4M unique Python files on Github. At
1125
+ fine-tuning, we set the batch size to 10 and trained the model
1126
+ using 8 Tesla V100 with 32GB memory. The learning rate
1127
+ is 5e-5, and we gradually warmed up the learning rate for
1128
+ the first 300 gradient updates, which are the default val-
1129
+ ues provided by the HuggingFace library [43]. The training
1130
+ stops after 20 epochs, or ends after the evaluation accuracy
1131
+ hasn’t improved for three epochs. For the complete and
1132
+ slice models we used the 512 tokens model, and when we
1133
+ used combined, we used the 1024 tokens model such that
1134
+ the exact same tokens present in complete and slice could
1135
+ be used together along with the separator.
1136
+ We apply CuBERT’s tokenization to Python programs in
1137
+ ETH150K where the Python programs are first tokenized us-
1138
+ ing the standard Python tokenizer (the tokenize module)7,8.
1139
+ Then we further break down the program tokens into 49,558
1140
+ subwords using subword tokenization [39], as performed by
1141
+ the cuBERT tokenizer.
1142
+ 4.4
1143
+ Results of fine tuning
1144
+ Figure 14 shows the accuracy in predicting the function call
1145
+ exactly across the different training and test conditions. As
1146
+ shown in the Figure 14, training on slice was at 47% ac-
1147
+ curacy when tested on the complete text (slice-complete),
1148
+ which is significantly above the 21% of top-1 baseline from
1149
+ cuBERT. Training on complete however was much better
1150
+ at 62% on the same text (complete-complete), which is
1151
+ not surprising given that inspection of examples (e.g., Fig-
1152
+ ure 10) show that complete often contains the expressions
1153
+ in slice when the dataflow is local, and furthermore, ben-
1154
+ efits from repetition in coding patterns that might hint at
1155
+ labels in the absence of any real connection. The key ques-
1156
+ tion is whether slices provide any benefit over and above
1157
+ what benefit is gained from complete. Training on combined
1158
+ suggests that slices do provide a strong signal, with a 65%
1159
+ accuracy on complete text (combined-complete), and 69%
1160
+ accuracy on the combined text (combined-combined). We
1161
+ also compared top-5 performance across conditions to allow
1162
+ comparison to the baseline language models - not surpris-
1163
+ ingly this result improved accuracy across all conditions,
1164
+ with the combined-combined condition showing the best
1165
+ performance at 78%. The results show that data flow analysis
1166
+ can significantly augment code completion performance.
1167
+ 4.5
1168
+ How do slices help code completion?
1169
+ We conducted an analysis of how slices might help code
1170
+ completion performance; i.e., to understand if slices help
1171
+ the model complete code better for rare labels compared
1172
+ 7github.com/python/cpython/blob/main/Lib/tokenize.py
1173
+ 8We note that tokenize only outputs tokens for the code snippet that is
1174
+ free of any syntax errors; otherwise, it returns either IndentationError or
1175
+ TokenError. To predict function calls we often feed code that is incomplete,
1176
+ thus syntactically incorrect; therefore, we had to modify the original module
1177
+ so that it always returns what has been already tokenized thus far.
1178
+ 9
1179
+
1180
+ , ,
1181
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
1182
+ 21
1183
+ 47
1184
+ 62
1185
+ 65
1186
+ 69
1187
+ 33
1188
+ 66
1189
+ 74
1190
+ 75
1191
+ 78
1192
+ 0
1193
+ 10
1194
+ 20
1195
+ 30
1196
+ 40
1197
+ 50
1198
+ 60
1199
+ 70
1200
+ 80
1201
+ CuBERT baseline
1202
+ slice-complete
1203
+ complete-complete combined-complete combined-combined
1204
+ Accuracy
1205
+ Top-1
1206
+ Top-5
1207
+ Figure 14. Results of fine tuning on the different "training -
1208
+ testing" conditions; i.e., training on {slice, complete or com-
1209
+ bined} and tested on {complete or combined}
1210
+ 0
1211
+ 0.1
1212
+ 0.2
1213
+ 0.3
1214
+ 0.4
1215
+ 0.5
1216
+ 0.6
1217
+ 0.7
1218
+ 0.8
1219
+ 0.9
1220
+ 1
1221
+ 1
1222
+ 4
1223
+ 16
1224
+ 64
1225
+ 256
1226
+ 1024
1227
+ Proportion of labels output correctly
1228
+ Label Counts
1229
+ Combined-Complete
1230
+ Complete-Complete
1231
+ Combined-Combined
1232
+ Figure 15. Accuracy on labels with different counts
1233
+ to more common ones, since statistical approaches likely
1234
+ work better for common labels, but less well for rare ones.
1235
+ Figure 15 shows the performance of the different models; the
1236
+ presence of slices at training and test enhance code comple-
1237
+ tion performance for rare labels more than common labels,
1238
+ although the advantage does seem to be present for common
1239
+ ones as well. The combined-combined model was 15% ac-
1240
+ curate on labels with count 1, of about 18,000 labels, and that
1241
+ number rapidly approaches 40% for labels with count 3. As
1242
+ labels become more frequent, the differences between the
1243
+ sklearn.datasets
1244
+ sklearn.load_digits
1245
+ sklearn.load_digits.data
1246
+ sklearn.load_digits.target
1247
+ sklearn.train_test_split
1248
+ sklearn.LinearSVC
1249
+ sklearn.svm
1250
+ sklearn.cross_validation
1251
+ Figure 16. KGpip’s training graph for our running example
1252
+ after filtering out as input to the AutoML system.
1253
+ models gets more noisy but the combined-combined case
1254
+ still holds an advantage.
1255
+ 4.6
1256
+ Comparison to existing work
1257
+ In this space, comparisons are tricky because there is no com-
1258
+ mon or standard benchmark and because the exact problem
1259
+ varies. We chose ETH150K, which is at least a well-known
1260
+ code repository, but work that e.g. relies on its own sample
1261
+ of GitHub makes results incomparable. The exact problem
1262
+ varies too, with some tools, like us, predicting function calls,
1263
+ others predicting only method calls and still others predict
1264
+ the next token for all tokens. There is a real need for a bench-
1265
+ mark in this space; as part of helping build such a benchmark,
1266
+ we will release our own slice and complete dataset to the
1267
+ community. [25] reports overall accuracy numbers around
1268
+ 0.7, which is almost the same as ours, but that paper is pre-
1269
+ dicting the next token across all token types, so could benefit
1270
+ from the fact that some predictions (e.g. ’)’ followed by ’:’ in
1271
+ def) follow from the grammar. Pythia [37] uses a neural net-
1272
+ work rather than a language model, but reports comparable
1273
+ accuracy numbers for top-1. Their top-5 number is higher,
1274
+ but their predictions seem to be for method calls, rather than
1275
+ all functions as we do, for which the receiver may provide
1276
+ context to aid prediction.
1277
+ These approaches may be complementary, too. Our work
1278
+ showed that adding slice data to local context greatly aided
1279
+ the accuracy of our models. Other approaches also rely on
1280
+ mostly local information, and could potentially benefit from
1281
+ slices as well. We plan to investigate this further in our future
1282
+ work.
1283
+ 5
1284
+ Automated ML Pipelines Application
1285
+ The problem of automated machine learning pipelines (Au-
1286
+ toML) focuses on automatically building pipelines by per-
1287
+ forming a search over valid data transformations and learn-
1288
+ ers, along with hyper-parameter optimization for each learner.
1289
+ Our research question is whether we can perform learner and
1290
+ transformation selection based on mining large repositories
1291
+ 10
1292
+
1293
+ Serenity: Library Based Python Code Analysis for Code Completion and Automated Machine Learning
1294
+ , ,
1295
+ of abstracted ML python scripts obtained statically by Seren-
1296
+ ity. Unlike dynamic analysis, Serenity’s static analysis of ML
1297
+ pipelines has the advantage of scaling to millions of scripts
1298
+ due to its low cost. Specifically, our question is whether the
1299
+ extracted semantics of a set of pipelines by Serenity can help
1300
+ in predicting a new pipeline when combined with neural
1301
+ graph models.
1302
+ We developed an AutoML system, called KGpip, described
1303
+ in detail in a separate work [20], which builds a database
1304
+ of datasets and their corresponding historically used ML
1305
+ pipelines using Serenity analysis. KGpip formulates the au-
1306
+ tomation of a ML pipeline as a graph generation problem. It
1307
+ is based on two hypotheses that a neural graph generator
1308
+ will: i) capture more succinctly multiple pipelines seen in
1309
+ practice for a given dataset, and ii) capture statistical similar-
1310
+ ities between different pipelines more effectively. In KGpip,
1311
+ we filter out Serenity’s analysis to remove non-ML related
1312
+ components such as calls to libraries other than target ML
1313
+ libraries (Sklearn, XGBoost, and LGBM), and nodes indicat-
1314
+ ing location of calls within a pipeline script, among others.
1315
+ Figure 16 shows the filtered version of the graph for our
1316
+ running example. We also show in Figure 17 an overview of
1317
+ how KGpip works at training and inference phases. Using
1318
+ code analysis graphs obtained from Serenity and dataset em-
1319
+ beddings, KGpip trains a graph generation model optimized
1320
+ to output a ML pipeline as close as possible to the target
1321
+ pipelines of the training data. At inference time, KGpip iden-
1322
+ tifies the closest dataset to the input dataset and uses its
1323
+ embedding as input to the graph generation model which in
1324
+ turn outputs a set of possible ML pipelines. These pipelines
1325
+ are then validated and fed to a hyper-parameter optimizer to
1326
+ get the best pipeline that results in the highest performance
1327
+ on the input dataset.
1328
+ KGpip is designed to work with AutoML systems, such
1329
+ as AutoSklearn [15] and FLAML [40], to utilize their hyper-
1330
+ parameter optimizers. With a collection of 2000 ML python
1331
+ scripts, we trained a graph generation neural network that
1332
+ learns to generate a ML pipeline graph for a given dataset.
1333
+ We conducted a comprehensive evaluation using 77 datasets
1334
+ from different benchmarks, such as AutoML and Penn Ma-
1335
+ chine Learning Benchmark (PMLB), and different ML portals,
1336
+ such as Kaggle and OpenML. Table 1 shows the overall KG-
1337
+ pip performance which significantly improves the selection
1338
+ of data transformation and learning algorithms of state-of-
1339
+ the-art AutoML systems, namely, Auto-Sklearn and FLAML.
1340
+ We note that AutoSklearn consults a database of pipelines
1341
+ and datasets, and picks pipelines to start the search based
1342
+ on a nearest neighbors to an unseen dataset, except that Au-
1343
+ toSklearn’s dataset consists of effective pipelines based on
1344
+ actual execution. We also compared KGpip to AL [6], which
1345
+ uses dynamic code analysis on existing machine learning
1346
+ pipelines to select optimized pipelines. AL was unable to
1347
+ process 60 datasets because it ran out of time in searching
1348
+ for pipelines. On a smaller set of 17/77 datasets on which
1349
+ Average Performance
1350
+ T-Test
1351
+ AutoSklearn
1352
+ 0.71 (0.24)
1353
+ -
1354
+ KGpip + AutoSklearn
1355
+ 0.77 (0.22)
1356
+ 0.0002
1357
+ FLAML
1358
+ 0.71 (0.27)
1359
+ -
1360
+ KGpip + FLAML
1361
+ 0.77 (0.20)
1362
+ 0.0132
1363
+ Table 1. Performance (average and stdev) of KGpip com-
1364
+ pared to FLAML and AutoSklearn. Both variations of KGpip
1365
+ show significant improvements compared to existing sys-
1366
+ tems, both with 2-tailed T-test 𝑝 < 0.05
1367
+ AL was able to work, AL achieved an average performance
1368
+ of 0.36 compared to 0.745, 0.705, 0.79 and 0.765 by FLAML,
1369
+ Auto-Sklearn, KGpip + FLAML, and KGpip + AutoSklearn,
1370
+ respectively. This comparison with both AL and AutoSklearn
1371
+ clearly illustrates the value provided by Serenity, compared
1372
+ even to approaches that rely on dynamic runtime analysis.
1373
+ 6
1374
+ Related Work
1375
+ Static Analysis for Python: Static analysis of Python has
1376
+ attracted considerable interest lately, and there have been
1377
+ a range of approaches. Type inference has been a focus of
1378
+ much work, some using techniques such as abstract inter-
1379
+ pretation and, more recently, there has been work using
1380
+ machine learning. Likely the best-known work is MyPy [1]
1381
+ and Pytype [2]. MyPy focuses on checking and inferring
1382
+ types that conform to PEP 484 [38], which defines a syntax
1383
+ for Python types. MyPy focuses on inference within a single
1384
+ function, since types are expressed at function boundaries
1385
+ in PEP 484. Pytype does type inference, and it can handle
1386
+ cases where a variable has different types at different points.
1387
+ It also does relatively little interprocedural analysis.
1388
+ Moat et al. [28] present an abstract interpretation for type
1389
+ inference of Python that models a variety of domains to
1390
+ compute more accurate information, and it makes use of
1391
+ the recency abstraction for aliasing. However, it is currently
1392
+ limited in its support for interprocedural analysis, which is
1393
+ enabled by inlining. Fritz and Hage [16] present a dataflow
1394
+ analysis for type inference that provides a range of tradeoffs
1395
+ for cost and precision. It does handle features like first-class
1396
+ functions.
1397
+ Machine learning is also used for type inference of Python.
1398
+ TypeWriter [31] trained a neural model using a corpus of
1399
+ code, with labeled data derived from user annotations. Type-
1400
+ Writer considers comments in code as inputs to the neural
1401
+ model, unlike program analysis based type inference. While
1402
+ such systems are certainly performing analysis, their ap-
1403
+ proach and mechanism are quite different from ours.
1404
+ There have been other analyses of Python, often for spe-
1405
+ cial purposes. Ariadne [11] makes use of WALA, as we do,
1406
+ but focuses on inferring the shapes of tensors in machine
1407
+ 11
1408
+
1409
+ , ,
1410
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
1411
+ Figure 17. An overview of KGpip training and inference workflows
1412
+ learning programs. Unlike our approach to libraries, Ariadne
1413
+ models ML libraries as needed for tensor-related operations.
1414
+ Code completion: Code completion has been a prominent
1415
+ area of research towards achieving better productivity when
1416
+ working within an IDE. One of the main challenges in this
1417
+ domain is about code representation where the vast majority
1418
+ of work has used either tokens or abstract syntax trees to
1419
+ represent code (we refer the reader to [3] for a detailed survey
1420
+ of this area). [25] represents Python and JavaScript codes
1421
+ as ASTs and use a pointer network for better predicting
1422
+ Out of Vocabulary words in code completion. Pythia [37] is
1423
+ another approach that uses ASTs with an LSTM model for
1424
+ code completion.
1425
+ A number of approaches also tried to leverage representa-
1426
+ tions based on data and control flow [4, 7, 14]. On JavaScript,
1427
+ [21] utilized a program dependence graph to detect code du-
1428
+ plication. [4] use AST based representation augmented with
1429
+ local data and control flows for predicting variable names
1430
+ and variables misuse. [14] combines token based represen-
1431
+ tations of code with edges based on object uses, and AST
1432
+ nodes to predict the documentation of a method. To perform
1433
+ code completion over Java API calls, [29, 30] used a mostly
1434
+ intraprocedural analysis for mining graphs augmented with
1435
+ control and data flow.
1436
+ With the rise of pre-trained language models such as BERT
1437
+ [10] and GPT [5, 32], many recent approaches [13, 19, 22,
1438
+ 26, 41] started to leverage the already existing rich language
1439
+ understanding in these models and fine tune it for various
1440
+ code understanding tasks such as code summarization, trans-
1441
+ lation, completion, bug detection, etc. CodeBERT[13] is a
1442
+ BERT based model trained on pairs of natural language and
1443
+ programming language samples across six programming
1444
+ languages. GraphCodeBERT [19] uses BERT as well, but
1445
+ represents the code using data flow graphs based on ASTs.
1446
+ The dataflow in GraphCodeBERT is completely local and
1447
+ not interprocedural, as in Serenity. For instance as an exam-
1448
+ ple, it adds edges from all variables used in an expression
1449
+ to their definitions. CuBERT [22] and CodeT5 [41] are an-
1450
+ other two models based on BERT and T5 [33] architectures,
1451
+ respectively.
1452
+ Unlike our approach, all these methods represented code
1453
+ either as a sequence of tokens [13, 22], ASTs [25, 27, 37, 41],
1454
+ or data flows derived from ASTs [19].
1455
+ AutoML approaches: Several AutoML frameworks have
1456
+ been proposed recently [6, 12, 15, 40]. In most AutoML sys-
1457
+ tems, learner and pre-processing selection is driven by a
1458
+ database of actual executions of pipelines and data. For in-
1459
+ stance, [15, 36] compute a database of dataset meta-features
1460
+ such as number of rows and columns, while [6] mines a
1461
+ repository of run-time information of inputs to the learners
1462
+ and preprocessors via dynamic code analysis of public ML
1463
+ pipelines available e.g. on Kaggle. The predicted learners and
1464
+ preprocessors are based on a similarity measure between the
1465
+ target dataset and stored features. In KGpip we utilized dense
1466
+ vector embeddings derived from raw contents of datasets to
1467
+ measure this similarity and graph neural networks to select
1468
+ the learners/preprocessors and generate the pipeline.
1469
+ Some existing systems such as TPOT [24] or Recipe [9]
1470
+ use evolutionary algorithms for pipeline generation. Others
1471
+ approach it as a probabilistic matrix factorization [17], an
1472
+ AI planning problem when combined with a user specified
1473
+ grammar [23, 42], or a bayesian optimization problem com-
1474
+ bined with Monte Carlo Tree Search [34]. None of these
1475
+ approaches however use analysis to build up their database.
1476
+ 7
1477
+ Conclusion
1478
+ In this paper, we introduced Serenity; a framework for Python
1479
+ code static analysis. Serenity relies on two mechanisms (a)
1480
+ dynamic dispatching at the core of language translation,
1481
+ and (b) extreme abstraction of libraries. To demonstrate the
1482
+ 12
1483
+
1484
+ E
1485
+ CSV
1486
+ Deep graph
1487
+ jupyter
1488
+ generator
1489
+ model
1490
+ CsV
1491
+ ML Pipelines
1492
+ Hyperparameter
1493
+ Skeleton
1494
+ Optimization
1495
+ Auto-
1496
+ Sklearn
1497
+ FLAMISerenity: Library Based Python Code Analysis for Code Completion and Automated Machine Learning
1498
+ , ,
1499
+ utility of Serenity’s analysis, we used it in two important
1500
+ code-related applications: code generation and automated
1501
+ machine learning. Serenity’s analysis showed very promis-
1502
+ ing performance in both applications, allowing us in some
1503
+ cases to outperform approaches based on dynamic analysis,
1504
+ and perform competitively for code completion. We also im-
1505
+ plemented Serenity as an open-source implementation based
1506
+ on WALA, a popular framework for program analysis.
1507
+ References
1508
+ [1] [n.d.]. MyPy. http://mypy-lang.org. Accessed: 2021-11-18.
1509
+ [2] [n.d.]. Pytype. https://github.com/google/pytype. Accessed: 2021-11-
1510
+ 18.
1511
+ [3] Miltiadis Allamanis, Earl T Barr, Premkumar Devanbu, and Charles
1512
+ Sutton. 2018. A survey of machine learning for big code and natural-
1513
+ ness. ACM Computing Surveys (CSUR) 51, 4 (2018), 1–37.
1514
+ [4] Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi.
1515
+ 2018. Learning to Represent Programs with Graphs. In ICLR. OpenRe-
1516
+ view.net.
1517
+ [5] Tom B Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared
1518
+ Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish
1519
+ Sastry, Amanda Askell, et al. 2020. Language models are few-shot
1520
+ learners. arXiv preprint arXiv:2005.14165 (2020).
1521
+ [6] José P. Cambronero and Martin C. Rinard. 2019. AL: Autogenerating
1522
+ Supervised Learning Programs. In Proceedings of the ACM on Program-
1523
+ ming Languages, Vol. 3. https://doi.org/10.1145/3360601
1524
+ [7] Kwonsoo Chae, Hakjoo Oh, Kihong Heo, and Hongseok Yang. 2017.
1525
+ Automatically Generating Features for Learning Program Analysis
1526
+ Heuristics for C-like Languages. Proc. ACM Program. Lang. 1, OOPSLA,
1527
+ Article 101 (Oct. 2017), 25 pages.
1528
+ [8] Mark Chen, Jerry Tworek, Heewoo Jun, Qiming Yuan, Henrique Ponde
1529
+ de Oliveira Pinto, Jared Kaplan, Harri Edwards, Yuri Burda, Nicholas
1530
+ Joseph, Greg Brockman, Alex Ray, Raul Puri, Gretchen Krueger,
1531
+ Michael Petrov, Heidy Khlaaf, Girish Sastry, Pamela Mishkin, Brooke
1532
+ Chan, Scott Gray, Nick Ryder, Mikhail Pavlov, Alethea Power, Lukasz
1533
+ Kaiser, Mohammad Bavarian, Clemens Winter, Philippe Tillet, Fe-
1534
+ lipe Petroski Such, Dave Cummings, Matthias Plappert, Fotios
1535
+ Chantzis, Elizabeth Barnes, Ariel Herbert-Voss, William Hebgen Guss,
1536
+ Alex Nichol, Alex Paino, Nikolas Tezak, Jie Tang, Igor Babuschkin,
1537
+ Suchir Balaji, Shantanu Jain, William Saunders, Christopher Hesse, An-
1538
+ drew N. Carr, Jan Leike, Josh Achiam, Vedant Misra, Evan Morikawa,
1539
+ Alec Radford, Matthew Knight, Miles Brundage, Mira Murati, Katie
1540
+ Mayer, Peter Welinder, Bob McGrew, Dario Amodei, Sam McCandlish,
1541
+ Ilya Sutskever, and Wojciech Zaremba. 2021. Evaluating Large Lan-
1542
+ guage Models Trained on Code. (2021). arXiv:2107.03374 [cs.LG]
1543
+ [9] Alex G. C. de Sá, Walter José G. S. Pinto, Luiz Otavio V. B. Oliveira, and
1544
+ Gisele L. Pappa. 2017. RECIPE: A Grammar-Based Framework for Au-
1545
+ tomatically Evolving Classification Pipelines. In Genetic Programming,
1546
+ James McDermott, Mauro Castelli, Lukas Sekanina, Evert Haasdijk,
1547
+ and Pablo García-Sánchez (Eds.). 246–261. https://doi.org/10.1007/978-
1548
+ 3-319-55696-3_16
1549
+ [10] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova.
1550
+ 2018. Bert: Pre-training of deep bidirectional transformers for language
1551
+ understanding. arXiv preprint arXiv:1810.04805 (2018).
1552
+ [11] Julian Dolby, Avraham Shinnar, Allison Allain, and Jenna Reinen. 2018.
1553
+ Ariadne: Analysis for Machine Learning Programs. In Proceedings of
1554
+ the 2nd ACM SIGPLAN International Workshop on Machine Learning
1555
+ and Programming Languages (Philadelphia, PA, USA) (MAPL 2018).
1556
+ Association for Computing Machinery, New York, NY, USA, 1–10.
1557
+ https://doi.org/10.1145/3211346.3211349
1558
+ [12] Iddo Drori, Lu Liu, Yi Nian, Sharath C Koorathota, Jung-Shian Li,
1559
+ Antonio Khalil Moretti, Juliana Freire, and Madeleine Udell. 2019.
1560
+ AutoML using Metadata Language Embeddings. ArXiv (2019). https:
1561
+ //arxiv.org/abs/1910.03698
1562
+ [13] Zhangyin Feng, Daya Guo, Duyu Tang, Nan Duan, Xiaocheng Feng,
1563
+ Ming Gong, Linjun Shou, Bing Qin, Ting Liu, Daxin Jiang, and Ming
1564
+ Zhou. 2020. CodeBERT: A Pre-Trained Model for Programming and
1565
+ Natural Languages. CoRR abs/2002.08155 (2020). arXiv:2002.08155
1566
+ https://arxiv.org/abs/2002.08155
1567
+ [14] Patrick Fernandes, Miltiadis Allamanis, and Marc Brockschmidt. 2018.
1568
+ Structured Neural Summarization. CoRR abs/1811.01824 (2018).
1569
+ [15] Matthias Feurer, Aaron Klein, Katharina Eggensperger, Jost Springen-
1570
+ berg, Manuel Blum, and Frank Hutter. 2015. Efficient and Robust
1571
+ Automated Machine Learning. In Proceedings of the International Con-
1572
+ ference on Neural Information Processing Systems (NeurIPS). 2962–2970.
1573
+ https://dl.acm.org/doi/10.5555/2969442.2969547
1574
+ [16] Levin Fritz and Jurriaan Hage. 2017. Cost versus Precision for Approxi-
1575
+ mate Typing for Python. In Proceedings of the 2017 ACM SIGPLAN Work-
1576
+ shop on Partial Evaluation and Program Manipulation (Paris, France)
1577
+ (PEPM 2017). Association for Computing Machinery, New York, NY,
1578
+ USA, 89–98. https://doi.org/10.1145/3018882.3018888
1579
+ [17] Nicolo Fusi, Rishit Sheth, and Melih Elibol. 2018. Probabilistic Ma-
1580
+ trix Factorization for Automated Machine Learning. In Proceedings of
1581
+ the International Conference on Neural Information Processing Systems
1582
+ (NeurIPS). 3352–3361. https://dl.acm.org/doi/10.5555/3327144.3327254
1583
+ [18] David Grove and Craig Chambers. 2001. A Framework for Call Graph
1584
+ Construction Algorithms. ACM Trans. Program. Lang. Syst. 23, 6 (nov
1585
+ 2001), 685–746. https://doi.org/10.1145/506315.506316
1586
+ [19] Daya Guo, Shuo Ren, Shuai Lu, Zhangyin Feng, Duyu Tang, Shujie Liu,
1587
+ Long Zhou, Nan Duan, Alexey Svyatkovskiy, Shengyu Fu, Michele
1588
+ Tufano, Shao Kun Deng, Colin B. Clement, Dawn Drain, Neel Sundare-
1589
+ san, Jian Yin, Daxin Jiang, and Ming Zhou. 2021. GraphCodeBERT:
1590
+ Pre-training Code Representations with Data Flow. In 9th International
1591
+ Conference on Learning Representations, ICLR 2021, Virtual Event, Aus-
1592
+ tria, May 3-7, 2021. OpenReview.net. https://openreview.net/forum?
1593
+ id=jLoC4ez43PZ
1594
+ [20] Mossad Helali, Essam Mansour, Ibrahim Abdelaziz, Julian Dolby, and
1595
+ Kavitha Srinivas. 2022. A Scalable AutoML Approach Based on Graph
1596
+ Neural Networks. Proc. VLDB Endow. 15, 11 (sep 2022), 2428–2436.
1597
+ https://doi.org/10.14778/3551793.3551804
1598
+ [21] Chun-Hung Hsiao, Michael J. Cafarella, and Satish Narayanasamy.
1599
+ 2014. Reducing MapReduce Abstraction Costs for Text-centric Appli-
1600
+ cations. In 43rd International Conference on Parallel Processing, ICPP
1601
+ 2014, Minneapolis, MN, USA, September 9-12, 2014. 40–49.
1602
+ https:
1603
+ //doi.org/10.1109/ICPP.2014.13
1604
+ [22] Aditya Kanade, Petros Maniatis, Gogul Balakrishnan, and Kensen Shi.
1605
+ 2020. Learning and evaluating contextual embedding of source code.
1606
+ In Proceedings of the 37th International Conference on Machine Learning,
1607
+ ICML 2020, 12-18 July 2020 (Proceedings of Machine Learning Research).
1608
+ PMLR.
1609
+ [23] Michael Katz, Parikshit Ram, Shirin Sohrabi, and Octavian Udrea.
1610
+ 2020. Exploring Context-Free Languages via Planning: The Case
1611
+ for Automating Machine Learning. In Proceedings of the International
1612
+ Conference on Automated Planning and Scheduling (ICAPS). 403–411.
1613
+ https://ojs.aaai.org//index.php/ICAPS/article/view/6686
1614
+ [24] Trang T Le, Weixuan Fu, and Jason H Moore. 2020. Scaling tree-based
1615
+ automated machine learning to biomedical big data with a feature set
1616
+ selector. Bioinformatics 36, 1 (2020), 250–256. https://doi.org/10.1093/
1617
+ bioinformatics/btz470
1618
+ [25] Jian Li, Yue Wang, Michael R Lyu, and Irwin King. 2017. Code com-
1619
+ pletion with neural attention and pointer networks. arXiv preprint
1620
+ arXiv:1711.09573 (2017).
1621
+ [26] Shuai Lu, Daya Guo, Shuo Ren, Junjie Huang, Alexey Svyatkovskiy,
1622
+ Ambrosio Blanco, Colin Clement, Dawn Drain, Daxin Jiang, Duyu
1623
+ Tang, et al. 2021.
1624
+ CodeXGLUE: A Machine Learning Benchmark
1625
+ Dataset for Code Understanding and Generation.
1626
+ arXiv preprint
1627
+ 13
1628
+
1629
+ , ,
1630
+ Wenting Zhao, Ibrahim Abdelaziz, Julian Dolby, Kavitha Srinivas, Mossad Helali, and Essam Mansour
1631
+ arXiv:2102.04664 (2021).
1632
+ [27] Chris Maddison and Daniel Tarlow. 2014. Structured generative models
1633
+ of natural source code. In International Conference on Machine Learning.
1634
+ PMLR, 649–657.
1635
+ [28] R. Monat, A. Ouadjaout, and A. Miné. 2020. Static type analysis by
1636
+ abstract interpretation of Python programs. In Proc. of the 34th Euro-
1637
+ pean Conference on Object-Oriented Programming (ECOOP’20) (virtual
1638
+ conference) (Leibniz International Proceedings in Informatics (LIPIcs),
1639
+ Vol. 166). Dagstuhl Publishing, 17:1–17:29.
1640
+ https://doi.org/10.4230/
1641
+ LIPIcs.ECOOP.2020.17
1642
+ http://www-apr.lip6.fr/~mine/publi/article-
1643
+ monat-al-ecoop20.pdf.
1644
+ [29] Anh Tuan Nguyen and Tien N. Nguyen. 2015. Graph-based Statistical
1645
+ Language Model for Code. In Proceedings of the 37th International
1646
+ Conference on Software Engineering - Volume 1 (Florence, Italy) (ICSE
1647
+ ’15). IEEE Press, Piscataway, NJ, USA, 858–868.
1648
+ http://dl.acm.org/
1649
+ citation.cfm?id=2818754.2818858
1650
+ [30] Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, Jafar M. Al-
1651
+ Kofahi, and Tien N. Nguyen. 2009. Graph-based Mining of Multiple
1652
+ Object Usage Patterns. In Proceedings of the the 7th Joint Meeting of
1653
+ the European Software Engineering Conference and the ACM SIGSOFT
1654
+ Symposium on The Foundations of Software Engineering (Amsterdam,
1655
+ The Netherlands) (ESEC/FSE ’09). ACM, New York, NY, USA, 383–392.
1656
+ https://doi.org/10.1145/1595696.1595767
1657
+ [31] Michael Pradel, Georgios Gousios, Jason Liu, and Satish Chandra.
1658
+ 2020. Typewriter: Neural type prediction with search-based validation.
1659
+ In Proceedings of the 28th ACM Joint Meeting on European Software
1660
+ Engineering Conference and Symposium on the Foundations of Software
1661
+ Engineering. 209–220.
1662
+ [32] Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei,
1663
+ Ilya Sutskever, et al. 2019. Language models are unsupervised multitask
1664
+ learners. OpenAI blog 1, 8 (2019), 9.
1665
+ [33] Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan
1666
+ Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J Liu. 2019.
1667
+ Exploring the limits of transfer learning with a unified text-to-text
1668
+ transformer. arXiv preprint arXiv:1910.10683 (2019).
1669
+ [34] Herilalaina Rakotoarison, Marc Schoenauer, and Michèle Sebag. 2019.
1670
+ Automated Machine Learning with Monte-Carlo Tree Search. In Pro-
1671
+ ceedings of the International Joint Conference on Artificial Intelligence
1672
+ (IJCAI). 3296–3303. https://doi.org/10.24963/ijcai.2019/457
1673
+ [35] Veselin Raychev, Pavol Bielik, and Martin Vechev. 2016. Probabilistic
1674
+ Model for Code with Decision Trees. SIGPLAN Not. 51, 10 (oct 2016),
1675
+ 731–747. https://doi.org/10.1145/3022671.2984041
1676
+ [36] Matthias Reif, Faisal Shafait, and Andreas Dengel. 2012. Meta-learning
1677
+ for evolutionary parameter optimization of classifiers. Machine Learn-
1678
+ ing 87, 3 (2012), 357–380. https://doi.org/10.1007/s10994-012-5286-7
1679
+ [37] Alexey Svyatkovskiy, Ying Zhao, Shengyu Fu, and Neel Sundaresan.
1680
+ 2019. Pythia: AI-assisted code completion system. In Proceedings of the
1681
+ 25th ACM SIGKDD International Conference on Knowledge Discovery &
1682
+ Data Mining. 2727–2735.
1683
+ [38] Guido van Rossum, Jukka Lehtosalo, and Lukasz Langa. 2014. PEP 484
1684
+ – Type Hints. https://www.python.org/dev/peps/pep-0484/
1685
+ [39] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion
1686
+ Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. At-
1687
+ tention is all you need. In Advances in neural information processing
1688
+ systems. 5998–6008.
1689
+ [40] Chi Wang, Qingyun Wu, Markus Weimer, and Erkang Zhu.
1690
+ 2021.
1691
+ FLAML: A Fast and Lightweight AutoML Library. In
1692
+ Proceedings of Machine Learning and Systems (MLSys), Vol. 3.
1693
+ 434–447.
1694
+ https://proceedings.mlsys.org/paper/2021/file/
1695
+ 92cc227532d17e56e07902b254dfad10-Paper.pdf
1696
+ [41] Yue Wang, Weishi Wang, Shafiq Joty, and Steven C. H. Hoi. 2021.
1697
+ CodeT5: Identifier-aware Unified Pre-trained Encoder-Decoder Mod-
1698
+ els for Code Understanding and Generation. In Proceedings of the
1699
+ 2021 Conference on Empirical Methods in Natural Language Processing,
1700
+ EMNLP 2021.
1701
+ [42] Marcel Wever, Felix Mohr, and Eyke Hüllermeier. 2018. ML-Plan for
1702
+ Unlimited-Length Machine Learning Pipelines. In AutoML Workshop
1703
+ at the International Conference on Machine Learning (ICML). https:
1704
+ //ris.uni-paderborn.de/download/3852/3853/38.pdf
1705
+ [43] Thomas Wolf, Lysandre Debut, Victor Sanh, Julien Chaumond,
1706
+ Clement Delangue, Anthony Moi, Pierric Cistac, Tim Rault, Rémi Louf,
1707
+ Morgan Funtowicz, Joe Davison, Sam Shleifer, Patrick von Platen,
1708
+ Clara Ma, Yacine Jernite, Julien Plu, Canwen Xu, Teven Le Scao, Syl-
1709
+ vain Gugger, Mariama Drame, Quentin Lhoest, and Alexander M. Rush.
1710
+ 2020. Transformers: State-of-the-Art Natural Language Processing.
1711
+ In Proceedings of the 2020 Conference on Empirical Methods in Natural
1712
+ Language Processing: System Demonstrations. Association for Computa-
1713
+ tional Linguistics, Online, 38–45. https://www.aclweb.org/anthology/
1714
+ 2020.emnlp-demos.6
1715
+ 14
1716
+
E9E4T4oBgHgl3EQffg1w/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FNE5T4oBgHgl3EQfVQ8Q/content/tmp_files/2301.05549v1.pdf.txt ADDED
@@ -0,0 +1,471 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.05549v1 [quant-ph] 12 Jan 2023
2
+ 1
3
+ On the explainability of quantum neural networks
4
+ based on variational quantum circuits
5
+ Ammar Daskin
6
+ Abstract—Ridge functions are used to describe and study the
7
+ lower bound of the approximation done by the neural networks
8
+ which can be written as a linear combination of activation
9
+ functions. If the activation functions are also ridge functions,
10
+ these networks are called explainable neural networks.
11
+ In this paper, we first show that quantum neural networks
12
+ which are based on variational quantum circuits can be written
13
+ as a linear combination of ridge functions. Consequently, we
14
+ show that the interpretability and explainability of such quantum
15
+ neural networks can be directly considered and studied as an
16
+ approximation with the linear combination of ridge functions.
17
+ Index Terms—Quantum neural networks, explainability, inter-
18
+ pretability, ridge functions
19
+ I. INTRODUCTION
20
+ Neural networks have applications almost in every field
21
+ of the science ranging from health to banking. The ability
22
+ to interpret the result of a model and explain the learning
23
+ behavior may be deemed important especially in critical in-
24
+ dustries such as medicine and health care[1–3]. Limitations
25
+ of the approximation rates of the classical neural networks
26
+ can be understood better by using linear combination of ridge
27
+ functions as an approximation to neural networks.
28
+ The power and the limitations of quantum neural networks
29
+ are yet to be fully understood. In this paper, we show that
30
+ quantum neural networks can be written as a sum of ridge
31
+ functions. Therefore, the math and methodologies that are used
32
+ to understand classical neural networks can be used to study
33
+ quantum ones.
34
+ A. Approximation with ridge functions
35
+ For a random variable y, if we have the observations
36
+ y1, . . . , yn at points x1, . . . , xn, a standard regression model
37
+ can be described by yi = ˆyi + ri, where ˆyi defines the
38
+ dependence of yi on xi When xi are univariate real values,
39
+ the assumption is that the dependence is smooth. This leads
40
+ the following estimation for the regression model[4]:
41
+ E(y | x) = f(x),
42
+ (1)
43
+ where f is a smoothing function. In linear smoothing, ˆy =
44
+ (ˆy1, . . . , ˆyn)T can be written in the form of matrix vector
45
+ transformation: ˆy = Sy, where S is the smoother matrix
46
+ that does not depend on y. When there are more than one
47
+ predictors, the estimating regression surface is hard because
48
+ of the curse of dimensionality (the data sparseness in high
49
+ A.
50
+ Daskin
51
+ was
52
+ with
53
+ the
54
+ Department
55
+ of
56
+ Computer
57
+ Engineering,
58
+ Istanbul
59
+ Medeniyet
60
+ University,
61
+ Istanbul,
62
+ Turkey
63
+ e-mail:
64
+ (see
65
+ https://sites.google.com/view/adaskin).
66
+ dimensions)[5]. The general approach is to use the one-
67
+ dimensional smoother as the building block in an additive
68
+ model [4]. Given predictors xijs for each yi outcome, i.e.
69
+ {yi, xi1, . . . , xip}, the additive model can be described as:
70
+ E(yi|xi1, . . . , xip) = α +
71
+ p
72
+
73
+ j=1
74
+ fj(xij) + ǫ.
75
+ (2)
76
+ where ǫ is the inherent error, α is a constant parameter, and fjs
77
+ represent unspecified smooth functions. Fitting can be done
78
+ by using the backfitting algorithm [5, 6] which is in matrix
79
+ form equivalent to Gauss-Seidel method in numerical linear
80
+ algebra[7].
81
+ Generalizing this model leads to the projection pursuit
82
+ model proposed in [5] where the regression surface is pre-
83
+ dicted by a linear combination of ridge functions as in the
84
+ following form:
85
+ f(x) =
86
+ K
87
+
88
+ k=1
89
+ fk(wk · x).
90
+ (3)
91
+ Here, wks represent weight vectors (projection indices) and
92
+ fks are ridge functions [8–11]: Any multivariate function
93
+ fk : Rd → R. The vector wk is called the direction and fk
94
+ gives a constant on certain hyper-planes whose normal vectors
95
+ are parallel to this direction. Ridge functions are used in
96
+ approximation theory, partial differential equations, and neural
97
+ networks. For instance, a feed forward neural network can be
98
+ defined as [8]:
99
+
100
+ k
101
+ γkσ (wk · x + bk) ,
102
+ (4)
103
+ where bk, αk, and wk represents parameters that describe the
104
+ neural network. σ is a univariate function (activation function).
105
+ The degree of approximation by σ functions can be bounded
106
+ by the degree of approximation by ridge functions (we refer
107
+ the reader to Ref.[8] for the properties and other uses of the
108
+ ridge functions). The lower bound of the approximation of the
109
+ neural networks can be also studied through the relations of
110
+ the activation functions with ridge functions (e.g., [12–14]).
111
+ If σ is chosen as a ridge function these networks are recently
112
+ called explainable neural networks [15]: e.g. an example
113
+ architecture which has three important structures, a projection
114
+ layer, sub-network, and a combination layer is described to
115
+ learn the following:
116
+ f(x) = µ +
117
+ K
118
+
119
+ k=1
120
+ γkfk(wk · x).
121
+ (5)
122
+ Here, µ and γks are shift and scaling parameters, respectively.
123
+ In comparison to standard neural networks, the learning in
124
+
125
+ 2
126
+ this model can be understood by the ”explainable” features:
127
+ linear projections and uni-variate functions (in other words, the
128
+ mechanisms used to learn the model can be clearly explained
129
+ by studying the constitutes that are ridge functions.).
130
+ II. EXPLAINABILITY OF QUANTUM NEURAL NETWORKS
131
+ Quantum neural networks[16–19] are generally based on
132
+ variational quantum circuits[20] and can be described by
133
+ ⟨x| W(θ) ˆOW(θ) |x⟩ ,
134
+ (6)
135
+ where ˆO represents the measurement operator, |x⟩ is the input
136
+ vector formatted as a quantum state and W(θ) is a unitary
137
+ matrix generated by the quantum gates with the angle values
138
+ defined by θ. Here, by abuse of the notation, we can consider
139
+ ˆO as a selector set on the parts of W(θ) |x⟩: e.g., to obtain
140
+ the measurement output of the first qubit in |0⟩ state, in vector
141
+ forms, we select the first half of the output and combine their
142
+ squared absolute values. Then, the output quantum state of the
143
+ quantum circuit applied to |x⟩ can be rewritten as:
144
+
145
+ i∈ ˆ
146
+ O
147
+ |
148
+
149
+ wi|x
150
+
151
+ |2 =
152
+
153
+ i∈ ˆ
154
+ O
155
+ fi(
156
+
157
+ wi|x
158
+
159
+ ),
160
+ (7)
161
+ where ⟨wi| represents a row of the unitary matrix W(θ).
162
+ In variational quantum circuits, generally any change of
163
+ the vector element of θ may affect multiple row of W(θ).
164
+ This can affect the studies that try to understand the quantum
165
+ neural network model. Therefore, to make any fi independent
166
+ from each other, we can use the linear combination of unitary
167
+ matrices[21, 22]. By following Ref.[22], we can write the rows
168
+ of any matrix W(θ) as the first rows of matrices and combine
169
+ them on a block diagonal matrix:
170
+ V =
171
+
172
+
173
+
174
+
175
+
176
+
177
+
178
+
179
+
180
+
181
+
182
+
183
+
184
+
185
+
186
+
187
+
188
+
189
+
190
+
191
+
192
+
193
+
194
+
195
+
196
+
197
+ ⟨w1|
198
+
199
+ ...
200
+
201
+
202
+
203
+
204
+
205
+
206
+
207
+ N×N
208
+ ...
209
+
210
+
211
+
212
+
213
+
214
+
215
+ ⟨wN|
216
+
217
+ ...
218
+
219
+
220
+
221
+
222
+
223
+
224
+
225
+ N×N
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+
238
+
239
+
240
+
241
+
242
+
243
+
244
+
245
+
246
+ N 2×N 2
247
+ (8)
248
+ where N is the dimension of W(θ). Using the direct sum,
249
+ we can write V =
250
+ N
251
+
252
+ i
253
+ Vi with Vi representing the unitary
254
+ matrix for wi. Note that any N-dimensional vector can be
255
+ formed with O(N) quantum gates as the leading row of a
256
+ unitary matrix by using its Schmidt decomposition. Therefore,
257
+ the construction V for a generic W(θ) requires at most O(N 2)
258
+ gates (See Ref.[22] for complexity analysis of the circuit.).
259
+ The equivalent quantum state to the output of W(θ) |x⟩
260
+ can be generated as a part of the outcome of the following
261
+ transformation:
262
+ |ψ⟩ = V
263
+
264
+
265
+
266
+
267
+ |x⟩
268
+ ...
269
+ |x⟩
270
+
271
+
272
+
273
+
274
+ N 2×1
275
+ .
276
+ (9)
277
+ In a simplified form let |ψi⟩ represents the ith element of |ψ⟩
278
+ with 0 ≥ i < N 2, we can define a new selector operator that
279
+ selects every |ψi⟩, where i mod N = 0. That means we can
280
+ still use the definition similar to Eq.(7):
281
+ N 2−1
282
+
283
+ i,i mod N=0
284
+ |
285
+
286
+ wi|x
287
+
288
+ |2
289
+ (10)
290
+ Note that by writing a quantum operator in this way, we simply
291
+ make the weight vectors independent from each other. That
292
+ means the impact of an angle-change in one quantum gate
293
+ can be limited to affect only one vector. Therefore, this model
294
+ is at least as much powerful as using a single unitary matrix
295
+ where a change may affect multiple rows. In addition, studying
296
+ the approximations in this model may be easier since we can
297
+ easily see how many independent weight vectors are needed
298
+ and how each weight vector affect the result and training.
299
+ A. Explainability of networks that are represented by expo-
300
+ nentials
301
+ Ridge functions are also used to approximate the integral
302
+ forms of functions[23]: One of the most commonly used one
303
+ is given by the following Fourier form:
304
+ Ψwk := eix·wk,
305
+ (11)
306
+ Here, the complex plane can be rewritten using the only real
307
+ valued functions, therefore Ψwk can be considered as a ridge
308
+ function for each wk. Therefore, quantum neural networks
309
+ such as [24] can be also explained as an approximation through
310
+ the linear combination of ridge functions.
311
+ This can be also used to understand quantum circuits that
312
+ are defined through the Ising type Hamiltonian[25] or machine
313
+ learning tasks that are solved through the adiabatic quantum
314
+ computation [26, 27]
315
+ III. DISCUSSION AND CONCLUSION
316
+ For a given set of weight vectors, in literature there are many
317
+ works on the conditions to approximate a given function with
318
+ unknown ridge functions. For instance[28], consider C(X) is
319
+ the space of continuous functions on X, then for a given
320
+ {w1, w2}, for an appropriate choice of some continuous
321
+ functions h1 and h2, one can write g1(h1(x)) + g2(h2(x)) =
322
+ C(X) if and only if the lengths of h1 − h2 paths in X are
323
+ bounded by some positive integer. From the Kolmogorov-
324
+ Arnold representation theorem [29], we know that any multi-
325
+ variate continuous function can be approximated as a sum of
326
+ univariate functions. By this theorem, it can be also explained
327
+ how the hidden layers in the classical neural networks help
328
+ in approximations[29–31]. However, a continuous function
329
+
330
+ 3
331
+ may not be represented exactly by an approximation with
332
+ ridge functions [10, 29]. Therefore, the approximation rates
333
+ in quantum neural networks that reduces to Eq.(7) and (10)
334
+ can be well understood. On the other hand, this indicates that
335
+ the limitations of the approximations with the ridge functions
336
+ may be also limitations for these types of quantum neural
337
+ networks.
338
+ In this brief paper, we show that quantum neural networks
339
+ can be understood as a linear combination of ridge functions,
340
+ which is used to understand the interpretability and explain-
341
+ ability of the classical neural networks. In particular, Eq.(7)
342
+ and Eq.(10) can be used to describe quantum neural network
343
+ models. In addition, since it can be written in the form of a
344
+ linear combination of ridge functions, the approximation errors
345
+ and upper and lower bounds on the errors of quantum neural
346
+ networks can be studied through this formulation.
347
+ In quantum neural networks which can be reduced to
348
+ Eq.(7) and (10), the approximation is done by using N ridge
349
+ functions. Here, N is in general exponential in the number of
350
+ qubits and can be considered a very large number. For general
351
+ function approximations, using these equations may be helpful
352
+ to make a decision on the size of N and required number of
353
+ operations and qubits before any application. However, the
354
+ problems solved by the neural networks are in general not
355
+ easy to define by functions, therefore it is not easy to decide
356
+ how many functions (and quantum operations and qubits) are
357
+ required to make the model more trainable.
358
+ REFERENCES
359
+ [1] E. Tjoa and C. Guan, “A survey on explainable artificial
360
+ intelligence (xai): Toward medical xai,” IEEE transac-
361
+ tions on neural networks and learning systems, vol. 32,
362
+ no. 11, pp. 4793–4813, 2020.
363
+ [2] P. Linardatos, V. Papastefanopoulos, and S. Kotsiantis,
364
+ “Explainable ai: A review of machine learning inter-
365
+ pretability methods,” Entropy, vol. 23, no. 1, p. 18, 2020.
366
+ [3] L. H. Gilpin, D. Bau, B. Z. Yuan, A. Bajwa, M. Specter,
367
+ and L. Kagal, “Explaining explanations: An overview of
368
+ interpretability of machine learning,” in 2018 IEEE 5th
369
+ International Conference on data science and advanced
370
+ analytics (DSAA), pp. 80–89, IEEE, 2018.
371
+ [4] A. Buja, T. Hastie, and R. Tibshirani, “Linear smoothers
372
+ and additive models,” The Annals of Statistics, vol. 17,
373
+ no. 2, pp. 453–510, 1989.
374
+ [5] J. H. Friedman, M. Jacobson, and W. Stuetzle, “PROJEC-
375
+ TION PURSUIT REGRESSION,” J. Am. Statist. Assoc.,
376
+ vol. 76, p. 817, 1981.
377
+ [6] L. Breiman and J. H. Friedman, “Estimating optimal
378
+ transformations for multiple regression and correlation,”
379
+ Journal of the American Statistical Association, vol. 80,
380
+ no. 391, pp. 580–598, 1985.
381
+ [7] G. H. Golub and C. F. Van Loan, Matrix computations.
382
+ JHU press, 2013.
383
+ [8] A. Pinkus, Ridge Functions. Cambridge Tracts in Math-
384
+ ematics, Cambridge University Press, 2015.
385
+ [9] E. J. Candes, Ridgelets: theory and applications. Stan-
386
+ ford University, 1998.
387
+ [10] V. Maiorov, “On best approximation by ridge functions,”
388
+ Journal of Approximation Theory, vol. 99, no. 1, pp. 68–
389
+ 94, 1999.
390
+ [11] P. P. Petrushev, “Approximation by ridge functions and
391
+ neural networks,” SIAM Journal on Mathematical Anal-
392
+ ysis, vol. 30, no. 1, pp. 155–189, 1998.
393
+ [12] V. Maiorov and A. Pinkus, “Lower bounds for ap-
394
+ proximation by mlp neural networks,” Neurocomputing,
395
+ vol. 25, no. 1-3, pp. 81–91, 1999.
396
+ [13] V. E. Ismailov, “Approximation by neural networks with
397
+ weights varying on a finite set of directions,” Journal of
398
+ Mathematical Analysis and Applications, vol. 389, no. 1,
399
+ pp. 72–83, 2012.
400
+ [14] J. M. Klusowski and A. R. Barron, “Minimax lower
401
+ bounds for ridge combinations including neural nets,”
402
+ in 2017 IEEE International Symposium on Information
403
+ Theory (ISIT), pp. 1376–1380, IEEE, 2017.
404
+ [15] J. Vaughan, A. Sudjianto, E. Brahimi, J. Chen, and V. N.
405
+ Nair, “Explainable neural networks based on additive
406
+ index models,” stat, vol. 1050, p. 5, 2018.
407
+ [16] M. Schuld, I. Sinayskiy, and F. Petruccione, “The quest
408
+ for a quantum neural network,” Quantum Information
409
+ Processing, vol. 13, no. 11, pp. 2567–2586, 2014.
410
+ [17] Y. Kwak, W. J. Yun, S. Jung, and J. Kim, “Quantum
411
+ neural networks: Concepts, applications, and challenges,”
412
+ in 2021 Twelfth International Conference on Ubiquitous
413
+ and Future Networks (ICUFN), pp. 413–416, IEEE,
414
+ 2021.
415
+ [18] Z.-A. Jia, B. Yi, R. Zhai, Y.-C. Wu, G.-C. Guo, and
416
+ G.-P. Guo, “Quantum neural network states: A brief
417
+ review of methods and applications,” Advanced Quantum
418
+ Technologies, vol. 2, no. 7-8, p. 1800077, 2019.
419
+ [19] F. V. Massoli, L. Vadicamo, G. Amato, and F. Falchi,
420
+ “A leap among quantum computing and quantum neural
421
+ networks: A survey,” ACM Computing Surveys, vol. 55,
422
+ no. 5, pp. 1–37, 2022.
423
+ [20] A. Kandala, A. Mezzacapo, K. Temme, M. Takita,
424
+ M. Brink, J. M. Chow, and J. M. Gambetta, “Hardware-
425
+ efficient
426
+ variational quantum eigensolver for
427
+ small
428
+ molecules and quantum magnets,” Nature, vol. 549,
429
+ no. 7671, pp. 242–246, 2017.
430
+ [21] A. M. Childs and N. Wiebe, “Hamiltonian simulation us-
431
+ ing linear combinations of unitary operations,” Quantum
432
+ Information & Computation, vol. 12, no. 11-12, pp. 901–
433
+ 924, 2012.
434
+ [22] A. Daskin, A. Grama, G. Kollias, and S. Kais, “Universal
435
+ programmable quantum circuit schemes to emulate an
436
+ operator,” The Journal of chemical physics, vol. 137,
437
+ no. 23, p. 234112, 2012.
438
+ [23] A. Pinkus, Integral Representations, p. 141–151. Cam-
439
+ bridge Tracts in Mathematics, Cambridge University
440
+ Press, 2015.
441
+ [24] A. Daskin, “A simple quantum neural net with a pe-
442
+ riodic activation function,” in 2018 IEEE International
443
+ Conference on Systems, Man, and Cybernetics (SMC),
444
+ pp. 2887–2891, IEEE, 2018.
445
+ [25] R. Xia, T. Bian, and S. Kais, “Electronic structure
446
+ calculations and the ising hamiltonian,” The Journal of
447
+
448
+ 4
449
+ Physical Chemistry B, vol. 122, no. 13, pp. 3384–3395,
450
+ 2017.
451
+ [26] E. Farhi, J. Goldstone, S. Gutmann, and M. Sipser,
452
+ “Quantum computation by adiabatic evolution,” arXiv
453
+ preprint quant-ph/0001106, 2000.
454
+ [27] T. Albash and D. A. Lidar, “Adiabatic quantum com-
455
+ putation,” Reviews of Modern Physics, vol. 90, no. 1,
456
+ p. 015002, 2018.
457
+ [28] V. E. Ismailov, “Representation of multivariate functions
458
+ by sums of ridge functions,” Journal of mathematical
459
+ analysis and applications, vol. 331, no. 1, pp. 184–190,
460
+ 2007.
461
+ [29] J. Schmidt-Hieber, “The kolmogorov–arnold represen-
462
+ tation theorem revisited,” Neural networks, vol. 137,
463
+ pp. 119–126, 2021.
464
+ [30] R. Hecht-Nielsen, “Kolmogorov’s mapping neural net-
465
+ work existence theorem,” in Proceedings of the interna-
466
+ tional conference on Neural Networks, vol. 3, pp. 11–14,
467
+ IEEE Press New York, NY, USA, 1987.
468
+ [31] V. K˚urkov´a, “Kolmogorov’s theorem and multilayer neu-
469
+ ral networks,” Neural networks, vol. 5, no. 3, pp. 501–
470
+ 506, 1992.
471
+
FNE5T4oBgHgl3EQfVQ8Q/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,322 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf,len=321
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
3
+ page_content='05549v1 [quant-ph] 12 Jan 2023 1 On the explainability of quantum neural networks based on variational quantum circuits Ammar Daskin Abstract—Ridge functions are used to describe and study the lower bound of the approximation done by the neural networks which can be written as a linear combination of activation functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
4
+ page_content=' If the activation functions are also ridge functions, these networks are called explainable neural networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
5
+ page_content=' In this paper, we first show that quantum neural networks which are based on variational quantum circuits can be written as a linear combination of ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
6
+ page_content=' Consequently, we show that the interpretability and explainability of such quantum neural networks can be directly considered and studied as an approximation with the linear combination of ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
7
+ page_content=' Index Terms—Quantum neural networks, explainability, inter- pretability, ridge functions I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
8
+ page_content=' INTRODUCTION Neural networks have applications almost in every field of the science ranging from health to banking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
9
+ page_content=' The ability to interpret the result of a model and explain the learning behavior may be deemed important especially in critical in- dustries such as medicine and health care[1–3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
10
+ page_content=' Limitations of the approximation rates of the classical neural networks can be understood better by using linear combination of ridge functions as an approximation to neural networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
11
+ page_content=' The power and the limitations of quantum neural networks are yet to be fully understood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
12
+ page_content=' In this paper, we show that quantum neural networks can be written as a sum of ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
13
+ page_content=' Therefore, the math and methodologies that are used to understand classical neural networks can be used to study quantum ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
14
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
15
+ page_content=' Approximation with ridge functions For a random variable y, if we have the observations y1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
16
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
17
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
18
+ page_content=' , yn at points x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
19
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
20
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
21
+ page_content=' , xn, a standard regression model can be described by yi = ˆyi + ri, where ˆyi defines the dependence of yi on xi When xi are univariate real values, the assumption is that the dependence is smooth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
22
+ page_content=' This leads the following estimation for the regression model[4]: E(y | x) = f(x), (1) where f is a smoothing function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
23
+ page_content=' In linear smoothing, ˆy = (ˆy1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
24
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
25
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
26
+ page_content=' , ˆyn)T can be written in the form of matrix vector transformation: ˆy = Sy, where S is the smoother matrix that does not depend on y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
27
+ page_content=' When there are more than one predictors, the estimating regression surface is hard because of the curse of dimensionality (the data sparseness in high A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
28
+ page_content=' Daskin was with the Department of Computer Engineering, Istanbul Medeniyet University, Istanbul, Turkey e-mail: (see https://sites.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
29
+ page_content='google.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
30
+ page_content='com/view/adaskin).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
31
+ page_content=' dimensions)[5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
32
+ page_content=' The general approach is to use the one- dimensional smoother as the building block in an additive model [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
33
+ page_content=' Given predictors xijs for each yi outcome, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
34
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
35
+ page_content=' {yi, xi1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
36
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
37
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
38
+ page_content=' , xip}, the additive model can be described as: E(yi|xi1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
39
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
40
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
41
+ page_content=' , xip) = α + p � j=1 fj(xij) + ǫ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
42
+ page_content=' (2) where ǫ is the inherent error, α is a constant parameter, and fjs represent unspecified smooth functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
43
+ page_content=' Fitting can be done by using the backfitting algorithm [5, 6] which is in matrix form equivalent to Gauss-Seidel method in numerical linear algebra[7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
44
+ page_content=' Generalizing this model leads to the projection pursuit model proposed in [5] where the regression surface is pre- dicted by a linear combination of ridge functions as in the following form: f(x) = K � k=1 fk(wk · x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
45
+ page_content=' (3) Here, wks represent weight vectors (projection indices) and fks are ridge functions [8–11]: Any multivariate function fk : Rd → R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
46
+ page_content=' The vector wk is called the direction and fk gives a constant on certain hyper-planes whose normal vectors are parallel to this direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
47
+ page_content=' Ridge functions are used in approximation theory, partial differential equations, and neural networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
48
+ page_content=' For instance, a feed forward neural network can be defined as [8]: � k γkσ (wk · x + bk) , (4) where bk, αk, and wk represents parameters that describe the neural network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
49
+ page_content=' σ is a univariate function (activation function).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
50
+ page_content=' The degree of approximation by σ functions can be bounded by the degree of approximation by ridge functions (we refer the reader to Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
51
+ page_content=' [8] for the properties and other uses of the ridge functions).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
52
+ page_content=' The lower bound of the approximation of the neural networks can be also studied through the relations of the activation functions with ridge functions (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
53
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
54
+ page_content=', [12–14]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
55
+ page_content=' If σ is chosen as a ridge function these networks are recently called explainable neural networks [15]: e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
56
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
57
+ page_content=' an example architecture which has three important structures, a projection layer, sub-network, and a combination layer is described to learn the following: f(x) = µ + K � k=1 γkfk(wk · x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
58
+ page_content=' (5) Here, µ and γks are shift and scaling parameters, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
59
+ page_content=' In comparison to standard neural networks, the learning in 2 this model can be understood by the ”explainable” features: linear projections and uni-variate functions (in other words, the mechanisms used to learn the model can be clearly explained by studying the constitutes that are ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
60
+ page_content=' ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
61
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
62
+ page_content=' EXPLAINABILITY OF QUANTUM NEURAL NETWORKS Quantum neural networks[16–19] are generally based on variational quantum circuits[20] and can be described by ⟨x| W(θ) ˆOW(θ) |x⟩ , (6) where ˆO represents the measurement operator, |x⟩ is the input vector formatted as a quantum state and W(θ) is a unitary matrix generated by the quantum gates with the angle values defined by θ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
63
+ page_content=' Here, by abuse of the notation, we can consider ˆO as a selector set on the parts of W(θ) |x⟩: e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
64
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
65
+ page_content=', to obtain the measurement output of the first qubit in |0⟩ state, in vector forms, we select the first half of the output and combine their squared absolute values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
66
+ page_content=' Then, the output quantum state of the quantum circuit applied to |x⟩ can be rewritten as: � i∈ ˆ O | � wi|x � |2 = � i∈ ˆ O fi( � wi|x � ), (7) where ⟨wi| represents a row of the unitary matrix W(θ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
67
+ page_content=' In variational quantum circuits, generally any change of the vector element of θ may affect multiple row of W(θ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
68
+ page_content=' This can affect the studies that try to understand the quantum neural network model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
69
+ page_content=' Therefore, to make any fi independent from each other, we can use the linear combination of unitary matrices[21, 22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
70
+ page_content=' By following Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
71
+ page_content=' [22], we can write the rows of any matrix W(θ) as the first rows of matrices and combine them on a block diagonal matrix: V = \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed ⟨w1| .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
72
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
73
+ page_content=' \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 N×N .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
74
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
75
+ page_content=' \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed ⟨wN| .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
76
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
77
+ page_content=' \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 N×N \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 N 2×N 2 (8) where N is the dimension of W(θ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
78
+ page_content=' Using the direct sum, we can write V = N � i Vi with Vi representing the unitary matrix for wi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
79
+ page_content=' Note that any N-dimensional vector can be formed with O(N) quantum gates as the leading row of a unitary matrix by using its Schmidt decomposition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
80
+ page_content=' Therefore, the construction V for a generic W(θ) requires at most O(N 2) gates (See Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
81
+ page_content=' [22] for complexity analysis of the circuit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
82
+ page_content=' ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
83
+ page_content=' The equivalent quantum state to the output of W(θ) |x⟩ can be generated as a part of the outcome of the following transformation: |ψ⟩ = V \uf8eb \uf8ec \uf8ec \uf8ed |x⟩ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
84
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
85
+ page_content=' |x⟩ \uf8f6 \uf8f7 \uf8f7 \uf8f8 N 2×1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
86
+ page_content=' (9) In a simplified form let |ψi⟩ represents the ith element of |ψ⟩ with 0 ≥ i < N 2, we can define a new selector operator that selects every |ψi⟩, where i mod N = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
87
+ page_content=' That means we can still use the definition similar to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
88
+ page_content=' (7): N 2−1 � i,i mod N=0 | � wi|x � |2 (10) Note that by writing a quantum operator in this way, we simply make the weight vectors independent from each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
89
+ page_content=' That means the impact of an angle-change in one quantum gate can be limited to affect only one vector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
90
+ page_content=' Therefore, this model is at least as much powerful as using a single unitary matrix where a change may affect multiple rows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
91
+ page_content=' In addition, studying the approximations in this model may be easier since we can easily see how many independent weight vectors are needed and how each weight vector affect the result and training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
92
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
93
+ page_content=' Explainability of networks that are represented by expo- nentials Ridge functions are also used to approximate the integral forms of functions[23]: One of the most commonly used one is given by the following Fourier form: Ψwk := eix·wk, (11) Here, the complex plane can be rewritten using the only real valued functions, therefore Ψwk can be considered as a ridge function for each wk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
94
+ page_content=' Therefore, quantum neural networks such as [24] can be also explained as an approximation through the linear combination of ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
95
+ page_content=' This can be also used to understand quantum circuits that are defined through the Ising type Hamiltonian[25] or machine learning tasks that are solved through the adiabatic quantum computation [26, 27] III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
96
+ page_content=' DISCUSSION AND CONCLUSION For a given set of weight vectors, in literature there are many works on the conditions to approximate a given function with unknown ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
97
+ page_content=' For instance[28], consider C(X) is the space of continuous functions on X, then for a given {w1, w2}, for an appropriate choice of some continuous functions h1 and h2, one can write g1(h1(x)) + g2(h2(x)) = C(X) if and only if the lengths of h1 − h2 paths in X are bounded by some positive integer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
98
+ page_content=' From the Kolmogorov- Arnold representation theorem [29], we know that any multi- variate continuous function can be approximated as a sum of univariate functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
99
+ page_content=' By this theorem, it can be also explained how the hidden layers in the classical neural networks help in approximations[29–31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
100
+ page_content=' However, a continuous function 3 may not be represented exactly by an approximation with ridge functions [10, 29].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
101
+ page_content=' Therefore, the approximation rates in quantum neural networks that reduces to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
102
+ page_content=' (7) and (10) can be well understood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
103
+ page_content=' On the other hand, this indicates that the limitations of the approximations with the ridge functions may be also limitations for these types of quantum neural networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
104
+ page_content=' In this brief paper, we show that quantum neural networks can be understood as a linear combination of ridge functions, which is used to understand the interpretability and explain- ability of the classical neural networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
105
+ page_content=' In particular, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
106
+ page_content=' (7) and Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
107
+ page_content=' (10) can be used to describe quantum neural network models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
108
+ page_content=' In addition, since it can be written in the form of a linear combination of ridge functions, the approximation errors and upper and lower bounds on the errors of quantum neural networks can be studied through this formulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
109
+ page_content=' In quantum neural networks which can be reduced to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
110
+ page_content=' (7) and (10), the approximation is done by using N ridge functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
111
+ page_content=' Here, N is in general exponential in the number of qubits and can be considered a very large number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
112
+ page_content=' For general function approximations, using these equations may be helpful to make a decision on the size of N and required number of operations and qubits before any application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
113
+ page_content=' However, the problems solved by the neural networks are in general not easy to define by functions, therefore it is not easy to decide how many functions (and quantum operations and qubits) are required to make the model more trainable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
114
+ page_content=' REFERENCES [1] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
115
+ page_content=' Tjoa and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
116
+ page_content=' Guan, “A survey on explainable artificial intelligence (xai): Toward medical xai,” IEEE transac- tions on neural networks and learning systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
117
+ page_content=' 32, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
118
+ page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
119
+ page_content=' 4793–4813, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
120
+ page_content=' [2] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
121
+ page_content=' Linardatos, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
122
+ page_content=' Papastefanopoulos, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
123
+ page_content=' Kotsiantis, “Explainable ai: A review of machine learning inter- pretability methods,” Entropy, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
124
+ page_content=' 23, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
125
+ page_content=' 1, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
126
+ page_content=' 18, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
127
+ page_content=' [3] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
128
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
129
+ page_content=' Gilpin, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
130
+ page_content=' Bau, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
131
+ page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
132
+ page_content=' Yuan, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
133
+ page_content=' Bajwa, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
134
+ page_content=' Specter, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
135
+ page_content=' Kagal, “Explaining explanations: An overview of interpretability of machine learning,” in 2018 IEEE 5th International Conference on data science and advanced analytics (DSAA), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
136
+ page_content=' 80–89, IEEE, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
137
+ page_content=' [4] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
138
+ page_content=' Buja, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
139
+ page_content=' Hastie, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
140
+ page_content=' Tibshirani, “Linear smoothers and additive models,” The Annals of Statistics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
141
+ page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
142
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
143
+ page_content=' 453–510, 1989.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
144
+ page_content=' [5] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
145
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
146
+ page_content=' Friedman, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
147
+ page_content=' Jacobson, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
148
+ page_content=' Stuetzle, “PROJEC- TION PURSUIT REGRESSION,” J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
149
+ page_content=' Am.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
150
+ page_content=' Statist.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
151
+ page_content=' Assoc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
152
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
153
+ page_content=' 76, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
154
+ page_content=' 817, 1981.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
155
+ page_content=' [6] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
156
+ page_content=' Breiman and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
157
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
158
+ page_content=' Friedman, “Estimating optimal transformations for multiple regression and correlation,” Journal of the American Statistical Association, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
159
+ page_content=' 80, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
160
+ page_content=' 391, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
161
+ page_content=' 580–598, 1985.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
162
+ page_content=' [7] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
163
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
164
+ page_content=' Golub and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
165
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
166
+ page_content=' Van Loan, Matrix computations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
167
+ page_content=' JHU press, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
168
+ page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
169
+ page_content=' Pinkus, Ridge Functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
170
+ page_content=' Cambridge Tracts in Math- ematics, Cambridge University Press, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
171
+ page_content=' [9] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
172
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
173
+ page_content=' Candes, Ridgelets: theory and applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
174
+ page_content=' Stan- ford University, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
175
+ page_content=' [10] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
176
+ page_content=' Maiorov, “On best approximation by ridge functions,” Journal of Approximation Theory, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
177
+ page_content=' 99, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
178
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
179
+ page_content=' 68– 94, 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
180
+ page_content=' [11] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
181
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
182
+ page_content=' Petrushev, “Approximation by ridge functions and neural networks,” SIAM Journal on Mathematical Anal- ysis, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
183
+ page_content=' 30, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
184
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
185
+ page_content=' 155–189, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
186
+ page_content=' [12] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
187
+ page_content=' Maiorov and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
188
+ page_content=' Pinkus, “Lower bounds for ap- proximation by mlp neural networks,” Neurocomputing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
189
+ page_content=' 25, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
190
+ page_content=' 1-3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
191
+ page_content=' 81–91, 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
192
+ page_content=' [13] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
193
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
194
+ page_content=' Ismailov, “Approximation by neural networks with weights varying on a finite set of directions,” Journal of Mathematical Analysis and Applications, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
195
+ page_content=' 389, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
196
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
197
+ page_content=' 72–83, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
198
+ page_content=' [14] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
199
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
200
+ page_content=' Klusowski and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
201
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
202
+ page_content=' Barron, “Minimax lower bounds for ridge combinations including neural nets,” in 2017 IEEE International Symposium on Information Theory (ISIT), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
203
+ page_content=' 1376–1380, IEEE, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
204
+ page_content=' [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
205
+ page_content=' Vaughan, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
206
+ page_content=' Sudjianto, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
207
+ page_content=' Brahimi, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
208
+ page_content=' Chen, and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
209
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
210
+ page_content=' Nair, “Explainable neural networks based on additive index models,” stat, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
211
+ page_content=' 1050, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
212
+ page_content=' 5, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
213
+ page_content=' [16] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
214
+ page_content=' Schuld, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
215
+ page_content=' Sinayskiy, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
216
+ page_content=' Petruccione, “The quest for a quantum neural network,” Quantum Information Processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
217
+ page_content=' 13, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
218
+ page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
219
+ page_content=' 2567–2586, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
220
+ page_content=' [17] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
221
+ page_content=' Kwak, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
222
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
223
+ page_content=' Yun, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
224
+ page_content=' Jung, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
225
+ page_content=' Kim, “Quantum neural networks: Concepts, applications, and challenges,” in 2021 Twelfth International Conference on Ubiquitous and Future Networks (ICUFN), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
226
+ page_content=' 413–416, IEEE, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
227
+ page_content=' [18] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
228
+ page_content='-A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
229
+ page_content=' Jia, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
230
+ page_content=' Yi, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
231
+ page_content=' Zhai, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
232
+ page_content='-C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
233
+ page_content=' Wu, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
234
+ page_content='-C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
235
+ page_content=' Guo, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
236
+ page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
237
+ page_content=' Guo, “Quantum neural network states: A brief review of methods and applications,” Advanced Quantum Technologies, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
238
+ page_content=' 2, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
239
+ page_content=' 7-8, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
240
+ page_content=' 1800077, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
241
+ page_content=' [19] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
242
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
243
+ page_content=' Massoli, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
244
+ page_content=' Vadicamo, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
245
+ page_content=' Amato, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
246
+ page_content=' Falchi, “A leap among quantum computing and quantum neural networks: A survey,” ACM Computing Surveys, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
247
+ page_content=' 55, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
248
+ page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
249
+ page_content=' 1–37, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
250
+ page_content=' [20] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
251
+ page_content=' Kandala, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
252
+ page_content=' Mezzacapo, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
253
+ page_content=' Temme, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
254
+ page_content=' Takita, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
255
+ page_content=' Brink, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
256
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
257
+ page_content=' Chow, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
258
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
259
+ page_content=' Gambetta, “Hardware- efficient variational quantum eigensolver for small molecules and quantum magnets,” Nature, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
260
+ page_content=' 549, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
261
+ page_content=' 7671, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
262
+ page_content=' 242–246, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
263
+ page_content=' [21] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
264
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
265
+ page_content=' Childs and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
266
+ page_content=' Wiebe, “Hamiltonian simulation us- ing linear combinations of unitary operations,” Quantum Information & Computation, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
267
+ page_content=' 12, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
268
+ page_content=' 11-12, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
269
+ page_content=' 901– 924, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
270
+ page_content=' [22] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
271
+ page_content=' Daskin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
272
+ page_content=' Grama, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
273
+ page_content=' Kollias, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
274
+ page_content=' Kais, “Universal programmable quantum circuit schemes to emulate an operator,” The Journal of chemical physics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
275
+ page_content=' 137, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
276
+ page_content=' 23, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
277
+ page_content=' 234112, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
278
+ page_content=' [23] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
279
+ page_content=' Pinkus, Integral Representations, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
280
+ page_content=' 141–151.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
281
+ page_content=' Cam- bridge Tracts in Mathematics, Cambridge University Press, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
282
+ page_content=' [24] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
283
+ page_content=' Daskin, “A simple quantum neural net with a pe- riodic activation function,” in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
284
+ page_content=' 2887–2891, IEEE, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
285
+ page_content=' [25] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
286
+ page_content=' Xia, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
287
+ page_content=' Bian, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
288
+ page_content=' Kais, “Electronic structure calculations and the ising hamiltonian,” The Journal of 4 Physical Chemistry B, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
289
+ page_content=' 122, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
290
+ page_content=' 13, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
291
+ page_content=' 3384–3395, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
292
+ page_content=' [26] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
293
+ page_content=' Farhi, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
294
+ page_content=' Goldstone, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
295
+ page_content=' Gutmann, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
296
+ page_content=' Sipser, “Quantum computation by adiabatic evolution,” arXiv preprint quant-ph/0001106, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
297
+ page_content=' [27] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
298
+ page_content=' Albash and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
299
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
300
+ page_content=' Lidar, “Adiabatic quantum com- putation,” Reviews of Modern Physics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
301
+ page_content=' 90, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
302
+ page_content=' 1, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
303
+ page_content=' 015002, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
304
+ page_content=' [28] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
305
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
306
+ page_content=' Ismailov, “Representation of multivariate functions by sums of ridge functions,” Journal of mathematical analysis and applications, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
307
+ page_content=' 331, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
308
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
309
+ page_content=' 184–190, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
310
+ page_content=' [29] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
311
+ page_content=' Schmidt-Hieber, “The kolmogorov–arnold represen- tation theorem revisited,” Neural networks, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
312
+ page_content=' 137, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
313
+ page_content=' 119–126, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
314
+ page_content=' [30] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
315
+ page_content=' Hecht-Nielsen, “Kolmogorov’s mapping neural net- work existence theorem,” in Proceedings of the interna- tional conference on Neural Networks, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
316
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
317
+ page_content=' 11–14, IEEE Press New York, NY, USA, 1987.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
318
+ page_content=' [31] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
319
+ page_content=' K˚urkov´a, “Kolmogorov’s theorem and multilayer neu- ral networks,” Neural networks, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
320
+ page_content=' 5, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
321
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
322
+ page_content=' 501– 506, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FNE5T4oBgHgl3EQfVQ8Q/content/2301.05549v1.pdf'}
GtE1T4oBgHgl3EQfFQMH/content/tmp_files/2301.02899v1.pdf.txt ADDED
@@ -0,0 +1,1418 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02899v1 [math.AG] 7 Jan 2023
2
+ Burnside rings and volume forms with logarithmic
3
+ poles
4
+ Antoine Chambert-Loir
5
+ Université Paris Cité, Institut de Mathématiques de Jussieu-Paris Rive Gauche, F-75013,
6
+ Paris, France
7
+ E-mail: antoine.chambert-loir@u-paris.fr
8
+ Maxim Kontsevich
9
+ Institut des Hautes Études Scientifiques, 35 route de Chartres, 91440 Bures-sur-Yvette,
10
+ France
11
+ E-mail: maxim@ihes.fr
12
+ Yuri Tschinkel
13
+ Courant Institute, NYU, 251 Mercer St. New York, NY 10012, USA
14
+ Simons Foundation, 160 5th Av., New York, NY 10010, USA
15
+ E-mail: tschinkel@cims.nyu.edu
16
+ Abstract. — We develop a theory of Burnside rings in the context of birational equivalences
17
+ of algebraic varieties equipped with logarithmic volume forms.
18
+ We introduce a residue
19
+ homomorphism and construct an additive invariant of birational morphisms. We also define
20
+ a specialization homomorphism.
21
+ Résumé. —
22
+ Nous proposons une théorie d’anneaux de Burnside dans le contexte de la
23
+ géométrie birationnelle des variétés algébriques munies d’une forme volume à pôles logarith-
24
+ miques. Nous introduisons un homomorphisme « résidu », construisons un invariant additif
25
+ des morphismes birationnels. Nous définissons aussi un homomorphisme de spécialisation.
26
+ 2000 Mathematics Subject Classification. — 14E08, 14E07, 14D06.
27
+ Key words and phrases. — Birational geometry, Burnside rings, logarithmic volume
28
+ forms, specialization.
29
+ Contents
30
+ 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
+ 2
32
+ 2. Logarithmic differential forms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33
+ 4
34
+ 3. Burnside rings for logarithmic forms. .. . . . . . . . . . . . . . . . . . . . . . . . . . .
35
+ 6
36
+ 4. Residues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
+ 9
38
+ 5. A complex of Burnside rings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
39
+ 6. Algebraic structure of Burn(k) after localization at 2. . . . . . . . . . . 17
40
+ 7. Birational morphisms preserving volume forms. . . . . . . . . . . . . . . . . . 20
41
+ 8. Specialization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
42
+ References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
43
+
44
+ 2
45
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
46
+ 1. Introduction
47
+ The study of birationality of algebraic varieties is a classical and well studied
48
+ subject, with many open problems. In some cases, it is interesting to study birational
49
+ maps preserving additional structure, for example group actions, symplectic forms,
50
+ or volume forms. Such a study is already implicit in many questions of birational
51
+ geometry, eg, in the notion of crepant resolution of singularities.
52
+ In this paper, we consider the case of varieties endowed with volume forms with
53
+ logarithmic poles and develop a formalism of Burnside rings along the lines of their
54
+ counterpart introduced by Kontsevich & Tschinkel (2019) to establish the spe-
55
+ cialization of rationality, and its equivariant version by Kresch & Tschinkel
56
+ (2022b).
57
+ Let k be a field of characteristic zero. For each integer n, we define
58
+ Burnn(k)
59
+ as the free abelian group on birational equivalence classses of pairs (X, ω) consisting
60
+ of an integral smooth proper k-variety X of dimension n equipped with an n-form ω
61
+ with at most logarithmic poles.
62
+ The graded abelian group
63
+ Burn(k) =
64
+
65
+ n∈N
66
+ Burnn(k)
67
+ carries a ring structure, induced by taking products of varieties, decomposed into ir-
68
+ reducible components, and equipped with the external product of the volume forms.
69
+ In section 4, we define morphisms of abelian groups
70
+ ∂ : Burnn(k) → Burnn−1(k).
71
+ When X is smooth and the polar divisor of ω has strict normal crossings, the image
72
+ of the class [X, ω] is given by the following formula. Let (Dα)α∈A be the family
73
+ of irreducible components of the polar divisor of ω. For each subset A of A , the
74
+ intersection DA = �
75
+ α∈A Dα is a union of integral smooth varieties of codimension |A|;
76
+ taking iterated residues, we may equip it with a volume form with logarithmic
77
+ poles ωA. Then
78
+ ∂([X, ω]) =
79
+
80
+ ∅̸=A⊆A
81
+ (−1)|A|−1[DA, ωA] · T|A|−1,
82
+ where
83
+ T = [P1, dt/t].
84
+ In particular, the existence of the map ∂ relies on the birational invariance of this
85
+ expression, see theorem 4.7.
86
+ This construction is reminiscent of the boundary map in polar homology
87
+ (Khesin & Rosly, 2003; Khesin et al, 2004; Gorchinskiy & Rosly, 2015).
88
+ However, apart from the obvious difference that we only record birational types of
89
+ strata, rather than the strata themselves, our formula takes into account strata of
90
+ all codimensions, rather than those of codimension one.
91
+
92
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
93
+ 3
94
+ The map ∂ is additive. Furthermore, we prove in theorem 4.10 that
95
+ ∂(a · b) = εn · ∂(a) · b + a · ∂(b) − T · ∂(a) · ∂(b),
96
+ when a ∈ Burnm(k) and b ∈ Burnn(k). Here ε is the class of the point Spec(k)
97
+ equipped with the volume form equal to −1.
98
+ In theorem 5.1, we show that
99
+ ∂ ◦ ∂ = 0.
100
+ These formulas may look complicated. However, as we explain in §6, they simplify
101
+ significantly after inverting 2.
102
+ Inspired by the constructions of Lin et al (2020); Lin & Shinder (2022);
103
+ Kresch & Tschinkel (2022a), we define in §7 a homomorphism
104
+ c: Bir(X, ω) → Burnn−1(k),
105
+ from the group of birational automorphisms of the pair (X, ω), where X is an n-
106
+ dimensional integral proper smooth variety equipped with a logarithmic volume
107
+ form ω. As in the above references, our map c is defined at the groupoid level of
108
+ birational maps preserving logarithmic volume forms.
109
+ When the birational isomorphism ϕ: (X, ω) ��� (Y, η) is described by a diagram
110
+ W
111
+ X
112
+ Y
113
+
114
+
115
+ p
116
+
117
+
118
+ q
119
+
120
+
121
+ ϕ
122
+ of smooth proper integral k-varieties, with birational morphisms p and q, the two
123
+ logarithmic volume forms p∗ω and q∗η on W are equal, and the element c(ϕ) ∈
124
+ Burnn−1(k) is given by
125
+ c(ϕ) =
126
+
127
+ E∈Exc(q)
128
+ [E, p∗ωE] −
129
+
130
+ D∈Exc(p)
131
+ [D, q∗ηD]
132
+ where Exc(p) is the set of irreducible components of the exceptional divisor of p,
133
+ and where, for each such component D, the logarithmic volume form p∗ωD on D is
134
+ obtained by taking the residue of p∗ω along D (and similarly for q).
135
+ Finally, consider a discrete valuation ring with residue field k and field of frac-
136
+ tions K and let t be a uniformizing element. In this context, we define a specialization
137
+ map
138
+ ρt : Burnn(K) → Burnn(k).
139
+ The image of the class [X, ω] involves the combinatorics of a good model (X , ω)
140
+ over the valuation ring, and a certain subcomplex of the Clemens complex of the
141
+ special fiber. In the particular case where X is smooth, the polar divisor of ω is
142
+ a relative divisor with normal crossings, and denoting by ωo the restriction of ω to
143
+ the special fiber Xo, one has
144
+ ρt([X, ω]) = [Xo, ωo].
145
+ Note that the existence of such a specialization map implies, as in theorem 1
146
+ of Kontsevich & Tschinkel (2019), or as in (Nicaise & Shinder, 2019), that
147
+
148
+ 4
149
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
150
+ birational equivalence of varieties with logarithmic volume forms is preserved under
151
+ “good specializations”.
152
+ In the geometric case, where the valuation is the local ring of a curve C at point o,
153
+ the construction of the specialization map can be viewed as a restriction to the
154
+ special fiber of a normalization of a global residue map ∂ that takes place on a proper
155
+ model whose special fiber is a divisor with normal crossings. The normalization
156
+ procedure extracts a subcomplex of the Clemens complex of the special fiber. A
157
+ similar situation appeared in the study of Tamagawa measures on analytic manifolds
158
+ (Chambert-Loir & Tschinkel, 2010).
159
+ Related constructions emerged from the seminal work of Kontsevich & Soibelman
160
+ (2006) inspired by mirror symmetry, and its subsequent developments, eg, by
161
+ Mustaţă & Nicaise (2015); Nicaise & Xu (2016); Boucksom & Jonsson
162
+ (2017); Jonsson & Nicaise (2020).
163
+ Our constructions use essentially only formal properties of the residue maps. Con-
164
+ sequently, one can envision analogous theories for logarithmic forms of smaller de-
165
+ gree, Milnor K-theory, or even for the cycle modules of Rost (1996).
166
+ Acknowledgments. — The third author was partially supported by NSF grant
167
+ 2000099.
168
+ 2. Logarithmic differential forms
169
+ 2.1. Kähler differentials. — Let k be a field of characteristic zero and let K be
170
+ a finitely generated extension of k; let n be its transcendence degree. The space of
171
+ Kähler differentials ΩK/k is the K-vector space generated by symbols da, for a ∈ K,
172
+ subject to the relations:
173
+ (1) For a ∈ k, one has da = 0;
174
+ (2) For a, b ∈ K, one has d(a + b) = da + db and d(ab) = adb + b(da).
175
+ For any integer m ⩾ 0, we may consider its mth exterior power Ωm
176
+ K/k, which is
177
+ a K-vector space of dimension
178
+ �n
179
+ m
180
+
181
+ ; in particular, it vanishes if m > n, Ω1
182
+ K/k has
183
+ dimension n, and Ωn
184
+ K/k has dimension one. One has Ω0
185
+ K/k = k, canonically.
186
+ Elements of Ωn
187
+ K/k, for n = tr. degk(K), are also called volume forms.
188
+ For a ∈ K×, we also write dlog a = da/a ∈ ΩK/k.
189
+ 2.2. Models. — Let m be an integer and let ω ∈ Ωm
190
+ K/k.
191
+ A model of K is an
192
+ integral k-scheme X together with a k-isomorphism K ≃ k(X); we say that this
193
+ model is proper, resp. smooth if X is proper, resp. smooth over k. Given such a
194
+ model, ω induces a meromorphic global section ωX of Ωm
195
+ X/k. The polar ideal of ωX
196
+ is the subsheaf of OX whose local sections are the a ∈ OX such that aωX is induced
197
+ by a regular m-form. Let D be the zero-locus of this ideal. Its complement U is
198
+ the largest open subscheme of X such that ωX is induced by a regular m-form on U.
199
+ If X is smooth, then ωX is locally free, hence the scheme D is an effective divisor
200
+ (Hartogs’s principle); we call it the polar divisor of ω on X.
201
+
202
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
203
+ 5
204
+ 2.3. Logarithmic forms. — By Hironaka’s theorem on embedded resolution of
205
+ singularities, there exist smooth projective models (X, ωX) of (K, ω) such that the
206
+ polar divisor D of ωX has normal crossings.
207
+ Following (Deligne, 1970, chap. 2, §3), we then say that ωX has at most loga-
208
+ rithmic poles, or that ω has at most logarithmic poles on X, if both ωX and dωX
209
+ have at most simple poles along D.
210
+ The following lemma implies that this condition is essentially independent of the
211
+ choice of X such that the polar divisor of ωX has normal crossings.
212
+ Lemma 2.4. — Let g : X′ → X be a morphism of smooth k-varieties, let D be a
213
+ divisor with normal crossings in X and let D′ be a divisor with normal crossings
214
+ in X′ such that D′ = g−1(D). Let ω be a regular m-form on X
215
+ D and let ω′ = g∗ω.
216
+ (1) If ω has at most logarithmic poles along D, then ω′ has at most logarithmic
217
+ poles along D′.
218
+ (2) The converse holds if g is proper and surjective.
219
+ Proof. — The first assertion is (Deligne, 1970, chap. II, prop. 3.2, (iv)). Let us
220
+ prove the second one.
221
+ Consider the generic point η of X and a point η′ ∈ X′
222
+ D′ which is algebraic
223
+ over k(η). The Zariski closure X′
224
+ 1 of η′ is proper and generically finite over X, and
225
+ D′
226
+ 1 = D′ ∩ X′
227
+ 1 is a divisor. There is a proper modification h: X′
228
+ 2 → X′
229
+ 1 such that
230
+ D′
231
+ 2 = h−1(D′
232
+ 1) has normal crossings. By the first part, the form h∗ω′|X′
233
+ 1 has at most
234
+ logarithmic poles along D′
235
+ 2. Replacing g by g◦h, we may assume that g is generically
236
+ finite.
237
+ Since the sheaf of forms with at most logarithmic poles along D is locally free and
238
+ X is smooth, we can delete from X a subset of codimension at least 2. Thus, we
239
+ may assume that g is flat, D is smooth and irreducible, and g is étale outside of D.
240
+ It suffices to argue étale locally at the generic point of D. By the local description
241
+ of ramified morphisms, there are étale local coordinates (z1, . . . , zn) on X such that
242
+ Dred = V(z1), local coordinates (z′
243
+ 1, . . . , z′
244
+ n) on X′ such that g∗z1 = (z′
245
+ 1)e, g∗z2 = z′
246
+ 2,
247
+ etc., where e is the ramification index of g along D. Let d be the order of the pole
248
+ of ω along D; write ω = α/zd
249
+ 1 + β ∧ dz1/zd
250
+ 1, where α, β are regular forms which do
251
+ not involve dz1. Then
252
+ ω′ = g∗ω = g∗α/(z′
253
+ 1)de + e g∗β ∧ dz′
254
+ 1/(z′
255
+ 1)1+(d−1)e.
256
+ Assume, by contradiction, that d ⩾ 2, so that de ⩾ 2 and 1 + (d − 1)e ⩾ 2. Since ω′
257
+ has at most logarithmic poles along D, we get g∗α = 0 and g∗β = 0. This implies
258
+ that both α and β are multiples of z1, contradicting the hypothesis that d was the
259
+ order of the pole of ω along D. Therefore, d ⩽ 1. This concludes the proof.
260
+ 2.5. — We say that an m-form ω ∈ Ωm
261
+ K/k is logarithmic if for all proper smooth
262
+ models X of K such that the polar divisor of ωX has normal crossings, the meromor-
263
+ phic differential form ωX has at most logarithmic poles. By resolution of singularities
264
+
265
+ 6
266
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
267
+ (Hironaka, 1964), two models are dominated by a third one, hence lemma 2.4, im-
268
+ plies that it suffices that this condition is satisfied on some proper smooth model
269
+ for which the polar divisor of ωX has normal crossings.
270
+ Analogously, if X is a reduced k-variety, then we say that a meromorphic m-form ω
271
+ on X is logarithmic “everywhere” if for all proper birational models (X′, ω′) of (X, ω),
272
+ the meromorphic m-form ω′ on X′ has at most logarithmic poles. It suffices that
273
+ this holds on one such model.
274
+ 3. Burnside rings for logarithmic forms
275
+ 3.1. Burnside rings. — Let k be a field of characteristic zero and n an integer
276
+ such that n ⩾ 0. Kontsevich & Tschinkel (2019) defined the Burnside group
277
+ Burnn(k) as the free abelian group on isomorphism classes of finitely generated
278
+ extensions of k of transcendence degree n.
279
+ Any integral k-variety X of dimension n has a class [X] in Burnn(k). This gives rise
280
+ to alternative useful presentations of Burnn(k), for example involving only classes
281
+ of integral projective smooth varieties.
282
+ The group
283
+ Burn(k) =
284
+
285
+ n≥0
286
+ Burnn(k)
287
+ carries a natural commutative ring structure, with multiplication defined by taking
288
+ products of (smooth projective) k-varieties:
289
+ [X] · [X′] = [X × X′].
290
+ 3.2. Definition of a Burnside group for volume forms. — Let k be a field
291
+ of characteristic zero and let n be an integer ⩾ 0. We define Burnn(k) to be the
292
+ free abelian group on isomorphisms classes of pairs (K, ω), where
293
+ – K is a finitely generated extension of k of transcendence degree n and
294
+ – ω ∈ Ωn
295
+ K/k is a logarithmic volume form.
296
+ We write
297
+ [K, ω] ∈ Burnn(k)
298
+ for the class of a pair (K, ω).
299
+ Remark 3.3. — This definition has obvious more geometric formulations.
300
+ For
301
+ example, we can take for generators equivalence classes of pairs (X, ω), where
302
+ – X is a smooth integral k-scheme of dimension n, and
303
+ – ω a regular volume form on X which is logarithmic “everywhere”,
304
+ modulo the smallest equivalence relation that identifies (X, ω) and (X′, ω′) if there
305
+ exists an open immersion f : X′ → X such that ω′ = f ∗ω.
306
+ Alternatively, we can assume that X is proper, smooth and integral, the form ω is
307
+ a logarithmic volume form on X, and consider the smallest equivalence relation that
308
+ identifies (X, ω) and (X′, ω′) if there exists a proper birational morphism f : X′ → X
309
+ such that ω′ = f ∗ω. By the weak factorization theorem of (Abramovich et al,
310
+
311
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
312
+ 7
313
+ 2002), this equivalence relation is generated by such morphisms f which are blowing-
314
+ ups along smooth centers in good position with respect to the polar divisor of X.
315
+ In both contexts, if X is an n-dimensional k-variety and ω is a meromorphic n-form
316
+ on X which is logarithmic “everywhere”, then we define [X, ω] to be the sum, over
317
+ all irreducible components Y of X which have dimension n, of the classes [Y, ω|Y].
318
+ Example 3.4. — Finitely generated extensions of k of transcendence degree 0 are
319
+ finite extensions of k. Let K be such an extension. Since k has characteristic zero,
320
+ one has Ω1
321
+ K/k = 0. However, Ω0
322
+ K/k, which is its 0th exterior power, is canonically
323
+ isomorphic to K. Consequently, Burn0(k) is the free abelian group on isomorphism
324
+ classes of pairs (K, λ), where K is a finite extension of k and λ ∈ K.
325
+ We will let 1 = [Spec(k), 1] and ε = [Spec(k), −1].
326
+ Example 3.5. — Let K = k(t). The differential form dt/t is a logarithmic volume
327
+ form; indeed X = P1
328
+ k is a model of K and this form has poles of order 1 at 0 and ∞,
329
+ and no other poles. We write T for the class of (k(t), dt/t).
330
+ Note that the k-isomorphism of K that maps t to 1/t maps dt/t to its opposite;
331
+ consequently, we also have T = [k(t), −dt/t] = ε · T.
332
+ In the context of birational geometry in presence of logarithmic volume forms,
333
+ “rational varieties” would have class in Tn, and similarly for stable birationality.
334
+ 3.6. Multiplicative structure. — We view the direct sum
335
+ Burn(k) =
336
+
337
+ n∈N
338
+ Burnn(k)
339
+ as a graded abelian group. It is endowed with a multiplication such that
340
+ [X, ω] · [X′, ω′] = [X × X′, ω ∧ ω′]
341
+ when X, X′ are proper, smooth and integral and ω, resp. ω′ are logarithmic volume
342
+ forms on X, resp. X′, and Y ranges over the set of irreducible components of X×X′.
343
+ Let s: X′ × X → X × X′ be the isomorphism exchanging the two factors. One has
344
+ s∗(ω ∧ ω′) = (−1)nn′ω′ ∧ ω,
345
+ if n = dim(X), n′ = dim(X′), ω is a volume form on X and ω′ is a volume form
346
+ on X′. Consequently,
347
+ a · b = εnn′ · b · a
348
+ for a ∈ Burnn(k) and b ∈ Burnn′(k). In particular, classes in Burnn(k), for even n,
349
+ are central in Burn(k).
350
+ We remark that the element T ∈ Burn1(k) is central as well. Let indeed a ∈
351
+ Burnn(k). If n is even, then a · T = T · a. Otherwise, we have a · T = ε · T · a, but
352
+ we have seen in example 3.5 that T = ε · T. As a consequence, a · T = T · a.
353
+ However, the ring Burn(k) is not commutative. Indeed, consider curves X, X′
354
+ without automorphisms and no nonconstant morphism between them. Then the
355
+ switch is the only isomorphism from X′ × X to X × X′. Take nonzero logarithmic
356
+
357
+ 8
358
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
359
+ 1-forms ω, ω′ on X, X′ respectively. The classes [X × X′, ω ∧ ω′] and [X′ × X, ω′ ∧ ω]
360
+ are then distinct.
361
+ 3.7. Functoriality. — Let k′ be an extension of k. Then there is a natural ring
362
+ homomorphism
363
+ Burn(k) → Burn(k′)
364
+ described as follows. Let (X, ω) be an integral k-variety of dimension n equiped with
365
+ a logarithmic q-form. Let X′ = X ⊗k k′ be its base change to k′, and let ω′ be the
366
+ volume form on X′ deduced from ω by base change. Then the class of (X, ω) maps to
367
+ the sum of classes (Y, ω′|Y), where Y runs the (finite) set of irreducible components
368
+ of X′.
369
+ If k′ is a finite extension of k, we also have a trace map
370
+ Trk′/k : Burn(k′) → Burn(k)
371
+ obtained by averaging over a set of representatives of automorphisms of the Galois
372
+ closure of k′ over k modulo those preserving k′.
373
+ 3.8. Relation with the classical Burnside group. — Forgetting the form ω
374
+ gives a ring morphism
375
+ π: Burn(k) → Burn(k).
376
+ On the other hand, if K is a finitely generated extension of k of transcendence
377
+ degree n, we can endow it with the zero n-form. The resulting map
378
+ ̟: Burn(k) → Burn(k)
379
+ identifies Burn(k) with an ideal of Burn(k). One has π ◦ ̟ = id.
380
+ 3.9. Variations on the theme. — The construction of the Burnside ring Burn(k)
381
+ admits several natural variants that are relevant in more specific contexts. Some of
382
+ them will be used in later sections.
383
+ 3.9.1. A relative ring. — Let n be an integer.
384
+ For any k-scheme S, we define
385
+ Burnn(S/k) as the free abelian group on triples (X, ω, u) where X is an integral
386
+ smooth n-dimensional k-scheme, ω ∈ Ωn
387
+ X/k is a regular volume form which is loga-
388
+ rithmic “everywhere”, and u: X → S is a morphism, modulo the smallest equivalence
389
+ relation that identifies (X, ω, u) and (X′, ω′, u′) if there exists an open immersion
390
+ f : X′ → X such that ω′ = f ∗ω and u′ = u ◦ f.
391
+ Let h: S → T be a morphism of k-schemes. It induces a morphism of abelian
392
+ groups
393
+ h∗ : Burnn(S/k) → Burnn(T/k)
394
+ such that h∗([X, ω, u]) = [X, ω, h ◦ u] for any triple (X, ω, u) as above.
395
+ 3.9.2. Pluriforms. — One can replace volume forms with volume r-pluriforms, that
396
+ is, elements of (Ωn
397
+ K/k)⊗r, for some given integer r. The corresponding logarithmic
398
+ condition requires that the pluriform has poles of order at most r on an adequate
399
+ model. Note that when r is even, the obtained ring is commmutative.
400
+
401
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
402
+ 9
403
+ 3.9.3. Forms up to scalars. — In the construction, we may wish to identify (K, ω)
404
+ and (K′, ω′) if there exists λ ∈ k×, resp. λ ∈ {±1}, and a k-isomorphism f : K → K′
405
+ such that f ∗ω′ = λω. These variants also give rise to a commutative ring.
406
+ 3.9.4. Group actions. — Let G be a profinite group scheme over k. One can also
407
+ consider pairs (K, ω), where the field K is endowed with an action of G leaving the
408
+ form ω invariant. The obtained ring will be denoted by BurnG(k).
409
+ 4. Residues
410
+ 4.1. Residue of a volume form. — Let X be an equidimensional smooth k-
411
+ variety of dimension n.
412
+ Let D be a smooth divisor on X. We denote by Ωm
413
+ X/k(log D) the sheaf of m-forms
414
+ on X with logarithmic poles along D, locally of the form η ∧d log f +η′, where η and
415
+ η′ are regular and f is a local equation of D. The residue map is the homomorphism
416
+ of OX-modules
417
+ ρD : Ωm
418
+ X/k(log D) → Ωm−1
419
+ D/k ,
420
+ characterized by the relation
421
+ ρD(η ∧ d log f + η′) = η|D
422
+ for every local sections η ∈ Ωm−1
423
+ X/k and η′ ∈ Ωm
424
+ X/k, and any local generator f of the
425
+ ideal of D.
426
+ If ω is a logarithmic m-form on X, there is an open subset U of X such that
427
+ U ∩ D ̸= ∅ and such that ω|U belongs to Ωm
428
+ X/k(log D). Its residue ρD(ω|U) is then a
429
+ meromorphic section of Ωm−1
430
+ D/k .
431
+ Lemma 4.2. — Let ω be a logarithmic differential form of degree m on X. Then
432
+ ρD(ω) is a logarithmic (m − 1)-form on D.
433
+ Proof. — We may assume that the sum of D and of the polar divisor of ω has strict
434
+ normal crossings. The assertion is then evident in local coordinates.
435
+ 4.3. Blowing-ups and normal bundles. — Let Y be a smooth closed sub-
436
+ scheme of X. The blow-up BlY(X) of X along Y is a smooth k-variety. The blowing-
437
+ up morphism bY : BlY(X) → X is an isomorphism over the complement of Y. If Y
438
+ is nowhere dense and nonempty, then EY = b−1
439
+ Y (Y) is a smooth divisor in BlY(X).
440
+ In general, EY = b−1
441
+ Y (Y) identifies, as an Y-scheme, with the projectivization of
442
+ the normal bundle NY(X) of Y in X.
443
+ Let W be a closed smooth subscheme of X. Assume that W and Y are transversal.
444
+ Then the Zariski closure of b−1
445
+ Y (W
446
+ (Y ∩ W)) is called the strict transform of W
447
+ in BlY(X). It identifies with BlY∩W(W).
448
+ Let now ω be a logarithmic m-form on X.
449
+ Then the form b∗
450
+ Yω on BlY(X) is
451
+ logarithmic; assuming that Y is nonempty and nowhere dense, we can consider the
452
+ residue ρY(ω) of b∗
453
+ Yω along EY. It is a logarithmic (n − 1)-form on P(NY(X )).
454
+
455
+ 10
456
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
457
+ Definition 4.4. — Let X be an irreducible proper smooth k-variety, let n be its
458
+ dimension and let ω ∈ Ωn
459
+ X/k be logarithmic volume form whose polar divisor D has
460
+ strict normal crossings. Let (Dα)α∈A be the family of its irreducible components; for
461
+ A ⊆ A , we let DA = �
462
+ α∈A Dα. We then define an element ρ(X, ω) in Burnn−1(X/k)
463
+ by the formula:
464
+ ρ(X, ω) =
465
+
466
+ ∅̸=A⊆A
467
+ (−1)|A|−1ρDA(X, ω).
468
+ (In this formula and all similar ones below, it is always implicit that the terms
469
+ where DA = ∅ are omitted.)
470
+ 4.5. Iterated residues. — We retain the notation of definition 4.4
471
+ Fix a logarithmic volume form ω on X and a nonempty subset A of A such
472
+ that DA ̸= ∅. It will be useful to compute inductively the logarithmic volume form
473
+ ρDA(ω) that appears in definition 4.4.
474
+ Let bA : ˜X → X be the blowing-up of X along DA and let E be its exceptional
475
+ divisor.
476
+ When A = {α} has a single element, DA is the divisor Dα, the blowing-up mor-
477
+ phism bA is an isomorphism and the exceptional divisor identifies with DA. Then
478
+ ρDA(X, ω) = [Dα, ρDα(ω), jα],
479
+ where jα is the immersion of Dα into X.
480
+ This construction can be pursued in higher codimension, using iterated residues.
481
+ Fix a total order on A . There is a unique, strictly increasing sequence (α1, . . . , αm)
482
+ in A such that A = {α1, . . . , αm}. Given the chosen order on A , we may apply the
483
+ iterated residues construction and obtain a logarithmic form of degree n − m
484
+ ρDA(ω) = ρDα1 ◦ · · · ◦ ρDαm(ω).
485
+ On a nonempty open subset U of X that meets DA, we may write
486
+ ω = η ∧ dlog(fα1) ∧ . . . dlog(fαm),
487
+ for a regular form η, and then one has ρDA(ω) = η|U∩DA.
488
+ Denote by bA the blowing-up of X along DA and by EA its exceptional divisor;
489
+ recall that EA identifies with the projectivized normal bundle NDA(X) of DA in X.
490
+ Using local equations for the divisors Dα, for α ∈ A, we trivialize NDA(X) on a dense
491
+ open subscheme of DA; this gives a birational isomorphism of EA with DA × Pm−1
492
+ (with m = |A|), and a local computation gives the formula
493
+ ρDA(X, ω) = [DA, ρDA(ω)] · Tm−1
494
+ in Burnn−1(DA/k).
495
+ When m ⩾ 2, the definition of ρDA actually depends on the chosen order of A , but
496
+ only up to a sign, so that the class [DA, ρDA(ω)] is well defined up to multiplication
497
+ by the class ε ∈ Burn0(k). On the other hand, it is multiplied by Tm−1 and we
498
+ have observed that ε · T = T.
499
+
500
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
501
+ 11
502
+ Proposition 4.6. — Let (X, ω), D, and (Dα)α∈A be as in definition 4.4. Let Y be
503
+ a strict irreducible subvariety of X; let AY be the set of all α ∈ A such that Y ̸⊆ Dα;
504
+ we assume that �
505
+ α∈AY Dα meets Y transversally.
506
+ Let g : X′ → X be the blowing-up of X along Y and let ω′ = g∗ω; it is a logarithmic
507
+ form, its polar divisor has strict normal crossings, and we have
508
+ g∗ρ(X′, ω′) = ρ(X, ω)
509
+ in Burn(X/k).
510
+ Proof. — Let E = g−1(Y) be the exceptional divisor; for each α ∈ A , let D′
511
+ α be the
512
+ strict transform of Dα. The blow-up X′ is smooth; the divisor E + �
513
+ α∈A D′
514
+ α has
515
+ strict normal crossings and contains the polar divisor of ω′.
516
+ Let B be the set of all β ∈ A such that Y ⊆ Dβ, so that DB is the minimal
517
+ stratum containing Y.
518
+ We now split the discussion into two cases.
519
+ (1) Assume that dim(Y) < dim(DB). Since g is ramified along E, its Jacobian
520
+ vanishes along E. Since ω has poles of order at most one, the form ω′ = g∗ω is
521
+ regular at the generic point of E. Consequently, the polar divisor of ω′ does not
522
+ contain E and we have to compare
523
+
524
+ ∅̸=A⊆A
525
+ (−1)|A|−1ρD′
526
+ A(ω′)
527
+ with
528
+
529
+ ∅̸=A⊆A
530
+ (−1)|A|−1ρDA(ω).
531
+ Since g is a local isomorphism around the generic points of Dα, for α ∈ A , we
532
+ see that the polar divisor of ω′ is equal to �
533
+ α∈A D′
534
+ α. For every nonempty subset A
535
+ of A , one has
536
+ g∗ρDA(X′, ω′) = ρDA(X, ω)
537
+ for every nonempty subset A of A , which implies the desired formula in this case.
538
+ (2) Assume that dim(Y) = dim(DB). In this case, Y is an irreducible component
539
+ of DB. Since D∅ = X and Y ̸= X, we have B ̸= ∅. We have to compare the expression
540
+
541
+ ∅̸=A⊆A
542
+ (−1)|A|−1ρD′
543
+ A(ω′) +
544
+
545
+ A⊆A
546
+ (−1)|A|ρE∩D′
547
+ A(ω′)
548
+ with
549
+
550
+ ∅̸=A⊆A
551
+ (−1)|A|−1ρDA(ω).
552
+ The argument takes place in a neighborhood of Y, which allows us to assume that
553
+ Y = DB.
554
+ Let A be a nonempty subset of A . One has D′
555
+ A = ∅ whenever B ⊆ A, and the
556
+ corresponding terms are absent from the second expression. On the other hand,
557
+ if B ̸⊆ A, the morphism g identifies D′
558
+ A with the blow-up of DA along DA ∩ Y =
559
+ DA∪B. In particular, g induces a birational isomorphism from D′
560
+ A to DA, so that
561
+
562
+ 12
563
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
564
+ g∗ρD′
565
+ A(X′, ω′) = ρDA(X, ω). Moreover, E ∩ D′
566
+ A is the projectivized normal bundle
567
+ PNDA∪B(DA), and
568
+ g∗ρE∩D′
569
+ A(X′, ω′) = ρDA∪B(X, ω).
570
+ Similarly, one has
571
+ g∗ρE(X′, ω′) = ρDB(X, ω).
572
+ This gives a formula of the form
573
+ g∗ρ(X′, ω′) =
574
+
575
+ ∅̸=A⊆A
576
+ B̸⊆A
577
+ (−1)|A|−1ρDA(X, ω) +
578
+
579
+ A⊆A
580
+ B̸⊆A
581
+ (−1)|A|ρDA∪B(X, ω)
582
+ =
583
+
584
+ ∅̸=A⊆A
585
+ n′
586
+ AρDA(X, ω),
587
+ where
588
+ n′
589
+ A =
590
+
591
+
592
+
593
+ (−1)|A|−1
594
+ if B ̸⊆ A,
595
+
596
+ C⊆A
597
+ B̸⊆C
598
+ C∪B=A
599
+ (−1)|C|
600
+ if B ⊆ A.
601
+ It suffices to prove that n′
602
+ A = nA for any nonempty subset A of A . This is obvious
603
+ when B ̸⊆ A, so let us assume that B ⊆ A. In the sum that defines n′
604
+ A, we write
605
+ C = (C
606
+ B)∪C′, where C′ = C∩B is a subset of B; the condition C∪B = A means
607
+ C
608
+ B = A
609
+ B; the condition B ̸⊆ C means C′ ̸= B. Consequently, we have
610
+ n′
611
+ A = (−1)|A B| �
612
+ C′⊆B
613
+ C′̸=B
614
+ (−1)|C′|
615
+ = (−1)|A B|
616
+ � �
617
+ C′⊆B
618
+ (−1)|C′| − (−1)|B|
619
+
620
+ = (−1)|A B| �
621
+ (1 − 1)|B| − (−1)|B|�
622
+ = (−1)|A|−1,
623
+ since |B| ⩾ 1. This concludes the proof of the proposition.
624
+ Theorem 4.7. — Let (X, ω) be as in definition 4.4. If X is proper, then the image
625
+ of ρ(X, ω) in Burnn−1(k) only depends on the class [X, ω] ∈ Burnn(k). It gives rise
626
+ to a morphism of abelian groups
627
+ ∂n : Burnn(k) → Burnn−1(k).
628
+ Proof. — By the definition of Burnn(k) involving pairs (X, ω) where X is proper,
629
+ it suffices to consider two pairs (X, ω) and (X′, ω′) as in definition 4.4 which are
630
+ related by a proper birational morphism g : X′ → X such that g∗ω = ω′. By the
631
+ weak factorization theorem of Abramovich et al (2002), in order to prove the
632
+ theorem, we may assume that g is a blowing-up of X along a smooth subvariety
633
+ which is transversal to the polar divisor of ω. In this case, proposition 4.6 asserts
634
+
635
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
636
+ 13
637
+ that g∗��(X′, ω′) = ρ(X, ω) in Burn(X/k). In particular, the images in Burn(k) of
638
+ ρ(X′, ω′) and ρ(X, ω) are equal.
639
+ Example 4.8. — The meromorphic differential form dt/t on P1
640
+ k has residues 1
641
+ and −1 at 0 and ∞ respectively. By construction, we thus have
642
+ ∂1(T) = [Spec(k), 1] + [Spec(k), −1] = 1 + ε.
643
+ Let n be an integer such that n ⩾ 2 and let us compute ∂n(Tn). We view Tn as
644
+ the class of Pn, with homogeneous coordinates [1 : x1 : . . . : xn], and with the toric
645
+ differential form
646
+ ωn = (dx1/x1) ∧ . . . (dxn/xn).
647
+ Its divisor is the sum of the toric hyperplanes D0, . . . , Dn. Each of these hyperplanes
648
+ identifies with Pn−1, and ρDj(ωn) is (−1)n−jωn−1. Let A = {0, . . . , n}. If A = A ,
649
+ then DA = ∅. Otherwise, we see by induction that DA is isomorphic to Pn−|A| and
650
+ ρDA(ωn) identifies with ±ωn−|A|, so that
651
+ [DA, ρDA(ωn)] · T|A|−1 = [Gm
652
+ n−1, ±ωn−1] = Tn−1,
653
+ since n − 1 ⩾ 1. Then,
654
+ ∂n(Tn) =
655
+
656
+ ∅̸=A⊆A
657
+ (−1)|A|−1[DA, ρDA(ωn)] · T|A|−1
658
+ =
659
+
660
+ ∅̸=A⊊A
661
+ (−1)|A|−1Tn−1.
662
+ Now,
663
+
664
+ ∅̸=A⊊A
665
+ (−1)|A|−1 = 1 − (1 − 1)n+1 + (−1)n+1 =
666
+
667
+ 2
668
+ if n is odd;
669
+ 0
670
+ if n is even.
671
+ We get ∂n(Tn) = 2Tn−1 if n is odd and ∂n(Tn) = 0 if n is even. (Remind that
672
+ n ⩾ 2.) Since T = ε · T, the following formula unifies the various cases: for n ⩾ 1,
673
+ we have
674
+ ∂n(Tn) = (1 + (−1)n−1ε) · Tn−1.
675
+ Proposition 4.9. — For every class b ∈ Burnn(k), we have
676
+ ∂n+1(b · T) = −∂n(b) · T + b · ∂1T.
677
+ Proof. — We may assume that b = [X, ω], where X is a proper integral smooth
678
+ variety of dimension n, and ω is a logarithmic volume form on X whose polar divisor
679
+ has strict normal crossings. Let (Dα)α∈A be the family of its irreducible components.
680
+ We view b·T as the class of [X×P1, ω ∧dt/t]. The polar divisor of ω ∧dt/t is equal
681
+ to
682
+
683
+ α∈A
684
+ Dα × P1 + X × {0} + X × {∞}.
685
+
686
+ 14
687
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
688
+ It has strict normal crossings, and its strata are of the form DA × P1, for nonempty
689
+ A ⊆ A , or DA × {0}, or DA × {∞}, for A ⊆ A . This decomposes ∂n+1(b × T) as
690
+ the sum of three terms.
691
+ The first one is
692
+
693
+ ∅̸=A⊆A
694
+ [DA × P1, ρDA×P1(ω ∧ dt/t)] · T|A|−1.
695
+ For any nonempty subset A of A , one has
696
+ ρDA×P1(ω ∧ dt/t) = ±ρDA(ω) ∧ dt/t,
697
+ so that
698
+ [DA × P1, ρDA×P1(ω ∧ dt/t)] · T|A|−1 = [DA, ρDA(ω)] · T · T|A|−1.
699
+ Consequently, the first term equals ∂n(b) × T.
700
+ Write D0 = X × {0} and D∞ = X × {∞}, and identify both divisors to X. For a
701
+ subset A of A , we have
702
+ ρDA∪{0}(ω ∧ dt/t) = ρDA ◦ ρD0(ω ∧ dt/t) = ρDA(ω).
703
+ Consequently, the second term is equal to
704
+
705
+ A⊆A
706
+ (−1)|A|[DA, ρDA(ω)] · T|A| = [X, ω] − ∂n(b) · T.
707
+ Similarly, the third term is equal to
708
+ [X, −ω] − ∂n(b) · T.
709
+ Summing up these three terms, we get
710
+ ∂n+1(b × T) = −∂n(b) · T + [X, ω] + [X, −ω].
711
+ We now recall that ∂1(T) = [Spec(k), 1] + [Spec(k), −1], so that
712
+ [X, ω] + [X, −ω] = [X, ω] · ∂1(T) = b · ∂1(T).
713
+ This concludes the proof.
714
+ Theorem 4.10. — Let a ∈ Burnm(k) and b ∈ Burnn(k); we have
715
+ ∂m+n(a · b) = εn · ∂m(a) · b + a · ∂n(b) − T · ∂m(a) · ∂n(b)
716
+ in Burnm+n−1(k).
717
+ Proof. — It suffices to treat the case where a and b are classes of proper integral
718
+ smooth varieties (X, ω), (Y, η), endowed with meromorphic volume forms whose
719
+ polar divisors have strict normal crossings and no multiplicities. Let (Dα)α∈A be
720
+ the irreducible components of the polar divisor of ω, let (Eβ)β∈B be the irreducible
721
+ components of the polar divisor of η. Then [X, ω]·[Y, η] is the class of [X×Y, ω ∧η];
722
+ the polar divisor of ω ∧ η is equal to
723
+
724
+ α∈A
725
+ Dα × Y +
726
+
727
+ β∈B
728
+ X × Eβ.
729
+
730
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
731
+ 15
732
+ We fix a total order on the disjoint union of A and B such that the elements of A
733
+ are smaller than those of B. For any subsets A, B of A and B, observe that we
734
+ have
735
+ ρDA∪B(ω ∧ η) = ±ρDA(ω) ∧ ρEB(η),
736
+ where ρDA has to be understood as the identity when A is empty, and similarly
737
+ for ρEB. The sign is 1 when A = ∅; when B = ∅, it is equal to (−1)|A|n; we won’t
738
+ need to use its explicit value in the other cases. Then we can write ∂([X, ω] · [Y, η])
739
+ as
740
+
741
+ A⊆A
742
+ B⊆B
743
+ A∪B̸=∅
744
+ (−1)|A|+|B|−1[DA × EB, ±ρA(ω) ∧ ρEB(η)] · T|A∪B|−1
745
+ and we split it into the sum of three terms, according to which B = ∅, or A = ∅, or
746
+ none of them is empty. The first two terms are respectively equal to
747
+
748
+ ∅̸=A⊆A
749
+ (−1)|A|−1[DA × Y, (−1)n|A|ρDA(ω) ∧ η] · T|A|−1 = ∂([X, (−1)nω]) · [Y, η]
750
+ and
751
+
752
+ ∅̸=B⊆B
753
+ (−1)|B|−1[X × EB, ω ∧ ρEB(η)] · T|B|−1 = [X, ω] · ∂([Y, η]),
754
+ since T belongs to the center of Burn(k). As for the third one, we obtain
755
+
756
+
757
+ ∅̸=B⊆B
758
+ (−1)|B|−1
759
+
760
+ ∅̸=A⊆A
761
+ (−1)|A|−1[DA, ρDA(ω)] · [EB, ρEB(η)] · T|A|+|B|−2
762
+ which equals
763
+ −∂([X, ω]) · ∂([Y, η]) · T.
764
+ Finally, we get
765
+ ���m+n(a · b) = ∂m+n([X, ω] · [Y, η])
766
+ = ∂m([X, (−1)nω) · [Y, η] + [X, ω] · ∂n([Y, η])
767
+ − T · ∂m([X, ω]) · ∂n([Y, η])
768
+ = εn · ∂m(a) · b + a · ∂n(b) − T · ∂m(a) · ∂n(b)
769
+ as was to be shown.
770
+ In particular, using the computation of example 4.8, we obtain the following
771
+ generalization of proposition 4.9.
772
+ Corollary 4.11. — For any a ∈ Burnm(k) and any integer n, we have
773
+ ∂m+n(a · Tn) =
774
+
775
+ ∂m(a) · Tn
776
+ if n is even;
777
+ −∂m(a) · Tn + a · ∂n(Tn)
778
+ if n is odd.
779
+ Remark 4.12. — For the variant of Burn(k) where we consider forms up to sign,
780
+ the formula of theorem 4.10 simplifies to
781
+ ∂m+n(a · b) = ∂m(a) · b + a · ∂n(b) − T · ∂m(a) · ∂n(b).
782
+
783
+ 16
784
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
785
+ 5. A complex of Burnside rings
786
+ Theorem 5.1. — For any integer n ⩾ 2, we have
787
+ ∂n−1 ◦ ∂n = 0.
788
+ In other words, the residue morphisms of Burnside groups give rise to a complex
789
+ · · · → Burnn(k) → Burnn−1(k) → · · · → Burn1(k) → Burn0(k)
790
+ Proof. — It suffices to prove the following result:
791
+ Let (X, ω) be an integral
792
+ proper smooth variety of dimension n equipped with a meromorphic volume
793
+ form ω whose polar divisor has strict normal crossings and no multiplicities; then
794
+ ∂n−1(∂n([X, ω])) = 0.
795
+ Let (Dα)α∈A be the family of irreducible components of the polar divisor of ω
796
+ in X. By definition, one has
797
+ ∂n([X, ω]) =
798
+
799
+ ∅̸=A⊆A
800
+ (−1)|A|−1ρDA(X, ω).
801
+ Fix a total order on A . Let (α1, . . . , αm) be a strictly increasing sequence in A
802
+ and let A = {α1, . . . , αm}. We have seen in §4.5 that ρDA(X, ω) can be defined via
803
+ iterated residue maps:
804
+ ρDA([X, ω]) = [DA, ρDα1 ◦ · · · ◦ ρDαm(ω)] · T|A|−1 = [DA, ωA] · T|A|−1
805
+ where we wrote ωA for the composition ρDα1 ◦ · · · ◦ ρDαm(ω). When |A| is odd, we
806
+ have
807
+ ∂(ρDA([X, ω])) = ∂([DA, ωA]) · T|A|−1,
808
+ while when |A| is even, we have
809
+ ∂(ρDA([X, ω])) = −∂([DA, ωA]) · Ta−1 + [DA, ωA] · ∂(T|A|−1).
810
+ Consequently, we have
811
+ ∂ ◦ ∂([X, ω]) =
812
+
813
+ ∅̸=A⊆A
814
+ ∂([DA, ωA]) · T|A|−1 −
815
+
816
+ ∅̸=A⊆A
817
+ |A| even
818
+ [DA, ωA] · ∂(T|A|−1).
819
+ The polar divisor of the form ωA on DA is equal to �
820
+ β̸∈A Dβ ∩ DA, so that, by
821
+ definition (and computation of ∂ via iterated residues),
822
+ ∂([DA, ωA]) =
823
+
824
+ ∅̸=B⊆∁A
825
+ (−1)|B|−1[DAB, ωA∪B] · T|B|−1.
826
+ Also, when A is nonempty and of even cardinality, ∂(T|A|−1) = 2T|A|−2. When we
827
+ put these two formulas into the antepenultimate one and collect the various terms,
828
+ we obtain
829
+ ∂ ◦ ∂([X, ω]) =
830
+
831
+ C⊆A
832
+ 2⩽|C|
833
+ nC[DC, ωC] · T|C|−2,
834
+
835
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
836
+ 17
837
+ where
838
+ nC = −
839
+
840
+ ∅̸=A,B
841
+ A∪B=C,A∩B=∅
842
+ (−1)|B| − 2δ|C| is even.
843
+ In the first sum, the terms A = ∅ or B = ∅ are omitted, while if we put them in, we
844
+ obtain
845
+
846
+ A∪B=C
847
+ A∩B=∅
848
+ (−1)|B| =
849
+ |C|
850
+
851
+ b=0
852
+ �|C|
853
+ b
854
+
855
+ (−1)b = (1 − 1)|C| = 0
856
+ since |C| ⩾ 1. Consequently,
857
+ nC = 1 + (−1)|C| − 2δ|C| is even = 0.
858
+ This concludes the proof.
859
+ 6. Algebraic structure of Burn(k) after localization at 2
860
+ In this section, we study the algebraic structure of the Burnside ring Burn(k),
861
+ endowed with its elements ε, T and the operator ∂.
862
+ 6.1. — By construction, Burn(k) = �
863
+ n⩾0 Burnn(k) is an associative unital Z⩾0-
864
+ graded ring, ε ∈ Burn0(k), T ∈ Burn1(k) and ∂ is a homogeneous additive map
865
+ of degree −1. They satisfy the following relations, for homogeneous elements a, b ∈
866
+ Burn(k):
867
+ b · a = ε|a||b| · a · b
868
+ (§3.6);
869
+ (1)
870
+ ε2 = 1
871
+ (example 3.4);
872
+ (2)
873
+ T = ε · T
874
+ (example 3.5);
875
+ (3)
876
+ ∂(T) = 1 + ε
877
+ (example 4.8);
878
+ (4)
879
+ ∂(a · b) = ε|b| · ∂(a) · b + a · ∂(b) − T · ∂(a) · ∂(b)
880
+ (theorem 4.10);
881
+ (5)
882
+ ∂(∂(a)) = 0
883
+ (theorem 5.1).
884
+ (6)
885
+ By (1), the element ε is central, and by (2), we may view Burn(k) as an algebra over
886
+ Z[ε]/(ε2 − 1). After inverting 2, the algebra Burn(k) splits into two components
887
+ Burnε=1(k) and Burnε=−1(k), one over which ε = 1, and the other over which
888
+ ε = −1.
889
+ In the rest of this section, we implicitly assume that 2 is inverted, without changing
890
+ the notation.
891
+
892
+ 18
893
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
894
+ 6.2. Sector ε = −1. — Here, we have T = −T, hence T = 0 since 2 is invertible.
895
+ As a consequence, after replacing ∂ with ∂′ : a �→ (−1)1+|a|∂(a), one gets from (5)
896
+ the usual graded Leibniz rule
897
+ ∂′(a · b) = ∂′(a) · b + (−1)|a|a · ∂′(b)
898
+ and therefore Burnε=−1(k) is a classical differential graded (super-)commutative
899
+ algebra, similar to, eg, the de Rham complex.
900
+ 6.3. Sector ε = 1. — The algebra Burnε=1 is now commutative (and not graded
901
+ commutative). This reflects the intuition in our constructions that they speak about
902
+ volume forms (as opposed to top-degree differential forms) for which we have com-
903
+ mutativity (as reflected by the change of order of integration in multiple integrals).
904
+ Lemma 6.4. — The map F: a �→ a − T �� ∂(a) is a ring endomorphism of
905
+ Burnε=1(k), and F2 = id. Moreover, one has F ◦ ∂ = ∂ = −∂ ◦ F.
906
+ Proof. — This map is additive. One has F(1) = 1 − T · ∂(1) = 1. Let us show
907
+ multiplicativity. Indeed, for a, b ∈ Burnε=1(k), one has
908
+ F(a) · F(b) = (a − T · ∂(a)) · (b − T · ∂(b))
909
+ = a · b − T · ∂(a) · b − T · a · ∂(b) + T2 · ∂(a) · ∂(b)
910
+ = a · b − T · (∂(a) · b + a · ∂(b) − T · ∂(a) · ∂(b))
911
+ = a · b − T · ∂(a · b)
912
+ (using (5))
913
+ = F(a · b).
914
+ Since ∂2 = 0, one has
915
+ F(∂(a)) = ∂(a) − T · ∂(∂(a)) = ∂(a).
916
+ On the other hand,
917
+ ∂(F(a)) = ∂(a − T · ∂(a))
918
+ = ∂(a) − ∂(T · ∂(a))
919
+ = ∂(a) − ∂(T) · ∂(a) − T · ∂(∂(a)) + T · ∂(T) · ∂(∂(a))
920
+ = −∂(a)
921
+ using that ∂(T) = 2 and ∂2 = 0.
922
+ Consequently, for a ∈ Burnε=1(k), we have
923
+ F2(a) = F(a) − T · ∂(F(a)) = a − T · ∂(a) + T · ∂(a) = a
924
+ since ∂ ◦ F = −∂.
925
+
926
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
927
+ 19
928
+ 6.5. — To simplify the notation, write B = Burnε=1(k). Since F2 = id and 2 is
929
+ invertible, the algebra B splits as a direct sum
930
+ B = B+ ⊕ B−,
931
+ such that F acts as id on B+ and as − id on B−. Moreover, B+ is a subalgebra.
932
+ Since the operator ∂ anticommutes with F, it induces maps
933
+ ∂± : B+ → B−,
934
+ ∂∓ : B− → B+.
935
+ Note that
936
+ F(T) = T − T · ∂(T) = −T,
937
+ so that T ∈ B−. Consequently, the multiplication by T map induces two maps
938
+ t± : B+ → B−,
939
+ t∓ : B− → B+.
940
+ Lemma 6.6. — The map ∂ vanishes on B+. Equivalently, ∂± = 0.
941
+ The maps 1
942
+ 2∂∓ and t± are inverses the one of the other.
943
+ Proof. — For a ∈ B+, one has ∂(a) = −∂(F(a)) = −∂(a), since ∂ ◦ F = −∂, hence
944
+ ∂(a) = 0.
945
+ On the other hand, for a ∈ B+, one has
946
+ ∂(T · a) = 2 · a + T · ∂(a) − 2T · ∂(a) = 2a − T · ∂(a) = a + F(a) = 2a
947
+ while for a ∈ B−, we have
948
+ T · ∂(a) = a − F(a) = 2a.
949
+ This concludes the proof of the lemma.
950
+ In particular, we see that the cohomology of the differential ∂ vanishes in the
951
+ sector Burnε=1(k) = B.
952
+ 6.7. — It follows from the lemma that we have a ring isomorphism
953
+ B = B+[t](t2 − T2),
954
+ from which we see that all the algebraic structure of B+ (namely δ, T, F) can be
955
+ canonically reconstructed from a unital commutative associative Z⩾0-graded ring B+
956
+ endowed with an element in degree +2 (namely, the element T2).
957
+ Remark 6.8. — The situation clarifies even more if we invert the class T. Then
958
+ we can write ∂(a) = (a − F(a))/T, and all relations happen to follow from the fact
959
+ that F is an involution such that F(T) = −1. Indeed,
960
+ ∂2(a) = ∂(a) − F(∂(a))
961
+ T
962
+ = 1
963
+ T
964
+ �a − ∂(a)
965
+ T
966
+ − F(a − ∂(a)
967
+ T
968
+
969
+ = 0
970
+
971
+ 20
972
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
973
+ explains that ∂2 = 0. Moreover, for a, b ∈ B, we have
974
+ ∂(a · b) = a · b − F(a · b)
975
+ T
976
+ = a · b − F(a) · F(b)
977
+ T
978
+ = a − F(a)
979
+ T
980
+ · b + a · b − F(b)
981
+ T
982
+ − T · a − F(a)
983
+ T
984
+ · b − F(b)
985
+ T
986
+ = ∂(a) · b + a · ∂(b) − T · ∂(a) · ∂(b).
987
+ 7. Birational morphisms preserving volume forms
988
+ 7.1. — Let (X, ωX) be a smooth integral k-variety of dimension n equipped with
989
+ a meromorphic form with poles of order at most one on X and let f : Y → X be a
990
+ proper birational morphism.
991
+ Let E be an exceptional divisor in Y, that is, such that dim(f(E)) < dim(E).
992
+ Then the Jacobian of p vanishes along E. Since ω has poles of order at most one
993
+ on X, the meromorphic form f ∗ω on Y is regular at the generic point of E; its
994
+ restriction to E is a meromorphic form with poles of order at most one and we may
995
+ consider the class [E, f ∗ωX|E] in Burnn−1(k).
996
+ We define c(f; X, ω) to be the sum of all such classes [E, f ∗ω|E] in the free abelian
997
+ group Burnn−1(k).
998
+ Lemma 7.2. — Let g : Z → Y be a proper birational morphism of smooth integral
999
+ varieties of dimension n. Then g ◦ f is a proper birational morphism and one has
1000
+ c(g ◦ f; X, ω) = c(g; Y, f ∗ω) + c(f; X, ω)
1001
+ in Burnn−1(k).
1002
+ Proof. — An integral divisor F in Z is exceptional for g ◦ f if and only if one of the
1003
+ two mutually excluding situations happen:
1004
+ – The divisor F is exceptional for g;
1005
+ – Or g(F) is a divisor in Y which is exceptional for f.
1006
+ Moreover, any divisor E in Y which is exceptional for f appears once and only as
1007
+ a divisor of the form g(F). In the first case, F contributes to c(g ◦ f; X, ω) by a
1008
+ term [F, (g ◦ f)∗ω|F], and it contributes to c(g; Y, f ∗ω) by precisely the same term.
1009
+ In the second case, F contributes to c(g ◦ f; X, ω) by a term [F, g∗(f ∗ω|E)], while E
1010
+ contributes to c(f; X, ω) by the term [E, f ∗ω|E]. Since g is birational around the
1011
+ generic point of E, they coincide, and this concludes the proof.
1012
+ 7.3. — Let (X, ωX) and (Y, ωY) be proper smooth k-varieties equipped with loga-
1013
+ rithmic volume forms and let
1014
+ ϕ: (X, ωX) ��� (Y, ωY)
1015
+
1016
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
1017
+ 21
1018
+ be a birational map preserving the volume forms. By definition, this means that
1019
+ there exists a diagram
1020
+ W
1021
+ X
1022
+ Y
1023
+
1024
+
1025
+ p
1026
+
1027
+
1028
+ q
1029
+
1030
+
1031
+ ϕ
1032
+ of integral k-varieties such that that p and q are proper and birational, and such
1033
+ that p∗ω = q∗ω′ on W. In this situation, we may assume that W is smooth.
1034
+ Lemma 7.4. — With this notation, the element
1035
+ c(ϕ) = c(q) − c(p) ∈ Burnn−1(k)
1036
+ only depends on the birational map ϕ, and not on the choice of the triple (W, p, q).
1037
+ Proof. — Consider two possible diagrams X
1038
+ p←− V
1039
+ q−→ Y and X
1040
+ r←− W
1041
+ s−→ Y describ-
1042
+ ing ϕ. Considering for example a resolution of singularities U of V ×X W, we can fit
1043
+ these two diagrams in a common commutative diagram of the following form:
1044
+ U
1045
+ V
1046
+ W
1047
+ X
1048
+ Y
1049
+
1050
+
1051
+ u
1052
+
1053
+
1054
+ v
1055
+
1056
+
1057
+ p
1058
+
1059
+
1060
+ q
1061
+
1062
+
1063
+ r
1064
+
1065
+
1066
+ s
1067
+
1068
+
1069
+ ϕ
1070
+ The equalities p∗ωX = q∗ωY and r∗ωX = s∗ωY imply that
1071
+ (p ◦ u)∗ωX = u∗p∗ωX = u∗q∗ωY = (q ◦ u)∗ωY = (s ◦ v)∗ωY.
1072
+ By lemma 7.2, we then have
1073
+ c(p) − c(q) = c(p ◦ u) − c(q ◦ u) = c(r ◦ v) − c(s ◦ v) = c(r) − c(s).
1074
+ This concludes the proof.
1075
+ Theorem 7.5. — If ψ: (Y, ωY) ��� (Z, ωZ) is another birational map preserving
1076
+ volume forms, then one has
1077
+ c(ψ ◦ ϕ) = c(ψ) + c(ψ).
1078
+ Proof. — Consider two diagrams X
1079
+ p←− V
1080
+ q−→ Y and Y
1081
+ r←− W
1082
+ s−→ Y describing ϕ
1083
+ and ϕ. Considering for example a resolution of singularities U of V ×Y W, we can
1084
+
1085
+ 22
1086
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
1087
+ fit these two diagrams in a common commutative diagram of the following form:
1088
+ U
1089
+ V
1090
+ W
1091
+ X
1092
+ Y
1093
+ Z
1094
+
1095
+
1096
+ u
1097
+
1098
+
1099
+ v
1100
+
1101
+
1102
+ p
1103
+
1104
+
1105
+ q
1106
+
1107
+
1108
+ r
1109
+
1110
+
1111
+ s
1112
+
1113
+
1114
+ ϕ
1115
+
1116
+
1117
+ ψ
1118
+ and the diagram X
1119
+ p◦u
1120
+ ←−− U
1121
+ s◦v
1122
+ −−→ describes the birational map ψ◦ϕ. Since q◦u = r◦v,
1123
+ we then have
1124
+ c(ψ ◦ ϕ) = c(p ◦ u) − c(s ◦ v)
1125
+ = c(p ◦ u) − c(q ◦ u) + c(r ◦ v) − c(s ◦ v)
1126
+ = c(p) − c(q) + +c(r) − c(s)
1127
+ = c(ϕ) + c(ψ),
1128
+ as was to be shown.
1129
+ Corollary 7.6. — Let Bir(X, ω) be the set of birational automorphisms of X pre-
1130
+ serving ω. The map c induces a homomorphism of abelian groups
1131
+ Bir(X, ω) → Burnn−1(k).
1132
+ Its kernel contains the group of automorphisms of X that preserve ω.
1133
+ 8. Specialization
1134
+ Let K be the field of fractions of a discrete valuation ring R with residue field k.
1135
+ Fix a uniformizer t ∈ R.
1136
+ In this context, Kontsevich & Tschinkel (2019) have defined two (distinct)
1137
+ specialization morphisms
1138
+ ρt : Burnn(K) → Burnn(k),
1139
+ relating the Burnside groups of K and k (see 3.1), one of which is a ring homo-
1140
+ morphism.
1141
+ (The latter homomorphism actually depends on the choice of t, see
1142
+ example 6.2 of (Kresch & Tschinkel, 2022b).)
1143
+ The goal of this section is to define a similar homomorphism
1144
+ ρt : Burn(K) → Burn(k)
1145
+ for varieties with logarithmic volume forms.
1146
+
1147
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
1148
+ 23
1149
+ 8.1. — Let X be an integral proper scheme over R, of relative dimension n, whose
1150
+ special fiber ∆ is a divisor with strict normal crossings.
1151
+ Let (∆α)α∈A be the family of irreducible components of the special fiber ∆; for
1152
+ α ∈ A , let eα be the multiplicity of ∆α in ∆. For every nonempty subset A of A ,
1153
+ let ∆A be the intersection of all divisors ∆α, for α ∈ A and eA be the greatest
1154
+ common divisor of the eα, for α ∈ A; let also ∆◦
1155
+ A be the complement ∆A
1156
+
1157
+ α̸∈A ∆α.
1158
+ The first specialization morphism of (Kontsevich & Tschinkel, 2019) is de-
1159
+ fined by
1160
+ (8.2)
1161
+ ρt([XK]) =
1162
+
1163
+ ∅̸=A⊆A
1164
+ (−1)|A|−1[∆A]L|A|−1,
1165
+ where L ∈ Burn(k) is the class of the affine line.
1166
+ Although this map is not multiplicative, it proved sufficient for many applications
1167
+ to rationality problems.
1168
+ To ensure multiplicativity, a more delicate construction was necessary, valued in
1169
+ the Burnside ring
1170
+ Burn�µ(k)
1171
+ of varieties endowed with an action of the profinite group �µ, limit of finite groups of
1172
+ roots of unity.
1173
+ Fix a nonempty subset A of A . We identify the normal bundle of ∆A in X as a
1174
+ direct sum of line bundles:
1175
+ N∆A(X ) ≃
1176
+
1177
+ α∈A
1178
+ N∆α(X )|∆A.
1179
+ Let us consider its open subscheme N ◦
1180
+ ∆A(X ) obtained by restricting to ∆◦
1181
+ A and
1182
+ taking out all “coordinate” hyperplanes. This furnishes a morphism
1183
+ νA : N ◦
1184
+ ∆A(X ) →
1185
+
1186
+ α∈A
1187
+ N∆α(X )⊗eα|∆◦
1188
+ A.
1189
+ Since the uniformizer t has divisor − �
1190
+ α∈A eα∆α on X , it trivializes the line bundle
1191
+ on the target of νA. We set ∆′
1192
+ A = ν−1
1193
+ A (t). By construction, the projection ∆′
1194
+ A → ∆A
1195
+ is a torsor with group µeA.
1196
+ With this notation, the correct, multiplicative, specialization map of (Kontsevich & Tschinkel,
1197
+ 2019) is given by the formula
1198
+ �ρt(X) =
1199
+
1200
+ ∅̸=A⊆A
1201
+ (−1)|A|−1[∆′
1202
+ A]L|A|−1
1203
+ in Burn�µ(k).
1204
+ Remark 8.3. — The relation between the two specialization morphisms is as fol-
1205
+ lows. Fix a nonempty subset A of A . The group Gm acts diagonally on N ◦
1206
+ ∆A(X )
1207
+ (the factors of index α /∈ A don’t act), and this induces an action of the finite group
1208
+ of roots of unity of order eA on ∆′
1209
+ A, hence an action of �µ, so that �ρt(X) naturally
1210
+ lives in the equivariant Burnside ring Burn�µ(k). Moreover, taking the �µ-invariants
1211
+
1212
+ 24
1213
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
1214
+ of ∆′
1215
+ A, we get ∆◦
1216
+ A, so that the specialization map ρt is the composition of �ρt with
1217
+ the map
1218
+ Burn�µ(k) → Burn(k)
1219
+ obtained by taking �µ-invariants.
1220
+ Taking invariants does not commute with taking products, in general, so that ρt
1221
+ is not multiplicative.
1222
+ 8.4. — Let us explain how to define analogous specialization homomorphisms in
1223
+ our context of Burnside groups with volume forms.
1224
+ For simplicity, we only consider the case where K has transcendence degree 1
1225
+ over k, in which case the idea can be explained geometrically as follows. We assume
1226
+ that there exists an smooth integral curve C together with a k-point o ∈ C(k) such
1227
+ that K = k(C) and R = OC,o. We fix a local parameter t ∈ R such that V(t) = o.
1228
+ Let us consider a pair (X, ω) consisting of an integral proper K-variety X of di-
1229
+ mension n and a logarithmic n-form ω on X.
1230
+ 8.5. — Consider a regular flat proper model X is of X over C, let ∆ = (Xo)red
1231
+ be its reduced special fiber, and consider a divisor D with relative normal cross-
1232
+ ings on X .
1233
+ We assume that the divisor D + ∆ has normal crossings.
1234
+ In this
1235
+ situation, Deligne (1970, §3.3.2) says that a meromorphic relative differential m-
1236
+ form on X /C is logarithmic with respect to D + ∆ if it is (locally) the image of
1237
+ a logarithmic m-form ˜ω in Ωm
1238
+ X /k with poles D + ∆ under the natural morphism
1239
+ Ωm
1240
+ X /k → Ωm
1241
+ X /C.
1242
+ Consider a logarithmic relative n-form ω on X /C. We consider an associated
1243
+ volume form ω′ on X , defined locally by
1244
+ ω′ = ˜ω ∧ dt/t,
1245
+ where ˜ω is any local lift of ω. This form ω′ is logarithmic and we can compute its
1246
+ “residue along ∆” as in §4, only taking into account the strata of the polar divisor
1247
+ of ω′ which are contained in the special fiber ∆.
1248
+ There exists a subset Ao of A and a subset Bo of B such that the polar divisor
1249
+ of ω′ is given by
1250
+
1251
+ α∈Ao
1252
+ ∆α +
1253
+
1254
+ β∈Bo
1255
+ Dβ.
1256
+ We thus set
1257
+ ρt(X , ω) =
1258
+
1259
+ ∅̸=A⊆Ao
1260
+ B⊆Bo
1261
+ (−1)|A|+|B|−1ρ∆A∩DB(X , ω).
1262
+ This is an element of Burnn(Xo/k).
1263
+ Proposition 8.6. — Let Y be an irreducible closed subscheme of X which is
1264
+ transverse to D + ∆ and let g : X ′ → X be the blowing-up of X along Y . The
1265
+ form g∗ω on X ′ is logarithmic and we have
1266
+ g∗ρt(X ′, g∗ω) = ρt(X , ω)
1267
+
1268
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
1269
+ 25
1270
+ in Burnn(Xo/k).
1271
+ Proof. — With the notation of §4, the difference
1272
+ ρ(X , ˜ω) − ρt(X , ω)
1273
+ is exactly the part of ρ(X , ˜ω) which lies over the complement of the special fiber Xo
1274
+ in X . We have seen in theorem 4.7 that
1275
+ g∗ρ(X ′, ˜ω′) = ρ(X , ω),
1276
+ and a similar formula holds over X
1277
+ Xo. This implies the proposition.
1278
+ 8.7. — Starting from a smooth proper K-variety X and a logarithmic volume
1279
+ form ω on X, we can define a model X /C, with D and ∆ as above, but the form ω
1280
+ will not necessarily extend to a logarithmic relative form with respect to D +∆, nor
1281
+ does the volume form ˜ω on X . However, this can be achieved by multiplying ω by
1282
+ a suitable power of the uniformizing element.
1283
+ Let us write the polar divisor of ˜ω on X as
1284
+ divX (˜ω) = D + ∆ =
1285
+
1286
+ α∈A
1287
+ dα∆α +
1288
+
1289
+ β∈B
1290
+ dβDβ.
1291
+ With this notation, the condition for ˜ω to be logarithmic on X is just that
1292
+ dα ⩾ −1,
1293
+ dβ ⩾ −1.
1294
+ In particular, while the conditions at the horizontal components follow from their
1295
+ counterparts on the generic fiber, those for the vertical components are not auto-
1296
+ matic. On the other hand, for any κ ∈ Z, the form tκ˜ω is logarithmic if and only
1297
+ if
1298
+ κeα + dα ⩾ −1
1299
+ for all α ∈ A , that is, if and only if κ ⩾ κ(ω), where κ(ω) is defined by
1300
+ κ(ω) = inf
1301
+ α∈A
1302
+ 1 − dα
1303
+
1304
+ .
1305
+ Since the rational number κ(ω) is defined in terms of logarithmic forms, it only
1306
+ depends on the class of (X, ω) in Burnn(K), and not on the actual model which is
1307
+ chosen to compute it.
1308
+ 8.8. — We assume for the moment that κ(ω) ∈ Z. This holds in particular if the
1309
+ special fiber Xo is reduced. Let then Ao be the subset of A consisting of all α such
1310
+ that
1311
+ κ(ω)eα + dα = −1,
1312
+ and let Bo be the subset of B consisting of all β such that dβ = −1. The polar
1313
+ divisor of tκ˜ω is equal to
1314
+
1315
+ α∈Ao
1316
+ ∆α +
1317
+
1318
+ β∈Bo
1319
+ Dβ,
1320
+
1321
+ 26
1322
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
1323
+ and we set
1324
+ ρt(X , ω) = ρt(X , tκ(ω)ω)
1325
+ in Burnn(Xo/k).
1326
+ In the particular case where D is empty, the strata of the Clemens complex of
1327
+ the special fiber that actually appear in the definition of this class are those defined
1328
+ by Kontsevich & Soibelman (2006), more precisely, by the adjustment provided
1329
+ by Mustaţă & Nicaise (2015).
1330
+ 8.9. — In the general case, the rational number κ(ω) is not an integer. Let us
1331
+ consider the finite ramified extension Kd = K(t1/d) of K, whose ramification index d
1332
+ is a multiple of the denominator of κ(ω), but which induces an isomorphism on
1333
+ the residue field. Geometrically, this furnishes a morphism π: Cd → C which is
1334
+ ramified at the point o, together with a lift of o in Cd(k) (still denoted by o), and a
1335
+ distinguished uniformizing element t1/d.
1336
+ We consider the extension of (X, ω) to Kd and introduce a model (Xd, ωd) as
1337
+ above, over Cd. Now, the corresponding κ-parameter is integral, so that any choice
1338
+ of a uniformizing element t1/d in Rd induces a class ρt1/d(Xd, ωd) in Burn(k). In
1339
+ fact, we can assume that the scheme Xd carries an action of the group scheme µd of
1340
+ dth roots of unity induced by its action on Spec(Rd), leaving the logarithmic form ωd
1341
+ invariant. In other words, we obtain a class in the group Burn�µ(k).
1342
+ Combinining these classes, we obtain the desired group homomorphism
1343
+ �ρt : Burn(K) → Burn�µ(k).
1344
+ In fact, as explained in (Nicaise, 2013, §2.3), especially proposition 2.3.2, one
1345
+ can compute the normalisation of X ⊗ Rd in terms of the given model X . This
1346
+ gives an explicit decomposition of �ρt(X, ω) as a sum
1347
+
1348
+ ∅̸=A⊆Ao
1349
+ (−1)|A|−1[D′
1350
+ A, ν∗
1351
+ AωA] · T|A|−1,
1352
+ where νA : D′
1353
+ A → DA is the µdA-torsor introduced in §8.1 for the definition of the
1354
+ classical specialization map.
1355
+ Remark 8.10. — In the case of specialization of rationality, it has proved fruitful
1356
+ to consider models with singularities on the special fiber, mild enough so that the
1357
+ special fiber computes the specialization of the birational type of the generic fiber.
1358
+ This is in particular the case for rational double points.
1359
+ A parallel study can be developped in the context of varieties with logarithmic
1360
+ forms.
1361
+ Following (Kontsevich & Tschinkel, 2019) and keeping track of the various
1362
+ logarithmic volume forms on the strata, we have:
1363
+ Theorem 8.11. — The morphism �ρt is a ring homomorphism.
1364
+
1365
+ BURNSIDE RINGS AND VOLUME FORMS WITH LOGARITHMIC POLES
1366
+ 27
1367
+ References
1368
+ D. Abramovich, K. Karu, K. Matsuki & J. Włodarczyk (2002), “Torifica-
1369
+ tion and factorization of birational maps”. Journal of the American Mathematical
1370
+ Society, 15 (3), pp. 531–572 (electronic).
1371
+ S. Boucksom & M. Jonsson (2017), “Tropical and non-Archimedean limits of
1372
+ degenerating families of volume forms”. Journal de l’École polytechnique - Math-
1373
+ ématiques, 4, pp. 87–139.
1374
+ A. Chambert-Loir & Yu. Tschinkel (2010), “Igusa integrals and volume asymp-
1375
+ totics in analytic and adelic geometry”. Confluentes Mathematici, 2, pp. 351–429.
1376
+ P. Deligne (1970), Equations différentielles à points singuliers réguliers, Lect.
1377
+ Notes Math. 163, Springer, Cham.
1378
+ S. Gorchinskiy & A. Rosly (2015), “A Polar Complex for Locally Free Sheaves”.
1379
+ International Mathematics Research Notices, 2015 (10), pp. 2784–2829.
1380
+ H. Hironaka (1964), “Resolution of singularities of an algebraic variety over a
1381
+ field of characteristic zero. I, II”. Annals of Mathematics. Second Series, 79, pp.
1382
+ 109–203, 205–326.
1383
+ M. Jonsson & J. Nicaise (2020), “Convergence of p-adic pluricanonical measures
1384
+ to Lebesgue measures on skeleta in Berkovich spaces”. Journal de l’École poly-
1385
+ technique — Mathématiques, 7, pp. 287–336.
1386
+ B. Khesin & A. Rosly (2003), “Polar Homology”. Canadian Journal of Mathe-
1387
+ matics, 55 (5), pp. 1100–1120.
1388
+ B. Khesin, A. Rosly & R. Thomas (2004), “A polar de Rham theorem”. Topology,
1389
+ 43 (5), pp. 1231–1246.
1390
+ M. Kontsevich & Y. Soibelman (2006), “Affine structures and non-Archimedean
1391
+ analytic spaces”. The Unity of Mathematics, Progr. Math. 244, pp. 321–385,
1392
+ Birkhäuser Boston, Boston, MA.
1393
+ M. Kontsevich & Y. Tschinkel (2019), “Specialization of birational types”.
1394
+ Inventiones mathematicae, 217 (2), pp. 415–432.
1395
+ A. Kresch & Y. Tschinkel (2022a), “Burnside groups and orbifold invariants of
1396
+ birational maps”. arXiv:2208.05835.
1397
+ A. Kresch & Y. Tschinkel (2022b), “Equivariant birational types and Burnside
1398
+ volume”. Annali Scuola Normale Superiore - Classe Di Scienze, 23 (2), pp. 1013–
1399
+ 1052.
1400
+ H.-Y. Lin & E. Shinder (2022), “Motivic invariants of birational maps”.
1401
+ arXiv:2207.07389.
1402
+ H.-Y. Lin, E. Shinder & S. Zimmermann (2020), “Factorization centers in di-
1403
+ mension two and the Grothendieck ring of varieties”. arXiv:2012.04806.
1404
+ M. Mustaţă & J. Nicaise (2015), “Weight functions on non-Archimedean analytic
1405
+ spaces and the Kontsevich–Soibelman skeleton”. Algebraic Geometry, 2 (3), pp.
1406
+ 365–404.
1407
+ J. Nicaise (2013), “Geometric criteria for tame ramification”. Mathematische
1408
+ Zeitschrift, 273 (3-4), pp. 839–868.
1409
+
1410
+ 28
1411
+ ANTOINE CHAMBERT-LOIR, MAXIM KONTSEVICH & YURI TSCHINKEL
1412
+ J. Nicaise & E. Shinder (2019), “The motivic nearby fiber and degeneration of
1413
+ stable rationality”. Inventiones mathematicae, 217 (2), pp. 377–413.
1414
+ J. Nicaise & C. Xu (2016), “The essential skeleton of a degeneration of algebraic
1415
+ varieties”. American Journal of Mathematics, 138 (6), pp. 1645–1667.
1416
+ M. Rost (1996), “Chow Groups with Coefficients”. Documenta Mathematica,
1417
+ 1 (16), pp. 319–393.
1418
+
GtE1T4oBgHgl3EQfFQMH/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
H9E4T4oBgHgl3EQfIAys/content/tmp_files/2301.04909v1.pdf.txt ADDED
@@ -0,0 +1,1008 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SIMPLE LYAPUNOV SPECTRUM FOR LINEAR HOMOGENEOUS
2
+ DIFFERENTIAL EQUATIONS WITH Lp PARAMETERS
3
+ DINIS AMARO, MÁRIO BESSA, AND HELDER VILARINHO
4
+ Abstract. In the present paper we prove that densely, with respect to an Lp-like
5
+ topology, the Lyapunov exponents associated to linear continuous-time cocycles
6
+ Φ : R× M → GL(2, R) induced by second order linear homogeneous differential
7
+ equations ¨x + α(ϕt(ω))˙x + β(ϕt(ω))x = 0 are almost everywhere distinct. The
8
+ coefficients α, β evolve along the ϕt-orbit for ω ∈ M and ϕt : M → M is an
9
+ ergodic flow defined on a probability space. We also obtain the corresponding
10
+ version for the frictionless equation ¨x + β(ϕt(ω))x = 0 and for a Schrödinger
11
+ equation ¨x + (E − Q(ϕt(ω)))x = 0, inducing a cocycle Φ : R × M → SL(2, R).
12
+ Keywords: Linear cocycles; Linear differential systems; Multiplicative ergodic
13
+ theorem; Lyapunov exponents; second order linear homogeneous differential equa-
14
+ tions.
15
+ 2010 Mathematics Subject Classification: Primary: 34D08, 37H15, Secondary:
16
+ 34A30, 37A20.
17
+ 1. Introduction
18
+ 1.1. Non-autonomous linear differential equations. The behaviour of the Lya-
19
+ punov exponents which are determined by the asymptotic growth of the expression
20
+ log ∥Φt
21
+ A∥1/t where Φt
22
+ A is a matricial solution of the autonomous differential equa-
23
+ tion ˙U(t) = A · U(t) and A is a square matrix of the same order as U(t), is a simple
24
+ exercise of linear algebra. Standard linear algebraic computations allows us to de-
25
+ termine the Lyapunov spectrum which is defined by the Lyapunov exponents and
26
+ its eigendirections. The dynamics of a perturbed system like ˙U(t) = B·U(t), where
27
+ B is a perturbation of A, is a problem that is well understood (see e.g. [26]). A much
28
+ more complicated and interesting situation was considered in the pioneering works
29
+ of Lyapunov and intended to consider the non-autonomous case ˙U(t) = A(t) · U(t),
30
+ where A is a matrix depending continuously on t. Not only the asymptotic de-
31
+ meanor of log ∥Φt
32
+ A∥1/t as well as its stability proves to be a substantially more
33
+ difficult issue. A standard way of looking to non-autonomous linear differential
34
+ equations is to consider the language of linear cocycles (see §2.1 for full details)
35
+ where being non-autonomous is captured by a labelling through an orbit of a given
36
+ flow ϕt on a certain phase space.
37
+ 1.2. The quest for positive Lyapunov exponents. A positive (or negative) Lya-
38
+ punov exponent gives us the average exponential rate of divergence (or conver-
39
+ gence) of two neighboring trajectories whereas zero exponents give us the ab-
40
+ sence of any kind of exponential behavior.
41
+ Pesin’s theory guarantee a strong
42
+ stable/unstable manifold theory in the presence of non-zero Lyapunov exponents.
43
+ These geometric tools underlie much of the central results in today’s dynamical
44
+ Date: January 13, 2023.
45
+ 1
46
+ arXiv:2301.04909v1 [math.DS] 12 Jan 2023
47
+
48
+ systems. Consequently, there is no doubt that detecting non-zero Lyapunov expo-
49
+ nents is an important question in dynamics an issue dating back to the late six-
50
+ tiees and the work of Millionshchikov [28]. It the early eightees Cornelis and
51
+ Wojtkowski [11], and Ledrappier [25] obtained criteria for the positivity of the
52
+ Lyapunov exponents and in the nineties Knill [30] and Nerurkar [29] proved that
53
+ non-zero Lyapunov exponents are a C0-dense phenomena for certain cocycles. In
54
+ the late nineties Arnold and Cong [7] proved the Lp-denseness of positive Lya-
55
+ punov exponents and their strategy was widespread in [13] by two of the authors.
56
+ Using Moser-type methods based on the concept of rotation number allowed Fab-
57
+ bri and Johnson to obtain abundance of positive Lyapunov exponents for linear
58
+ differential systems evolving on SL(2, R) and based on a translation on the torus
59
+ (see [20, 21, 22] and also the work with Zampogni [23]). Clearly, finding a po-
60
+ sitive Lyapunov exponent in SL(2, R) immediately enable us to obtain a negative
61
+ Lyapunov exponent and thus the simplicity of the Lyapunov spectrum (i.e. all
62
+ Lyapunov exponents are different). Several results on the positivity of Lyapunov
63
+ exponents established in the last ten years or so bring up different new approaches
64
+ [17, 13, 34, 19, 14, 35]. As a paradigmatic example we recall [10] where Avila
65
+ obtained abundance of simple spectrum, on a quite large scope of topologies and
66
+ on the two dimensional case.
67
+ 1.3. Asymptotic behaviour of second order linear homogeneous differential
68
+ equations from Lyapunov’s viewpoint. It has been known for almost two cen-
69
+ turies that there are serious constraints when we try to apply analytic methods to
70
+ integrate most functions. Indeed, Liouville theory (see e.g [32]) explicitly describes
71
+ what kind of problems can arise when solving differential equations. The qualita-
72
+ tive theory of differential equations created by Poincaré and Lyapunov turn out to
73
+ be a clever approach to deal with this setback. Here we intend to analyze the as-
74
+ ymptotic behavior of the solutions of second order homogeneous linear differential
75
+ equations of the form
76
+ ¨x(t) + α(ϕt(ω))˙x(t) + β(ϕt(ω))x(t) = 0,
77
+ (1)
78
+ with coefficients α and β displaying Lp regularity, varying in time along the orbits
79
+ of a flow ϕt and allowing an Lp-small perturbation on the parameters. Namely, we
80
+ will describe its Lyapunov spectrum taking into account the possibility of making
81
+ a Lp-type perturbation on its coefficients. Instead of deal with a single equation
82
+ we will consider infinite equations simultaneously as explained now: we consider
83
+ a time-continuous cocycle based on an ergodic flow ϕt : M → M with respect to a
84
+ probability measure in M and with a dynamics on the fiber defined by a linear flow
85
+ Φt
86
+ A which is solution of the linear variational equation ˙U(ω, t) = A(ϕt(ω)) · U(ω, t)
87
+ with generator
88
+ A:
89
+ M
90
+ −→
91
+ R2×2
92
+ ω
93
+ �−→
94
+
95
+ 0
96
+ 1
97
+ −β(ω)
98
+ −α(ω)
99
+
100
+ (2)
101
+ Differential equations like (1) appear in large scale in physics, engineering, com-
102
+ plex biological systems and numerous applications of mathematics. The quintes-
103
+ sential example is the simple damped pendulum free from external forces where α
104
+ and β are functions depending on ω ∈ M evolving along a flow ϕt : M → M for
105
+ t ∈ R. When α and β are first integrals (i.e. functions that are constant along the
106
+ orbits of the flow ϕt) related with ϕt, then (1) can be solved by simple algorithms of
107
+ 2
108
+
109
+ an elementary course on differential equations. When the parameters vary in time,
110
+ explicit solutions could be hard to get. This is the case when the frictional force α
111
+ and the frequency of the oscillator β change over time which, we must admit, is the
112
+ most plausible to happen in nature. Notice that generators like A in (2) generate a
113
+ particular class of solutions. Clearly, when α � 0 the solutions evolve on a sub-
114
+ class of the general linear group GL(2, R) and when α = 0 the solutions evolve on
115
+ a subclass of the special linear group SL(2, R). Therefore, a specific study should
116
+ be made taking into consideration that perturbations must belong to our class and
117
+ not to the wider class of generators of cocycles evolving in GL(2, R) or even in
118
+ SL(2, R). Questions related to this particular class were treated in several works
119
+ like e.g. [8, 9, 12, 24, 27, 3].
120
+ Fixing position and momentum (x(0), ˙x(0)) we intend to study the asymptotic
121
+ behavior when t → ∞ of the pair (x(t), ˙x(t)) namely asymptotic exponential growth
122
+ rate given by the Lyapunov exponent. In the present work and broadly speaking we
123
+ intend to answer the following question:
124
+ Is it possible to perturb the coefficients α and β, in an Lp-topology,
125
+ in order to obtain two distinct Lyapunov exponents?
126
+ Of course that, when considering the autonomous case in (2), say α and β not
127
+ depending on ω previous question is easily answered. Indeed, consider Aβ in (2)
128
+ with α = 0, then A0 has a solution with trivial Lyapunov spectrum (a single Lya-
129
+ punov exponent equal to 0) but any Aβ with small β � 0 will produce a solution
130
+ with simple Lyapunov spectrum (two Lyapunov exponents equal to ± √β). The
131
+ difficulty increases significantly when we consider the non-autonomous case.
132
+ The precise concepts that allow an adequate formalisation to express the above
133
+ question will be presented in Theorem 1 and Corollaries 1 and 2.
134
+ 2. Definitions and statement of the results
135
+ 2.1. Linear cocycles. In this section we present some definitions that will be use-
136
+ ful in the sequel. Let (M, M, µ) be a probability space and let ϕ: R × M → M be a
137
+ metric dynamical system (or flow) in the sense that is a measurable map and
138
+ (1) ϕt : M → M given by ϕt(ω) = ϕ(t, ω) preserves the measure µ for all t ∈ R;
139
+ (2) ϕ0 = IdM and ϕt+s = ϕt ◦ ϕs for all t, s ∈ R.
140
+ Unless stated otherwise we will consider along the text that the flow is ergodic
141
+ in the usual sense that there exist no invariant sets except zero measure sets and
142
+ their complements. Let B(X) be the Borel σ-algebra of a topological space X.
143
+ A (continuous-time) linear random dynamical system (RDS) on (R2, B(R2)), or a
144
+ (continuous-time) linear cocycle, over ϕ is a (B(R) ⊗ M/B(GL(2, R))-measurable
145
+ map
146
+ Φ : R × M → GL(2, R)
147
+ such that the mappings Φ(t, ω) forms a cocycle over ϕ, i.e.,
148
+ (1) Φ(0, ω) = Id for all ω ∈ M;
149
+ (2) Φ(t + s, ω) = Φ(t, ϕs(ω)) ◦ Φ(s, ω), for all s, t ∈ R and ω ∈ M,
150
+ and t �→ Φ(t, ω) is continuous for all ω ∈ M. We recall that having ω �→ Φ(t, ω)
151
+ measurable for each t ∈ R and t �→ Φ(t, ω) continuous for all ω ∈ M implies that
152
+ Φ is measurable in the product measure space. These objects are also called linear
153
+ differential systems (LDS) in the literature.
154
+ 3
155
+
156
+ 2.2. Kinetic linear cocycles. We begin by considering as motivation the non-
157
+ autonomous linear differential equation which describes a motion of the damped
158
+ harmonic oscillator as the simple pendulum along the path (ϕt(ω))t∈R, with ω ∈ M
159
+ described by the flow ϕ. Let K ⊂ R2×2 be the set of matrices 2 × 2 of type
160
+ �0
161
+ 1
162
+ b
163
+ a
164
+
165
+ (3)
166
+ with a, b ∈ R. Denote by G the set of measurable applications A : M → R2×2
167
+ and by K ⊂ G the set of kinetic measurable applications A : M → K. As usual
168
+ we identify two applications on G that coincide on a µ full measure subset of M.
169
+ Consider measurable maps α: M → R and β: M → R. Take the differential
170
+ equation given in (1). Considering y(t) = ˙x(t) we may rewrite (1) as the following
171
+ vectorial first order linear system
172
+ ˙X = A(ϕt(ω)) · X,
173
+ (4)
174
+ where X = X(t) = (x(t), y(t))T = (x(t), ˙x(t))T and A ∈ K is given by (2). For all
175
+ 1 ≤ p < ∞ we define
176
+ Gp =
177
+
178
+ A ∈ G:
179
+
180
+ M
181
+ ∥A∥pdµ < ∞
182
+
183
+ ,
184
+ where ∥ · ∥ denotes de standard Euclidean matrix norm. It is clear that for all
185
+ 1 ≤ p < q < ∞ we have Gq ⊂ Gp. It follows from [5, Thm. 2.2.2] (see also
186
+ Lemma 2.2.5 and Example 2.2.8 in this reference) that if A ∈ G1 then it generates
187
+ a unique (up to indistinguishability) linear RDS ΦA satisfying
188
+ ΦA(t, ω) = Id +
189
+ � t
190
+ 0
191
+ A(ϕs(ω)) · ΦA(s, ω) ds.
192
+ (5)
193
+ The solution ΦA(t, ω) defined in (5) is called the Carathéodory solution or weak
194
+ solution. Given an initial condition X(0) = v ∈ R2, we say that t �→ ΦA(t, ω)v
195
+ solves or is a solution of (4), or that (4) generates ΦA(t, ω). Note that ΦA(0, ω)v = v
196
+ for all ω ∈ M and v ∈ R2. If the solution (5) is differentiable in time (i.e. with
197
+ respect to t) and satisfies for all t
198
+ d
199
+ dtΦA(t, ω)v = A(ϕt(ω)) · ΦA(t, ω)v
200
+ and
201
+ ΦA(0, ω)v = v,
202
+ (6)
203
+ then it is called a classical solution of (4). Of course that t �→ ΦA(t, ω)v is con-
204
+ tinuous for all ω and v. Due to (6) we call A : M → K a (kinetic) ‘infinitesimal
205
+ generator’ of ΦA. Sometimes, due to the relation between A and ΦA, we refer
206
+ to both A and ΦA as a kinetic linear cocyle/RDS/LDS. If (4) has initial condition
207
+ X(0) = v then ΦA(0, ω)v = v and X(t) = ΦA(t, ω)v.
208
+ Let K0 ⊂ K stand for the traceless kinetic cocycles derived from matrices as
209
+ in (3) but with a = 0. For 1 ≤ p < ∞ set K p = K ∩ Gp and K p
210
+ 0 = K0 ∩ Gp ⊂ K p.
211
+ 2.3. The Lp topology. We begin by defining an Lp-like topology generated by a
212
+ metric that compares the infinitesimal generators on G. Given 1 ≤ p < ∞ and
213
+ A, B ∈ G we set
214
+ ˆσp(A, B) :=
215
+ �����������
216
+ ��
217
+ M
218
+ ∥A(ω) − B(ω)∥p dµ(ω)
219
+ � 1
220
+ p
221
+ ,
222
+ ∞ if the above integral does not exists,
223
+ 4
224
+
225
+ and define
226
+ σp(A, B) :=
227
+ �������
228
+ ˆσp(A,B)
229
+ 1+ ˆσp(A,B),
230
+ if ˆσp(A, B) < ∞
231
+ 1,
232
+ if ˆσp(A, B) = ∞ .
233
+ Clearly, σp is a distance in G. It can be understood has a version of the Lp-distance.
234
+ Next topological content results were mainly proved in [3]. The remaining state-
235
+ ments follow straightforwardly.
236
+ Proposition 2.1. Consider 1 ≤ p < ∞. Then:
237
+ (i) σp(A, B) ≤ σq(A, B) for all 1 ≤ p ≤ q < ∞ and all A, B ∈ G.
238
+ (ii) If A ∈ G1 then sup0≤t≤1 log+ ∥ΦA(t, ω)±1∥ ∈ L1(µ).
239
+ (iii) If A ∈ Gp then for any B ∈ G satisfying σp(A, B) < p we have B ∈ Gp.
240
+ (iv) The sets (K p, σp) and (K p
241
+ 0 , σp) are closed, for all 1 ≤ p < ∞.
242
+ (v) For all 1 ≤ p < ∞, (K p, σp) and (K p
243
+ 0 , σp) are complete metric spaces
244
+ and, therefore Baire spaces.
245
+ Next results are elementary in measure theory nevertheless we will use it often.
246
+ They capture the whole idea of making huge perturbations on the uniform norm
247
+ but small perturbations in the σp-distance as long the support is small in measure.
248
+ Lemma 2.2. Let 1 ≤ p < ∞. Given A ∈ Gp and ϵ > 0 there exists δ > 0 such that
249
+ if F ∈ M and µ(F ) < δ, then
250
+
251
+ F ∥A(ω)∥p dµ(ω) < ϵ.
252
+ Proof. The proof is made by contradiction. Suppose that exists ϵ > 0 and Fn ∈ M,
253
+ for each n ∈ N, such that µ(Fn) < 1
254
+ 2n and
255
+
256
+ Fn
257
+ ∥A(ω)∥p dµ(ω) ≥ ϵ.
258
+ (7)
259
+ Letting F = lim supn Fn, by the Borel-Cantelli lemma µ(F ) = 0, and so
260
+
261
+ F
262
+ ∥A(ω)∥p dµ(ω) = 0.
263
+ (8)
264
+ The following leads to a contradiction:
265
+ ϵ
266
+ (7)
267
+
268
+ lim sup
269
+
270
+ Fn
271
+ ∥A(ω)∥p dµ(ω) = lim sup
272
+
273
+ ∥A(ω)∥pχFn(ω) dµ(ω)
274
+ ⋆≤
275
+
276
+ lim sup ∥A(ω)∥pχFn(ω) dµ(ω) =
277
+
278
+ ∥A(ω)∥pχF (ω) dµ(ω)
279
+ =
280
+
281
+ F
282
+ ∥A(ω)∥p dµ(ω)
283
+ (8)= 0,
284
+ where in ⋆ we used the reverse Fatou lemma.
285
+
286
+ Corollary 2.3. Let 1 ≤ p < ∞, A ∈ Gp and ϵ > 0 be given. Consider B ∈ Gp such
287
+ that A(ω) � B(ω) if and only if ω ∈ F for some F ∈ M (that is, B only differs from
288
+ A in F ). Then there exists δ > 0 such that if µ(F ) < δ we have σp(A, B) < ϵ.
289
+ Proof. Is is enough to prove that ˆσp(A, B) < ϵ. For that, apply Lemma 2.2 for
290
+ (A − B) ∈ Gp and ϵ p.
291
+
292
+ 5
293
+
294
+ 2.4. Statement of Theorem 1 and a tour on its proof. Let 1 ≤ p < ∞ and
295
+ A ∈ K p. Since K p ⊂ K1 ⊂ G1, from Proposition 2.1 the cocycle ΦA satisfies the
296
+ following integrability condition
297
+ sup
298
+ 0≤t≤1
299
+ log+ ∥ΦA(t, ω)±1∥ ∈ L1(µ).
300
+ (9)
301
+ Hence, under condition (9) Oseledets theorem (see e.g. [31, 5]) guarantees that
302
+ for µ almost every ω ∈ M, there exists a ΦA-invariant splitting, called Oseledets
303
+ splitting, of the fiber R2
304
+ ω = E1
305
+ ω ⊕ E2
306
+ ω and real numbers λ1(A, ω) ≥ λ2(A, ω), called
307
+ Lyapunov exponents, such that:
308
+ λ(A, ω, vi) := lim
309
+ t→±∞
310
+ 1
311
+ t log ∥ΦA(t, ω)vi∥ = λi(A, ω),
312
+ for any vi ∈ Ei
313
+ ω \ {⃗0} and i = 1, 2. If the flow ϕt is ergodic, then the Lyapunov
314
+ exponents (and the dimensions of the associated subbundles) are constant µ almost
315
+ everywhere, and we refer to them as λ1(A) and λ2(A), with λ1(A) ≥ λ2(A). We say
316
+ that A (or ΦA) has one-point Lyapunov spectrum or trivial Lyapunov spectrum if
317
+ for µ a.e. ω ∈ M, λ1(A, ω) = λ2(A, ω). Otherwise we say A (or ΦA) has simple
318
+ Lyapunov spectrum. For details on these results see [5] (in particular, Example
319
+ 3.4.15).
320
+ We are now in conditions to state our main result that establishes the existence
321
+ of a σp-dense subset of K p displaying simple spectrum:
322
+ Theorem 1. Let ϕt : M → M be ergodic. For any 1 ≤ p < ∞, A ∈ K p and ϵ > 0,
323
+ there exists B ∈ K p exhibiting simple Lyapunov spectrum satisfying σp(A, B) < ϵ.
324
+ This result shows in particular that the σp-generic subset of K p in which the
325
+ trivial spectrum prevails, obtained in [3], can not contain σp-open sets. The stra-
326
+ tegy to prove that for each kinetic cocycle satisfying the integrability condition
327
+ there is another kinetic cocycle, arbitrarily close with a simple spectrum, borrow
328
+ some ideas of [7, 13] where the authors obtained a similar result for the discrete
329
+ time case and for more general cocycles. However, the context of continuous-time
330
+ cocycles and the restriction to a very particular family of cocycles, such as the one
331
+ we are considering in this paper, bring several difficulties that have no similarities
332
+ in previous works. We have to face the situation that kinetic cocycles are rigid1
333
+ and to obtain the desired perturbation we will make a step-by-step perturbation
334
+ algorithm that we now describe:
335
+ (1) We begin by coding ϕ by a special flow to avoid overlaps and then consider
336
+ a thin time-1 flowbox VR concatenated to an also thin time-1 flowbox VS ,
337
+ so that o VR ∪ VS will be a time-2 flowbox;
338
+ (2) We cut the original dynamics in VR (respectively VS ) and paste a simple
339
+ constant traceless infinitesimal generator R2π, whose solution basically ro-
340
+ tates an angle 2πη in time-η. Outside VR ∪ VS we keep the same dynamic
341
+ of A. By simple we mean that we can easily obtain the identity by just
342
+ doing a time-1 iteration. Call A0 this new cocycle;
343
+ 1 The pertubative arguments in [7, 13] were easier to make because since dim SL(2, R) = 3 three
344
+ degrees of freedom were available. In our kinetic scenario we have to perform the same perturbations
345
+ but with only a single degree of freedom.
346
+ 6
347
+
348
+ (3) Since VR ∪ VS is a thin flowbox, A0 will be arbitrarily σp-near A. If A0
349
+ has simple spectrum we are over, otherwise we prove Theorem 1 for A0
350
+ instead of A;
351
+ (4) Inside VR we cut the dynamics of A0 and paste a tailor-made rotation R
352
+ such that for each ω entering in VR we rotate in time-1 a vector vω into a
353
+ fixed special direction given by v = (1, 1). The vector vω will be used to
354
+ forcefully create an Oseledets direction so we can calculate the Lyapunov
355
+ exponents. Here we rotate any angle by a small σp-perturbation since by
356
+ (1) VR is thin. A key observation is that the trace keeps unchanged, and
357
+ that is the main motivation to the previous placement of R2π on VR. Call
358
+ B0 this new cocycle. If B0 has simple spectrum we are over, otherwise we
359
+ prove Theorem 1 for B0 instead of A0;
360
+ (5) Inside VS we cut the dynamics of B0 and paste a constant infinitesimal
361
+ generator S which stretch the vector v in time-1 by a known magnitude e.
362
+ No problem arises with the (eventually large) size of the uniform norm of
363
+ the perturbation because the σp-distance is small due to the thickness of
364
+ VS . Again the trace keeps unchanged. Call B this new cocycle;
365
+ (6) Now we use ergodicity and compute the Lyapunov exponents of points
366
+ who will inevitably have to return to VR ∪ VS infinitely many times;
367
+ (7) The stretch S is a perturbation that is concerned with providing an expan-
368
+ sion along an invariant direction. As it is difficult to find different kinetic
369
+ cocycles which keep the same invariant directions here it becomes clear
370
+ why we have chosen back there the identity after time 1 (more precisely a
371
+ rotation by 2π) given by R2π;
372
+ (8) Finally, the concern to keep the trace constant in (4) and (5) will bear fruit
373
+ since if a perturbation increases a Lyapunov exponent and simultaneously
374
+ the sum of the two Lyapunov exponents of the original cocycle and the
375
+ perturbed one remains the same, then only one thing could have happened:
376
+ the perturbed cocycle cannot have trivial spectrum but instead must display
377
+ a Lyapunov exponent smaller than the Lyapunov exponent of the original
378
+ cocycle.
379
+ The following table summarises the step-by-step construction from the linear
380
+ differential systems A to B:
381
+ Table 1. Step-by-step description of the several perturbations
382
+ Cocycle
383
+ M \ (VR ∪ VS )
384
+ VR
385
+ VS
386
+ A
387
+ A
388
+ A
389
+ A
390
+ A0
391
+ A
392
+ R2π
393
+ R2π
394
+ B0
395
+ A
396
+ R
397
+ R2π
398
+ B
399
+ A
400
+ R
401
+ S
402
+ We use an approach slightly different from the previous works [7, 13, 6, 18].
403
+ Moreover, to avoid overlapping in the perturbations, we will encode the base flow
404
+ through a special flow in a Kakutani Castle (as in [2, 33]). On the other hand, to
405
+ estimate the proximity of the perturbed cocycle to the original one, we also use a
406
+ control over the measure of VR ∪VS that support the two perturbations taking into
407
+ account Corollary 2.3.
408
+ 7
409
+
410
+ It should be noted that, in addition to the difficulties inherent in the context
411
+ of continuous-time cocycles, performing these perturbations (rotation and stretch)
412
+ are not trivial, as we do not have the usual mechanisms like those that exist in
413
+ the context in cocycles that evolve in GL(2, R) or SL(2, R), or, more generally,
414
+ cocycles that satisfy the accessibility condition (also recognized as twisting) and
415
+ saddle-conservative (also known as pinching), which allow the realization of these
416
+ processes in a less demanding way, as, for example, in [4, 7, 15, 16, 13].
417
+ As our perturbations are all traceless we get from Theorem 1 that conservative
418
+ kinetic cocycles have non-zero Lyapunov exponents σp-densely.
419
+ Corollary 1. Let ϕt : M → M be ergodic. For any 1 ≤ p < ∞, A ∈ K p
420
+ 0 and
421
+ ϵ > 0, there exists B ∈ K p
422
+ 0 exhibiting non-zero Lyapunov exponents satisfying
423
+ σp(A, B) < ϵ.
424
+ Finally, we present Corollary 1 with a somewhat different look, namely by con-
425
+ sidering the one-dimensional Schrödinger operator on L2(R) and with an Lp poten-
426
+ tial Q: M → R given by:
427
+ Hω :
428
+ L2(R)
429
+ −→
430
+ L2(R)
431
+ φ
432
+ �−→
433
+
434
+ − d2
435
+ dt2 + Q(ϕt(ω))
436
+
437
+ φ
438
+ (10)
439
+ In particular we like to describe the Lyapunov spectrum of the time-independent
440
+ Schrödinger equation
441
+ Hωφ = Eφ,
442
+ (11)
443
+ where E ∈ R is a given energy. Putting together (10) and (11) we deduce a kinetic
444
+ cocycle as in (2) but with α(ω) = 0 and β(ω) = E − Q(ω) for all ω ∈ M. We fix the
445
+ energy E and focus on the LDS
446
+ AE :
447
+ M
448
+ −→
449
+ R2×2
450
+ ω
451
+ �−→
452
+
453
+ 0
454
+ 1
455
+ −E + Q(ω)
456
+ 0
457
+
458
+ (12)
459
+ called one-dimensional Schrödinger LDS with potential Q. As a direct conse-
460
+ quence of Corollary 1 we have:
461
+ Corollary 2. Let ϕt : M → M be ergodic. Given 1 ≤ p < ∞, ϵ > 0 and a one-
462
+ dimensional Schrödinger LDS with a fixed energy E as in (12) and with potential
463
+ Q, there exists ˜Q such that the one-dimensional Schrödinger LDS with the same
464
+ energy E and potential ˜Q exhibits non-zero Lyapunov exponents and ∥ ˜Q−Q∥Lp < ϵ.
465
+ 3. On the perturbations
466
+ 3.1. Special flows. Consider a measure space Σ, a map T : Σ → Σ, a T -invariant
467
+ probability measure ˜µ defined in Σ and a roof function h: Σ → R+ satisfying
468
+ h(ω) ≥ H > 0, for some H > 0 and all ω ∈ Σ, and
469
+
470
+ Σ h(ω)d˜µ(ω) < ∞. Define the
471
+ space Mh ⊆ Σ × R+ by
472
+ Mh = �(ω, t) ∈ Σ × R+ : 0 ≤ t ≤ h(ω)�
473
+ with the identification between the pairs (ω, h(ω)) and (T (ω), 0). The semiflow
474
+ defined on Mh by S s(ω, r) = (T n(ω), r + s − �n−1
475
+ i=0 h(T i(ω))), where n ∈ N is
476
+ uniquely defined by
477
+ n−1
478
+
479
+ i=0
480
+ h(T i(ω)) ≤ r + s <
481
+ n
482
+
483
+ i=0
484
+ h(T i(ω))
485
+ 8
486
+
487
+ is called a suspension semiflow. If T is invertible then (S t)t is a flow. Furthermore,
488
+ if ℓ denotes the one dimensional Lebesgue measure the measure µ = (˜µ×ℓ)/
489
+
490
+ h d˜µ
491
+ defined on Mh by
492
+
493
+ g dµ =
494
+ 1
495
+
496
+ h d˜µ
497
+ � �� h(ω)
498
+ 0
499
+ g(ω, t)dt
500
+
501
+ d˜µ(ω),
502
+ ∀g ∈ C0(Mh)
503
+ is a probability measure and it is invariant by the suspension semiflow (S t)t. Flows
504
+ with such representation are called special flows (or flows built under a function)
505
+ and are denoted by (ϕt, Σ, T , h). It is well-known (see [1, Theorem 2]) that any
506
+ ergodic flow is isomorphic to a special flow. Along this work we assume that the
507
+ base flow is a special flow (ϕt, Σ, T , h) and, without any loss of generality, that
508
+ H > 2. To avoid overloading the notation we write M instead of Mh.
509
+ 3.2. Perturbations supported in time-τ flowboxes. Take A ∈ G and a non-
510
+ periodic orbit ω ∈ M.
511
+ We will consider a perturbation B = Bω,τ of A only
512
+ along a segment of the orbit of ω with extremes ω and ϕτ(ω) for τ > 0. Let
513
+ P ∈ G be given and define B: M → R2×2 such that B( ˆω) = A( ˆω) for all ˆω outside
514
+ ϕ[0,τ](ω) = {ϕs(ω) : s ∈ [0, τ]} and B( ˆω) = P( ˆω) otherwise. The map B is called a
515
+ (local) perturbation of A by P supported on ϕ[0,τ](ω). Given Σ0 ⊂ Σ and 0 ≤ a < b
516
+ we define the set
517
+ ϕ[a,b](Σ0) =
518
+
519
+ ϕt(ω): ω ∈ Σ0, t ∈ [a, b]
520
+
521
+ .
522
+ Given A ∈ G1, P ∈ G, Σ0 ⊂ Σ and a > 0, we may extend the local perturbations
523
+ of A by P to be supported on the flowbox ϕ[a,b](Σ0), with 0 ≤ a < b < H, in the
524
+ following way: for ω ∈ ϕ[a,b](Σ0) we project ω in ˜ω ∈ ϕa(Σ0) i.e. ω = ϕr( ˜ω), for
525
+ some 0 ≤ r ≤ b−a, and let B ˜ω,b−a be (local) perturbation of A by P = P ˜ω supported
526
+ on ϕ[0,b−a]( ˜ω) and define
527
+ B(ω) :=
528
+ � A(ω),
529
+ if ω � ϕ[a,b](Σ0)
530
+ B ˜ω,b−a(ω),
531
+ if ω ∈ ϕ[a,b](Σ0) .
532
+ To distinguish the situations we refer for B(ω) as a global perturbation of A by
533
+ P supported in ϕ[a,b](Σ0), where we always suppose that P(ω) = P ˜ω(ω) for all
534
+ ω ∈ ϕ[a,b](Σ0).
535
+ 3.3. Rotating and Stretching. Next two results provide local and global argu-
536
+ ments to rotate over prescribed directions under a small σp-perturbation. This will
537
+ be used to generate a suitable invariant direction. The first one allows us to perform
538
+ a uniform bounded kinetic perturbation in a local segment of orbit which rotates
539
+ a given vector. The second one thickens Lemma 3.1 by broaden the rotation in a
540
+ single orbit to rotations in a flowbox.
541
+ Lemma 3.1. Given ω ∈ M, u, v ∈ R2 \ {0}, A ∈ K p, there is γ � 0, and a
542
+ perturbation Bω,1 ∈ K p of A supported on ϕ[0,1](ω) such that:
543
+ (i) ∥Bω,1( ˆω)∥ ≤ 4π2 for all ˆω on ϕ[0,1](ω), and
544
+ (ii) ΦBω,1(1, ω)u = γ v.
545
+ Proof. Let θ = ∡(Ru, Rv) ∈ ]0, 2π] measured clockwise. Set a constant infinitesi-
546
+ mal generator R: M → R2×2 given by
547
+ R(ω) = Rθ(ω) =
548
+ � 0
549
+ 1
550
+ −θ2
551
+ 0
552
+
553
+ .
554
+ (13)
555
+ 9
556
+
557
+ We consider the perturbation B = Bω,1 ∈ K p of A by R supported on ϕ[0,1](ω).
558
+ The infinitesimal generator in (13) generates a linear differential system with fun-
559
+ damental classical solution (6) given, for all ω ∈ M and t ∈ R by the ‘clockwise
560
+ elliptical rotation’ defined by:
561
+ ΦR(t, ω) =
562
+
563
+ cos(θt)
564
+ θ−1 sin(θt)
565
+ −θ sin(θt)
566
+ cos(θt)
567
+
568
+ ,
569
+ (14)
570
+ and such that ΦB(1, ω)u = ΦR(1, ω)u = γv, for some γ � 0 fulfilling (ii).
571
+
572
+ From Corollary 2.3 it follows that we may extend the local perturbation Bω,1
573
+ given by the rotation Rθ(ω) as in Lemma 3.1, to a global perturbation, tuned for
574
+ each orbit segment, to obtain a new generator that is σp-close to the original, once
575
+ we have a smaller measure of the flowbox were the perturbation takes place. This
576
+ is pointed in the next basic measure theoretic result which is an immediate conse-
577
+ quence of Corollary 2.3.
578
+ Lemma 3.2 (Global). For all 1 ≤ p < ∞, A ∈ Gp, a > 0 and ϵ > 0, there exists
579
+ a measurable set Σ0 ⊂ Σ with ˜µ(Σ0) > 0 such that for any global perturbation
580
+ B ∈ Gp of A supported in the flowbox ϕ[a,a+1](Σ0), with ∥B(ϕt(ω))∥ ≤ 4π2 for all
581
+ ω ∈ Σ0 and t ∈ [a, a + 1], we have that σp(A, B) < ϵ.
582
+ Let us fix a suitable constant and traceless infinitesimal generator
583
+ S =
584
+ �0
585
+ 1
586
+ 1
587
+ 0
588
+
589
+ .
590
+ (15)
591
+ As S has simple expression we integrate it obtaining:
592
+ ΦS (t, ω) = eS t =
593
+ �cosh t
594
+ sinh t
595
+ sinh t
596
+ cosh t
597
+
598
+ (16)
599
+ We notice that (16) has eigenvalues σS
600
+ 1 = et and σS
601
+ 2 = e−t with associated eigen-
602
+ vectors vS
603
+ 1 = (1, 1) and vS
604
+ 2 = (−1, 1), respectively. Observe that ES
605
+ 1 = R · vS
606
+ 1 is a
607
+ unstable direction and ES
608
+ 2 = R · vS
609
+ 2 is a stable direction.
610
+ Next trivial remark will be of utmost importance in the sequel because it com-
611
+ bines three main ingredients: invariance of certain 1-dimensional directions, some
612
+ expansiveness along this direction and all this done in traceless kinetic infinitesi-
613
+ mal generators.
614
+ Remark 3.1 (Invariance and stretch). Considering θ = 2π in (14), say R2π, we get
615
+ e · vS
616
+ 1 = e · ΦR2π(1, ω) vS
617
+ 1 = ΦS (1, ω) vS
618
+ 1 .
619
+ (17)
620
+ 4. Proof of Theorem 1
621
+ Let A ∈ K p, 1 ≤ p < ∞ and ϵ > 0 be given. We assume that ΦA has a single
622
+ Lyapunov exponent λ(A). The sequence of perturbations are summarized in Table
623
+ 1.
624
+ 10
625
+
626
+ 4.1. Defining A0 (picking out good coordinates): Let Σ0 ⊂ Σ be as in Lemma 3.2.
627
+ For r > 0 we assume that we have flowboxes defined by VR := ϕ[0,1](Br) and
628
+ VS := ϕ[1,2](Br), where Br ∈ Σ0 is such that 0 < ˜µ(Br) ≤ r. Consider A0 ∈ K1
629
+ defined as:
630
+ A0(ω) :=
631
+ � A(ω),
632
+ if ω � VR ∪ VS
633
+ R2π,
634
+ if ω ∈ VR ∪ VS
635
+ .
636
+ By Corollary 2.3 if r is sufficiently small when compared with ϵ we get
637
+ σp(A, A0) < ϵ
638
+ 3.
639
+ (18)
640
+ If ΦA0 has simple spectrum we are over. Otherwise, we prove the theorem for A0
641
+ instead of A.
642
+ 4.2. Defining B0 (rotating on VR): Set
643
+ k(ω) = inf
644
+ t≥0
645
+
646
+ t: ϕ−t(ω) ∈ ϕ1(Br)
647
+
648
+ .
649
+ We will define the a random vector field g(ω). We start with the normalized image
650
+ under the cocycle associated with ΦA0 of the vector v =
651
+ vS
652
+ 1
653
+ ∥vS
654
+ 1 ∥ =
655
+ � √
656
+ 2
657
+ 2 ,
658
+
659
+ 2
660
+ 2
661
+
662
+ :
663
+ g(ω) :=
664
+ ���������
665
+ v,
666
+ if
667
+ ω ∈ ϕ1(Br)
668
+ ΦA0(k(ω),ϕ−k(ω)(ω))v
669
+ ∥ΦA0(k(ω),ϕ−k(ω)(ω))v∥,
670
+ if
671
+ ω � (VR \ Br)
672
+ and set from now on E(ω) = span {g(ω)}.
673
+ Let B0 be a perturbation of A0 supported in the flowbox VR as in Lemma 3.2
674
+ such that for all ω ∈ Br we have ΦB0(1, ω)g(ω) = κv for some κ ∈ R, that is:
675
+ B0(ω) :=
676
+ � R(ω),
677
+ if ω ∈ VR
678
+ A0(ω),
679
+ otherwise
680
+ .
681
+ Observe that the rotation must be tuned for each ω0 ∈ Br, in the sense that for
682
+ ω = ϕt(ω0) ∈ VR, with 0 ≤ t ≤ 1, we set R(ω) = Rθ(ω0) with θ = ∡(g(ω0), v). In
683
+ particular, for all ω0 ∈ Br we have Φ(1, ω0)g(ω) = κv, for some κ ∈ R. Moreover,
684
+ A0 and B0 have the same trace. Indeed, A0 = B0 outside VR and in VR we have
685
+ B0 = R and A0 = R2π, which are both traceless (see (13)). Therefore, by Liouville’s
686
+ formula for all ω and t ≥ 0
687
+ det ΦB0(t, ω) = det ΦA0(t, ω).
688
+ (19)
689
+ For ω ∈ VR \ Br define
690
+ g(ω) = ΦB0(k(ω), ϕ−k(ω)(ω))v
691
+ ∥ΦB0(k(ω), ϕ−k(ω)(ω))v∥.
692
+ (20)
693
+ Notice that for ω ∈ Br, since ΦB0(1, ω)Rg(ω) = Rv we get
694
+ ΦB0(1, ω)Rg(ω)(ω) = Rg(ϕ1(ω)).
695
+ (21)
696
+ Let ˜ω ∈ ϕ1(Br) and τ > 0 be such that ϕt( ˜ω) � VR for all t ∈]0, τ[. Then, for all
697
+ t ∈ [0, τ] we have the ΦB0-invariance of g:
698
+ ΦB0(t, ˜ω)Rg( ˜ω) = ΦB0(t, ˜ω)Rv = ΦA0(t, ˜ω)Rv = Rg(ϕt( ˜ω)).
699
+ (22)
700
+ 11
701
+
702
+ If ϕt( ˜ω) ∈ VR for some t ∈]0, τ[ then considering s > 0 such that ϕs(ω) ∈ Br we
703
+ get:
704
+ ΦB0(t, ˜ω)Rg( ˜ω)
705
+ =
706
+ ΦB0(t − s, ϕs( ˜ω))ΦA0(s, ˜ω)Rv
707
+ =
708
+ ΦB0(t − s, ϕs( ˜ω))Rg(ϕs( ˜ω))
709
+ (20)
710
+ =
711
+ Rg(ϕt( ˜ω)).
712
+ Finally, (21), (26) and last equality gives that the vector field g is ΦB0-invariant.
713
+ Again by Corollary 2.3 if r is sufficiently small we get
714
+ σp(A0, B0) < ϵ
715
+ 3.
716
+ (23)
717
+ If ΦB0 has simple spectrum we are over. Otherwise, we prove the theorem for
718
+ B0 instead of A0.
719
+ 4.3. Defining B (stretching on VS ): We define
720
+ B(ω) :=
721
+ � B0(ω),
722
+ if ω � VS
723
+ S,
724
+ if ω ∈ VS
725
+ .
726
+ Observe that B and B0 have the same trace. Indeed, B = B0 outside VS and in
727
+ VS we have B0 = R2π which are both traceless (see (13) and (15)). Therefore, by
728
+ Liouville’s formula and (19) for all ω and t ≥ 0
729
+ det ΦB(t, ω) = det ΦB0(t, ω) = det ΦA0(t, ω).
730
+ (24)
731
+ From Corollary 2.3, once more, if r is sufficiently small we get
732
+ σp(B0, B) < ϵ
733
+ 3.
734
+ (25)
735
+ Notice that the invariance of the direction E(ω) under ΦB fails when ϕt(ω) enters
736
+ VS . However, for ˜ω ∈ ϕ1(Br) we have by (17) and (26)
737
+ ΦB(1, ˜ω)Rg( ˜ω) = ΦS (1, ˜ω)Rv = Rv = RΦR2π(1, ˜ω)v = ΦA0(1, ˜ω)Rv = Rg(ϕ1( ˜ω))
738
+ and so
739
+ ΦS (1, ˜ω)E( ˜ω) = E(ϕ1( ˜ω)),
740
+ (26)
741
+ which will be enough for our purposes; see Figure 1.
742
+ Figure 1. The traceless perturbation scheme with the invariant di-
743
+ rections and the stretch effect.
744
+ Let λ1(B) ≥ λ2(B) be the Lyapunov exponents of ΦB. We assume that ΦB0 has
745
+ one-point spectrum, say λ1(B0) = λ2(B0) = λ(B0), because otherwise the theorem
746
+ 12
747
+
748
+ dB(T, W)g()
749
+ ΦB(1,
750
+ B(1, T())
751
+ P Bo
752
+ 3is proved. Let λ(B0) be the single Lyapunov exponent of ΦB0. Hence we have
753
+ λ(B0) = λ(B0, ω, vS
754
+ 1 ) for a.e. ω. By the Oseledets theorem we have
755
+ 2λ(B0) =
756
+
757
+ log
758
+ ���det(ΦB0(1, ω))
759
+ ���dµ
760
+ (27)
761
+ and
762
+ λ1(B) + λ2(B) =
763
+
764
+ log
765
+ ���det(ΦB(1, ω))
766
+ ���dµ.
767
+ (28)
768
+ The two previous equalities together with (24) allows us to conclude that
769
+ 2λ(B0) = λ1(B) + λ2(B)
770
+ (29)
771
+ and so, if we show that λ1(B) > λ(B0) then we get λ1(B) > λ2(B) and Theorem 1
772
+ is proved. Recall that the random vector field g is invariant by ΦB0 but in what ΦB
773
+ concerns, the invariance fails as the base dynamics enters VS . However, by (26)
774
+ the invariance is recovered in the moment the base dynamics is leaving VS .
775
+ For ω ∈ M let us consider the real map b0(·, ω) for all t ∈ R in such a way that
776
+ b0(t, ω)g(ϕt(ω)) = ΦB0(t, ω)g(ω).
777
+ (30)
778
+ Claim 4.1. The map b0(t, ω) forms a cocycle over ϕt.
779
+ Indeed, since ΦB0(0, ω) = Id for all ω ∈ M we have b0(0, ω) = 1 and for all s, t,
780
+ evaluating b0(t + s, ω) at g(ϕt+s(ω)), we have
781
+ b0(t + s, ω)g(ϕt+s(ω))
782
+ (30)
783
+ =
784
+ ΦB0(t + s, ω)g(ω)
785
+ =
786
+ ΦB0(t, ϕs(ω)) · ΦB0(s, ω)g(ω)
787
+ (30)
788
+ =
789
+ ΦB0(t, ϕs(ω)) · b0(s, ω)g(ϕs(ω))
790
+ =
791
+ b0(s, ω) ΦB0(t, ϕs(ω))g(ϕs(ω))
792
+ =
793
+ b0(t, ϕs(ω))b0(s, ω)g(ϕt+s(ω)),
794
+ and so b0(t + s, ω) = b0(t, ϕs(ω))b0(s, ω).
795
+ Since the random vector field g is not completely invariant by ΦB we consider
796
+ two distinct situations. Set ϕ{1,2}(Br) = ϕ1(Br) ∪ ϕ2(Br). For ω ∈ M and τ ≥ 0 such
797
+ that ϕt(ω) � VS \ ϕ{1,2}(Br), for all 0 ≤ t ≤ τ, we consider the real map b(·, ω) for
798
+ all t ∈ [0, τ] in such a way that
799
+ b(t, ω)g(ϕt(ω)) = ΦB(t, ω)g(ω)
800
+ (31)
801
+ and, for all ω ∈ ϕ1(Br), we set b(1, ω) ∈ R in such a way that
802
+ ΦB(1, ω)g(ω) = b(1, ω)g(ϕ1(ω)).
803
+ (32)
804
+ If ϕt(ω) � VS \ ϕ{1,2}(Br), for all 0 ≤ t ≤ τ, we have B(ϕt(ω)) = B0(ϕt(ω)) and
805
+ b(t, ω)g(ϕt(ω)) = ΦB(t, ω)g(ω) = ΦB0(t, ω)g(ω) = b0(t, ω)g(ϕt(ω)).
806
+ (33)
807
+ In particular this holds between the output of VS to the next input in VS .
808
+ Claim 4.2. If ϕt(ω), ϕs(ω) � VS \ ϕ{1,2}(Br), b(t, ω) forms a cocycle over ϕt in the
809
+ sense that b(t + s, ω) = b(t, ϕs(ω))b(s, ω).
810
+ 13
811
+
812
+ The proof follows similarly to Claim 4.1 taking also into account (32).
813
+ Pick ω in a full measure subset of points that visits infinitely often Br and for
814
+ which the conclusion of Birkhoff’s Ergodic theorem holds. Without loss of gene-
815
+ rality we may assume that ω � Vr ∪ VS . For t ≥ 0 set
816
+ Jt(ω) = #
817
+
818
+ j ∈ N: j ≤ t, ϕ j(ω) ∈ ϕ2(Br)
819
+
820
+ .
821
+ Recall that
822
+ λ(B, ω, g(ω))
823
+ =
824
+ lim
825
+ t→∞
826
+ 1
827
+ t log ∥ΦB(t, ω)g(ω)∥,
828
+ and we may split the previous orbit in the limit by considering the time for ϕt(ω)
829
+ to enter VS , the time-1 moment crossing the flowbox VS , where we use (17), and,
830
+ again, the time it takes to return to VS and so on. For simplicity, let us define
831
+ recursively
832
+ s0 = s0(ω) = min{t: ϕt(ω) ∈ ϕ1(Br)},
833
+ ℓ0 = ℓ0(ω) = s0 + 1,
834
+ sn = s0(ϕℓn−1(ω)) and ℓn = sn + 1, for n ≥ 1,
835
+ ∆n = sn − ℓn−1, for n ≥ 1,
836
+ ˜ωn = ϕsn(ω) ∈ ϕ1(Br) and ˆωn = ϕℓn(ω) ∈ ϕ2(Br), for n ≥ 1.
837
+ Now, in one hand, since B0 has one-point spectrum, for µ-a.e. ω,
838
+ λ(B0, ω)
839
+ =
840
+ λ(B0, ω, g(ω))
841
+ =
842
+ lim
843
+ t→∞
844
+ 1
845
+ t log ∥ΦB0(t, ω)g(ω)∥
846
+ (30)
847
+ =
848
+ lim
849
+ t→∞
850
+ 1
851
+ t log |b0(t, ω)|.
852
+ (34)
853
+ On the other hand, by Remark 3.1 and (32) we have for ˜ω ∈ ϕ1(Br) that
854
+ b(1, ˜ω)g(ϕ1( ˜ω)) = ΦB(1, ˜ω)g( ˜ω)
855
+ (17)
856
+ = e·ΦB0(1, ˜ω)g( ˜ω) = e·b0(1, ˜ω)g(ϕ1( ˜ω)). (35)
857
+ Without loss of generality, we can consider the following limits over the un-
858
+ bounded set {t ≥ 0: ϕt(ω) ∈ ϕ1(Br)}. From Birkhoff’s Ergodic theorem we have
859
+ λ(B, ω, g(ω))
860
+ =
861
+ lim
862
+ t→∞
863
+ 1
864
+ t log ∥ΦB(t, ω)g(ω)∥
865
+ (31)+(32)
866
+ =
867
+ lim
868
+ t→∞
869
+ 1
870
+ t
871
+ ���������log |b(s0, ω)| +
872
+ Jt(ω)−1
873
+
874
+ j=0
875
+ log |b(∆j+1, ˆωsj)b(1, ˜ωsj)|
876
+ ���������
877
+ (33)+(35)
878
+ =
879
+ lim
880
+ t→∞
881
+ 1
882
+ t
883
+ ���������log |b0(s0, ω)| +
884
+ Jt(ω)−1
885
+
886
+ j=0
887
+ log |b0(∆j+1, ˆωsj) · e · b0(1, ˜ωsj)|
888
+ ���������
889
+ Claim 4.1
890
+ =
891
+ lim
892
+ t→∞
893
+ 1
894
+ t log |b0(t, ω)| + lim
895
+ t→∞
896
+ Jt(ω)
897
+ t
898
+ (30)
899
+ =
900
+ lim
901
+ t→∞
902
+ 1
903
+ t log ∥ΦB0(t, ω)g(ω)∥ + lim
904
+ t→∞
905
+ 1
906
+ t
907
+ � t
908
+ 0
909
+ 1VS (ϕt(ω)) dt
910
+ =
911
+ λ(B0, ω, g(ω)) + µ(VS ),
912
+ which implies λ1(B, ω) > λ(B0, ω), hence λ1(B) > λ(B0). From (29), we get
913
+ λ1(B) > λ(B0) > λ2(B) so that B has simple spectrum. Moreover, by (18), (23) and
914
+ (25) we have σp(A, B) < ϵ and Theorem 1 is now proved. □
915
+ 14
916
+
917
+ Clearly when considering the set K1
918
+ 0 on Corollary 1 the equalities (27) and (28)
919
+ become 2λ(B0) = λ1(B) + λ2(B) = 0. Hence the conclusion this time will be that
920
+ λ1(B) > 0 for B ∈ K1
921
+ 0 arbitrarily σp-close to A and also λ2(B) = −λ1(B) < 0.
922
+ Acknowledgements: The authors were partially supported by FCT - ‘Fundação
923
+ para a Ciência e a Tecnologia’, through Centro de Matemática e Aplicações (CMA-
924
+ UBI), Universidade da Beira Interior, project UIDB/MAT/00212/2020. MB was
925
+ partially supported by the Project ‘Means and Extremes in Dynamical Systems’
926
+ (PTDC/MAT-PUR/4048/2021). MB also like to thank CMUP for providing the
927
+ necessary conditions in which this work was developed.
928
+ References
929
+ [1] W. Ambrose, Representation of ergodic flows, Annals of Mathematics 42 (1941), 3, 723–739.
930
+ [2] W. Ambrose, S. Kakutani, Structure and continuity of measure preserving transformations,
931
+ Duke Math. J., 9: (1942), 25–42.
932
+ [3] D. Amaro, M. Bessa, H. Vilarinho Genericity of trivial Lyapunov spectrum for Lp-cocycles
933
+ derived from second order linear homogeneous differential equations (Submitted).
934
+ [4] A. Arbieto, J. Bochi, Lp-generic cocycles have one-point Lyapunov spectrum, Stochastics and
935
+ Dynamics 3 (2003) 73–81. Corrigendum. ibid, 3 (2003) 419–420.
936
+ [5] L. Arnold, Random Dynamical Systems, Springer Verlag, 1998.
937
+ [6] L. Arnold, N. Cong, Linear cocycles with simple Lyapunov spectrum are dense in L∞, Ergod.
938
+ Th. & Dynam. Sys., 19, (1999) 1389–1404.
939
+ [7] L. Arnold, N. Cong, On the simplicity of the Lyapunov spectrum of products of random matri-
940
+ ces, Ergod. Th. & Dynam. Sys. 17 (1997) 1005–1025.
941
+ [8] L. Arnold, H. Crauel, J.-P. Eckmann, editors Lyapunov Exponents. Proceedings, Oberwolfach
942
+ 1990, volume 1486 of Springer Lecture Notes in Math. Springer-Verlag, Berlin Heidelberg New
943
+ York, 1991.
944
+ [9] L. Arnold, V. Wihstutz, editors, Lyapunov Exponents. Proceedings, Bremen 1984, volume 1186
945
+ of Springer Lecture Notes in Mathematics. SpringerVerlag, Berlin Heidelberg New York, 1986.
946
+ [10] A. Avila, Density of positive Lyapunov exponents for S L(2, R)-cocycles, J. Amer. Math. Soc.
947
+ 24 (4) (2011) 999–1014.
948
+ [11] E. Cornelis, M. Wojtkowski, A criterion for the positivity of the Liapunov characteristic expo-
949
+ nent, Ergod. Theory & Dyn. Syst. 4 (1984) 527–539.
950
+ [12] M. Bessa, Perturbations of Mathieu equations with parametric excitation of large period, Ad-
951
+ vances in Dynamical Systems and Applications, 7, 1, (2012) 17–30.
952
+ [13] M. Bessa, H. Vilarinho, Fine properties of Lp-cocycles which allows abundance of simple and
953
+ trivial spectrum. Journal of Differential Equations, 256, 7 (2014) 2337–2367.
954
+ [14] M. Bessa, J. Bochi, M. Cambrainha, C. Matheus, P. Varandas, D. Xu, Positivity of the Top
955
+ Lyapunov Exponent for Cocycles on Semisimple Lie Groups over Hyperbolic Bases, Bull Braz
956
+ Math Soc, New Series (2018) 49:73–87.
957
+ [15] J. Bochi, Genericity of zero Lyapunov exponents, Ergod. Th. & Dynam. Sys. 22 (2002) 1667–
958
+ 1696.
959
+ [16] J. Bochi, M.Viana, The Lyapunov exponents of generic volume-preserving and symplectic maps,
960
+ Ann. of Math. 161 (3) (2005) 1423–1485.
961
+ [17] Bonatti, C., Gómez-Mont, X., Viana, M., Généricité d’exposants de Lyapunov non-nuls pour
962
+ des produits déterministes de matrices. Ann. Inst. H. Poincaré Anal. Non Linéaire 20, (2003)
963
+ 579–624.
964
+ [18] N. D. Cong, A generic bounded linear cocycle has simple Lyapunov spectrum, Ergod. Th. &
965
+ Dynam. Sys. (2005),25, 1775-1797.
966
+ [19] Duarte, P., Klein, S., Positive Lyapunov exponents for higher dimensional quasiperiodic cocy-
967
+ cles. Commun. Math. Phys. 332(1), (2014) 189–219.
968
+ 15
969
+
970
+ [20] R. Fabbri, Genericity of hyperbolicity in linear differential systems of dimension two, (Italian)
971
+ Boll. Unione Mat. Ital., Sez. A, Mat. Soc. Cult. 8 (1) Suppl. (1998) 109–111.
972
+ [21] R. Fabbri, R. Johnson, Genericity of exponential dichotomy for two-dimensional differential
973
+ systems, Ann. Mat. Pura Appl. IV. Ser. 178 (2000) 175–193.
974
+ [22] R. Fabbri, R. Johnson, On the Lyapounov exponent of certain SL(2, R)-valued cocycles, Differ.
975
+ Equ. Dyn. Syst. 7 (3) (1999) 349–370.
976
+ [23] R. Fabbri, R. Johnson, L. Zampogni, On the Lyapunov exponent of certain SL(2, R)-valued
977
+ cocycles II, Differ. Equ. Dyn. Syst. 18 (1-2) (2010) 135–161.
978
+ [24] X. Feng, K. Loparo, Almost sure instability of the random harmonic oscillator, SIAM J. Appl.
979
+ Math. 50, 3, (1990) 744–759.
980
+ [25] Ledrappier, F.: Positivity of the exponent for stationary sequences of matrices. In: Arnold, L.,
981
+ Wihstutz, V. (eds.) Lyapunov Exponents (Bremen, 1984). Lecture Notes in Mathematics, vol.
982
+ 1886, pp. 56–73, Springer, New York (1986)
983
+ [26] T. Kato, Perturbation Theory for Linear Operators, 2nd ed., Springer, 1980.
984
+ [27] A. Leizarowitz, On the Lyapunov exponent of a harmonic oscillator driven by a finite-state
985
+ Markov process, SIAM J. Appl. Math., 49, 2, (1989) 404–419.
986
+ [28] V. M. Millionshchikov, Systems with integral separateness which are dense in the set of all
987
+ linear systems of differential equations, Differential Equations 5 (1969) 850–852.
988
+ [29] M. Nerurkar, Positive exponents for a dense set of continuous cocycles which arise as solutions
989
+ to strongly accessible linear differential systems, Contemp. Math. Ser. AMS 215 (1998) 265–
990
+ 278.
991
+ [30] O. Knill, Positive Lyapunov exponents for a dense set of bounded measurable SL(2, R) cocycles,
992
+ Ergodic Theory Dynam. Systems 12 (2) (1992) 319–331.
993
+ [31] V. Oseledets, A multiplicative ergodic theorem: Lyapunov characteristic numbers for dynami-
994
+ cal systems, Transl. Moscow Math. Soc. 19 (1968) 197-231.
995
+ [32] R. H. Risch, The problem of integration in finite terms, Trans. Amer. Math. Soc. 139 (1969),
996
+ 167–189.
997
+ [33] D. Rudolph, A Two-Valued Step Coding for Ergodic Flows, Math. Z. 150 (1976) 201–220.
998
+ [34] M. Viana, Almost all cocycles over any hyperbolic system have nonvanishing Lyapunov expo-
999
+ nents, Ann. of Math. 167 (2) (2008) 643–680.
1000
+ [35] D. Xu, Density of positive Lyapunov exponents for symplectic cocycles, J. Eur. Math. Soc., 21,
1001
+ 10, (2019), 3143–3190.
1002
+ Centro de Matem´atica e Aplica¸c˜oes (CMA-UBI), Universidade da Beira Interior, Rua Marquˆes
1003
+ d’Ávila e Bolama, 6201-001, Covilh˜a, Portugal.
1004
+ Email address: dinis.amaro@ubi.pt
1005
+ Email address: bessa@ubi.pt
1006
+ Email address: helder@ubi.pt
1007
+ 16
1008
+
H9E4T4oBgHgl3EQfIAys/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
L9FAT4oBgHgl3EQfxB4e/content/tmp_files/2301.08684v1.pdf.txt ADDED
@@ -0,0 +1,2278 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER
2
+ UNCERTAINTY: A TENSOR TRAIN APPROACH
3
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
4
+ Abstract. We propose an algorithm to solve optimization problems constrained by partial
5
+ (ordinary) differential equations under uncertainty, with almost sure constraints on the state
6
+ variable.
7
+ To alleviate the computational burden of high-dimensional random variables,
8
+ we approximate all random fields by the tensor-train decomposition. To enable efficient
9
+ tensor-train approximation of the state constraints, the latter are handled using the Moreau-
10
+ Yosida penalty, with an additional smoothing of the positive part (plus/ReLU) function by
11
+ a softplus function. We derive theoretical bounds on the constraint violation in terms of
12
+ the Moreau-Yosida regularization parameter and smoothing width of the softplus function.
13
+ This result also proposes a practical recipe for selecting these two parameters. When the
14
+ optimization problem is strongly convex, we establish strong convergence of the regularized
15
+ solution to the optimal control. We develop a second order Newton type method with a
16
+ fast matrix-free action of the approximate Hessian to solve the smoothed Moreau-Yosida
17
+ problem. This algorithm is tested on benchmark elliptic problems with random coefficients,
18
+ optimization problems constrained by random elliptic variational inequalities, and a real-
19
+ world epidemiological model with 20 random variables. These examples demonstrate mild
20
+ (at most polynomial) scaling with respect to the dimension and regularization parameters.
21
+ 1. Introduction
22
+ Over last two decades optimization problems constrained by physical laws, such as partial
23
+ (ordinary) differential equations (PDEs/ODEs), have emerged as a prominent research area.
24
+ This is fueled by many applications in science and engineering, such as controlling pathogen
25
+ propagation in built environment [26, 25], shape and topology optimization [36, 28], optimal
26
+ strategies to predict shutdowns due to pandemics [11]. The optimization variables consist of
27
+ state (y) and control/design (u). However, often due to noisy measurements and ambiguous
28
+ models due to incomplete physics, the underlying physical laws contain uncertainty. This
29
+ has led to significant theoretical and algorithmic developments in the area of optimization
30
+ problems constrained by physical laws under uncertainty. See for instance [23, 4, 14, 3] and
31
+ the references therein. These papers focus on problems with control constraints.
32
+ The literature on state-constrained optimization problems under uncertainty is scarce.
33
+ For instance, [12, 17] use probability constraints, and [15, 13, 16] consider almost surely
34
+ Date: 20 January 2023.
35
+ 2020 Mathematics Subject Classification.
36
+ 49J55, 93E20, 49K20, 49K45, 90C15, 65D15, 15A69, 15A23 .
37
+ Key words and phrases. almost surely constraints, state constraints, risk neutral, tensor train, reduced
38
+ space, preconditioner, variational inequality.
39
+ HA is partially supported by NSF grant DMS-2110263 and the AirForce Office of Scientific Research under
40
+ Award NO: FA9550-22-1-0248. SD is thankful for the support from Engineering and Physical Sciences Re-
41
+ search Council (EPSRC) New Investigator Award EP/T031255/1 and New Horizons grant EP/V04771X/1.
42
+ 1
43
+ arXiv:2301.08684v1 [math.OC] 20 Jan 2023
44
+
45
+ 2
46
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
47
+ type constraints.
48
+ It is well-known that even in the deterministic setting, the state con-
49
+ strained problems are highly challenging. One of the fundamental difficulties is that the
50
+ state constraints are imposed in the sense of continuous functions. As a result, the Lagrange
51
+ multipliers corresponding to those constraints are Radon measures that exhibit low regu-
52
+ larity [6]. The situation is much more delicate in the stochastic setting. We refer to the
53
+ aforementioned references for a detailed discussion on this topic. Motivated by the deter-
54
+ ministic setting, [13] introduces a Moreau-Yosida based approximation scheme to solve the
55
+ state-constrained optimization problems when the PDE constraints are given by an elliptic
56
+ equation with random coefficients. Further extensions of this work are considered in [1, 16].
57
+ However, all of these papers approximate expectations of random fields by Monte-Carlo-type
58
+ methods, which may converge slowly.
59
+ In [3], we introduced an algorithm (TTRISK) based on the tensor train (TT) decom-
60
+ position [30] to solve risk-averse optimization problems with control constraints, and the
61
+ conditional value-at-risk (CVaR) [32] risk measure. We demonstrated that the extra com-
62
+ putational cost due to the uncertainty can scale proportionally to error−0.5 when the TT
63
+ approximation is used, in contrast to a error−2 scaling of Monte Carlo quadratures.
64
+ In
65
+ the current paper, we continue this program and develop a TT based algorithm for state-
66
+ constrained optimization problems.
67
+ For simplicity of presentation, we only consider the
68
+ risk-neutral setting, i.e., the objective function is given by the expected value of a quantity
69
+ of interest. Similarly to [13, 16], we tackle the state constrains using Moreau-Yosida based
70
+ relaxation with a softplus smoothing. The main contributions of this paper are listed next:
71
+ (i) We consider an ε-softplus regularization of the positive part function (·)+ = max{·, 0}
72
+ and derive a probabilistic estimate of state constraint violation in terms of Moreau-
73
+ Yosida regularization parameter γ and ε. In particular, we show that selecting ε ∝ γ−1/2
74
+ ensures the convergence of the constraint violation with a rate γ−1/2. This result is
75
+ motivated by [13, Prop. 2]. Notice that the ε-smoothing is carried out because the
76
+ irregular function (·)+ may lack an efficient TT decomposition.
77
+ (ii) When the optimization problem is strongly convex, we establish strong convergence
78
+ of the regularized solution to the optimal control. Our final results can be seen as
79
+ generalizations of the results in deterministic setting.
80
+ (iii) We derive a second order Newton type method to solve the regularized problem with
81
+ a fast matrix-free action of the approximate Hessian.
82
+ (iv) We test the proposed method on elliptic equations in one and two physical dimensions
83
+ and random coefficients, as well as an ODE example (motivated by a realistic applica-
84
+ tion) with 20 random variables, and show that the algorithm is free from the curse of
85
+ dimensionality.
86
+ (v) The proposed approach has been also successfully applied to an example where the
87
+ PDE constraint is given by an elliptic variational inequality.
88
+ Outline: The remainder of the paper is organized as follows. In Section 2, we provide a
89
+ rigorous mathematical formulation of the problem under consideration. Section 3 is devoted
90
+ to the Moreau-Yosida approximation, derivation of the second order Newton method and
91
+ approximation error estimates due to the Moreau-Yosida approximation. In Section 4, we
92
+ provide a brief description of the TT format. This is followed by practical aspects of Moreau-
93
+ Yosida approximations in Section 5. Finally, in Section 6, we provide a series of numerical
94
+
95
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
96
+ 3
97
+ experiments. At first, we consider an optimization problem with an elliptic PDE in one
98
+ spatial dimension as constraints. This is followed by a two-dimensional case. After these
99
+ benchmarks, an optimization problem with an elliptic variational inequality as constraint is
100
+ considered in Section 6.3. The numerical experiments conclude with a realistic ODE example
101
+ for designing optimal lockdown strategies in Section 6.4.
102
+ 2. Problem Formulation
103
+ Let (Ω, F, P) denote a complete probability space, where Ω represents the sample space,
104
+ F is the Borel σ-algebra of events on the power set of Ω, and P : Ω → [0, 1] is an appropriate
105
+ probability measure. We denote by E[·] the expectation with respect to P. Let U be a real
106
+ deterministic reflexive Banach space of optimization variables (control or design) defined on
107
+ an open, bounded and connected set D ⊂ Rn with Lipschitz boundary. We denote by ∥ · ∥U
108
+ the norm on U, and the duality pairing between U and U ∗ as ⟨·, ·⟩U∗,U. Let Y = L2(Ω, F, P; ˆY)
109
+ and Z = L2(Ω, F, P; ˆZ) be Bochner spaces of random fields, based on deterministic Banach
110
+ spaces ˆY �→ L2(D) �→ ˆY∗ and ˆZ, with corresponding norms and duality pairings
111
+ ∥y∥2
112
+ Y = E[∥y(ω)∥2
113
+ ˆY],
114
+ ⟨y, v⟩Y∗,Y = E
115
+
116
+ ⟨y(ω), v(ω)⟩ ˆY∗, ˆY
117
+
118
+ ,
119
+ and similarly for Z. Let Uad ⊆ U be a closed convex nonempty subset and let c : Y×Uad×Ω →
120
+ Z denote, e.g., a partial differential operator, then consider the equality constraint
121
+ c(y, u; ω) = 0,
122
+ in Z,
123
+ a.s. ω ∈ Ω,
124
+ where a.s. indicates “almost surely” with respect to the probability measure P.
125
+ In this paper, we consider the optimization problems of the form
126
+ min
127
+ y,u R[J(y, u; ω)]
128
+ (2.1)
129
+ s.t
130
+ c(y, u; ω) = 0,
131
+ in Z,
132
+ a.s. ω ∈ Ω,
133
+ (2.2)
134
+ where R represents the risk measure and R[J(y, u; ω)] is a deterministic cost function. More
135
+ precisely, we will focus on the so-called risk-neutral formulation; that is, R is simply the
136
+ expectation, denoted by E. We are particularly interested in the case in which the state
137
+ variable y is constrained by a random variable:
138
+ y ≤ ymax(ω)
139
+ a.s.,
140
+ (2.3)
141
+ where we assume that ymax ∈ Y.
142
+ In what follows, we discuss the Moreau-Yosida approximation for (2.1)-(2.3) and derive a
143
+ Newton type method. Throughout the paper, without explicitly stating, we will make use
144
+ of the following assumption.
145
+ Assumption 2.1 (unique forward solution). There exists an injective operator S(ω) : Uad →
146
+ Y (maybe nonlinear) such that c(S(ω)u, u; ω) = 0 ∀u ∈ Uad a.s.
147
+ This allows us to define the reduced-space cost function
148
+ j(u) := R[J(S(ω)u, u; ω)].
149
+ (2.4)
150
+
151
+ 4
152
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
153
+ The resulting reduced optimization problem is given by
154
+ min
155
+ u∈Uad j(u)
156
+ s.t
157
+ y ≤ ymax(ω)
158
+ a.s.
159
+ (2.5)
160
+ 3. Smoothed Moreau-Yosida approximation
161
+ Solving (2.5) with state constraints involve computation of the indicator function of an
162
+ active set and/or Lagrange multiplier as a random field that is nonnegative on a compli-
163
+ cated high-dimensional domain.
164
+ This may be difficult for many function approximation
165
+ methods, especially for tensor decompositions that are considered in this paper. We tackle
166
+ this difficulty by first turning the constrained optimization problem (2.5) into an uncon-
167
+ strained optimization problem with the Moreau-Yosida penalty, and further by smoothing
168
+ the indicator function in the penalty term.
169
+ The classical Moreau-Yosida problem reads, with γ ≥ 0 denoting the regularization pa-
170
+ rameter,
171
+ min
172
+ u∈Uad jγ(u),
173
+ where
174
+ jγ(u) := j(u) + γ
175
+ 2E
176
+ ���(Su − ymax(ξ))+
177
+ ��2
178
+ L2(D)
179
+
180
+ ,
181
+ (3.1)
182
+ where the so-called positive part or ReLU function (·)+ reads (s)+ = s if s ≥ 0 and 0, oth-
183
+ erwise. Here, we have removed the need to optimize the Lagrange multiplier (corresponding
184
+ to the inequality constraints) over the nonnegative cone, but the function approximation of
185
+ a nonsmooth high-dimensional random field (Su − ymax(ξ))+ (and derivatives thereof) may
186
+ be still inefficient.
187
+ For this reason, we replace the ReLU function in the penalty term by a smoothed version.
188
+ In this paper, we use the softplus function
189
+ gε(s) = ε · log(1 + exp(s/ε)) ∈ C∞(R),
190
+ g0(s) = lim
191
+ ε→0 gε(x) = (s)+,
192
+ (3.2)
193
+ although other (e.g. piecewise polynomial) functions are also possible [24, 1]. Now, the cost
194
+ function becomes
195
+ jγ,ε(u) := j(u) + γ
196
+ 2E
197
+ ���gε(Su − ymax)
198
+ ��2
199
+ L2(D)
200
+
201
+ .
202
+ (3.3)
203
+ 3.1. Discretization and Derivatives of the Cost. In practice, the operator S involves
204
+ the solution of a differential equation, which needs to be discretized (using e.g.
205
+ Finite
206
+ Element methods and/or time integration schemes). For a given mesh parameter h > 0, we
207
+ introduce the discretized (maybe nonlinear) operator Sh(ω) : Uad → Rny, where ny is the
208
+ total number of degrees of freedom in the discrete solution. We denote the induced Bochner
209
+ space Yh ∼= L2
210
+ h(Ω, D) := L2(Ω, F, P; Rny). The L2-norm can be written as an expectation of
211
+ a vector quadratic form,
212
+ ∥y∥2
213
+ L2
214
+ h(Ω,D) = E
215
+
216
+ y(ω)⊤My(ω)
217
+
218
+ ,
219
+ ∀y ∈ L2
220
+ h(Ω, D),
221
+ where M = M⊤ > 0 ∈ Rny×ny is a mass matrix. The discretized problem cost is denoted
222
+ by jh(u) ≈ j(u), and the discretized constraint is yh
223
+ max ∈ Yh. Now, the semi-discretized
224
+ Moreau-Yosida cost function (3.3) becomes
225
+ jγ,ε,h(u) := jh(u) + γ
226
+ 2E
227
+
228
+ ∥gε(Shu − yh
229
+ max)∥2
230
+ M
231
+
232
+ .
233
+ (3.4)
234
+
235
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
236
+ 5
237
+ To derive a Newton type method, we compute the expressions of gradient and Hessian:
238
+ ∇ujγ,ε,h = ∇ujh + γE
239
+
240
+ S∗
241
+ h · diag(g′
242
+ ε(Shu − yh
243
+ max)) · Mgε(Shu − yh
244
+ max)
245
+
246
+ ,
247
+ (3.5)
248
+ ∇uujγ,ε,h = ∇2
249
+ uujh + γE
250
+
251
+ S∗
252
+ h · diag(g′
253
+ ε)Mdiag(g′
254
+ ε) · S′
255
+ h
256
+
257
+ (3.6)
258
+ + γE
259
+
260
+ S∗
261
+ h · (tendiag(g′′
262
+ ε) ×3 (Mgε)) · S′
263
+ h
264
+
265
+ (3.7)
266
+ + γE
267
+
268
+ ∇uS∗
269
+ h ×3 (diag(g′
270
+ ε(Shu − yh
271
+ max)) · Mgε(Shu − yh
272
+ max))
273
+
274
+ ,
275
+ (3.8)
276
+ where tendiag(·) is producing a 3-dimensional tensor out of vector by putting the vector
277
+ elements along the diagonal, and zero elements otherwise, and ×3 is the tensor-vector con-
278
+ traction product over the 3d mode of the tensor. If Sh is a nonlinear operator, S′
279
+ h = ∇uSh(u)
280
+ denotes the gradient of an image of u, and S∗
281
+ h is the adjoint of S′
282
+ h.
283
+ 3.2. Matrix-free Fixed Point Gauss-Newton Hessian. The exact assembly of all terms
284
+ of the Hessian (3.6)–(3.8) can be too computationally expensive, since this involves dense
285
+ tensor-valued random fields (such as ∇uS∗
286
+ h). To simplify the computations, we can firstly
287
+ omit the terms (3.7) and (3.8) which contain order-3 tensors. Secondly, we can replace the
288
+ exact expectation by a fixed-point evaluation. Rewriting (2.1) using Assumption 2.1 we can
289
+ define J(u; ω) = J(S(ω)u, u; ω) and its discretized version Jh(u; ω) = J(Sh(ω)u, u; ω). The
290
+ Hessian of jh can then be written as
291
+ ∇2
292
+ uujh = E
293
+
294
+ ∇2
295
+ uuJh(u; ω)
296
+
297
+ .
298
+ For practical computations, it is convenient to parametrize all random fields with inde-
299
+ pendent identically distributed (i.i.d.) random variables with a known probability density
300
+ function. Those variables can then be sampled independently, and an expectation can be
301
+ computed simply by quadrature. Therefore, we will use the following assumption.
302
+ Assumption 3.1 (finite noise). There exists a d-dimensional random vector ξ(ω) ∈ Rd
303
+ with a product probability density function π(ξ) = π(ξ1) · · · π(ξd), such that any random field
304
+ y ∈ Y can be expressed as a function of ξ, y(ω) = y(ξ(ω)) a.s., and
305
+ E[y] =
306
+ ˆ
307
+ Rd y(ξ)π(ξ)dξ.
308
+ In particular, the vector ξ can often be derived from a parametrization of the forward
309
+ solution operator Sh(ω) = Sh(ξ(ω)), and/or the constraint yh
310
+ max(ω) = yh
311
+ max(ξ(ω)).
312
+ Example 3.2. Let y = S(ν(ω))u be the resolution of an elliptic PDE
313
+ −∇(κ(x; ν(ω))∇y) = u,
314
+ where the diffusivity
315
+ κ(x; ν(ω)) = κ0(x) +
316
+ p
317
+
318
+ k=1
319
+ ψk(x)νk(ω)
320
+ and the constraint
321
+ ymax(x; η(ω)) = y0(x) +
322
+ q
323
+
324
+ k=1
325
+ φk(x)ηk(ω)
326
+
327
+ 6
328
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
329
+ are given by Karhunen-Loeve expansions (see e.g., [27]), where ν and η are independent
330
+ random variables. Then, we can define ξ = (ν1, . . . , νp, η1, . . . , ηq).
331
+ Now we can replace ∇2
332
+ uujh = E[∇2
333
+ uuJh(u; ξ)] by
334
+ ˜∇2
335
+ uujh = ∇2
336
+ uuJh(u; E[ξ]).
337
+ This is exact if ∇2
338
+ uuJh is linear in ξ, but we can take it as an approximation in the general case
339
+ too. Now to apply ˜∇2
340
+ uujh to a vector we just need to apply one deterministic ∇2
341
+ uuJh(u; E[ξ]),
342
+ which involves solving one forward, one adjoint, and two linear sensitivity (of state and
343
+ adjoint) deterministic problems in the most general setting [4, Ch. 1, Algo. 2].
344
+ Similarly we approximate the second term in (3.6) by
345
+ γS∗
346
+ h(ξ∗)MS′
347
+ h(ξ∗),
348
+ where
349
+ ξ∗ = E
350
+
351
+ ξ · 1⊤g′
352
+ ε(Shu − yh
353
+ max(ξ))
354
+
355
+ E
356
+
357
+ 1⊤g′
358
+ ε(Shu − yh
359
+ max(ξ))
360
+
361
+ is the mean of the random variable with respect to the probability density πg′ ∝ π ·
362
+ (1⊤g′
363
+ ε(Shu − yh
364
+ max)), and 1 ∈ Rny is the constant vector, averaging the spatial components.
365
+ Note that 1⊤g′
366
+ ε(Shu − yh
367
+ max) is a nonnegative function bounded by ny, so π1⊤g′
368
+ ε(Shu − yh
369
+ max)
370
+ is nonnegative and normalizable, and πg′ is indeed a probability density.
371
+ Finally, we obtain a deterministic approximate Hessian
372
+ ˜H = ∇2
373
+ uuJh(u; E[ξ]) + γS∗
374
+ h(ξ∗)MS′
375
+ h(ξ∗),
376
+ (3.9)
377
+ which can be applied to a vector by solving 2 forward, 2 adjoint, and 2 sensitivity problems.
378
+ 3.3. Probability of the Constraint Violation. In the rest of this section, we prove certain
379
+ properties about the quality of the solution of the smoothed problem (3.3) with respect to
380
+ the constraint, and the exact solution of (2.1)–(2.3). This needs a few properties of the
381
+ softplus smoothing function.
382
+ Lemma 3.3. For any ε ≥ 0, the softplus function (3.2) satifies: gε(s) ≥ (s)+ for any s ∈ R,
383
+ g′
384
+ ε(s) ≥ 0.5 for s ≥ 0, and g′
385
+ ε(s) ≤ 0.5 for s ≤ 0.
386
+ Proof. Using the monotonicity of the logarithm,
387
+ gε(s) = ε log
388
+
389
+ 1 + exp(s/ε)
390
+
391
+
392
+
393
+ ε log
394
+
395
+ exp(s/ε)
396
+
397
+ = s = (s)+,
398
+ s ≥ 0,
399
+ 0 = (s)+,
400
+ s < 0.
401
+ The remaining inequalities follow simply from the monotonicity of the sigmoid function
402
+ g′
403
+ ε(s) = 1/(1 + exp(−s/ε)) and that g′
404
+ ε(0) = 0.5.
405
+
406
+ Theorem 3.4. Let uγ,ε be a minimizer of (3.3), and assume that j(u) ≥ 0 for any u ∈ Uad.
407
+ Then for any δ > 0, we have
408
+ P
409
+
410
+ ∥(S(ω)uγ,ε − ymax(ω))+∥2
411
+ L2(D) > δ
412
+
413
+ ≤ C1 + C2γε2
414
+ γδ
415
+ ,
416
+ where C1 = 2j(u∗), C2 = log2 2 · ∥1∥2
417
+ L2(D), and u∗ is a minimizer of (2.1)–(2.3).
418
+ Remark 3.5. This motivates the condition ε ≲ 1/√γ to overcome the effect of smoothing.
419
+
420
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
421
+ 7
422
+ Proof. Using Markov’s inequality, we obtain
423
+ P
424
+
425
+ ∥(Suγ,ε − ymax(ω))+∥2
426
+ L2(D) > δ
427
+
428
+
429
+ E
430
+ ���(Suγ,ε − ymax(ω))+
431
+ ��2
432
+ L2(D)
433
+
434
+ δ
435
+
436
+ E
437
+ ���gε(Suγ,ε − ymax(ω))
438
+ ��2
439
+ L2(D)
440
+
441
+ δ
442
+ ,
443
+ where in the second inequality we used Lemma 3.3. Since uγ,ε minimizes (3.3), it holds
444
+ j(uγ,ε) + γ
445
+ 2E[∥gε(Suγ,ε − ymax(ω))∥2
446
+ L2(D)] ≤ j(u∗) + γ
447
+ 2E[∥gε(Su∗ − ymax(ω))∥2
448
+ L2(D)]
449
+ for any u∗ ∈ Uad such as the minimizer of (2.1) constrained to (2.3). Dividing by γ/2 and
450
+ neglecting j(uγ,ε) ≥ 0, we get
451
+ E[∥gε(Suγ,ε − ymax(ω))∥2
452
+ L2(D)] ≤ C1
453
+ γ + E[∥gε(Su∗ − ymax(ω))∥2
454
+ L2(D)].
455
+ For the latter term, (2.3) implies Su∗ − ymax(ω) ≤ 0 a.s., and due to monotonicity of gε,
456
+ gε(Su∗ − ymax(ω)) ≤ gε(0) = ε · log 2
457
+ a.s.
458
+ Taking this upper bound out of the expectation and norm, we obtain
459
+ E[∥gε(Suγ,ε−ymax(ω))∥2
460
+ L2(D)] ≤ C1
461
+ γ +ε2·log2 2·E[∥1∥2
462
+ L2(D)] = C1
463
+ γ +ε2·log2 2·∥1∥2
464
+ L2(D), (3.10)
465
+ and the estimate on probability follows by the Markov’s inequality.
466
+
467
+ 3.4. Strong Convergence with Strongly Convex Cost. To prove the strong conver-
468
+ gence of the minimizer of (3.3) to the minimizer of (2.1)–(2.3) we need further assumptions
469
+ on the cost and smoothing functions.
470
+ Assumption 3.6 (Bounded derivative of the cost). There exists L < ∞ such that
471
+ ∥j′(u)∥U∗ ≤ L
472
+ ∀u ∈ Uad.
473
+ Assumption 3.7 (α-strong convexity of the cost). There exists α > 0 such that
474
+ ⟨j′(u) − j′(v), u − v⟩U∗,U ≥ α∥u − v∥2
475
+ U,
476
+ ∀u, v ∈ Uad.
477
+ Assumption 3.8 (Smoothing function). The smoothing function gε possesses the following
478
+ properties
479
+ g′
480
+ ε(s) ≥ 0.5,
481
+ gε(s) ≥ s,
482
+ for
483
+ s ≥ 0,
484
+ g′
485
+ ε(s) ≤ 0.5,
486
+ for
487
+ s ≤ 0,
488
+ (3.11)
489
+ and either:
490
+ gε(s)s ≥ −ηmax(ε),
491
+ for
492
+ s ≤ 0,
493
+ (3.12)
494
+ or, for any random field y(ω) ∈ Y such that y(ω) ≤ 0 a.s.,
495
+ ⟨y, gε(y)⟩Y∗,Y ≥ −ηint(ε),
496
+ (3.13)
497
+ where ηmax(ε), ηint(ε) ≥ 0, ∀ε > 0, ηmax(ε), ηint(ε) → 0 as ε → 0.
498
+ Notice that all the conditions in (3.11) are satisfied by the softplus function (3.2) (see
499
+ Lemma 3.3). We only need to check (3.12) or alternatively (3.13).
500
+
501
+ 8
502
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
503
+ Conjecture 3.9. Our numerical experiments demonstrate that for the softplus function
504
+ (3.2) it holds ηmax(ε) = O(ε2) and ηint(ε) = O(ε3), although we are only able to prove the
505
+ latter estimate under specific conditions (Lemma 3.11 and Theorem 3.12).
506
+ Now we are able to prove the strong convergence of the smoothed optimal control.
507
+ Theorem 3.10. Under Assumptions 2.1 and 3.6–3.8, linear operator S, and ε = εγ depen-
508
+ dent on γ in such a way that
509
+ γ min{ηmax(εγ), ηint(εγ)} → 0,
510
+ as
511
+ γ → ∞,
512
+ and ⟨f, f⟩Y∗,Y = ∥f∥2
513
+ L2(Ω,D) for any f ∈ Y, the minimizer uγ of (3.3) converges to the
514
+ solution u∗ of the exact problem (2.1)–(2.3),
515
+ α∥uγ − u∗∥2
516
+ U + γ
517
+ 2∥(Suγ − ymax)+∥2
518
+ L2(Ω,D) → 0,
519
+ γ → ∞.
520
+ Proof. The optimality condition for the smoothed problem, ⟨∇ujγ,ε(uγ), v − uγ⟩U∗,U ≥ 0,
521
+ ∀v ∈ Uad, can be expanded by introducing an auxiliary variable λγ to match the gradient of
522
+ the Moreau-Yosida term:
523
+ ⟨j′(uγ) + S∗λγ, v − uγ⟩U∗,U ≥ 0,
524
+ (3.14)
525
+ γg′
526
+ ε(Suγ − ymax)gε(Suγ − ymax) = λγ.
527
+ (3.15)
528
+ In turn, the KKT conditions for the original problem read
529
+ ⟨j′(u∗) + S∗λ∗, v − u∗⟩U∗,U ≥ 0
530
+ ∀v ∈ Uad
531
+ (3.16)
532
+ λ∗ ≥ 0
533
+ Su∗ − ymax ≤ 0
534
+ ⟨λ∗, Su∗ − ymax⟩Y∗,Y = 0.
535
+ (3.17)
536
+ Adding (3.16) with v = uγ to (3.14) with v = u∗, and casting S∗ onto another side of the
537
+ duality pairing, we get
538
+ 0 ≥ ⟨j′(uγ) + S∗λγ − j′(u∗) − S∗λ∗, uγ − u∗⟩U∗,U
539
+ = ⟨j′(uγ) − j′(u∗), uγ − u∗⟩U∗,U + ⟨λγ, Suγ − Su∗⟩Y∗,Y + ⟨j′(u∗), uγ − u∗⟩U∗,U.
540
+ (3.18)
541
+ Due to the strong convexity, (3.18), and Assumption 3.6 we arrive at
542
+ α∥uγ − u∗∥2
543
+ U + ⟨λγ, Suγ − Su∗⟩Y∗,Y ≤ ⟨j′(u∗), u∗ − uγ⟩U∗,U ≤ ∥j′(u∗)∥U∗∥u∗ − uγ∥U. (3.19)
544
+ The second term on the left hand side can be bounded as follows.
545
+ Using the fact that
546
+ ymax − Su∗ ≥ 0 a.s. and the definition of λγ, we obtain that
547
+ ⟨λγ, Suγ − Su∗⟩Y∗,Y = ⟨λγ, (Suγ − ymax) + (ymax − Su∗)⟩Y∗,Y
548
+ ≥ ⟨λγ, Suγ − ymax⟩Y∗,Y
549
+ = γ⟨g′
550
+ ε(Suγ − ymax)gε(Suγ − ymax), Suγ − ymax⟩Y∗,Y
551
+ = γ⟨g′
552
+ ε(Suγ − ymax)(Suγ − ymax), gε(Suγ − ymax)⟩Y∗,Y
553
+ = γ⟨g′
554
+ ε(Suγ − ymax)(Suγ − ymax)+, gε(Suγ − ymax)⟩Y∗,Y
555
+ + γ⟨g′
556
+ ε(Suγ − ymax)(Suγ − ymax)−, gε(Suγ − ymax)⟩Y∗,Y,
557
+ (3.20)
558
+
559
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
560
+ 9
561
+ where we have split Suγ − ymax into positive and negative parts, with (s)− = min(s, 0)
562
+ denoting the negative part. Next using Assumption 3.8 in (3.20), we readily obtain that
563
+ ⟨λγ, Suγ − Su∗⟩Y∗,Y ≥ γ⟨0.5(Suγ − ymax)+, (Suγ − ymax)+⟩Y∗,Y
564
+ + γ⟨0.5(Suγ − ymax)−, gε(Suγ − ymax)⟩Y∗,Y
565
+ (3.21)
566
+ ≥ γ
567
+
568
+ 0.5∥(Suγ − ymax)+∥2
569
+ L2(Ω,D) − 0.5ηint(ε)
570
+
571
+ .
572
+ (3.22)
573
+ Alternatively, we can bound (3.21) using (3.12) to arrive at
574
+ ⟨λγ, Suγ − Su∗⟩Y∗,Y ≥ γ
575
+
576
+ 0.5∥(Suγ − ymax)+∥2
577
+ L2(Ω,D) − 0.5ηmax(ε)∥1∥2
578
+ L2(Ω,D)
579
+
580
+ .
581
+ In either case, (3.19) implies that uγ is bounded in Uad. Therefore, there exists a weakly
582
+ converging subsequence uγ ⇀ ˆu in U as γ → ∞. Since, Uad is closed convex, therefore
583
+ ˆu ∈ Uad. If ε = εγ → 0 as γ → ∞, Assumption 3.8 (for both ηmax and ηint) implies that
584
+ 0.5γ∥(Suγ −ymax)+∥2
585
+ L2(Ω,D) is bounded, which means ∥(Suγ −ymax)+∥2
586
+ L2(Ω,D) → 0 as γ → ∞.
587
+ Since S is injective and linear, ∥(Suγ − ymax)+∥2
588
+ L2(Ω,D) is continuous and convex, hence [38,
589
+ Theorem 2.12]:
590
+ 0 = lim inf
591
+ γ→∞ ∥(Suγ − ymax)+∥2
592
+ L2(Ω,D) ≥ ∥(Sˆu − ymax)+∥2
593
+ L2(Ω,D).
594
+ Since D is a connected domain of positive measure, this yields |(Sˆu − ymax)+| = 0, that is,
595
+ Sˆu ≤ ymax a.s. Adding again (3.16) and (3.14) and using strong convexity of j, but keeping
596
+ both λγ and λ∗, we get
597
+ α∥uγ − u∗∥2
598
+ U ≤ ⟨λ∗ − λγ, Suγ − Su∗⟩Y∗,Y
599
+ (3.23)
600
+ ≤ ⟨λ∗, (Suγ − ymax) + (ymax − Su∗)⟩Y∗,Y
601
+ (3.24)
602
+ − γ
603
+ 2∥(Suγ − ymax)+∥2
604
+ L2(Ω,D) + γ
605
+ 2 min{∥1∥2
606
+ L2(Ω,D)ηmax(εγ), ηint(εγ)},
607
+ (3.25)
608
+ where we used (3.22) with the negative sign. If γηmax(εγ) → 0 or γηint(εγ) → 0, then
609
+ 0 ≤ lim
610
+ γ→∞[α∥uγ − u∗∥2
611
+ U] ≤ lim
612
+ γ→∞⟨λ∗, Suγ − ymax⟩Y∗,Y = ⟨ λ∗
613
+ ����
614
+ ≥0
615
+ , Sˆu − ymax
616
+
617
+ ��
618
+
619
+ ≤0
620
+ ⟩Y∗,Y ≤ 0
621
+ (3.26)
622
+ due to (3.17), so uγ → u∗, thereby completing the proof of the theorem.
623
+
624
+ Lemma 3.11. For the softplus function (3.2) it holds for any ε ≥ 0:
625
+ ˆ 0
626
+ −∞
627
+ sgε(s)ds ≥ −ε3.
628
+ Proof. The proof uses elementary calculus and is given in Appendix A.
629
+
630
+ In order to search for a rate of convergence, we establish the following result:
631
+ Theorem 3.12. Suppose Assumptions 2.1, 3.1 and 3.6–3.8 hold, ˆY is a space of scalar
632
+ functions, the operator S is linear, and |∂(Su − ymax)/∂ξ1| ≥ c > 0 a.s. ∀u ∈ Uad. Suppose
633
+ that ⟨f, g⟩ ˆY∗, ˆY =
634
+ ´
635
+ D f(x)g(x)dx ∀f, g ∈ ˆY, and maxξ1∈R π(ξ1) = P < ∞. Let ε = ε0/√γ
636
+
637
+ 10
638
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
639
+ with any ε0 > 0. Then the minimizer uγ of (3.3) converges to the solution u∗ of the exact
640
+ problem (2.1)–(2.3), and
641
+ ∥uγ − u∗∥2
642
+ U ≤ Cε3
643
+ 0γ−1/2 + 1
644
+ α⟨λ∗, Suγ − ymax⟩Y∗,Y → 0,
645
+ γ → ∞,
646
+ where C > 0 is independent of γ and ε0.
647
+ Remark 3.13. For the classical Moreau-Yosida penalty with ε0 = 0, we recover existing
648
+ convergence estimates [21, 2] that depend only on ⟨λ∗, Suγ − ymax⟩Y∗,Y. This term converges
649
+ to 0 as shown in (3.26), but the rate of this convergence can be estimated only if bounds on
650
+ ∥λ∗∥L2(Ω,D) or ∥Suγ −ymax∥Y can be established from other sources, such as the discretization
651
+ of Y [21, Theorem 3.7].
652
+ Proof. We aim at refining the estimate (3.22). Specifically, we need to lower-bound ⟨(Suγ −
653
+ ymax)−, gε(Suγ − ymax)⟩Y∗,Y, where (y)− = min(y, 0).
654
+ For brevity, let f(x, ξ) = Suγ −
655
+ ymax(x, ξ). Using the particular form of duality pairing and Assumption 3.1, we can write
656
+ ⟨(Suγ − ymax)−, gε(Suγ − ymax)⟩Y∗,Y =
657
+ ˆ
658
+ Rd
659
+ ˆ
660
+ D
661
+ (f)−gε(f)dxπ(ξ1) · · · π(ξd)dξ
662
+ =
663
+ ˆ
664
+ D
665
+ ˆ
666
+ f(x,ξ)≤0
667
+ fgε(f)π(ξ1) · · · π(ξd)dξdx.
668
+ (3.27)
669
+ Introduce a change of variables
670
+
671
+ ����
672
+ ξ1
673
+ ξ2...
674
+ ξd
675
+
676
+ ���� →
677
+
678
+ ����
679
+ f(x, ξ)
680
+ ξ2...
681
+ ξd
682
+
683
+ ����
684
+ with the Jacobian
685
+ J :=
686
+ ���������
687
+ det
688
+
689
+ ����
690
+ ∂f
691
+ ∂ξ1
692
+ ∂f
693
+ ∂ξ2
694
+ · · ·
695
+ ∂f
696
+ ∂ξd
697
+ 0
698
+ 1
699
+ · · ·
700
+ 0
701
+ ...
702
+ 0
703
+ · · ·
704
+ 0
705
+ 1
706
+
707
+ ����
708
+ ���������
709
+ =
710
+ ����
711
+ ∂f
712
+ ∂ξ1
713
+ ���� ≥ c > 0.
714
+ Now we can express (3.27) using univariate integration,
715
+ ⟨(Suγ − ymax)−, gε(Suγ − ymax)⟩Y∗,Y =
716
+ ˆ
717
+ D
718
+ ˆ 0
719
+ min f
720
+ ˆ
721
+ Rd−1 fgε(f)J−1π(ξ1(f)) · · · π(ξd)dξ2 · · · dξddfdx
722
+
723
+ ˆ
724
+ D
725
+ ˆ 0
726
+ −∞
727
+ fgε(f)1
728
+ cPdfdx
729
+ ≥ −|D|P 1
730
+ cε3,
731
+ where in the second line we used that the expression under the integral is nonpositive, and
732
+ ´
733
+ π(x2)dx2 = · · · =
734
+ ´
735
+ π(xd)dxd = 1, and in the third line we used Lemma 3.11.
736
+
737
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
738
+ 11
739
+ Now we can replace (3.22) as follows:
740
+ ⟨λγ, Suγ − Su∗⟩Y∗,Y ≥ γ
741
+
742
+ 0.5∥(Suγ − ymax)+∥2
743
+ L2(Ω,D) − 0.5|D|P 1
744
+ cε3
745
+
746
+ .
747
+ Proceeding as in Theorem 3.10, we replace (3.25) by
748
+ α∥uγ − u∗∥2
749
+ U ≤ ⟨λ∗, Suγ − ymax⟩Y∗,Y + γ
750
+ 2|D|P 1
751
+ cε3.
752
+ Setting ε = ε0/√γ, we obtain that
753
+ ∥uγ − u∗∥2
754
+ U ≤ 1
755
+ α⟨λ∗, Suγ − ymax⟩Y∗,Y + |D|P
756
+ 2cα
757
+ � �� �
758
+ C
759
+ ε3
760
+ 0
761
+ γ1/2.
762
+ Thus the proof is complete.
763
+
764
+ Remark 3.14. This theorem can be generalized to vector-valued functions straightforwardly.
765
+ Indeed, if fi(x, ξ) denotes the ith component of a vector function, the duality pairing (3.27)
766
+ reads
767
+ ⟨(f)−, gε(f)⟩Y∗,Y =
768
+ ˆ
769
+ Rd
770
+ ˆ
771
+ D
772
+
773
+ i
774
+ (fi)−gε(fi)dxπ(ξ)dξ =
775
+
776
+ i
777
+ ˆ
778
+ D
779
+ ˆ
780
+ fi(x,ξ)≤0
781
+ figε(fi)π(ξ)dξdx,
782
+ and ξ1 can be changed to fi for each term of the sum over i.
783
+ The assumption of a lower bound of the Jacobian is practical.
784
+ The Karhunen-Loeve
785
+ expansion as in Example 3.2 is normally derived as the eigenvalue expansion of the covariance
786
+ function of e.g.
787
+ κ.
788
+ By the Perron-Frobenius theorem, ψ1(x) = ∂κ/∂ξ1 > 0.
789
+ Further,
790
+ ∂y/∂κ ̸= 0 due to ellipticity. Hence ∂(Su)/∂ξ1 ̸= 0 whenever either u or boundary conditions
791
+ or source term are nonzero. The remaining assumptions of Thm. 3.12 are also reasonable for
792
+ practical solutions of regularized optimization problems. A convenient observation is that
793
+ ε = ε0/√γ is the sufficient condition on the law of decay of the smoothing parameter for
794
+ both Theorems 3.4 and 3.12.
795
+ 4. Tensor-Train decomposition
796
+ Throughout this section, we use Assumption 3.1. Recall that the bottleneck is the com-
797
+ putation of the expectation in e.g. gradient (3.5). While it may be possible to use a Monte
798
+ Carlo quadrature, its convergence is usually slow, which may make estimates of small values
799
+ of the gradient near the optimum particularly inaccurate. In this section, we describe the
800
+ Tensor-Train (TT) decomposition as a function approximation technique that allows fast
801
+ computation of the expectation. The original TT decomposition [30] was proposed for ten-
802
+ sors (such as tensors of expansion coefficients), and the functional TT (FTT) decomposition
803
+ [5, 19] has extended this idea to multivariate functions.
804
+ Let us introduce a basis {ℓi(ξk)}
805
+
806
+ i=1 in each random variable ξk, k = 1, . . . , d, and a
807
+ quadrature with nodes Z = {zj} and weights {wj} which is exact on this basis,
808
+ E[ℓi] =
809
+
810
+
811
+ j=1
812
+ wjℓi(zj).
813
+
814
+ 12
815
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
816
+ For example, we can take Lagrange interpolation polynomials built upon a Gaussian quadra-
817
+ ture, or orthogonal polynomials up to degree nξ − 1 together with the roots of the degree-nξ
818
+ polynomial, or Fourier modes and the rectangular quadrature with the number of nodes
819
+ corresponding to the highest frequency. Then we can approximate any random field y ∈ Y
820
+ in the tensor product basis,
821
+ y(ξ) ≈
822
+
823
+
824
+ i1=1
825
+ · · ·
826
+
827
+
828
+ id=1
829
+ Yi1,...,idℓi1(ξ1) · · · ℓid(ξd).
830
+ Note that the expansion coefficients Y form a tensor of nd
831
+ ξ entries, which is impossible to
832
+ store directly if d is large. The TT decomposition aims to factorize this tensor further to a
833
+ product of tensors of manageable size.
834
+ Definition 4.1. A tensor Y ∈ Rnξ×···×nξ is said to be approximated by the TT decomposition
835
+ with a relative approximation error ϵ if there exist 3-dimensional tensors Y(k) ∈ Rrk−1×nξ×rk,
836
+ k = 1, . . . , d, such that
837
+ ˜Yi1,...,id :=
838
+ r0,...,rd
839
+
840
+ s0,...,sd=1
841
+ Y(1)
842
+ s0,i1,s1Y(2)
843
+ s1,i2,s2 · · · Y(d)
844
+ sd−1,id,sd,
845
+ (4.1)
846
+ and ∥Y− ˜Y∥F = ϵ∥Y∥F. The factors Y(k) are called TT cores, and the ranges of summation
847
+ indices r0, . . . , rd ∈ N are called TT ranks. Note that without loss of generality we can let
848
+ r0 = rd = 1.
849
+ Plugging in the basis and redistributing the summations we obtain the FTT approximation
850
+ ˜y(ξ) :=
851
+ r0,...,rd
852
+
853
+ s0,...,sd=1
854
+ y(1)
855
+ s0,s1(ξ1)y(2)
856
+ s1,s2(ξ2) · · · y(d)
857
+ sd−1,sd(ξd),
858
+ where
859
+ y(k)
860
+ sk−1,sk(ξk) =
861
+
862
+
863
+ i=1
864
+ Y(k)
865
+ sk−1,i,skℓi(ξk),
866
+ k = 1, . . . , d.
867
+ Smooth [35], weakly correlated [33] or certainly structured [20] functions have been shown
868
+ to induce rapidly converging TT approximations.
869
+ Given the TT decomposition, its expectation can be computed by first integrating each
870
+ TT core, and then multiplying the TT cores one by one. Let
871
+ V(k)
872
+ sk−1,sk =
873
+
874
+
875
+ j=1
876
+ wjy(k)
877
+ sk−1,sk(zj) =
878
+
879
+
880
+ i,j=1
881
+ wjLi,jY(k)
882
+ sk−1,i,sk,
883
+ where
884
+ Li,j = ℓi(zj).
885
+ (4.2)
886
+ Now we multiply the matrices V(k) ∈ Rrk−1×rk in order:
887
+ E[˜y] =
888
+ ���
889
+ V(1)V(2)�
890
+ V(3)
891
+
892
+ · · · V(d)
893
+
894
+ .
895
+ (4.3)
896
+ Note that each step in (4.3) is a product of 1 × rk−1 vector by rk−1 × rk matrix. In turn, the
897
+ univariate quadrature (4.2) requires n2
898
+ ξrk−1rk floating point operations if the Vandermonde
899
+ matrix L is dense, and nξrk−1rk if it’s sparse, for example, if Lagrange polynomials are used.
900
+
901
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
902
+ 13
903
+ Introducing r := maxk rk, we conclude that the expectation of a TT decomposition can be
904
+ computed with a complexity O(dr2) which is linear in the dimension.
905
+ To compute a TT approximation, we employ the TT-Cross algorithm [31]. We start with
906
+ an empirical risk minimization problem
907
+ min
908
+ Y(1),...,Y(d)
909
+ N
910
+
911
+ j=1
912
+
913
+ ˜y(ξj) − y(ξj)
914
+ �2
915
+ ,
916
+ where Ξ = {ξj} is a certain set of samples. To avoid minimization over all Y(1), . . . , Y(d)
917
+ simultaneously (which is non-convex), we switch to an alternating direction approach: iterate
918
+ over k = 1, . . . , d, solving in each step
919
+ min
920
+ Y(k)
921
+ N
922
+
923
+ j=1
924
+
925
+ ˜y(ξj) − y(ξj)
926
+ �2
927
+ .
928
+ (4.4)
929
+ This problem can be solved by linear normal equations. Indeed, introduce a matrix Y̸=k ∈
930
+ RN×(rk−1nξrk) with elements
931
+ (Y̸=k)j,t =
932
+
933
+ s0,...,sk−2
934
+ y(1)
935
+ s0,s1(ξj
936
+ 1) · · · y(k−1)
937
+ sk−2,sk−1(ξj
938
+ k−1)ℓi(ξj
939
+ k)
940
+
941
+ sk+1,...,sd
942
+ y(k+1)
943
+ sk,sk+1(ξj
944
+ k+1) · · · y(d)
945
+ sd−1,sd(ξj
946
+ d),
947
+ where t = (sk−1 − 1)nξrk + (i − 1)rk + sk, and a vector y(k) ∈ Rrk−1nξrk with elements
948
+ y(k)
949
+ t
950
+ = Y(k)
951
+ sk−1,i,sk. Now ˜y(Ξ) = Y̸=ky(k), and (4.4) is minimized by
952
+ y(k) = (Y⊤
953
+ ̸=kY̸=k)−1(Y⊤
954
+ ̸=ky(Ξ)).
955
+ (4.5)
956
+ To both select “good” sample set Ξ and simplify the assembly of Y̸=k, we restrict the set
957
+ to have the Cartesian form
958
+ Ξ = Ξ<k × Z × Ξ>k,
959
+ where Ξ<k = {(ξ1, . . . , ξk−1)}, Ξ>k = {(ξk+1, . . . , ξd)} with nestedness conditions
960
+ (ξ1, . . . , ξk−1, ξk) ∈ Ξ<k+1 ⇒ (ξ1, . . . , ξk−1) ∈ Ξ<k,
961
+ (ξk, ξk+1, . . . , ξd) ∈ Ξ>k−1 ⇒ (ξk+1, . . . , ξd) ∈ Ξ>k.
962
+ This makes
963
+ Y̸=k = Y<k ⊗ L ⊗ Y>k,
964
+ where
965
+ (Y<k)j,s =
966
+
967
+ s0,...,sk−2
968
+ y(1)
969
+ s0,s1(ξj
970
+ 1) · · · y(k−1)
971
+ sk−2,s(ξj
972
+ k−1),
973
+ (ξj
974
+ 1, . . . , ξj
975
+ k−1) ∈ Ξ<k,
976
+ (Y>k)j,s =
977
+
978
+ sk+1,...,sd
979
+ y(k+1)
980
+ s,sk+1(ξj
981
+ k+1) · · · y(d)
982
+ sd−1,sd(ξj
983
+ d),
984
+ (ξj
985
+ k+1, . . . , ξj
986
+ d) ∈ Ξ>k.
987
+ Moreover, Y<k+1 and Y>k−1 are submatrices of
988
+ Y≤k :=
989
+
990
+ ��
991
+ Y<ky(k)(z1)
992
+ ...
993
+ Y<ky(k)(znξ)
994
+
995
+ ��
996
+ and
997
+ Y≥k :=
998
+
999
+ y(k)(z1)Y>k
1000
+ · · ·
1001
+ y(k)(znξ)Y>k
1002
+
1003
+ ,
1004
+ (4.6)
1005
+
1006
+ 14
1007
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
1008
+ respectively. This allows us to build the sampling sets by selecting rk rows of Y≤k (resp.
1009
+ columns of Y≥k) by the maximum volume principle [18], which needs only O(nξr3) floating
1010
+ point operations per single matrix Y≤k or Y≥k. The rk indices of e.g. rows of Y≤k con-
1011
+ stituting the maximum volume submatrix Y<k are also indices of the rk tuples in Ξ<k × Z
1012
+ constituting the next “left” set Ξ<k+1. The “right” set Ξ>k−1 is constructed analogously.
1013
+ This closes the recursion and allows us to carry out the alternating iteration in either di-
1014
+ rection, k = 1, . . . , d or k = d, . . . , 1. By this construction, the cardinality of Ξ<k+1 and
1015
+ Ξ>k−1 is rk. Hence, the cardinality of Ξ is rk−1nξrk, and one full iteration of the TT-Cross
1016
+ algorithm needs O(dnξr2) samples of y.
1017
+ One drawback of the “naive” TT-Cross algorithm outlines above is that the TT ranks are
1018
+ fixed. To adapt them to a desired error tolerance, several modifications have been proposed:
1019
+ merge ξk, ξk+1 into one variable, optimize the corresponding larger TT core, and separate it
1020
+ into two actual TT cores using truncated singular value decomposition (SVD) [34] or matrix
1021
+ adaptive cross approximation [8]; oversample Ξ<k or Ξ>k with random or error-targeting
1022
+ points [10]; oversample the selection of submatrices from (4.6) by using the rectangular
1023
+ maximum volume principle [29].
1024
+ However, in this paper we can pursue a somewhat more natural regression approach [7]. We
1025
+ will always need to approximate a vector function, where different components correspond
1026
+ to different degrees of freedom of an ODE or a PDE solution, or different components of
1027
+ a gradient. Since the procedure to evaluate y is now taking two arguments (ξ and, say,
1028
+ m = 1, . . . , M indexing extra degrees of freedom), we can replace the normal equations (4.5)
1029
+ by
1030
+ y(k)(m) = (Y⊤
1031
+ ̸=kY̸=k)−1(Y⊤
1032
+ ̸=ky(Ξ, m)),
1033
+ which can be reshaped into a 4-dimensional tensor ˆY(k) ∈ Rrk−1×nξ×rk×M with elements
1034
+ ˆY(k)
1035
+ sk−1,i,sk,m = y(k)
1036
+ t (m). To compute the usual 3-dimensional TT core, we can use a simple
1037
+ Principal Component Analysis (PCA), which selects ˆr slices Y(k)
1038
+ sk−1,i,1, . . . , Y(k)
1039
+ sk−1,i,ˆr with the
1040
+ minimal ˆr such that
1041
+ min
1042
+ W
1043
+
1044
+ sk−1,i,sk,m
1045
+
1046
+
1047
+ ˆr
1048
+
1049
+ s=1
1050
+ Y(k)
1051
+ sk−1,i,sWs,sk,m − ˆY(k)
1052
+ sk−1,i,sk,m
1053
+
1054
+
1055
+ 2
1056
+ ≤ tol2 · ∥ ˆY(k)∥2
1057
+ F.
1058
+ Note that this problem is solved easily by the truncated SVD, where the new TT rank ˆr
1059
+ can be chosen anywhere between 1 and min{rk−1nξ, rkM} to satisfy the error tolerance tol.
1060
+ After replacing rk with ˆr, the TT-Cross iteration k = 1, . . . , d can proceed as previously.
1061
+ In the last step (k = d), the PCA step is omitted, and we obtain the so-called block TT
1062
+ decomposition [9], which in the functional form reads
1063
+ ˜y(ξ, m) =
1064
+
1065
+ s0,...,sd
1066
+ y(1)
1067
+ s0,s1(ξ1) · · · y(d−1)
1068
+ sd−2,sd−1(ξd−1)ˆy(d)
1069
+ sd−1,sd(ξd, m).
1070
+ The “backward” iteration k = d, . . . , 1 can be generalized similarly.
1071
+
1072
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
1073
+ 15
1074
+ 5. Practical computation of the smoothed Moreau-Yosida optimization
1075
+ To compute the gradient of the cost function (3.5), we need to approximate the function
1076
+ under the expectation,
1077
+ Gε,h
1078
+ u (ξ) := Sh(ξ)∗ · diag(g′
1079
+ ε(Sh(ξ)u − yh
1080
+ max(ξ))) · Mgε(Sh(ξ)u − yh
1081
+ max(ξ)),
1082
+ (5.1)
1083
+ using the TT-Cross, followed by taking the expectation of the TT decomposition1 This can be
1084
+ performed in two ways. To begin with, we can apply the TT-Cross algorithm to approximate
1085
+ directly Gε,h
1086
+ u (ξ). For each sample ξj ∈ Ξ, one needs to solve one forward problem to compute
1087
+ Sh(ξj)u, and one adjoint problem to apply Sh(ξj)∗ to the rest of the function. Recall that
1088
+ the TT-Cross needs O(dnξr2) samples, hence O(dnξr2) solutions of the forward, adjoint
1089
+ and sensitivity problems. However, the maximal TT rank r of the softplus and sigmoid
1090
+ functions typically grows proportional to 1/ε. When the solution of the forward and adjoint
1091
+ problem is expensive (for example, in the PDE-constrained optimization), this may result in
1092
+ an excessive computational complexity.
1093
+ Alternatively, we can first compute TT approximations ˜y(ξ) ≈ Sh(ξ)u and ˜Sh(ξ)∗ ≈
1094
+ Sh(ξ)∗, followed by TT approximations ˜gε(ξ) :≈ gε(˜y(ξ) − yh
1095
+ max(ξ)), ˜g′
1096
+ ε(ξ) :≈ g′
1097
+ ε(˜y(ξ) −
1098
+ yh
1099
+ max(ξ)), and finally ˜Gε,h
1100
+ u (ξ) ≈ ˜Sh(ξ)∗diag(˜g′
1101
+ ε(ξ))˜gε(ξ) using the approximate solution ˜y(ξ),
1102
+ which does not require the solution of the PDE anymore. The bottleneck now is the ap-
1103
+ proximation of the matrix-valued function Sh(ξ)∗ ∈ Rnu×ny. If both ny and nu are large (for
1104
+ example, in a case of a distributed control), the computation of Sh(ξ)∗ for each sample of ξ
1105
+ requires assembling this large dense matrix, equivalent to the solution of the adjoint prob-
1106
+ lem with nu right hand sides. Nevertheless, the tensor approximation of Sh(ξ)∗ converges
1107
+ usually much faster (e.g. exponentially) compared to the approximation of Gε,h
1108
+ u (ξ) directly,
1109
+ hence the TT approximation of Sh(ξ)∗ may need much smaller TT ranks compared to the
1110
+ TT approximation of Gε,h
1111
+ u (ξ). In turn, the TT-Cross applied to Sh(ξ)∗ requires much fewer
1112
+ solutions of the forward problem. For a moderate nu this makes it faster to precompute ˜y(ξ)
1113
+ and ˜Sh(ξ)∗. The entire pseudocode of the smoothed Moreau-Yosida optimization is listed in
1114
+ Algorithm 1.
1115
+ 6. Numerical examples
1116
+ We start with γ0 = 1 and double γℓ+1 = 2γℓ in the course of the Newton iterations until
1117
+ a desired value of γ∗ is reached. According to Theorem 3.4, we choose εℓ = 0.5/√γℓ. The
1118
+ iteration is stopped when γL has reached the maximal desired value γ∗, and the step size has
1119
+ become smaller than δmin = 10−3. We always take a zero control as the initial guess u0, and
1120
+ θ = 10−4. All computations are carried out in MATLAB 2020b on a Intel Xeon E5-2640 v4
1121
+ CPU, using TT-Toolbox (https://github.com/oseledets/TT-Toolbox).
1122
+ 6.1. One-dimensional Elliptic PDE. We consider an elliptic PDE example from [22, 13].
1123
+ Here, a misfit functional
1124
+ j(u) = 1
1125
+ 2E
1126
+
1127
+ ∥y(u, ω, x) − yd(x)∥2
1128
+ L2(D)
1129
+
1130
+ + α
1131
+ 2 ∥u(x)∥2
1132
+ L2(D)
1133
+ 1Note that Gε,h
1134
+ u (ξ) is a vector function with M being the number of degrees of freedom in the discretized
1135
+ u.
1136
+
1137
+ 16
1138
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
1139
+ Algorithm 1 Inexact projected Newton optimization with smoothed a.s. constraints
1140
+ Require: Procedures to compute Shu, jh(u), ∇ujh(u), constraint yh
1141
+ max, initial and maximal
1142
+ Moreau-Yosida parameters γ0, γ∗, initial smoothing parameter ε0, initial control u0, ap-
1143
+ proximation and stopping tolerance tol, maximal number of iterations L, Armijo tuning
1144
+ parameter θ ∈ (0, 1), minimal step size δmin ∈ (0, 1).
1145
+ Ensure: Optimized control uγ∗,h.
1146
+ 1: Set iteration number ℓ = 0, step size δ = 1, u−1 = u0.
1147
+ 2: while ℓ < L and δ > δmin and ∥uℓ − uℓ−1∥U > tol · ∥uℓ∥U or ℓ = 0 or γℓ < γ∗ do
1148
+ 3:
1149
+ Set ε = ε0/√γℓ.
1150
+ 4:
1151
+ Approximate ˜Gε,h
1152
+ uℓ (ξ) ≈ Gε,h
1153
+ uℓ (ξ) as shown in (5.1) using TT-Cross up to tolerance tol.
1154
+ 5:
1155
+ Approximate ˜g′
1156
+ ε(ξ) ≈ g′
1157
+ ε(Sh(ξ)uℓ − yh
1158
+ max(ξ)) using TT-Cross up to tolerance tol.
1159
+ 6:
1160
+ Compute the gradient ∇ujγℓ,ε,h = ∇ujh(uℓ) + γℓE[ ˜Gε,h
1161
+ uℓ (ξ)]
1162
+ 7:
1163
+ Compute the anchor point ξ∗ = E[ξ · 1⊤˜g′
1164
+ ε(ξ)]/E[1⊤˜g′
1165
+ ε(ξ)].
1166
+ 8:
1167
+ Compute the Newton direction v = − ˜H−1∇ujγℓ,ε,h using (3.9).
1168
+ 9:
1169
+ Set step size δ = 1.
1170
+ 10:
1171
+ while jh(PUad(uℓ + δv)) > jh(uℓ) + δθ⟨v, ∇ujγℓ,ε,h⟩U∗,U and δ > δmin do
1172
+ 11:
1173
+ Set δ = δ/2.
1174
+ 12:
1175
+ end while
1176
+ 13:
1177
+ Set uℓ+1 = PUad(uℓ + δv).
1178
+ 14:
1179
+ Set γℓ+1 = min{2γℓ, γ∗}.
1180
+ 15:
1181
+ Set ℓ = ℓ + 1.
1182
+ 16: end while
1183
+ 17: return uγ∗,h = uℓ.
1184
+ is optimized subject to the stochastic PDE constraint2
1185
+ ν(ω)∆y(u, ω, x) = g(ω, x) + u(x),
1186
+ (ω, x) ∈ Ω × D,
1187
+ ν(ω) = 10ξ1(ω)−2,
1188
+ g(ω, x) = ξ2(ω)
1189
+ 100 ,
1190
+ y|x=0 = −1 − ξ3(ω)
1191
+ 1000 ,
1192
+ y|x=1 = −2 + ξ4(ω)
1193
+ 1000
1194
+ (6.1)
1195
+ where D = (0, 1), and ξ(ω) = (ξ1(ω), . . . , ξ4(ω)) ∼ U(−1, 1)4 is uniformly distributed. We
1196
+ take the desired state yd(x) = − sin(50x/π) and the regularization parameter α = 10−2.
1197
+ Moreover, we add the constraints
1198
+ y(u, ω, x) ≤ ymax ≡ 0
1199
+ a.s.,
1200
+ and
1201
+ − 0.75 ≤ u(x) ≤ 0.75
1202
+ a.e.
1203
+ We discretize (6.1) in the spatial coordinate x using linear finite elements on a uniform
1204
+ grid with ny interior points, and in each random variable ξi(ω) using nξ Gauss-Legendre
1205
+ quadrature nodes on (−1, 1). Note that we exclude the boundary points x = 0 and x = 1
1206
+ due to the Dirichlet boundary conditions. This spatial discretization is used for both y and
1207
+ u.
1208
+ 2Note that [22, 13] considered the constraint y ≥ 0, so here we reverse the sign of y to make the constraint
1209
+ in the form (2.3).
1210
+
1211
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
1212
+ 17
1213
+ Firstly, we study precomputation of the surrogate solution ˜y(ξ) and adjoint operator
1214
+ ˜S∗
1215
+ h(ξ).
1216
+ We fix ny = 63, nξ = 65, the TT approximation tolerance 10−7 and the final
1217
+ Moreau-Yosida regularization parameter γ∗ = 1000.
1218
+ The direct computation of the TT
1219
+ approximation of (5.1) requires 995 seconds of the CPU time due to the maximal TT rank
1220
+ of 87. In contrast, ˜S∗
1221
+ h has the maximal TT rank of 8, and the computation of ˜S∗
1222
+ h requires
1223
+ only 64 seconds despite a larger ny × ny TT core carrying the spatial variables. Using the
1224
+ surrogates ˜y and ˜S∗
1225
+ h, the remaining computation of ∇ujγ,ε,h can be completed in less than 15
1226
+ seconds. The relative difference between the two approximations of ∇ujγ,ε,h is below the TT
1227
+ approximation tolerance. This shows that the surrogate forward solution can significantly
1228
+ speed up Algorithm 1 without degrading its convergence, so we use it in all remaining
1229
+ experiments in this subsection.
1230
+ 0
1231
+ 0.2
1232
+ 0.4
1233
+ 0.6
1234
+ 0.8
1235
+ 1
1236
+ −0.6
1237
+ −0.4
1238
+ −0.2
1239
+ 0
1240
+ 0.2
1241
+ 0.4
1242
+ 0.6
1243
+ x
1244
+ u
1245
+ γ∗ = 3000
1246
+ γ∗ = 1000
1247
+ γ∗ = 300
1248
+ γ∗ = 100
1249
+ 0
1250
+ 0.2
1251
+ 0.4
1252
+ 0.6
1253
+ 0.8
1254
+ 1
1255
+ −1.6
1256
+ −1.4
1257
+ −1.2
1258
+ −1
1259
+ −0.8
1260
+ −0.6
1261
+ −0.4
1262
+ −0.2
1263
+ 0
1264
+ ymax = 0
1265
+ x
1266
+ y
1267
+ Figure 1. Left: control signals uγ∗(x) for different γ∗. Right: mean (solid
1268
+ lines) and 95% confidence interval (shaded area, for γ∗ = 3000 only) of the
1269
+ state y(uγ∗, ω, x).
1270
+ In Figure 1 we show the solutions (control and state) for varying final Moreau-Yosida
1271
+ penalty parameter γ∗, fixing ny = 63, nξ = 129 and the TT approximation tolerance of
1272
+ 10−6. We see that the solution converges with increasing γ∗, and larger γ∗ yields a smaller
1273
+ probability of the constraint violation, albeit at a larger misfit cost j(u), as shown in Figure 2.
1274
+ In particular, γ∗ > 300 gives a solution with less than 1% of the constraint violation, such
1275
+ that the empirical 95% confidence interval computed using 1000 samples of the converged
1276
+ field y(uγ∗) (see Fig. 1, right) is entirely within the constraint.
1277
+ Finally, we study the convergence in the approximation parameters more systematically
1278
+ in Figure 3.
1279
+ In each plot we fix two out of three parameters: the final Moreau-Yosida
1280
+ penalty γ∗, the number of discretization points in the random variables nξ, and the number
1281
+
1282
+ 18
1283
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
1284
+ 102
1285
+ 103
1286
+ 104
1287
+ 10−3
1288
+ 10−2
1289
+ γ∗
1290
+ 102
1291
+ 103
1292
+ 104
1293
+ 0.35
1294
+ 0.36
1295
+ 0.37
1296
+ 0.38
1297
+ 0.39
1298
+ γ∗
1299
+ Figure 2. Left: probability of the constraint violation, P(y(uγ∗, ω, x) > 0).
1300
+ Right: total final cost j(uγ∗).
1301
+ 102
1302
+ 102.5
1303
+ 103
1304
+ 10−1.5
1305
+ 10−1
1306
+ 10−0.5
1307
+ γ∗
1308
+ relative error
1309
+ u
1310
+ y
1311
+ γ−0.75
1312
+
1313
+ γ−0.5
1314
+
1315
+ 20
1316
+ 40
1317
+ 10−5
1318
+ 10−4
1319
+ 10−3
1320
+ 10−2
1321
+
1322
+ relative error
1323
+ u
1324
+ y
1325
+ 31
1326
+ 65
1327
+ 127
1328
+ 255
1329
+ 10−3
1330
+ 10−2
1331
+ 10−1
1332
+ ny
1333
+ relative error
1334
+ u
1335
+ y
1336
+ n−1.5
1337
+ y
1338
+ Figure 3. Relative L2-norm difference from y and u to the reference solutions
1339
+ with γ∗ = 104 with fixed nξ = 257, ny = 63 (left), nξ = 129 with fixed γ∗ = 100,
1340
+ ny = 63 (middle) and ny = 511 with fixed γ∗ = 100, nξ = 25 (right).
1341
+ of discretization points in space ny. In addition, we fix the TT approximation threshold
1342
+ to 10−8 to reduce its influence. We observe a convergence in line with the γ−1/2
1343
+
1344
+ rate of
1345
+ Theorem 3.4, exponential in nξ (which is often the case for a polynomial approximation of
1346
+ smooth functions [37]) until the tensor approximation error is hit, and between first and
1347
+ second order in ny, which seems to be an interplay of the discretization consistency of the
1348
+ linear finite elements (second order) and box constraints (first order).
1349
+
1350
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
1351
+ 19
1352
+ 6.2. Two-dimensional elliptic PDE. Now consider a two-dimensional extension of the
1353
+ previous problem,
1354
+ ν(ω)∆y(u, ω, x) = g(ω, x) + u(x),
1355
+ (ω, x) ∈ Ω × D,
1356
+ (6.2)
1357
+ y|x1=0 = b1(ω)(1 − x2) + b2(ω)x2,
1358
+ y|x2=1 = b2(ω)(1 − x1) + b3(ω)x1
1359
+ (6.3)
1360
+ y|x1=1 = b4(ω)(1 − x2) + b3(ω)x2,
1361
+ y|x2=0 = b1(ω)(1 − x1) + b4(ω)x1,
1362
+ (6.4)
1363
+ ν(ω) = 10ξ1(ω)−2,
1364
+ g(ω, x) = ξ2(ω)
1365
+ 100 ,
1366
+ (6.5)
1367
+ b1(ω) = −1 − ξ3(ω)
1368
+ 1000 ,
1369
+ b2(ω) = −2 + ξ4(ω)
1370
+ 1000
1371
+ ,
1372
+ (6.6)
1373
+ b3(ω) = −1 − ξ5(ω)
1374
+ 1000 ,
1375
+ b4(ω) = −2 + ξ6(ω)
1376
+ 1000
1377
+ ,
1378
+ (6.7)
1379
+ where D = (0, 1)2, and ξ(ω) = (ξ1(ω), . . . , ξ6(ω)) ∼ U(−1, 1)6 is uniformly distributed. We
1380
+ optimize the regularized misfit functional
1381
+ j(u) = 1
1382
+ 2E
1383
+
1384
+ ∥y(u, ω, x) − yd(x)∥2
1385
+ L2(D)
1386
+
1387
+ + α
1388
+ 2 ∥u(x)∥2
1389
+ L2(D)
1390
+ with the desired state yd(x) = − sin(50x1/π) cos(50x2/π) and the regularization parameter
1391
+ α = 10−2, subject to constraints
1392
+ y(u, ω, x) ≤ ymax ≡ 0
1393
+ a.s.,
1394
+ and
1395
+ − 0.75 ≤ u(x) ≤ 0.75
1396
+ a.e.
1397
+ We smooth the almost sure constraint by the Moreau-Yosida method with the ultimate
1398
+ penalty parameter γ∗ = 102.
1399
+ We discretize both y and u in (6.2) using bilinear finite elements on a ny × ny rectangular
1400
+ grid. For the two-dimensional problem, the operator ˜S∗
1401
+ h is a dense matrix of size n2
1402
+ y × n2
1403
+ y,
1404
+ which we are unable to precompute. Therefore, we use the TT-Cross to approximate Gε,h
1405
+ u (ξ)
1406
+ directly.
1407
+ In Figure 4 we show the optimal control, mean and standard deviation of the solution for
1408
+ ny = 63 and nξ = 17. We see that the mean solution reflects the desired state subject to the
1409
+ constraints. The final cost j(uγ∗) is about 0.222634, and the probability of the constraint
1410
+ violation is 0.0139223. The Newton method took L = 37 iterations to converge, the maximal
1411
+ TT rank of ˜y(ξ) was 10 which was the same in all iterations, the maximal rank of g′
1412
+ ε(˜y−yh
1413
+ max)
1414
+ was 300, attained at the iteration after reaching γ∗ (iteration 9), and the maximal rank of
1415
+ ˜Gε,h
1416
+ u (ξ) was 56 (in the final iterations). The computation took about a day of CPU time.
1417
+ However, these TT ranks are comparable to those in the one-dimensional example. This
1418
+ shows that the proposed technique can be also applied to a high-dimensional physical space,
1419
+ including complex domains and non-uniform grids, since the TT structure is independent of
1420
+ the spatial discretization.
1421
+ 6.3. Variational inequality constraints. In this section we minimize the regularized mis-
1422
+ fit
1423
+ j(u) = 1
1424
+ 2E[∥y(u, ω, x) − yd(x)∥2
1425
+ L2(D)] + 1
1426
+ 2∥u(x)∥2
1427
+ L2(D)
1428
+ (6.8)
1429
+
1430
+ 20
1431
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
1432
+ 0
1433
+ 0.2
1434
+ 0.4
1435
+ 0.6
1436
+ 0.8
1437
+ 1
1438
+ 0
1439
+ 0.1
1440
+ 0.2
1441
+ 0.3
1442
+ 0.4
1443
+ 0.5
1444
+ 0.6
1445
+ 0.7
1446
+ 0.8
1447
+ 0.9
1448
+ 1
1449
+ -0.6
1450
+ -0.4
1451
+ -0.2
1452
+ 0
1453
+ 0.2
1454
+ 0.4
1455
+ 0.6
1456
+ 0
1457
+ 0.2
1458
+ 0.4
1459
+ 0.6
1460
+ 0.8
1461
+ 1
1462
+ 0
1463
+ 0.1
1464
+ 0.2
1465
+ 0.3
1466
+ 0.4
1467
+ 0.5
1468
+ 0.6
1469
+ 0.7
1470
+ 0.8
1471
+ 0.9
1472
+ 1
1473
+ -0.9
1474
+ -0.8
1475
+ -0.7
1476
+ -0.6
1477
+ -0.5
1478
+ -0.4
1479
+ -0.3
1480
+ -0.2
1481
+ -0.1
1482
+ 0
1483
+ 0.2
1484
+ 0.4
1485
+ 0.6
1486
+ 0.8
1487
+ 1
1488
+ 0
1489
+ 0.1
1490
+ 0.2
1491
+ 0.3
1492
+ 0.4
1493
+ 0.5
1494
+ 0.6
1495
+ 0.7
1496
+ 0.8
1497
+ 0.9
1498
+ 1
1499
+ 0.05
1500
+ 0.1
1501
+ 0.15
1502
+ 0.2
1503
+ 0.25
1504
+ Figure 4. Left: control signal uγ∗(x). Middle: mean E[y(uγ∗, ω, x)]. Right:
1505
+ standard deviation
1506
+
1507
+ E[(y(uγ∗, ω, x) − E[y(uγ∗, ω, x)])2].
1508
+ subject to a random elliptic variational inequality (VI) constraint,
1509
+ y(u, ω, x) ≤ 0 :
1510
+ ⟨A(ω)y(u, ω, x)−f(ω, x)−B(ω, x)u, y(u, ω, x)−v⟩ ≤ 0,
1511
+ ∀v : v ≤ 0. (6.9)
1512
+ We use Example 5.1 from [1] (with the reversed sign of y), where D = (0, 1)2, A = −∆,
1513
+ B = Id, and deterministic functions constructing the desired state:
1514
+ ˆy(x) =
1515
+
1516
+ 160(x3
1517
+ 1 − x2
1518
+ 1 + 0.25x1)(x3
1519
+ 2 − x2
1520
+ 2 + 0.25x2)
1521
+ in (0, 0.5)2,
1522
+ 0,
1523
+ otherwise,
1524
+ ˆζ(x) = max(0, −2|x1 − 0.8| − 2|x1x2 − 0.3| + 0.5),
1525
+ yd(x) = −ˆy − ˆζ + ∆ˆy.
1526
+ In contrast, the right hand side depends on the random variables,
1527
+ f(ξ(ω), x) = ∆ˆy + ˆy + ˆζ + b(ξ(ω), x),
1528
+ b(ξ(ω), x) =
1529
+ ��d
1530
+ i=1
1531
+ √λiφi(x)ξi(ω),
1532
+ in (0, 0.5) × (0, 1),
1533
+ 0,
1534
+ otherwise.
1535
+ The Karhunen-Loeve expansion in b(ξ, x) is an affine-uniform random field, with ξi(ω) ∼
1536
+ U(−1, 1), φi(x) = 2 cos(πjx2) cos(πkx1) and λi =
1537
+ 1
1538
+ 100 exp(− π
1539
+ 4(j2 + k2)), where the pairs
1540
+ (j, k), j, k = 1, 2, . . . , are permuted such that λ1 ≥ λ2 ≥ · · · .
1541
+ The VI (6.9) is replaced by the penalized problem
1542
+ Ay + 1
1543
+ εgε(y) = f(ξ, x) + Bu,
1544
+ (6.10)
1545
+ so we minimize (6.8) with y(u, ξ, x) plugged in from (6.10). The latter equation is solved
1546
+ via the Newton method, initialized with y = 0 as the initial guess, and stopped when the
1547
+ relative difference between two consecutive iterations of y falls below 10−12. The problem is
1548
+ discretized in x via the piecewise bilinear finite elements on a uniform ny × ny grid with cell
1549
+ size h = 1/(ny + 1). The homogeneous Dirichlet boundary conditions y = 0 on ∂D allow us
1550
+ to store only interior grid points. This gives us a discrete problem of minimizing
1551
+ jh(u) = 1
1552
+ 2E[∥y(u, ξ) − yd∥2
1553
+ Mh] + 1
1554
+ 2∥u∥2
1555
+ Mh
1556
+ (6.11)
1557
+
1558
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
1559
+ 21
1560
+ subject to
1561
+ Ahy + 1
1562
+ εgε(y) = f(ξ) + u,
1563
+ (6.12)
1564
+ where Ah, Mh ∈ Rn2
1565
+ y×n2
1566
+ y are the stiffness and mass matrices, respectively.
1567
+ The state part of the cost
1568
+ jy(u, ξ) = 1
1569
+ 2∥y(u, ξ) − yd∥2
1570
+ Mh
1571
+ and its gradient
1572
+ ∇ujy(u, ξ) = S∗
1573
+ h(ξ)Mh(y(u, ξ) − yd)
1574
+ are approximated by the TT-Cross (as functions of ξ), which allows one to compute the ex-
1575
+ pectation of ˜jy(u, ξ) ≈ jy(u, ξ) and ∇u˜jy(u, ξ) ≈ ∇ujy(u, ξ) easily. The forward model (6.12)
1576
+ is solved at each evaluation of ξ in the TT-Cross. However, to avoid excessive computations,
1577
+ the Hessian of (6.11) is approximated by that anchored at the mean point ξ = 0:
1578
+ ∇uujh(u) ≈ ˜H := S∗
1579
+ h(0)MhS′
1580
+ h(0) + Mh.
1581
+ The Newton system ˜H−1∇ujh is solved iteratively by using the CG method, since the matrix-
1582
+ vector product with ˜H requires the solution of only one forward and one adjoint problem,
1583
+ S∗
1584
+ h · v = S′
1585
+ h · v =
1586
+
1587
+ Ah + diag
1588
+ �1
1589
+ εg′
1590
+ ε(y)
1591
+ ��−1
1592
+ v,
1593
+ ∀v ∈ Rn2
1594
+ y.
1595
+ (6.13)
1596
+ In Table 1 we vary the dimension of the random variable d, the number of quadrature
1597
+ points in each random variable nξ, and the approximation tolerance in the TT-Cross (tol).
1598
+ The spatial grid size is fixed to ny = 31, which is comparable with the resolution in [1],
1599
+ and the smoothing parameter ε = 10−6. As a reference solution u∗, we take the control
1600
+ computed with d = 20, nξ = 5 and tol = 10−4. We see that the control and the cost can be
1601
+ approximated quite accurately even with a very low order of the polynomial approximation
1602
+ in ξ. It also seems unnecessary to keep 20 terms in the Karhunen-Loeve expansion.
1603
+ The computation complexity is dominated by the solutions of the forward and adjoint
1604
+ problems. The article [1] reports a “# PDE solves” in a path-following stochastic variance
1605
+ reduced gradient method solving (6.8)–(6.9). We believe this indicates the number of the
1606
+ complete solutions of the PDE (6.12). However, each solution of (6.12) to the increment
1607
+ tolerance 10−12 requires 23–25 Newton iterations, each of which requires the linear system
1608
+ solution of the form (6.13), Moreover, the anchored outer Hessian ˜H requires two extra linear
1609
+ solves. Therefore, in Table 1, we show both the number of PDE solutions till convergence,
1610
+ Npde, and the number of all linear system solutions Nlin, occurred during the optimization
1611
+ of (6.11) till the relative increment of u falls below the TT-Cross tolerance. In addition,
1612
+ we report the maximal TT ranks of the state cost gradient and the state itself. Note that
1613
+ assembly of the full state is not needed during the optimization of (6.11) – only certain
1614
+ samples of y(u, ξ) are needed in the TT-Cross approximation of ∇ujh. To save the computing
1615
+ time, the TT tensor of the entire state is computed only after the optimization of u has
1616
+ converged.
1617
+ In Figure 5 we show the mean optimized forward state and the control.
1618
+ The results
1619
+ coincide qualitatively with those in [1]. If we consider the computational cost necessary to
1620
+
1621
+ 22
1622
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
1623
+ Table 1. Cost, error in the control, number of solutions of n2
1624
+ y × n2
1625
+ y linear
1626
+ system as in (6.13), number of complete forward PDE solutions (6.12), and
1627
+ the TT ranks of the cost gradient and forward solution.
1628
+ d
1629
+
1630
+ tol
1631
+ jh(u)
1632
+ ∥u−u∗∥Mh
1633
+ ∥u∗∥Mh
1634
+ Nlin
1635
+ Npde
1636
+ r(∇u˜jy)
1637
+ r(˜y)
1638
+ 10
1639
+ 5
1640
+ 10−4
1641
+ 1.261333069
1642
+ 1.1473e-06
1643
+ 1070007
1644
+ 44584
1645
+ 85
1646
+ 316
1647
+ 20
1648
+ 3
1649
+ 10−3
1650
+ 1.261333069
1651
+ 2.9012e-05
1652
+ 46312
1653
+ 1976
1654
+ 7
1655
+ 29
1656
+ 20
1657
+ 3
1658
+ 10−4
1659
+ 1.261333069
1660
+ 4.2713e-06
1661
+ 433134
1662
+ 18153
1663
+ 56
1664
+ 183
1665
+ 20
1666
+ 5
1667
+ 10−4
1668
+ 1.261333069
1669
+
1670
+ 1840467
1671
+ 76243
1672
+ 102
1673
+ 402
1674
+ Figure 5. Left: mean optimised state E[−y] with d = 20, nξ = 3 and tol =
1675
+ 10−3. Middle: variance of the optimized state E[(y −E[y])2]. Right: optimised
1676
+ control u.
1677
+ compute the optimal control only, we can notice that Npde is significantly lower than the
1678
+ 291808 PDE solves in the stochastic variance reduced gradient method of [1].
1679
+ 6.4. SEIR ODE model. Now consider a slightly simplified version of the epidemiological
1680
+ ODE model used for the propagation of COVID-19 in the UK using the data from March-
1681
+ May 2020 [11].
1682
+ This is a compartmental differential equation model with the following
1683
+ compartments.
1684
+ • Susceptible (S).
1685
+ • Exposed (E), but not yet infectious.
1686
+ • Infected SubClinical type 1 (ISC1): may require hospitalization in the future.
1687
+ • Infected SubClinical type 2 (ISC2): will recover without hospitalization.
1688
+ • Infected Clinical type 1 (IC1): individuals in the hospital who may decease.
1689
+ • Infected Clinical type 2 (IC2): individuals in the hospital who will recover.
1690
+ • Recovered (R) and immune to reinfections.
1691
+ • Deceased (D).
1692
+ In turn, each of these compartments are split into 5 further sub-compartments corresponding
1693
+ to age bands: 0-19, 20-39, 40-59, 60-79 and 80+. The number of individuals in each com-
1694
+ partment is denoted by the name of the compartment and age band index, For example, Si
1695
+ denotes the number of susceptible individuals in the ith age band (i = 1, . . . , 5), Ei denotes
1696
+ the number of exposed individuals in the ith age band, and so on. Variables corresponding
1697
+
1698
+ 0.06
1699
+ 0.04
1700
+ 0.02
1701
+ 0
1702
+ 0.2
1703
+ 0.4
1704
+ 0.5
1705
+ 0.6
1706
+ 0.810-7
1707
+ .5
1708
+ 0.5
1709
+ O
1710
+ 0
1711
+ 0.5
1712
+ 0.5
1713
+ 1.50.06
1714
+ 0.04
1715
+ 0.02
1716
+ 0
1717
+ 0.2
1718
+ 0.4
1719
+ 0.5
1720
+ 0.6
1721
+ 0.8STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
1722
+ 23
1723
+ to different age bands but same compartment are collected into vectors, S = (S1, . . . , S5),
1724
+ E = (E1, . . . , E5) and so on.
1725
+ Some of the variables introduced above are coupled to others only one way, and can be
1726
+ removed from the actual simulations.
1727
+ First, when the number of infected individuals is
1728
+ small compared to the population size (which is typically the case in the early stages of the
1729
+ epidemic), the relative variation of S is small. Hence, S can be taken constant instead of
1730
+ solving an ODE on it. Similarly, none of the variables depend on R and D, so they can be
1731
+ excluded from a coupled system of ODEs too, and computed separately after the solution of
1732
+ the ODEs. With these considerations in mind, the forward model reads as follows:
1733
+ d
1734
+ dt
1735
+
1736
+ �����
1737
+ E
1738
+ ISC1
1739
+ ISC2
1740
+ IC1
1741
+ IC2
1742
+
1743
+ �����
1744
+
1745
+
1746
+ �����
1747
+ −κI
1748
+ Au
1749
+ Au
1750
+ 0
1751
+ 0
1752
+ κ · diag(ρ)
1753
+ −ηCI
1754
+ 0
1755
+ 0
1756
+ 0
1757
+ κ · diag(1 − ρ)
1758
+ 0
1759
+ −ηRI
1760
+ 0
1761
+ 0
1762
+ 0
1763
+ ηC · diag(ρ′)
1764
+ 0
1765
+ −νI
1766
+ 0
1767
+ 0
1768
+ ηC · diag(1 − ρ′)
1769
+ 0
1770
+ 0
1771
+ −ηR,CI
1772
+
1773
+ �����
1774
+
1775
+ �����
1776
+ E
1777
+ ISC1
1778
+ ISC2
1779
+ IC1
1780
+ IC2
1781
+
1782
+ �����
1783
+ = 0.
1784
+ (6.14)
1785
+ Here I ∈ R5×5 is the identity matrix and diag(·) produces a diagonal matrix from a vec-
1786
+ tor. The control is defined in terms of the intensity of lockdown measures, and affects the
1787
+ susceptible-infected interaction matrix Au = χ · diag(S) · Cu · diag( 1
1788
+ N ), where
1789
+ Cu = diag(chome)Chome + diag(cwork
1790
+ u
1791
+ )Cwork + diag(cschool
1792
+ u
1793
+ )Cschool + diag(cother
1794
+ u
1795
+ )Cother (6.15)
1796
+ is the matrix of contact intensities between the age compartments. The total contact inten-
1797
+ sity is a sum of pre-pandemic contact intensity matrices in the four setting Chome, Cwork, Cschool
1798
+ and Cother, multiplied by the reduction factors chome, cwork
1799
+ u
1800
+ , cschool
1801
+ u
1802
+ and cother
1803
+ u
1804
+ due to the lock-
1805
+ down measures.
1806
+ Since home contacts cannot be controlled, chome = (1, . . . , 1), but the
1807
+ remaining factors vary proportionally to the lockdown control applied from day 17 onwards,
1808
+
1809
+ u(t) =
1810
+
1811
+
1812
+
1813
+ (1, 1, 1, 1, 1)⊤,
1814
+ t < 17,
1815
+ (c123(1 − uµ(t)), c123(1 − uµ(t)), c123(1 − uµ(t)), c4, c5)⊤,
1816
+ 17 ≤ t ≤ 90,
1817
+ (c123(1 − uµ(90)), c123(1 − uµ(90)), c123(1 − uµ(90)), c4, c5)⊤,
1818
+ t > 90,
1819
+ (6.16)
1820
+ where µ ∈ {work, school, other}, uµ are the intensities of lockdown measures applied to each
1821
+ setting µ, and c123, c4, c5 are the initial contact intensities in the corresponding age groups.
1822
+ Note that the control will be optimized only on the time interval [17, 90]. Before day 17
1823
+ the contact intensities are not reduced (no lockdown). From day 90 onwards we continue
1824
+ applying the last value of the control.
1825
+ In addition, the model depends on the following parameters:
1826
+ • χ: probability of S–ISC interactions.
1827
+ • κ = 1/dL: average rate of an Exposed individual becoming SubClinical. It is inversely
1828
+ proportional to the average number of days dL an individual stays in the Exposed
1829
+ state.
1830
+ • ηC = 1/dC: average rate of a SubClinical individual becoming Clinical. Similarly, dC
1831
+ is the average time spent in the SubClinical state.
1832
+ • ηR = 1/dR: rate of recovery from ISC2.
1833
+ • ηR,C = 1/dR,C: rate of recovery from IC2.
1834
+
1835
+ 24
1836
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
1837
+ • ν = 1/dD: rate of decease in the IC1 state.
1838
+ • ρ = (ρ1, . . . , ρ5)⊤ ∈ R5: correction coefficients of the Exposed → SubClinical 1 tran-
1839
+ sition rate for different age bands.
1840
+ • ρ′ = (ρ′
1841
+ 1, . . . , ρ′
1842
+ 5)⊤ ∈ R5: correction coefficients of the SubClinical → Clinical 1 tran-
1843
+ sition.
1844
+ • N = (N1, . . . , N5)⊤ ∈ R5: total number of individuals in each age group.
1845
+ • N 0: total number of infected individuals on day 0.
1846
+ • N in = (0.1, 0.4, 0.35, 0.1, 0.05)⊤N 0: age partition of the initial number of infected
1847
+ individuals.
1848
+ The ODE (6.14) is initialized by setting
1849
+ E(0) = N in
1850
+ 3 ,
1851
+ ISC1(0) = 2
1852
+ 3diag(ρ)N in,
1853
+ ISC2(0) = 2
1854
+ 3diag(1−ρ)N in,
1855
+ IC1(0) = IC2(0) = 0.
1856
+ The population sizes S = N are taken from the Office for National Statistics, mid 2018
1857
+ estimate.
1858
+ However, none of the model parameters above are known beforehand. In [11], those were
1859
+ treated as random variables, and their distributions were estimated from observed numbers
1860
+ of infections and hospitalizations during the first 90 days using Approximate Bayesian Com-
1861
+ putation (ABC). In general, these variables are correlated through the posterior distribution,
1862
+ sampling from which is a daunting problem. Here, we replace the joint ABC posterior dis-
1863
+ tribution by independent uniform distributions with a scaled posterior standard deviation
1864
+ centered around the posterior mean:
1865
+ χ ∼ U(0.13 − 0.03σ, 0.13 + 0.03σ),
1866
+ dL ∼ U(1.57 − 0.42σ, 1.57 + 0.42σ),
1867
+ (6.17)
1868
+ dC ∼ U(2.12 − 0.80σ, 2.12 + 0.80σ),
1869
+ dR ∼ U(1.54 − 0.40σ, 1.54 + 0.40σ),
1870
+ dR,C ∼ U(12.08 − 1.51σ, 12.08 + 1.51σ),
1871
+ dD ∼ U(5.54 − 2.19σ, 5.54 + 2.19σ),
1872
+ ρ1 ∼ U(0.06 − 0.03σ, 0.06 + 0.03σ),
1873
+ ρ2 ∼ U(0.05 − 0.03σ, 0.05 + 0.03σ),
1874
+ ρ3 ∼ U(0.08 − 0.04σ, 0.08 + 0.04σ),
1875
+ ρ4 ∼ U(0.54 − 0.22σ, 0.54 + 0.22σ),
1876
+ ρ5 ∼ U(0.79 − 0.14σ, 0.79 + 0.14σ),
1877
+ ρ′
1878
+ 1 ∼ U(0.26 − 0.23σ, 0.26 + 0.23σ),
1879
+ ρ′
1880
+ 2 ∼ U(0.28 − 0.25σ, 0.28 + 0.25σ),
1881
+ ρ′
1882
+ 3 ∼ U(0.33 − 0.27σ, 0.33 + 0.27σ),
1883
+ ρ′
1884
+ 4 ∼ U(0.26 − 0.11σ, 0.26 + 0.11σ),
1885
+ ρ′
1886
+ 5 ∼ U(0.80 − 0.13σ, 0.80 + 0.13σ),
1887
+ N 0 ∼ U(276 − 133σ, 276 + 133σ),
1888
+ c123 ∼ U(0.63 − 0.21σ, 0.63 + 0.21σ),
1889
+ c4 ∼ U(0.57 − 0.23σ, 0.57 + 0.23σ),
1890
+ c5 ∼ U(0.71 − 0.23σ, 0.71 + 0.23σ).
1891
+ Here, σ is the standard deviation scaling parameter, taken to be 0.03 in our experiment.
1892
+ This distribution behaves qualitatively similar to the posterior distribution in the vicinity
1893
+ of the posterior mean.
1894
+ It provides sufficient randomness to benchmark the constrained
1895
+ optimization method, while admitting independent sampling and gridding, needed for the
1896
+ TT approximations. That is, (6.17) form a random vector
1897
+ ξ = (χ, dL, dC, dR, dR,C, dD, ρ1, ρ2, ρ3, ρ4, ρ5, ρ′
1898
+ 1, ρ′
1899
+ 2, ρ′
1900
+ 3, ρ′
1901
+ 4, ρ′
1902
+ 5, N 0, c123, c4, c5)
1903
+ of d = 20 independent random variables, the state vector is
1904
+ y(ξ, t) = (E1, . . . , E5, ISC1
1905
+ 1
1906
+ , . . . , ISC1
1907
+ 5
1908
+ , ISC2
1909
+ 1
1910
+ , . . . , ISC2
1911
+ 5
1912
+ , IC1
1913
+ 1 , . . . , IC1
1914
+ 5 , IC2
1915
+ 1 , . . . , IC2
1916
+ 5 ),
1917
+
1918
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
1919
+ 25
1920
+ and the ODE (6.14) constitutes the forward problem.
1921
+ For the inverse problem, we use the total number of deceased patients as the cost function.
1922
+ The rate of decease is proportional to the number of Clinical type 1 individuals, so the total
1923
+ number of deceased individuals can be computed as
1924
+ D(ξ, t) = ν
1925
+ ˆ t
1926
+ 0
1927
+ IC1(ξ, s)ds.
1928
+ (6.18)
1929
+ To regularize the problem, we add also the norm of the control u(t) = (uwork(t), uschool(t), uother(t)).
1930
+ Thus, the total cost function reads
1931
+ j(u) = 1
1932
+ 2E[D(ξ, T)] + α
1933
+ 2
1934
+ ˆ 90
1935
+ 17
1936
+ ∥u(t)∥2
1937
+ 2dt,
1938
+ (6.19)
1939
+ where T = 100 is the final simulation time, and α is the regularization parameter, which we
1940
+ set to 100 in our experiment. Note that the norm of the control is taken only over the time
1941
+ interval [17, 90] where the control varies.
1942
+ We introduce the following constraints. Firstly, we limit the control components to the
1943
+ intervals uwork ∈ [0, 0.69], uschool ∈ [0, 0.9] and uother ∈ [0, 0.59]. Next, we constrain the
1944
+ R number at the end of the variable control interval, R(ξ, 90) ≤ 1. In our model, the R
1945
+ number can be computed as R(ξ, t) = λmax(K), where
1946
+ K = −
1947
+
1948
+ �����
1949
+ 0
1950
+ Au
1951
+ Au
1952
+ 0
1953
+ 0
1954
+ 0
1955
+ 0
1956
+ 0
1957
+ 0
1958
+ 0
1959
+ 0
1960
+ 0
1961
+ 0
1962
+ 0
1963
+ 0
1964
+ 0
1965
+ 0
1966
+ 0
1967
+ 0
1968
+ 0
1969
+ 0
1970
+ 0
1971
+ 0
1972
+ 0
1973
+ 0
1974
+
1975
+ �����
1976
+
1977
+ �����
1978
+ −κI
1979
+ 0
1980
+ 0
1981
+ 0
1982
+ 0
1983
+ κ · diag(ρ)
1984
+ −ηCI
1985
+ 0
1986
+ 0
1987
+ 0
1988
+ κ · diag(1 − ρ)
1989
+ 0
1990
+ −ηRI
1991
+ 0
1992
+ 0
1993
+ 0
1994
+ ηC · diag(ρ′)
1995
+ 0
1996
+ −νI
1997
+ 0
1998
+ 0
1999
+ ηC · diag(1 − ρ′)
2000
+ 0
2001
+ 0
2002
+ −ηR,CI
2003
+
2004
+ �����
2005
+ −1
2006
+ ,
2007
+ and λmax denotes the maximal in modulus eigenvalue. Recall that R < 1 implies that the
2008
+ epidemic decays, while R > 1 corresponds to an expanding epidemic. The full smoothed
2009
+ Moreau-Yosida cost function becomes
2010
+ jγ,ε(u) = 1
2011
+ 2E[D(ξ, T)] + α
2012
+ 2
2013
+ ˆ 90
2014
+ 17
2015
+ ∥u(t)∥2
2016
+ 2dt + γ
2017
+ 2E
2018
+ ���gε(R(ξ, 90) − 1)
2019
+ ��2�
2020
+ .
2021
+ (6.20)
2022
+ Since the control is applied nonlinearly in the model, computation of derivatives of the cost
2023
+ function (6.20) is complicated. Thus, instead of the Newton method, we use the projected
2024
+ gradient descent method, where the gradient of (6.20) is calculated using finite differencing
2025
+ with anisotropic step sizes 10−6 �� max(|u|, 0.1). The ODE (6.14) is solved using an implicit
2026
+ Euler method with a time step 0.1.
2027
+ In this experiment, we use a fixed Moreau-Yosida
2028
+ parameter γ = 5 · 105 in all iterations, and the smoothing width is chosen as ε = 50/√γ.
2029
+ The iteration is stopped when the cost value does not decrease in two consecutive iterations.
2030
+ Each random variable (6.17) is discretized with n = 3 Gauss-Legendre quadrature nodes, and
2031
+ the TT approximations are carried out with a relative error tolerance of 10−2. The control
2032
+ u(t) is discretized using 7 Gauss-Legendre nodes on [17, 90] with a Lagrangian interpolation
2033
+ in between.
2034
+ In Figure 6, we compare optimizations without constraining R(ξ, 90) (left), and with the
2035
+ a.s. constraint (right) as described above. We plot the time evolution of the mean and
2036
+ confidence interval of the total number of hospitalized individuals, IC(t) = IC1(t) + IC2(t).
2037
+
2038
+ 26
2039
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
2040
+ 0
2041
+ 20
2042
+ 40
2043
+ 60
2044
+ 80
2045
+ 100
2046
+ 0
2047
+ 5
2048
+ 10
2049
+ 15
2050
+ 20
2051
+ 25
2052
+ t (days)
2053
+ hospitalizations (thousands)
2054
+ 0
2055
+ 20
2056
+ 40
2057
+ 60
2058
+ 80
2059
+ 100
2060
+ 0
2061
+ 5
2062
+ 10
2063
+ 15
2064
+ 20
2065
+ 25
2066
+ t (days)
2067
+ hospitalizations (thousands)
2068
+ 0
2069
+ 20
2070
+ 40
2071
+ 60
2072
+ 80
2073
+ 100
2074
+ 0
2075
+ 0.2
2076
+ 0.4
2077
+ 0.6
2078
+ 0.8
2079
+ 1
2080
+ t (days)
2081
+ u
2082
+ work
2083
+ school
2084
+ other
2085
+ 0
2086
+ 20
2087
+ 40
2088
+ 60
2089
+ 80
2090
+ 100
2091
+ 0
2092
+ 0.2
2093
+ 0.4
2094
+ 0.6
2095
+ 0.8
2096
+ 1
2097
+ t (days)
2098
+ u
2099
+ work
2100
+ school
2101
+ other
2102
+ Figure 6. Top: optimized IC = IC1 + IC2, mean (blue circles) and 95%
2103
+ confidence interval (shaded area). Bottom: optimized control signals. Left:
2104
+ unconstrained optimization, Right: optimization constrained with R(ξ, 90) ≤
2105
+ 1 a.s. approximated with γ = 5 · 105. Black dashed lines indicate the end of
2106
+ the optimization time horizon t = 90.
2107
+ The unconstrained scenario is a finite horizon optimization problem, which drives the control
2108
+ to near zero values at the end of the controllable time interval, t = 90, due to the zero terminal
2109
+ condition on the adjoint state. Naturally, this leads to infection growing again for t > 90,
2110
+ since we extrapolate these small values of the control from t = 90 onwards.
2111
+ In contrast, if we constrain the R number at the end of the optimization interval to be
2112
+ below 1 almost surely, this drives the control to higher values again. If we extrapolate these
2113
+
2114
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
2115
+ 27
2116
+ control values beyond the optimization window, the epidemic continues decaying, albeit with
2117
+ a slightly larger uncertainty. This indicates that almost sure constraints can suggest a more
2118
+ resilient control in risk-critical applications.
2119
+ Appendix A. Proof of Lemma 3.11
2120
+ Introduce a new variable t = exp(s/ε), then
2121
+ ˆ 0
2122
+ −∞
2123
+ s log(1 + exp(s/ε))ds =
2124
+ ˆ 1
2125
+ 0
2126
+ ε log(t) log(1 + t)
2127
+ t/ε
2128
+ dt
2129
+ = ε2
2130
+ ˆ 1
2131
+ 0
2132
+ log(t) log(t + 1)d log(t)
2133
+ = ε2
2134
+ 2 (log(t))2 log(t + 1)
2135
+ ��1
2136
+ 0 − ε2
2137
+ 2
2138
+ ˆ 1
2139
+ 0
2140
+ (log(t))2d log(t + 1).
2141
+ The first term is zero at t = 1, and at t = 0 we can use that 0 ≤ log(t + 1) ≤ t for 0 ≤ t < 1
2142
+ and limt→0(log(t))2 log(t + 1) ≤ limt→0(log(t))2t = 0. For the second term, we proceed as
2143
+ follows,
2144
+ ˆ 0
2145
+ −∞
2146
+ s log(1 + exp(s/ε))ds = −ε2
2147
+ 2
2148
+ ˆ 1
2149
+ 0
2150
+ (log(t))2
2151
+ t + 1
2152
+ dt
2153
+ ≥ −ε2
2154
+ 2
2155
+ ˆ 1
2156
+ 0
2157
+ (log(t))2dt
2158
+ = −ε2
2159
+ 2 t(log(t))2��1
2160
+ 0
2161
+
2162
+ ��
2163
+
2164
+ 0
2165
+ +ε2
2166
+ ˆ 1
2167
+ 0
2168
+ log(t)dt
2169
+ = ε2 t log t|1
2170
+ 0 − ε2
2171
+ ˆ 1
2172
+ 0
2173
+ dt = −ε2.
2174
+ The proof is completed by recalling that sgε(s) = ε · s log(1 + exp(s/ε)).
2175
+ References
2176
+ [1] A. Alphonse, C. Geiersbach, M. Hinterm¨uller, and T. M. Surowiec. Risk-averse optimal control of
2177
+ random elliptic variational inequalities. arXiv preprint 2210.03425, 2022.
2178
+ [2] H. Antil, T.S. Brown, D. Verma, and M. Warma. Optimal control of fractional PDEs with state and
2179
+ control constraints. Pure Appl. Funct. Anal., 7(5):1533–1560, 2022.
2180
+ [3] H. Antil, S. Dolgov, and A. Onwunta. Ttrisk: Tensor train decomposition algorithm for risk averse
2181
+ optimization. Numerical Linear Algebra with Applications, n/a(n/a):e2481.
2182
+ [4] H. Antil, D.P. Kouri, M.-D. Lacasse, and D. Ridzal, editors. Frontiers in PDE-constrained optimization,
2183
+ volume 163 of The IMA Volumes in Mathematics and its Applications. Springer, New York, 2018. Papers
2184
+ based on the workshop held at the Institute for Mathematics and its Applications, Minneapolis, MN,
2185
+ June 6–10, 2016.
2186
+ [5] D. Bigoni, A. P. Engsig-Karup, and Y. M. Marzouk. Spectral tensor-train decomposition. SIAM J. Sci.
2187
+ Comput., 38(4):A2405–A2439, 2016.
2188
+ [6] E. Casas. Control of an elliptic problem with pointwise state constraints. SIAM J. Control Optim.,
2189
+ 24(6):1309–1318, 1986.
2190
+
2191
+ 28
2192
+ HARBIR ANTIL, SERGEY DOLGOV, AND AKWUM ONWUNTA
2193
+ [7] S. Dolgov, B. N. Khoromskij, A. Litvinenko, and H. G. Matthies. Polynomial Chaos Expansion of
2194
+ random coefficients and the solution of stochastic partial differential equations in the Tensor Train
2195
+ format. SIAM J. Uncertainty Quantification, 3(1):1109–1135, 2015.
2196
+ [8] S. Dolgov and D. Savostyanov. Parallel cross interpolation for high–precision calculation of high–
2197
+ dimensional integrals. Comput. Phys. Commun., 246:106869, 2020.
2198
+ [9] S. V. Dolgov, B. N. Khoromskij, I. V. Oseledets, and D. V. Savostyanov. Computation of extreme
2199
+ eigenvalues in higher dimensions using block tensor train format. Comput. Phys. Commun., 185(4):1207–
2200
+ 1216, 2014.
2201
+ [10] S. V. Dolgov and D. V. Savostyanov. Alternating minimal energy methods for linear systems in higher
2202
+ dimensions. SIAM Journal on Scientific Computing, 36(5):A2248–A2271, 2014.
2203
+ [11] R. Dutta, S. N. Gomes, D. Kalise, and L. Pacchiardi. Using mobility data in the design of optimal
2204
+ lockdown strategies for the COVID-19 pandemic. PLoS Comput. Biol., 17(8):1–25, 2021.
2205
+ [12] M. H. Farshbaf-Shaker, R. Henrion, and D. H¨omberg. Properties of chance constraints in infinite di-
2206
+ mensions with an application to PDE constrained optimization. Set-Valued Var. Anal., 26(4):821–841,
2207
+ 2018.
2208
+ [13] D.B. Gahururu, M. Hinterm¨uller, and T.M. Surowiec. Risk-neutral pde-constrained generalized nash
2209
+ equilibrium problems. Mathematical Programming, 2022.
2210
+ [14] S. Garreis, T. M. Surowiec, and M. Ulbrich. An interior-point approach for solving risk-averse PDE-
2211
+ constrained optimization problems with coherent risk measures. SIAM J. Optim., 31(1):1–29, 2021.
2212
+ [15] C. Geiersbach and W. Wollner. Optimality conditions for convex stochastic optimization problems in
2213
+ Banach spaces with almost sure state constraints. SIAM J. Optim., 31(4):2455–2480, 2021.
2214
+ [16] Caroline Geiersbach and Michael Hinterm¨uller. Optimality Conditions and Moreau–Yosida Regular-
2215
+ ization for Almost Sure State Constraints. ESAIM Control Optim. Calc. Var., 28:Paper No. 80, 36,
2216
+ 2022.
2217
+ [17] A. Geletu, A. Hoffmann, P. Schmidt, and P. Li. Chance constrained optimization of elliptic PDE systems
2218
+ with a smoothing convex approximation. ESAIM Control Optim. Calc. Var., 26:Paper No. 70, 28, 2020.
2219
+ [18] S. A. Goreinov, I. V. Oseledets, D. V. Savostyanov, E. E. Tyrtyshnikov, and N. L. Zamarashkin. How
2220
+ to find a good submatrix. In V. Olshevsky and E. Tyrtyshnikov, editors, Matrix Methods: Theory,
2221
+ Algorithms, Applications, pages 247–256. World Scientific, Hackensack, NY, 2010.
2222
+ [19] A. Gorodetsky, S. Karaman, and Y. Marzouk. A continuous analogue of the tensor-train decomposition.
2223
+ Comput. Methods Appl. Mech. Engrg., 347:59–84, 2019.
2224
+ [20] W. Hackbusch and B. N. Khoromskij. Low-rank Kronecker-product approximation to multi-dimensional
2225
+ nonlocal operators. I. Separable approximation of multi-variate functions. Computing, 76(3-4):177–202,
2226
+ 2006.
2227
+ [21] M. Hinterm¨uller and M. Hinze. Moreau-Yosida regularization in state constrained elliptic control prob-
2228
+ lems: Error estimates and parameter adjustment. SIAM Journal on Numerical Analysis, 47(3):1666–
2229
+ 1683, 2009.
2230
+ [22] M. Hoffhues, W. R¨omisch, and T. M. Surowiec. On quantitative stability in infinite-dimensional opti-
2231
+ mization under uncertainty. Optimization Letters, 15(8):2733–2756, 2021.
2232
+ [23] D. P. Kouri and T. M. Surowiec. Risk-averse PDE-constrained optimization using the conditional value-
2233
+ at-risk. SIAM J. Optim., 26(1):365–396, 2016.
2234
+ [24] K. Kunisch and D. Wachsmuth. Sufficient optimality conditions and semi-smooth Newton methods for
2235
+ optimal control of stationary variational inequalities. ESAIM Control Optim. Calc. Var., 18(2):520–547,
2236
+ 2012.
2237
+ [25] R. L¨ohner, H. Antil, S. Idelsohn, and E. O˜nate. Detailed simulation of viral propagation in the built
2238
+ environment. Comput. Mech., 66(5):1093–1107, 2020.
2239
+ [26] R. L¨ohner, H. Antil, A. Srinivasan, S Idelsohn, and E. O˜nate. High-fidelity simulation of pathogen
2240
+ propagation, transmission and mitigation in the built environment. Archives of Computational Methods
2241
+ in Engineering, pages 1–26, 2021.
2242
+ [27] G. J. Lord, C. E. Powell, and T. Shardlow. An Introduction to Computational Stochastic PDEs. West
2243
+ Nyack: Cambridge University Press, 2014.
2244
+
2245
+ STATE-CONSTRAINED OPTIMIZATION PROBLEMS UNDER UNCERTAINTY
2246
+ 29
2247
+ [28] K. Maute. Topology optimization under uncertainty. In Topology optimization in structural and contin-
2248
+ uum mechanics, pages 457–471. Springer, 2014.
2249
+ [29] A. Yu. Mikhalev and I. V. Oseledets. Rectangular maximum–volume submatrices and their applications.
2250
+ Linear Algebra Appl., 538:187–211, 2018.
2251
+ [30] I. V. Oseledets. Tensor train decomposition. SIAM J. Sci. Comp., 33(5):2295 – 2317, 2011.
2252
+ [31] I. V. Oseledets and E. E. Tyrtyshnikov. TT-cross approximation for multidimensional arrays. Linear
2253
+ Algebra Appl., 432(1):70–88, 2010.
2254
+ [32] R. T. Rockafellar and S. Uryasev. Optimization of conditional value-at-risk. The Journal of Risk, 2:21
2255
+ – 41, 2000.
2256
+ [33] P. B. Rohrbach, S. Dolgov, L. Grasedyck, and R. Scheichl. Rank bounds for approximating Gaussian
2257
+ densities in the Tensor-Train format. SIAM/ASA Journal on Uncertainty Quantification, 10(3):1191–
2258
+ 1224, 2022.
2259
+ [34] D. V. Savostyanov and I. V. Oseledets. Fast adaptive interpolation of multi-dimensional arrays in tensor
2260
+ train format. In Proceedings of 7th International Workshop on Multidimensional Systems (nDS). IEEE,
2261
+ 2011.
2262
+ [35] R. Schneider and A. Uschmajew. Approximation rates for the hierarchical tensor format in periodic
2263
+ Sobolev spaces. J. Complexity, 2013.
2264
+ [36] J. Soko�lowski and J. P. Zol´esio. Introduction to shape optimization, volume 16 of Springer Series in
2265
+ Computational Mathematics. Springer-Verlag, Berlin, 1992. Shape sensitivity analysis.
2266
+ [37] L. N. Trefethen. Spectral methods in MATLAB. SIAM, Philadelphia, 2000.
2267
+ [38] F. Tr¨oltzsch. Optimal Control of Partial Differential Equations: Theory, Methods and Applications.
2268
+ American Mathematical Society, 2010.
2269
+ Harbir Antil, The Center for Mathematics and Artificial Intelligence (CMAI) and De-
2270
+ partment of Mathematical Sciences, George Mason University, Fairfax, VA 22030, USA.
2271
+ Email address: hantil@gmu.edu
2272
+ Sergey Dolgov, Department of Mathematical Sciences, University of Bath, Bath, BA2
2273
+ 7AY, UK.
2274
+ Email address: s.dolgov@bath.ac.uk
2275
+ Akwum Onwunta, Department of Industrial and Systems Engineering, Lehigh University,
2276
+ Bethlehem, PA 18015, USA.
2277
+ Email address: ako221@lehigh.edu
2278
+
L9FAT4oBgHgl3EQfxB4e/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LNAyT4oBgHgl3EQfgPhD/content/2301.00354v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a38bdb85a97d5cc535480400791417b692604e6b5200af95d7017c51d2fdf11c
3
+ size 998227
LNE0T4oBgHgl3EQfiwE-/content/tmp_files/2301.02449v1.pdf.txt ADDED
@@ -0,0 +1,337 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A prototype tank for the SWGO detector
2
+ Sofia Grusovin,∗ Giovanni Consolati,𝑎, 𝑓 Alessandro de Angelis,𝑏,𝑒 Cornelia Arcaro,𝑒
3
+ Francesca Bisconti,𝑐,𝑔 Andrea Chiavassa,𝑐,𝑔 Michele Doro,𝑏,𝑒 Fausto Guarino,𝑑,ℎ
4
+ Mosè Mariotti𝑏,𝑒 and Elisa Prandini𝑏,𝑒
5
+ 𝑎Department of Aerospace Science and Technology, Politecnico di Milano,
6
+ Via LaMasa 34, 20156 Milano, Italy
7
+ 𝑏Dipartimento di Fisica e Astronomia G. Galilei, Università degli Studi di Padova,
8
+ Via F. Marzolo 8, 35131 Padova, Italy
9
+ 𝑐Dipartimento di Fisica, Università degli Studi di Torino,
10
+ Via Pietro Giuria 1, 10125 Torino, Italy
11
+ 𝑑Dipartimento di Fisica "Ettore Pancini", Università degli Studi di Napoli Federico II,
12
+ Strada Comunale Cinthia, 80126 Napoli, Italy
13
+ 𝑒INFN Padova,
14
+ Via Francesco Marzolo 8, 35131 Padova, Italy
15
+ 𝑓 INFN Milano,
16
+ Via Celoria 16, 20133 Milano, Italy
17
+ 𝑔INFN Torino,
18
+ Via Pietro Giuria 1, 10125 Torino, Italy
19
+ ℎINFN Napoli,
20
+ Strada Comunale Cinthia, 80126 Napoli, Italy
21
+ E-mail: sofia.grusovin@protonmail.com, giovanni.consolati@polimi.it,
22
+ alessandro.deangelis@unipd.it, cornelia.arcaro@pd.infn.it,
23
+ fbiscont@to.infn.it, achiavas@to.infn.it, michele.doro@unipd.it,
24
+ guarino@na.infn.it, mose.mariotti@unipd.it, elisa.prandini@unipd.it
25
+ The Southern Wide-field Gamma-ray Observatory (SWGO) is an international collaboration work-
26
+ ing on realizing a next-generation observatory located in the Southern hemisphere, which offers
27
+ a privileged view of our galactic center. We are working on the construction of a prototype water
28
+ Cherenkov detector at Politecnico di Milano using a flexible testing facility for several candidate
29
+ light sensors and configurations.
30
+ A structure able to hold different types of detectors in multiple configurations has been designed,
31
+ built and tested in Politecnico’s labs. Furthermore, an analytical study of muons and electrons
32
+ showers has been carried out using the SWGO observatory simulation software to examine the
33
+ correlation between the detection capabilities of the prototype tank and its water level.
34
+ *** 27th European Cosmic Ray Symposium - ECRS ***
35
+ *** 25-29 July 2022 ***
36
+ *** Nijmegen, the Netherlands ***
37
+ ∗Speaker
38
+ © Copyright owned by the author(s) under the terms of the Creative Commons
39
+ Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
40
+ https://pos.sissa.it/
41
+ arXiv:2301.02449v1 [astro-ph.IM] 6 Jan 2023
42
+
43
+ A prototype tank for the SWGO detector
44
+ Sofia Grusovin
45
+ 1.
46
+ Introduction
47
+ The Southern Wide-field Gamma ray Observatory (SWGO) is an international collaboration
48
+ with the objective of realizing a new-generation observatory for Very-High-Energy (VHE) gamma
49
+ rays. The observatory will be located in South America at a latitude between -30° and -10°, at
50
+ an altitude of at least 4.4 km. Some similar facilities already exist, such as HAWC in Mexico[10]
51
+ and LHAASO in China[9], but SWGO will be the first observatory of its kind in the Southern
52
+ hemisphere, which has a privileged view of the galactic center region[1, 4, 8] (fig. 1b).
53
+ (a) Qualitative representation of SWGO’s
54
+ layout.[1]
55
+ (b) FoV of SWGO and HAWC.[1]
56
+ Figure 1: SWGO design.
57
+ The observatory will be based on thousends of Water Cherenkov units (fig. 1a). In the design of
58
+ such units, there are many variables to assess, such as the detector’s geometry, the types of sensors
59
+ to be used and their configuration, and the materials; therefore some test facilities are needed[5].
60
+ 2.
61
+ The prototype tank
62
+ The Italian partners of the SWGO collaboration (Istituto Nazionale di Fisica Nucleare, Politec-
63
+ nico di Milano, Università degli Studi di Torino, Università degli Studi di Padova and Università
64
+ degli Studi di Napoli Federico II) are working on the realization of a test facility to be used for
65
+ SWGO. It will consist of a cylindrical tank (3.32 m diameter and 3.12 m height) with an external
66
+ structure made of galvanized steel and an internal liner in AQUATEX® PVC which could be then
67
+ changed for different tests (fig. 2). The prototype tank is installed at Politecnico di Milano, and
68
+ its objective is to act as a test facility for different types of sensors and sensors’ configurations,
69
+ different types of liners, different tank configurations and anything else that could be useful to the
70
+ collaboration.
71
+ Multi-PMT modules and light traps for example are being studied at the universities of Padova
72
+ and Napoli respectively and the prototype tank will be used to test them. Multi-PMT modules are
73
+ made by 3” PMTs, like KM3 Hyper-Kamiokade (fig. 4a), which has been considered as inspiration
74
+ although a MoU is still being finalized. Light traps on the other hand use Wavelength Shiftters
75
+ (WLS), which are materials that absorb light and re-emit it at a lower energy in a different random
76
+ direction, so the light ends up trapped inside because of internal reflection (fig. 4b). This means
77
+ that a small sensor can be used to capture the light by using a large WLS surface[2, 3].
78
+ 2
79
+
80
+ PARTICLEDETECTORARRAY
81
+ NottoscafeTHEFERMI BUBBLES
82
+ SWGO
83
+ ImageCredit:NASA
84
+ Invisible to HAWC
85
+ Image Credit:HAWCCollab
86
+ (Preliminary)
87
+ HAWC
88
+ Invisible to HAWC
89
+ &SWGO
90
+ THE GALACTIC CENTRE
91
+ Image Credit: SARAOA prototype tank for the SWGO detector
92
+ Sofia Grusovin
93
+ (a) B6 building in Politecnico di Milano’s Bovisa campus: site of the test
94
+ installation and first candidate for the tank’s location.
95
+ (b) The prototype tank inside
96
+ B6 labs after test installation.
97
+ Figure 2: Test installation of the Prototype Tank.
98
+ (a) Hyper-K prototype considered as inspi-
99
+ ration.
100
+ (b) WLS light traps: concept and tests.
101
+ Figure 3: Experimental sensors design.
102
+ 2.1 Main requirements
103
+ The first main requirement to be considered for the tank’s installation site is that the floor must
104
+ resist the tank’s pressure due to the large volume of water contained. An analysis on detection
105
+ capabilities as a function of the water level has therefore been done first, in order to choose the
106
+ appropriate water level (see section 3). The analysis’s results could also be useful in the future for
107
+ the studies on tank geometry.
108
+ Since the prototype tank is a test facility, it will be of main importance to be able to change
109
+ the sensors’ configurations frequently, so an appropriate structure was designed to hold the sensors.
110
+ During the design process, another main requirement that had to be taken into account was the need
111
+ of maintaining high water purity inside the tank, which posed limits on the materials’ choices.
112
+ 3
113
+
114
+ photon
115
+ detectorA prototype tank for the SWGO detector
116
+ Sofia Grusovin
117
+ 3.
118
+ Study on particle detection as a function of the water level
119
+ A preliminary study has been conducted on two showers of muons with the energies of 1 GeV
120
+ and 10 GeV: muons in fact are the only particles that will most likely be detected at Milano’s altitude.
121
+ The shower’s interaction with the tank has been studied with 5 different water levels: 1.65 m, 2.00
122
+ m, 2.35 m, 2.70 m and 3.05 m (fig. 4).
123
+ (a) Prototype tank with 2.0 m water level.
124
+ (b) Prototype tank with 2.7 m water level.
125
+ Figure 4: Visual output of the simulation of a muon (green) entering the tank and producing photons (red)
126
+ in two different scenarios.
127
+ An additional study has been carried out on electron showers with the energy of 1 GeV to
128
+ verify the model, since a different behavior was expected from the tank’s interaction with muons
129
+ and electrons. Muons are more penetrating particles with respect to electrons: the latter lose energy
130
+ faster, thus producing Cherenkov light only during a brief segment in the upper part of the detector;
131
+ muons on the other hand usually cross the whole tank. A lower number of PE detected by the PMTs
132
+ can be expected for electrons with a higher water level since they are produced only in the upper
133
+ part of the tank and many of them would therefore be absorbed by the water before reaching the
134
+ photosensors.
135
+ Both studies have been carried out using the HAWCSim framework, which makes use of
136
+ Geant4[6] to simulate the interaction of the particle with the tank itself and the water, includ-
137
+ ing the production of Cherenkov photons that can be detected by the Photo Multiplier Tubes (PMTs)
138
+ installed inside the tank (fig. 4).
139
+ The tank’s dimensions and materials used for the simulations were the ones reported in section 2.
140
+ The sensors’ configuration chosen (which will be the prototype tank’s reference configuration) was
141
+ made by:
142
+ • 1 × 10” (253 mm) PMT situated in the center of the tank
143
+ • 4 × 5” (128 mm) PMT equidistant from the center in square configuration
144
+ In HAWCSim, three models of PMT from the Hamamatsu company were available at the time
145
+ of this analysis: 8” R5912 PMT, 10” R7081HQE PMT and 3” R12199 PMT. To simulate the four
146
+ 5” PMTs, the 8” R5912 PMTs were used and then scaled to 5” during the analysis phase[5].
147
+ 4
148
+
149
+ A prototype tank for the SWGO detector
150
+ Sofia Grusovin
151
+ 3.1 Particles generation
152
+ 12000 particles (for each case: 1 GeV muons, 10 GeV muons and 1 GeV electrons) have been
153
+ generated in a disk of fixed radius over the tank (r = 1.78 m, 10 cm larger than the tank’s radius; h
154
+ = 3.22 m, 10 cm larger than the tank’s height). Their azimuth angle 𝜙 has been randomly selected
155
+ in the range 𝜃 - 360° and zenith angle 𝜃 extracted from the distribution cos(𝜃)2. In each scenario,
156
+ the first 10000 particles entering the tank have been analyzed. Since they had random direction in
157
+ fact, not all the particles would enter the tank, therefore generating 12000 particles assured having
158
+ at least 10000 that could be used for the analysis[7].
159
+ 3.2 Results
160
+ As it can be seen from fig. 5b, the detection efficiency increases linearly with the water
161
+ level and the standard deviation of the first photon time decreases with the water level (fig. 5c),
162
+ meaning that the detector becomes more sensitive with more water. The number of photoelectrons
163
+ detected is important to notice because here the difference between muons and electrons can be
164
+ clearly appreciated (fig. 5a). The number of PE detected decreasing with higher levels of water for
165
+ electrons was the expected behavior, in contrast with muons, for which that number increases, so
166
+ the model was considered to be reliable.
167
+ (a) Number of PE detected.
168
+ (b) Detection efficiency.
169
+ (c) Standard deviation of the first photon time.
170
+ Figure 5: Plots of results for muons (1 GeV and 10 GeV) and electrons (1 GeV).
171
+ 4.
172
+ Design of the PMT holder
173
+ The material chosen for the PMT holder has been stainless steel AISI 304, which had good
174
+ mechanical properties and was compatible with purified water.
175
+ 5
176
+
177
+ Number of PE detected by PMT 1 (1o"
178
+ 140
179
+ 120
180
+ Number of PE detected
181
+ 100
182
+ 80
183
+ 60
184
+ 40
185
+ Npe 1GeV PMT 1 mu-
186
+ 20
187
+ Npe 10GeV PMT 1 mu-
188
+ Npe 1GeV PMT 1 e-
189
+ 0.
190
+ 1.65
191
+ 2.00
192
+ 2.35
193
+ 2.70
194
+ 3.05
195
+ Water levelDetection efficiency of PMT 1 (1o"
196
+ 1
197
+ 0.9
198
+ 0.8
199
+ Detection efficiency
200
+ 0.7
201
+ 0.6
202
+ 0.5
203
+ 0.4
204
+ 0.3
205
+ Eff. 1GeV PMT 1 mu-
206
+ 0.2
207
+ Eff. 10GeV PMT 1 mu-
208
+ 0.1
209
+ Eff. 1GeV PMT 1 e-
210
+ 0
211
+ 1.65
212
+ 2.00
213
+ 2.35
214
+ 2.70
215
+ 3.05
216
+ Water levelSD of the first photon time on PMT 1 (10")
217
+ 3.5
218
+ Standard deviation
219
+ 2.5
220
+ 1.5
221
+ std dev.f.time1GeV PMT1
222
+ 1
223
+ mu-
224
+ std deV. f.time 10GeV PMT 1
225
+ 0.5
226
+ mu-
227
+ std deV. f.time 1GeV PMT 1 e-
228
+ 0
229
+ 1.65
230
+ 2.00
231
+ 2.35
232
+ 2.70
233
+ 3.05
234
+ Water levelA prototype tank for the SWGO detector
235
+ Sofia Grusovin
236
+ The first idea was to design a structure that could hold as many sensors configurations as
237
+ possible. A CAD model of such structure had been realized (fig. 6), and it was a good compromise
238
+ between weight, robustness and flexibility requirements. This design however had to be adapted to
239
+ parts available on the market and it was not easy to find similar pieces. In addition to that, the PMTs
240
+ of the reference configuration were nearly ready to be tested, while the other sensors that have to be
241
+ tested here are still in development.
242
+ VII - 19 sensors (1 + 6 + 6 + 6)
243
+ VI - 13 sensors (1 + 6 + 6)
244
+ V - 5 sensors (1 + 4)
245
+ IV - 10 sensors (1 + 3 + 6)
246
+ I - 4 sensors (1 + 3)
247
+ IIa and IIb - 4 sensors compact (1 + 3)
248
+ III - 7 sensors (1 + 6)
249
+ (a) Initial structure scheme.
250
+ (b) Initial structure cad model.
251
+ Figure 6: First design of the PMT holder.
252
+ It has therefore been decided to design a simpler structure to be used for the reference configu-
253
+ ration, designing it directly with parts that were known to be available on the market, with the idea
254
+ of disassembling it and reuse the parts for the bigger structure when it will be needed (fig. 7 and
255
+ fig. 8).
256
+ A loading analysis has been performed in solidworks applying the mass of the reference
257
+ configuration PMTs and it has been shown that the structure could easily sustain the weight (fig. 9).
258
+ To properly hold the PMTs, the same C-profiles used for the main structure have been used since
259
+ the materials were already available and they were able to guarantee good stability. An additional
260
+ gasket has to be placed between the C-profiles and the PMT in order to protect the sensor.
261
+ Figure 7: 3D model of the cross holder.
262
+ 6
263
+
264
+ A prototype tank for the SWGO detector
265
+ Sofia Grusovin
266
+ (a) Part a: flat bar.
267
+ (b) Part b: C-profile.
268
+ (c) Part c: L-profile.
269
+ Figure 8: Parts composing the cross holder: part a is the base piece bought from the supplier (1000 mm x
270
+ 50 mm x 1 mm perforated flat bar) from which part b and part c can be obtained.
271
+ (a) Von Mises stress with static maximum load.
272
+ (b) Displacement with static maximum load.
273
+ Figure 9: Cross holder: results of the solidworks static analysis.
274
+ The parts have been manufactured in the workshop of the Department of Aerospace Science
275
+ and Technology (Politecnico di Milano) by cutting and bending the flat bars. The C-profiles and
276
+ the L-profiles could be obtained by cutting and folding the original perforated flat bars.
277
+ When the structure was complete, a placement test with the five reference configuration PMTs
278
+ has been done. The appropriate rubber for the gaskets, compatible with purified water, had not been
279
+ ordered yet, so foam rubber has been used. The structure was not deformed by the PMTs’ weight
280
+ and the sensors were held stably (fig. 10).
281
+ 5.
282
+ Conclusions
283
+ After considering the data coming from the study on particle detection as a function of the
284
+ water level, it has been decided to maximize detection performances allowing the possibility to fill
285
+ the tank completely.
286
+ Since the PMT holder is ready to be used, the first test with the reference configuration will
287
+ start soon, followed by tests with the novel sensors designs from Napoli end Padova described in
288
+ section 2.
289
+ 7
290
+
291
+ von Mises (N/m^2)
292
+ 7,581e+06
293
+ 6,824 +06
294
+ 6,066e +06
295
+ 5,308e +06
296
+ 4,550t+06
297
+ 3,793 +06
298
+ 3,015 +06
299
+ 2,277e +06
300
+ 1,519e +06
301
+ 7.,617e+05
302
+ 3,943± -03URES (mm)
303
+ 3,077e-02
304
+ 2,769e-02
305
+ 2,462±-02
306
+ 2,154e-02
307
+ 1,846e-02
308
+ 1,539e-02
309
+ 1,231e-02
310
+ 9,231e-03
311
+ 6,154e-03
312
+ 3,077e-03
313
+ 1,000e-30A prototype tank for the SWGO detector
314
+ Sofia Grusovin
315
+ Figure 10: PMT holder: holding test.
316
+ References
317
+ [1] INFN and SWGO collaboration, INFN SWGO letter of intent, 2020.
318
+ [2] J.E. Ward, J. Cortina and D. Guberman, Light-Trap: a SiPM upgrade for VHE astronomy and
319
+ beyond, Journal of Instrumentation 11 (2016).
320
+ [3] M. Mariotti et al., Optimized wavelength shifters light traps with SiPM photo sensors for
321
+ SWGO, Internal SWGO paper.
322
+ [4] J. Hinton, The Southern Wide-field Gamma-ray Observatory: status and srospects, Proceed-
323
+ ings of Science 395 ICRC2021 (2022) 023.
324
+ [5] F. Bisconti and A. Chiavassa, Study of water Cherenkov detector designs for the SWGO
325
+ experiment, Proceedings of Science 395 ICRC2021 (2022) 895.
326
+ [6] S. Agostinelli et al., GEANT4 — a simulation toolkit, Nuclear Instruments and Methods in
327
+ Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equip-
328
+ ment 506 (2003) 250.
329
+ [7] F. Bisconti and A. Chiavassa, Study of water Cherenkov detector design for ground-based
330
+ gamma-ray experiments, arXiv e-prints (2022).
331
+ [8] A. Albert et al., Science case for a wide field-of-view very-high-energy gamma-ray observatory
332
+ in the Southern hemisphere, arXiv e-prints (2019).
333
+ [9] F. A. Aharonian, LHAASO: A PeVatrons explorer, Science China Physics, Mechanics &
334
+ Astronomy volume 64 (2021) 109531.
335
+ [10] G. Sinnis, The HAWC TeV gamma-ray observatory, Il nuovo cimento C 34 (2021) 65.
336
+ 8
337
+
LNE0T4oBgHgl3EQfiwE-/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,240 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf,len=239
2
+ page_content='A prototype tank for the SWGO detector Sofia Grusovin,∗ Giovanni Consolati,𝑎, 𝑓 Alessandro de Angelis,𝑏,𝑒 Cornelia Arcaro,𝑒 Francesca Bisconti,𝑐,𝑔 Andrea Chiavassa,𝑐,𝑔 Michele Doro,𝑏,𝑒 Fausto Guarino,𝑑,ℎ Mosè Mariotti𝑏,𝑒 and Elisa Prandini𝑏,𝑒 𝑎Department of Aerospace Science and Technology, Politecnico di Milano, Via LaMasa 34, 20156 Milano, Italy 𝑏Dipartimento di Fisica e Astronomia G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
3
+ page_content=' Galilei, Università degli Studi di Padova, Via F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
4
+ page_content=' Marzolo 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
5
+ page_content=' 35131 Padova,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
6
+ page_content=' Italy 𝑐Dipartimento di Fisica,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
7
+ page_content=' Università degli Studi di Torino,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
8
+ page_content=' Via Pietro Giuria 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
9
+ page_content=' 10125 Torino,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
10
+ page_content=' Italy 𝑑Dipartimento di Fisica "Ettore Pancini",' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
11
+ page_content=' Università degli Studi di Napoli Federico II,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
12
+ page_content=' Strada Comunale Cinthia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
13
+ page_content=' 80126 Napoli,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
14
+ page_content=' Italy 𝑒INFN Padova,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
15
+ page_content=' Via Francesco Marzolo 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
16
+ page_content=' 35131 Padova,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
17
+ page_content=' Italy 𝑓 INFN Milano,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
18
+ page_content=' Via Celoria 16,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
19
+ page_content=' 20133 Milano,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
20
+ page_content=' Italy 𝑔INFN Torino,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
21
+ page_content=' Via Pietro Giuria 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
22
+ page_content=' 10125 Torino,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
23
+ page_content=' Italy ℎINFN Napoli,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
24
+ page_content=' Strada Comunale Cinthia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
25
+ page_content=' 80126 Napoli,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
26
+ page_content=' Italy E-mail: sofia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
27
+ page_content='grusovin@protonmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
28
+ page_content='com, giovanni.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
29
+ page_content='consolati@polimi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
30
+ page_content='it, alessandro.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
31
+ page_content='deangelis@unipd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
32
+ page_content='it, cornelia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
33
+ page_content='arcaro@pd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
34
+ page_content='infn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
35
+ page_content='it, fbiscont@to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
36
+ page_content='infn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
37
+ page_content='it, achiavas@to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
38
+ page_content='infn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
39
+ page_content='it, michele.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
40
+ page_content='doro@unipd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
41
+ page_content='it, guarino@na.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
42
+ page_content='infn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
43
+ page_content='it, mose.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
44
+ page_content='mariotti@unipd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
45
+ page_content='it, elisa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
46
+ page_content='prandini@unipd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
47
+ page_content='it The Southern Wide-field Gamma-ray Observatory (SWGO) is an international collaboration work- ing on realizing a next-generation observatory located in the Southern hemisphere, which offers a privileged view of our galactic center.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
48
+ page_content=' We are working on the construction of a prototype water Cherenkov detector at Politecnico di Milano using a flexible testing facility for several candidate light sensors and configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
49
+ page_content=' A structure able to hold different types of detectors in multiple configurations has been designed, built and tested in Politecnico’s labs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
50
+ page_content=' Furthermore, an analytical study of muons and electrons showers has been carried out using the SWGO observatory simulation software to examine the correlation between the detection capabilities of the prototype tank and its water level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
51
+ page_content=' *** 27th European Cosmic Ray Symposium - ECRS *** *** 25-29 July 2022 *** *** Nijmegen, the Netherlands *** ∗Speaker © Copyright owned by the author(s) under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
52
+ page_content='0 International License (CC BY-NC-ND 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
53
+ page_content='0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
54
+ page_content=' https://pos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
55
+ page_content='sissa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
56
+ page_content='it/ arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
57
+ page_content='02449v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
58
+ page_content='IM] 6 Jan 2023 A prototype tank for the SWGO detector Sofia Grusovin 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
59
+ page_content=' Introduction The Southern Wide-field Gamma ray Observatory (SWGO) is an international collaboration with the objective of realizing a new-generation observatory for Very-High-Energy (VHE) gamma rays.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
60
+ page_content=' The observatory will be located in South America at a latitude between -30° and -10°, at an altitude of at least 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
61
+ page_content='4 km.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
62
+ page_content=' Some similar facilities already exist, such as HAWC in Mexico[10] and LHAASO in China[9], but SWGO will be the first observatory of its kind in the Southern hemisphere, which has a privileged view of the galactic center region[1, 4, 8] (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
63
+ page_content=' 1b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
64
+ page_content=' (a) Qualitative representation of SWGO’s layout.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
65
+ page_content=' [1] (b) FoV of SWGO and HAWC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
66
+ page_content=' [1] Figure 1: SWGO design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
67
+ page_content=' The observatory will be based on thousends of Water Cherenkov units (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
68
+ page_content=' 1a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
69
+ page_content=' In the design of such units, there are many variables to assess, such as the detector’s geometry, the types of sensors to be used and their configuration, and the materials;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
70
+ page_content=' therefore some test facilities are needed[5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
71
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
72
+ page_content=' The prototype tank The Italian partners of the SWGO collaboration (Istituto Nazionale di Fisica Nucleare, Politec- nico di Milano, Università degli Studi di Torino, Università degli Studi di Padova and Università degli Studi di Napoli Federico II) are working on the realization of a test facility to be used for SWGO.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
73
+ page_content=' It will consist of a cylindrical tank (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
74
+ page_content='32 m diameter and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
75
+ page_content='12 m height) with an external structure made of galvanized steel and an internal liner in AQUATEX® PVC which could be then changed for different tests (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
76
+ page_content=' 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
77
+ page_content=' The prototype tank is installed at Politecnico di Milano, and its objective is to act as a test facility for different types of sensors and sensors’ configurations, different types of liners, different tank configurations and anything else that could be useful to the collaboration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
78
+ page_content=' Multi-PMT modules and light traps for example are being studied at the universities of Padova and Napoli respectively and the prototype tank will be used to test them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
79
+ page_content=' Multi-PMT modules are made by 3” PMTs, like KM3 Hyper-Kamiokade (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
80
+ page_content=' 4a), which has been considered as inspiration although a MoU is still being finalized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
81
+ page_content=' Light traps on the other hand use Wavelength Shiftters (WLS), which are materials that absorb light and re-emit it at a lower energy in a different random direction, so the light ends up trapped inside because of internal reflection (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
82
+ page_content=' 4b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
83
+ page_content=' This means that a small sensor can be used to capture the light by using a large WLS surface[2, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
84
+ page_content=' 2 PARTICLEDETECTORARRAY NottoscafeTHEFERMI BUBBLES SWGO ImageCredit:NASA Invisible to HAWC Image Credit:HAWCCollab (Preliminary) HAWC Invisible to HAWC &SWGO THE GALACTIC CENTRE Image Credit: SARAOA prototype tank for the SWGO detector Sofia Grusovin (a) B6 building in Politecnico di Milano’s Bovisa campus: site of the test installation and first candidate for the tank’s location.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
85
+ page_content=' (b) The prototype tank inside B6 labs after test installation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
86
+ page_content=' Figure 2: Test installation of the Prototype Tank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
87
+ page_content=' (a) Hyper-K prototype considered as inspi- ration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
88
+ page_content=' (b) WLS light traps: concept and tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
89
+ page_content=' Figure 3: Experimental sensors design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
90
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
91
+ page_content='1 Main requirements The first main requirement to be considered for the tank’s installation site is that the floor must resist the tank’s pressure due to the large volume of water contained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
92
+ page_content=' An analysis on detection capabilities as a function of the water level has therefore been done first, in order to choose the appropriate water level (see section 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
93
+ page_content=' The analysis’s results could also be useful in the future for the studies on tank geometry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
94
+ page_content=' Since the prototype tank is a test facility, it will be of main importance to be able to change the sensors’ configurations frequently, so an appropriate structure was designed to hold the sensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
95
+ page_content=' During the design process, another main requirement that had to be taken into account was the need of maintaining high water purity inside the tank, which posed limits on the materials’ choices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
96
+ page_content=' 3 photon detectorA prototype tank for the SWGO detector Sofia Grusovin 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
97
+ page_content=' Study on particle detection as a function of the water level A preliminary study has been conducted on two showers of muons with the energies of 1 GeV and 10 GeV: muons in fact are the only particles that will most likely be detected at Milano’s altitude.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
98
+ page_content=' The shower’s interaction with the tank has been studied with 5 different water levels: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
99
+ page_content='65 m, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
100
+ page_content='00 m, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
101
+ page_content='35 m, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
102
+ page_content='70 m and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
103
+ page_content='05 m (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
104
+ page_content=' 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
105
+ page_content=' (a) Prototype tank with 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
106
+ page_content='0 m water level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
107
+ page_content=' (b) Prototype tank with 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
108
+ page_content='7 m water level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
109
+ page_content=' Figure 4: Visual output of the simulation of a muon (green) entering the tank and producing photons (red) in two different scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
110
+ page_content=' An additional study has been carried out on electron showers with the energy of 1 GeV to verify the model, since a different behavior was expected from the tank’s interaction with muons and electrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
111
+ page_content=' Muons are more penetrating particles with respect to electrons: the latter lose energy faster, thus producing Cherenkov light only during a brief segment in the upper part of the detector;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
112
+ page_content=' muons on the other hand usually cross the whole tank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
113
+ page_content=' A lower number of PE detected by the PMTs can be expected for electrons with a higher water level since they are produced only in the upper part of the tank and many of them would therefore be absorbed by the water before reaching the photosensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
114
+ page_content=' Both studies have been carried out using the HAWCSim framework, which makes use of Geant4[6] to simulate the interaction of the particle with the tank itself and the water, includ- ing the production of Cherenkov photons that can be detected by the Photo Multiplier Tubes (PMTs) installed inside the tank (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
115
+ page_content=' 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
116
+ page_content=' The tank’s dimensions and materials used for the simulations were the ones reported in section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
117
+ page_content=' The sensors’ configuration chosen (which will be the prototype tank’s reference configuration) was made by: 1 × 10” (253 mm) PMT situated in the center of the tank 4 × 5” (128 mm) PMT equidistant from the center in square configuration In HAWCSim, three models of PMT from the Hamamatsu company were available at the time of this analysis: 8” R5912 PMT, 10” R7081HQE PMT and 3” R12199 PMT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
118
+ page_content=' To simulate the four 5” PMTs, the 8” R5912 PMTs were used and then scaled to 5” during the analysis phase[5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
119
+ page_content=' 4 A prototype tank for the SWGO detector Sofia Grusovin 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
120
+ page_content='1 Particles generation 12000 particles (for each case: 1 GeV muons, 10 GeV muons and 1 GeV electrons) have been generated in a disk of fixed radius over the tank (r = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
121
+ page_content='78 m, 10 cm larger than the tank’s radius;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
122
+ page_content=' h = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
123
+ page_content='22 m, 10 cm larger than the tank’s height).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
124
+ page_content=' Their azimuth angle 𝜙 has been randomly selected in the range 𝜃 - 360° and zenith angle 𝜃 extracted from the distribution cos(𝜃)2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
125
+ page_content=' In each scenario, the first 10000 particles entering the tank have been analyzed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
126
+ page_content=' Since they had random direction in fact, not all the particles would enter the tank, therefore generating 12000 particles assured having at least 10000 that could be used for the analysis[7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
127
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
128
+ page_content='2 Results As it can be seen from fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
129
+ page_content=' 5b, the detection efficiency increases linearly with the water level and the standard deviation of the first photon time decreases with the water level (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
130
+ page_content=' 5c), meaning that the detector becomes more sensitive with more water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
131
+ page_content=' The number of photoelectrons detected is important to notice because here the difference between muons and electrons can be clearly appreciated (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
132
+ page_content=' 5a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
133
+ page_content=' The number of PE detected decreasing with higher levels of water for electrons was the expected behavior, in contrast with muons, for which that number increases, so the model was considered to be reliable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
134
+ page_content=' (a) Number of PE detected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
135
+ page_content=' (b) Detection efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
136
+ page_content=' (c) Standard deviation of the first photon time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
137
+ page_content=' Figure 5: Plots of results for muons (1 GeV and 10 GeV) and electrons (1 GeV).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
138
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
139
+ page_content=' Design of the PMT holder The material chosen for the PMT holder has been stainless steel AISI 304, which had good mechanical properties and was compatible with purified water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
140
+ page_content=' 5 Number of PE detected by PMT 1 (1o" 140 120 Number of PE detected 100 80 60 40 Npe 1GeV PMT 1 mu- 20 Npe 10GeV PMT 1 mu- Npe 1GeV PMT 1 e- 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
141
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
142
+ page_content='65 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
143
+ page_content='00 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
144
+ page_content='35 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
145
+ page_content='70 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
146
+ page_content='05 Water levelDetection efficiency of PMT 1 (1o" 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
147
+ page_content='9 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
148
+ page_content='8 Detection efficiency 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
149
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
150
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
151
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
152
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
153
+ page_content='3 Eff.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
154
+ page_content=' 1GeV PMT 1 mu- 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
155
+ page_content='2 Eff.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
156
+ page_content=' 10GeV PMT 1 mu- 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
157
+ page_content='1 Eff.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
158
+ page_content=' 1GeV PMT 1 e- 0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
159
+ page_content='65 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
160
+ page_content='00 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
161
+ page_content='35 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
162
+ page_content='70 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
163
+ page_content='05 Water levelSD of the first photon time on PMT 1 (10") 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
164
+ page_content='5 Standard deviation 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
165
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
166
+ page_content='5 std dev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
167
+ page_content='f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
168
+ page_content='time1GeV PMT1 1 mu- std deV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
169
+ page_content=' f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
170
+ page_content='time 10GeV PMT 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
171
+ page_content='5 mu- std deV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
172
+ page_content=' f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
173
+ page_content='time 1GeV PMT 1 e- 0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
174
+ page_content='65 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
175
+ page_content='00 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
176
+ page_content='35 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
177
+ page_content='70 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
178
+ page_content='05 Water levelA prototype tank for the SWGO detector Sofia Grusovin The first idea was to design a structure that could hold as many sensors configurations as possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
179
+ page_content=' A CAD model of such structure had been realized (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
180
+ page_content=' 6), and it was a good compromise between weight, robustness and flexibility requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
181
+ page_content=' This design however had to be adapted to parts available on the market and it was not easy to find similar pieces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
182
+ page_content=' In addition to that, the PMTs of the reference configuration were nearly ready to be tested, while the other sensors that have to be tested here are still in development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
183
+ page_content=' VII - 19 sensors (1 + 6 + 6 + 6) VI - 13 sensors (1 + 6 + 6) V - 5 sensors (1 + 4) IV - 10 sensors (1 + 3 + 6) I - 4 sensors (1 + 3) IIa and IIb - 4 sensors compact (1 + 3) III - 7 sensors (1 + 6) (a) Initial structure scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
184
+ page_content=' (b) Initial structure cad model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
185
+ page_content=' Figure 6: First design of the PMT holder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
186
+ page_content=' It has therefore been decided to design a simpler structure to be used for the reference configu- ration, designing it directly with parts that were known to be available on the market, with the idea of disassembling it and reuse the parts for the bigger structure when it will be needed (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
187
+ page_content=' 7 and fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
188
+ page_content=' 8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
189
+ page_content=' A loading analysis has been performed in solidworks applying the mass of the reference configuration PMTs and it has been shown that the structure could easily sustain the weight (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
190
+ page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
191
+ page_content=' To properly hold the PMTs, the same C-profiles used for the main structure have been used since the materials were already available and they were able to guarantee good stability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
192
+ page_content=' An additional gasket has to be placed between the C-profiles and the PMT in order to protect the sensor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
193
+ page_content=' Figure 7: 3D model of the cross holder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
194
+ page_content=' 6 A prototype tank for the SWGO detector Sofia Grusovin (a) Part a: flat bar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
195
+ page_content=' (b) Part b: C-profile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
196
+ page_content=' (c) Part c: L-profile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
197
+ page_content=' Figure 8: Parts composing the cross holder: part a is the base piece bought from the supplier (1000 mm x 50 mm x 1 mm perforated flat bar) from which part b and part c can be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
198
+ page_content=' (a) Von Mises stress with static maximum load.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
199
+ page_content=' (b) Displacement with static maximum load.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
200
+ page_content=' Figure 9: Cross holder: results of the solidworks static analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
201
+ page_content=' The parts have been manufactured in the workshop of the Department of Aerospace Science and Technology (Politecnico di Milano) by cutting and bending the flat bars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
202
+ page_content=' The C-profiles and the L-profiles could be obtained by cutting and folding the original perforated flat bars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
203
+ page_content=' When the structure was complete, a placement test with the five reference configuration PMTs has been done.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
204
+ page_content=' The appropriate rubber for the gaskets, compatible with purified water, had not been ordered yet, so foam rubber has been used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
205
+ page_content=' The structure was not deformed by the PMTs’ weight and the sensors were held stably (fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
206
+ page_content=' 10).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
207
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
208
+ page_content=' Conclusions After considering the data coming from the study on particle detection as a function of the water level, it has been decided to maximize detection performances allowing the possibility to fill the tank completely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
209
+ page_content=' Since the PMT holder is ready to be used, the first test with the reference configuration will start soon, followed by tests with the novel sensors designs from Napoli end Padova described in section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
210
+ page_content=' 7 von Mises (N/m^2) 7,581e+06 6,824 +06 6,066e +06 5,308e +06 4,550t+06 3,793 +06 3,015 +06 2,277e +06 1,519e +06 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
211
+ page_content=',617e+05 3,943± -03URES (mm) 3,077e-02 2,769e-02 2,462±-02 2,154e-02 1,846e-02 1,539e-02 1,231e-02 9,231e-03 6,154e-03 3,077e-03 1,000e-30A prototype tank for the SWGO detector Sofia Grusovin Figure 10: PMT holder: holding test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
212
+ page_content=' References [1] INFN and SWGO collaboration, INFN SWGO letter of intent, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
213
+ page_content=' [2] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
214
+ page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
215
+ page_content=' Ward, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
216
+ page_content=' Cortina and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
217
+ page_content=' Guberman, Light-Trap: a SiPM upgrade for VHE astronomy and beyond, Journal of Instrumentation 11 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
218
+ page_content=' [3] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
219
+ page_content=' Mariotti et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
220
+ page_content=', Optimized wavelength shifters light traps with SiPM photo sensors for SWGO, Internal SWGO paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
221
+ page_content=' [4] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
222
+ page_content=' Hinton, The Southern Wide-field Gamma-ray Observatory: status and srospects, Proceed- ings of Science 395 ICRC2021 (2022) 023.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
223
+ page_content=' [5] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
224
+ page_content=' Bisconti and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
225
+ page_content=' Chiavassa, Study of water Cherenkov detector designs for the SWGO experiment, Proceedings of Science 395 ICRC2021 (2022) 895.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
226
+ page_content=' [6] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
227
+ page_content=' Agostinelli et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
228
+ page_content=', GEANT4 — a simulation toolkit, Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equip- ment 506 (2003) 250.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
229
+ page_content=' [7] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
230
+ page_content=' Bisconti and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
231
+ page_content=' Chiavassa, Study of water Cherenkov detector design for ground-based gamma-ray experiments, arXiv e-prints (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
232
+ page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
233
+ page_content=' Albert et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
234
+ page_content=', Science case for a wide field-of-view very-high-energy gamma-ray observatory in the Southern hemisphere, arXiv e-prints (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
235
+ page_content=' [9] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
236
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
237
+ page_content=' Aharonian, LHAASO: A PeVatrons explorer, Science China Physics, Mechanics & Astronomy volume 64 (2021) 109531.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
238
+ page_content=' [10] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
239
+ page_content=' Sinnis, The HAWC TeV gamma-ray observatory, Il nuovo cimento C 34 (2021) 65.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
240
+ page_content=' 8' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE0T4oBgHgl3EQfiwE-/content/2301.02449v1.pdf'}
M9FQT4oBgHgl3EQfVza8/content/tmp_files/2301.13302v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
M9FQT4oBgHgl3EQfVza8/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
MdE0T4oBgHgl3EQfSwDa/content/tmp_files/2301.02228v1.pdf.txt ADDED
@@ -0,0 +1,2077 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MedKLIP: Medical Knowledge Enhanced Language-Image Pre-Training
2
+ Chaoyi Wu1,2,
3
+ Xiaoman Zhang1,2,
4
+ Ya Zhang1,2,
5
+ Yanfeng Wang1,2,
6
+ Weidi Xie1,2
7
+ 1Cooperative Medianet Innovation Center, Shanghai Jiao Tong University
8
+ 2Shanghai AI Laboratory
9
+ {wtzxxxwcy02, xm99sjtu, ya zhang, wangyanfeng, weidi}@sjtu.edu.cn
10
+ https://chaoyi-wu.github.io/MedKLIP/
11
+ Abstract
12
+ In this paper, we consider the problem of enhancing
13
+ self-supervised visual-language pre-training (VLP) with
14
+ medical-specific knowledge, by exploiting the paired image-
15
+ text reports from the radiological daily practice. In par-
16
+ ticular, we make the following contributions: First, un-
17
+ like existing works that directly process the raw reports, we
18
+ adopt a novel report filter to extract the medical entities,
19
+ avoiding unnecessary complexity from language grammar
20
+ and enhancing the supervision signals; Second, we pro-
21
+ pose a novel entity embedding module by querying an ex-
22
+ ternal knowledge description base, to exploit the rich con-
23
+ text of additional information that the medical domain af-
24
+ fords, and implicitly build relationships between entities in
25
+ the language embedding space; Third, we propose a novel
26
+ Transformer-based fusion model for spatially aligning the
27
+ entity description with visual signals at the image patch
28
+ level only with self-supervised learning, thus enabling the
29
+ ability for spatial grounding; Fourth, we conduct thorough
30
+ experiments to validate the effectiveness of our proposed
31
+ architecture, and benchmark on numerous public bench-
32
+ marks e.g., ChestX-ray14, RSNA Pneumonia, SIIM-ACR
33
+ Pneumothorax, COVIDx CXR-2, COVID Rural, and Ede-
34
+ maSeverity. In both zero-shot and fine-tuning settings, our
35
+ model has demonstrated strong performance compared with
36
+ the former methods on disease classification and grounding.
37
+ 1. Introduction
38
+ With the rapid development of deep learning, numerous
39
+ works have been proposed to facilitate computer-aided di-
40
+ agnosis in the medical field [16, 17, 39, 48]. Despite the
41
+ tremendous progress, these models are normally trained to
42
+ recognize or segment the structures that fall into a certain
43
+ closed set of anatomical or disease categories, whenever a
44
+ new disease comes to be of interest, a costly procedure for
45
+ data annotation, model re-training, and ethics proof will be
46
+ required, fundamentally limiting its practical values. As an
47
+ a.
48
+ b.
49
+ Pre-train Model
50
+ Which one?
51
+
52
+
53
+ R_2
54
+ R_2
55
+ R_1
56
+ --
57
+ R_1
58
+ --
59
+
60
+ --
61
+ R_N
62
+ --
63
+ R_N
64
+ --
65
+ Report Base
66
+ R_2
67
+ R_1
68
+ --
69
+
70
+ --
71
+ R_N
72
+ --
73
+ Report Base
74
+ Increased right lower lobe opacity,
75
+ concerning for infection. No evidence of
76
+ pneumothorax.
77
+ R_2: Final Report
78
+ Increased right lower lobe opacity,
79
+ concerning for infection. No evidence of
80
+ pneumothorax.
81
+ R_2: Final Report
82
+ Supervision
83
+ Pre-train Model
84
+ Which one?
85
+
86
+
87
+ R_2
88
+ R_1
89
+ --
90
+
91
+ --
92
+ R_N
93
+ --
94
+ Report Base
95
+ Increased right lower lobe opacity,
96
+ concerning for infection. No evidence of
97
+ pneumothorax.
98
+ R_2: Final Report
99
+ Supervision
100
+ Pre-train Model
101
+ Knowledge
102
+ Description Base
103
+ Entity Descriptions
104
+ Entities
105
+ Position? Exist?
106
+ Entity
107
+ Position
108
+ Exist
109
+ Opacity
110
+ Right lower lobe
111
+ TRUE
112
+ Pneumothorax
113
+ Unspecified
114
+ FALSE
115
+
116
+
117
+ Report Filter
118
+ Final Report
119
+ Increased right lower lobe opacity,
120
+ concerning for infection. No evidence of
121
+ pneumothorax.
122
+ Final Report
123
+ Increased right lower lobe opacity,
124
+ concerning for infection. No evidence of
125
+ pneumothorax.
126
+ Supervision
127
+ Report Base
128
+ Pre-train Model
129
+ Knowledge
130
+ Description Base
131
+ Entity Descriptions
132
+ Entities
133
+ Position? Exist?
134
+ Entity
135
+ Position
136
+ Exist
137
+ Opacity
138
+ Right lower lobe
139
+ TRUE
140
+ Pneumothorax
141
+ Unspecified
142
+ FALSE
143
+
144
+
145
+ Report Filter
146
+ Final Report
147
+ Increased right lower lobe opacity,
148
+ concerning for infection. No evidence of
149
+ pneumothorax.
150
+ Supervision
151
+ Report Base
152
+ Figure 1. Our method mainly considers combining medical knowl-
153
+ edge with VLP. a. shows the standard VLP flowchart which uses
154
+ text-image retrieval as a proxy task. b. is our MedKLIP flowchart.
155
+ We adopt a report filter module to decompose raw reports at entity
156
+ level and further use knowledge descriptions to explain entities.
157
+ Our model can realize zero-shot classification and grounding.
158
+ alternative, recent research considers to train the model by
159
+ exploiting a large number of multi-modal medical data, that
160
+ is generated from daily clinical routine, for example, the
161
+ most common example is the dataset of X-ray images with
162
+ paired radiological reports [15,25,28].
163
+ This paper focuses on self-supervised vision-language
164
+ representation learning in the medical domain, with the goal
165
+ of zero-shot disease diagnosis (classification) and ground-
166
+ ing. Undoubtedly, such tasks have also been widely inves-
167
+ tigated in the computer vision community, with significant
168
+ progress made in the past years, for example, CLIP [43],
169
+ ALBEF [30], BLIP [29], etc. However, to achieve such a
170
+ goal in the medical domain, different challenges must be
171
+ resolved, which requires research efforts from the commu-
172
+ nity: First, data availability, training Foundation Models in
173
+ arXiv:2301.02228v1 [eess.IV] 5 Jan 2023
174
+
175
+ computer vision normally require over millions of image-
176
+ text pairs at ease, while in the medical domain, only a few
177
+ hundred thousand pairs are available [28]. The limited data
178
+ amount challenges language models to understand the re-
179
+ ports in free form [7]. Second, the problem considered in
180
+ medical diagnosis is naturally fine-grained, that requires
181
+ distinguishing between fine appearance details to under-
182
+ stand the disease, as a consequence, domain knowledge is
183
+ essential; Third, robustness is crucial, it is, therefore, prefer-
184
+ able to have explainability, where diagnosis results come
185
+ along with the visual grounding, to help radiologists to un-
186
+ derstand the system, and build trust between humans and
187
+ machines.
188
+ Unlike existing work in medical VLP (Vision-Language
189
+ Pre-training) [7, 22, 40, 56] that na¨ıvely matches raw re-
190
+ ports with image scans, we propose a novel knowledge-
191
+ enhanced visual-language model that takes medical prior
192
+ into consideration and enables us to address the aforemen-
193
+ tioned challenges explicitly, as shown in Fig. 1: First, we
194
+ propose a report filter to extract useful medical entities,
195
+ and simplify each report into sets of triplets, denoted as
196
+ {entity, position, exist}. Consequently, decomposing re-
197
+ ports into entities leads to an effective representation of the
198
+ reports with minimal information loss, enriching supervi-
199
+ sion signals at the detailed entity level; Second, we map
200
+ these entities into fine-grained descriptions by querying a
201
+ well-defined medical knowledge base, and compute the text
202
+ embedding for these descriptions, to implicitly build rela-
203
+ tionships between entities; Third, we adopt a transformer-
204
+ based architecture for aligning the image patches with en-
205
+ tity descriptions, that simultaneously infer the likelihood of
206
+ certain diseases and the visual evidence in the form of a
207
+ spatial heatmap, i.e., providing grounding for explainability
208
+ purpose.
209
+ We train the model on the most widely-used medi-
210
+ cal image-report dataset MIMIC-CXR [28] and rigorously
211
+ evaluate on numerous public benchmarks, e.g., ChestX-
212
+ ray14 [50], RSNA Pneumonia [44], SIIM-ACR Pneumoth-
213
+ orax [1], COVIDx CXR-2 [41], COVID Rural [12, 47],
214
+ and EdemaSeverity [8]. We get a state-of-the-art zero-shot
215
+ classification and grounding performance on different dis-
216
+ eases, spanning different image distributions, with further
217
+ fine-tuning, our model still exceeds previous models signif-
218
+ icantly.
219
+ 2. Related Work
220
+ Vision-Language Pre-training Models. Vision-Language
221
+ Pre-training (VLP) models have achieved great success in
222
+ natural scenarios. Generally, there are two typical structures
223
+ for VLP models. One is two-stream methods [5,27,30]. The
224
+ other is single-stream methods [10, 32]. These impressive
225
+ results promote VLP methods in medical. Different from
226
+ natural data, medical VLP suffers from a serious Lack of
227
+ Data (224k [28] vs 400M [5]). Most medical VLP meth-
228
+ ods follow the two-stream methods [8, 22, 40, 56]. Con-
229
+ VIRT [56] first proposed to use contrastive learning as a
230
+ proxy task in medical. LoVT and GLoRIA then focus on
231
+ improving the local alignment performance [8,22]. BioViL
232
+ notices the language pattern in reports is different from
233
+ other natural texts and re-designs the language model used
234
+ for medical VLP [7]. These works have greatly contributed
235
+ to the development of this aspect. However, they still view
236
+ medical texts and images as common natural data and use a
237
+ classical pipeline to handle them, instead of leveraging the
238
+ rich prior knowledge in medical.
239
+ Medical Named-Entity-Recognition Models.
240
+ Various
241
+ natural language processing (NLP) approaches have been
242
+ proposed to extract useful information from radiology re-
243
+ ports [25,37,42,45]. These early methods considered only
244
+ the disease, causing they lose a lot of information. Some
245
+ Analysis tools [4,6] have also been developed to extract key
246
+ clinical concepts and their attributes from biomedical text.
247
+ Further state-of-the-art works [26, 51] are proposed to ex-
248
+ tract relationship between different entities without demand
249
+ of pre-defined close disease set, retaining most of useful in-
250
+ formation with high accuracy. This progress inspires us a
251
+ lot and provide a new perspective for VLP. However, how
252
+ to take advantage of this Named-Entity-Recognition (NER)
253
+ models have not been discussed sufficiently in VLP field.
254
+ Medical Knowledge Enhanced Models. Leveraging ex-
255
+ ternal medical knowledge to enhance deep learning models
256
+ is not a new topic [52]. Depending the approaches of us-
257
+ ing medical knowledge, They can be classified into model-
258
+ based and input-based two types. In model-based types, the
259
+ authors may imitate the radiological practice to design the
260
+ model [20, 23, 31, 49] or change the model structure based
261
+ on diagnostic patterns [11, 18, 38]. In input-based types,
262
+ the knowledge is viewed as an extra input to calculate fea-
263
+ tures [46, 53, 54] or to guide the final loss [9, 24]. Multi-
264
+ task learning and attention mechanism [33,34,36] are often
265
+ adopted to realize medical knowledge combination. How-
266
+ ever, most of these works are task-specific [52] because
267
+ medical knowledge lacks an effective shared representation
268
+ space across various diseases while we demonstrate that
269
+ leveraging medical entity descriptions with text encoding
270
+ has the potential to provide such a space.
271
+ 3. Method
272
+ In this section, we start by describing our considered
273
+ problem scenario in Sec. 3.1, followed by the details of
274
+ our proposed Transformer-based architecture in Sec. 3.2,
275
+ including, the visual encoder, knowledge-enhanced text en-
276
+ coder, and the fusion module for aligning the visual and lan-
277
+ guage signals. In Sec. 3.3, we describe the training proce-
278
+ dure for our proposed model with the paired image-reports
279
+
280
+ Text Encoder
281
+ Text Encoder
282
+ Visual
283
+ Encoder
284
+ Visual
285
+ Encoder
286
+ Entity Descriptions:
287
+ Pneumonia is an condition of the lung …
288
+ Pneumothorax is an abnormal collection of air …
289
+ Opacity is defined as an area of hazy opacification …
290
+ Fracture is a break of bone especially in rib bone…
291
+
292
+ Fusion Module
293
+ Fusion Module
294
+ Contrastive Loss
295
+ CE Loss
296
+
297
+ =
298
+ +
299
+ Chest 1 view, 8/21/2011
300
+ History: 50 years male Comparison: None
301
+ Impression: Increased right lower lobe opacity, concerning
302
+ for infection. No evidence of pneumothorax.
303
+ Final Report
304
+ Chest 1 view, 8/21/2011
305
+ History: 50 years male Comparison: None
306
+ Impression: Increased right lower lobe opacity, concerning
307
+ for infection. No evidence of pneumothorax.
308
+ Final Report
309
+ CE Head
310
+ CE Head
311
+ Contrastive Head
312
+ Contrastive Head
313
+ Report Filter
314
+
315
+
316
+ Entity
317
+ Position
318
+ Exist
319
+ Opacity
320
+ Right lower lobe
321
+ TRUE
322
+ Pneumothorax
323
+ Unspecified
324
+ FALSE
325
+ + Negative Locations
326
+ Report Filter
327
+ Report
328
+ Location Embeddings
329
+ for Contrastive
330
+ 0/1 Labels
331
+ for CE
332
+ Text Filter
333
+ Text Filter
334
+ It is located at [location]
335
+ Text Encoder
336
+ Text Encoder
337
+ It is located at [location]
338
+ Text Encoder
339
+ Main Framework
340
+ Figure 2. The whole framework of our method. The figure mainly contains the fourth module: Visual Encoder, Knowledge-enhanced
341
+ Language Encoding, Fusion Module. Knowledge-enhanced Language Encoding contains Text Encoder and Report Filter. Report Filter
342
+ extracts entities from the raw reports and Text Encoder further embeds them. Visual Encoder is used to encoder the input of visual
343
+ modalities and Fusion Module is used for cross-modality interaction. The details of Report Filter can be found in the right sub-figure. A
344
+ report is first filtered by a pre-trained filter and viewed as a set of triplets. The “Position” part is mixed with some negative positions for
345
+ contrastive loss and the “Exist” part is used for CE loss.
346
+ sourced from the daily routine X-ray scans.
347
+ 3.1. Problem Scenario
348
+ Assuming we are given a training set with N samples,
349
+ i.e., Dtrain = {(X1, T1), . . . , (XN, TN)}, where Xi, Ti re-
350
+ fer to the X-ray image and its corresponding medical report
351
+ generated in the daily routine scans, respectively, our goal
352
+ is to train a visual-language model that enables us to diag-
353
+ nose the existence of certain diseases and localize the vi-
354
+ sual evidence spatially. Specifically, at inference time, we
355
+ can freely ask the system to identify the likelihood of the
356
+ patient getting a certain disease (may or may not be seen
357
+ during training), with its visual description for the disease
358
+ of interest:
359
+ ˆsi, ˆmi = Φfusion(Φvisual(Xi), Φtextual([description])),
360
+ (1)
361
+ where Xi ∈ RH×W ×3 refers to an image sample from the
362
+ test set, with H, W denoting height and width respectively.
363
+ ˆsi ∈ [0, 1] refers to the inferred likelihood of the patient
364
+ having a certain disease indicated by the input description,
365
+ and ˆmi ∈ RH×W ×1 denotes a predicted spatial heatmap,
366
+ with high activation on pixels that potentially provide the
367
+ visual indication for such disease. In the following section,
368
+ we will detail the individual components of our architecture,
369
+ namely, the visual encoder, text encoder, and fusion mod-
370
+ ule, and training them with the available training set (Dtrain).
371
+ 3.2. Architecture
372
+ In this section, we detail our proposed framework, con-
373
+ sisting of three main components, namely, visual encoding,
374
+ knowledge-enhanced language encoding, and fusion mod-
375
+ ule, as shown in Fig. 2. Note that, we hereon only consider
376
+ single sampled image-reports pair (Xi, Ti), and ignore the
377
+ subscript in notations for simplicity.
378
+ 3.2.1. Visual Encoding
379
+ Given an X-ray image scan X ∈ RH×W ×3, we can com-
380
+ pute the features with a visual backbone:
381
+ V = Φvisual(X) ∈ Rh×w×d,
382
+ (2)
383
+ h, w, d refer to the height, width, and feature dimension
384
+ of the output feature map, in our case, we adopt a stan-
385
+ dard ResNet-50 as the visual backbone, and take the out-
386
+ put from the 4th residual block. Note that, we make the
387
+ such an architectural choice for a fair comparison with ex-
388
+ isting work [7,22,40,56], while other visual backbones, e.g.,
389
+ ViT [14], can equally be applied.
390
+ 3.2.2. Knowledge-enhanced Language Encoding
391
+ The goal of this module is to extract useful information
392
+ from the text report, by incorporating medical domain
393
+ knowledge. In particular, we design two stages, namely re-
394
+ port filtering, and entity encoding.
395
+ Report Filtering. To start with, we propose to condense
396
+ the report and transform it into a set of entity triplets, i.e.,
397
+ removing the unnecessary complexity from language gram-
398
+ mar, as shown in Figure 2 (right). In detail, we use a pre-
399
+ trained text filter [26, 55] to extract valuable information
400
+ from the report, for example, the medical entities and their
401
+ corresponding positions on the image.
402
+ Specifically, given a report T with a set of sentences,
403
+ T = {s1, s2, ..., sM}, the filter independently operates on
404
+ each of the sentences, and construct a number of triplets
405
+ from the report, with the extracted entity (most are dis-
406
+ eases), spatial position, and a label indicating the existence
407
+ of the disease:
408
+ Φfilter(sj) = {entityn, positionn, existn}, n ∈ [0, tj],
409
+ (3)
410
+
411
+ where tj represents the total number of entities contained
412
+ in one sentence, with n = 0 indicating the special case that
413
+ there is no valid entity. Note that, the position refers to the
414
+ spatial position of the entity lying in an image, it is not to
415
+ be confused with the positional embedding in Transformer.
416
+ Entity Encoding. Here, we replace the entities by querying
417
+ detailed visual descriptions from a medical-purpose knowl-
418
+ edge base, for example, “Pneumonia” → “It is a condition
419
+ of the lung primarily affecting the small air sacs known as
420
+ alveolar. It may present with opacities and pleural effusion
421
+ and it can increase the diagnostic accuracy of lung consoli-
422
+ dation”. Note that, such descriptions for the medical termi-
423
+ nologies can easily be sourced from either existing educa-
424
+ tional textbooks or online resources12. Despite its simplic-
425
+ ity, converting the entities into descriptions is crucial for
426
+ more reliable and open-vocabulary diagnosis, as it further
427
+ decomposes the medical entities into visual attributes that
428
+ are shared by different diseases, encouraging the model to
429
+ capture a deep understanding of the visual evidence.
430
+ To encode the entity, we use the ClinicalBERT [3] as a
431
+ pre-trained text encoder, to first compute the embedding for
432
+ the entity description and position, and then adopt a linear
433
+ MLP to flexibly project the embedding to desired dims:
434
+ e = Φtextual([description]) ∈ Rd,
435
+ (4)
436
+ p = Φtextual(“it is located at [position]”) ∈ Rd′.
437
+ (5)
438
+ Each triplet has now been converted into {e, p, l}, l ∈ {0, 1}
439
+ denotes the existence of the entity.
440
+ Discussion We have made two major differences compared
441
+ to the existing visual-language models in computer vision,
442
+ First, the information in medical reports is often more con-
443
+ densed, normally describing the existence of abnormality
444
+ and their positions in the image, thus, adopting the filter
445
+ operation can avoid unnecessary complexity from grammar,
446
+ while still retaining most of the useful information in re-
447
+ ports.
448
+ Second, entities tend to be medical terminologies
449
+ that are only understandable to audiences with a medical
450
+ background, enrich the encoding by visual descriptions can
451
+ significantly help the model to capture a deep understand-
452
+ ing of the visual evidence for diseases, specifically, for seen
453
+ diseases, such shared visual attributes enable to build the
454
+ implicit relationship, while for unseen diseases, their visual
455
+ evidence may have already been well understood by pro-
456
+ cessing the descriptions of the seen ones, as they tend to be
457
+ shared among diseases.
458
+ 1Wikipedia https://en.wikipedia.org/wiki/Wiki
459
+ 2UMLS [6] https://www.nlm.nih.gov/research/umls/
460
+ index.html
461
+ 3.2.3. Fusion Module
462
+ After extracting all the entities and their corresponding po-
463
+ sitions from the reports, we select the top |Q| most com-
464
+ monly appearing entities in reports, and compute the textual
465
+ embeddings for their corresponding descriptions, denoted
466
+ as an entity set Q = {e1, e2, ..., e|Q|}, and top |P| posi-
467
+ tion embeddings as a position set P = {p1, p2, ..., p|P |}.
468
+ For a certain image, its computed visual representation and
469
+ the entity set will be passed into a fusion module for align-
470
+ ment, consisting of multiple Transformer Decoder layers.
471
+ We treat the entity set Q as Query, and the image features
472
+ V as Key and Value into the Transformer decoders, the out-
473
+ puts from the fusion module are further fed into two linear
474
+ MLP layers, one is used for inferring the existence of the
475
+ entity, and the other generates an embedding to indicate the
476
+ entity’s spatial position:
477
+ {ˆs, ˆp, ˆm} = Φfusion(V, Q),
478
+ (6)
479
+ where ˆs ∈ R|Q| represents the existence prediction for each
480
+ entity query, and ˆp ∈ R|Q|×d′ represents the prediction em-
481
+ bedding of spatial position for the entities. ˆm denotes the
482
+ average of the cross-attention maps sourced from Trans-
483
+ former Decoder layers. The training procedure will be de-
484
+ tailed in Sec. 3.3.
485
+ Discussion.
486
+ In contrast to the existing approaches [56]
487
+ that aligns the reports with the entire image, our adopted
488
+ Transformer decoder enables to compute correspondences
489
+ between text and image at the patch level. Consequently,
490
+ the image features V are more suitable for downstream seg-
491
+ mentation tasks and the average of the cross-attention map
492
+ in each layers can be used directly for zero-shot grounding.
493
+ 3.3. Training
494
+ To train the proposed model, we leverage the corre-
495
+ sponding triplets, for entities that are not mentioned in the
496
+ considered report, we simply ignore them while computing
497
+ loss. For simplicity, the following formulations are based
498
+ on the assumption that the considered query do have corre-
499
+ sponding triplets. In specific, for the existence prediction
500
+ ˆs, we use binary cross-entropy with the existence label, de-
501
+ noted as Lcls; to supervise the position prediction for each
502
+ entity query, we adopt contrastive learning, randomly sam-
503
+ ple M position embeddings from the position set:
504
+ Lloc = − 1
505
+ |Q|
506
+ |Q|
507
+
508
+ k=1
509
+ e⟨ˆpk,pk⟩
510
+ e⟨ˆpk,pk⟩ + �M
511
+ u=1 e⟨ˆpk,PI(k,u)⟩ ,
512
+ (7)
513
+ where ⟨·, ·⟩ represents the inner product of two vectors
514
+ and I(·, ·) is a random index sampling function. P is un-
515
+ normalized in calculation.
516
+ The final loss is the sum of the two:
517
+ Ltotal = α1Lloc + α2Lcls,
518
+ (8)
519
+
520
+ where α1, α2 refer to two hyper-parameters controlling the
521
+ ratio of the two losses, and we set them to be 1.0 by default.
522
+ 4. Experiment
523
+ In this section, we start by introducing the dataset used
524
+ for experiments, e.g., pre-training, and various downstream
525
+ datasets. Then we describe the implementation details and
526
+ the considered baselines.
527
+ 4.1. Pre-training Dataset
528
+ MIMIC-CXR v2 [19, 28] consists of over 227k studies of
529
+ paired image-report data, they are sourced from 65,379 pa-
530
+ tients at different scanning. Each study can have one or two
531
+ images (different scan views), totaling 377,110 images.
532
+ 4.2. Datasets for Downstream Tasks
533
+ ChestX-ray14 [50] contains 112,120 frontal-view X-ray
534
+ images of 30,805 unique patients, collected from the year
535
+ of 1992 to 2015 by NIH(National Institutes of Health), with
536
+ labels of 14 common diseases provided. We split the dataset
537
+ into 0.8/0.1/0.1 for train/valid/test.
538
+ RSNA Pneumonia [44] contains more than 260k frontal-
539
+ view chest X-rays with corresponding pneumonia opac-
540
+ ity masks collected by RSNA (Radiological Society of
541
+ North America). Commonly, it is treated as a classifica-
542
+ tion tasks [7, 22]. We split the dataset into 0.6/0.2/0.2 for
543
+ train/valid/test.
544
+ SIIM-ACR Pneumothorax [1] contains more than 12k
545
+ frontal-view chest X-rays with pneumothorax masks col-
546
+ lected by SIIM-ACR (Society for Imaging Informatics in
547
+ Medicine and American College of Radiology). Similarly
548
+ to RSNA Pneumonia dataset, it can be both used as clas-
549
+ sification and segmentation tasks. We split the dataset into
550
+ 0.6/0.2/0.2 for train/valid/test.
551
+ COVIDx CXR-2 [41] and COVID Rural [12, 47] aim to
552
+ evaluate on diagnosing COVID-19. COVIDx CXR-3 con-
553
+ tains 29,986 images from 16,648 patients with COVID-19
554
+ classification labels. We use it as a classification dataset and
555
+ split it into 0.7/0.2/0.1 for train/valid/test. Additionally,
556
+ we use COVID Rural dataset for COVID-19 segmentation.
557
+ It contains more than 200 chest X-rays with segmentation
558
+ masks, and we split it into 0.6/0.2/0.2 for train/valid/test.
559
+ Edema Severity [8] contains 6,524 examples from MIMIC-
560
+ CXR with pulmonary edema severity labels (0 to 3, increas-
561
+ ing severity) extracted from the radiology reports. Of these,
562
+ 141 radiologists were examined by radiologists, and con-
563
+ sensus was reached on severity level. It can be seen as a
564
+ typical fine-grained classification task. We split the dataset
565
+ into 0.6/0.2/0.2 for train/valid/test.
566
+ 4.3. Implementation Details
567
+ This section details the implementation for architecture,
568
+ pre-training, zero-shot inference and fine-tuning procedure.
569
+ Model architecture. As input to the model, images are re-
570
+ sized into 224 × 224 × 3. We use the first four layers of
571
+ ResNet50 [21] as our visual backbone (Φvisual), and adopt
572
+ a MLP layer to transform the output feature dimension into
573
+ d = 256. As a result, the output feature maps from vi-
574
+ sual encoder is V ∈ R14×14×256. On the report side, we
575
+ extract the entities with a pre-trained text filter, as described
576
+ in [26], and compute the entity and position embedding with
577
+ a pre-trained ClinicalBERT [2], its default embedding dim
578
+ is d′ = 768. We obtain |Q| = 75 entities and |P| = 51 po-
579
+ sitions that most frequently appear in the reports, following
580
+ [55]. We sample M = 7 negative positions for each en-
581
+ tity to calculate contrastive loss for training entity position
582
+ training. In the fusion module, We adopt 4 Transformer De-
583
+ coder layers with 4 heads in each layer.
584
+ Pre-training. At this stage, both the filtering operation and
585
+ language encoding use pre-trained networks, while the vi-
586
+ sual encoder and fusion module are trained end-to-end on
587
+ the image-text pairs. We use AdamW [35] optimizer with
588
+ lr = 1 × 10−4 and lrwarm up = 1 × 10−5. We train on a
589
+ GeForce RTX 3090 GPU with batch size 32 for 60 epochs.
590
+ The first 5 epochs are set for warming up.
591
+ Inference. At inference time, given a test image, we aim
592
+ to infer the existence of certain entity / disease, and ground
593
+ their visual evidence. For those entities that have appeared
594
+ at training time, we simply adopt the corresponding ele-
595
+ ments from the entity query set, while for those unseen
596
+ ones, we replace the entity with a brief description, and
597
+ treat that as an added query to the model. The existence
598
+ output can be directly applied for classification and the av-
599
+ erage cross-attention of different layers in the transformer-
600
+ based fusion module between specific query and the visual
601
+ features are used for grounding.
602
+ Fine-tuning. For the downstream tasks, with large amount
603
+ of training data, we can fine-tune the model end-to-
604
+ end, with our pre-trained visual backbone as initializa-
605
+ tion. Specifically, for image classification task, we adopt
606
+ ResNet50 [21] and initialize its first four layers with our
607
+ pre-trained visual encoder. For image segmentation task,
608
+ we use ResUNet [13] as backbone and initialize its encoder
609
+ with our pre-trained image encoder.
610
+ 4.4. Baselines
611
+ We compare with various existing state-of-the-art med-
612
+ ical image-text pre-train methods, namely, ConVIRT [56],
613
+ GLoRIA [22] and BioViL [7]. Since ConVIRT and GLo-
614
+ RIA are pre-trained on an in-house dataset, we re-train their
615
+ models on MIMIC-CXR dataset for fair comparison. For
616
+ BioViL, we use the officially released models by the au-
617
+
618
+ Dataset
619
+ RSNA Pneumonia
620
+ SIIM-ACR Pneumothorax
621
+ ChestX-ray14
622
+ Methods
623
+ AUC↑
624
+ F1↑
625
+ ACC↑
626
+ AUC↑
627
+ F1↑
628
+ ACC↑
629
+ AUC↑
630
+ F1↑
631
+ ACC↑
632
+ ConVIRT [56]
633
+ 0.8042
634
+ 0.5842
635
+ 0.7611
636
+ 0.6431
637
+ 0.4329
638
+ 0.5700
639
+ 0.6101
640
+ 0.1628
641
+ 0.7102
642
+ GLoRIA [22]
643
+ 0.7145
644
+ 0.4901
645
+ 0.7129
646
+ 0.5342
647
+ 0.3823
648
+ 0.4047
649
+ 0.6610
650
+ 0.1732
651
+ 0.7700
652
+ BioViL [7]
653
+ 0.8280
654
+ 0.5833
655
+ 0.7669
656
+ 0.7079
657
+ 0.4855
658
+ 0.6909
659
+ 0.6912
660
+ 0.1931
661
+ 0.7916
662
+ Ours
663
+ 0.8694
664
+ 0.6342
665
+ 0.8002
666
+ 0.8924
667
+ 0.6833
668
+ 0.8428
669
+ 0.7676
670
+ 0.2525
671
+ 0.8619
672
+ Table 1. Comparison with other state-of-the-art methods on zero-shot classification task. AUC, F1 and ACC scores are reported. For
673
+ ChestX-ray14, the metrics all refer to the macro average on the 14 diseases.
674
+ Prompt Type
675
+ Direct Covid-19
676
+ Covid-19 Description
677
+ Methods
678
+ AUC↑
679
+ F1↑
680
+ ACC↑
681
+ AUC↑
682
+ F1↑
683
+ ACC↑
684
+ ConVIRT [56]
685
+ 0.6159
686
+ 0.7057
687
+ 0.6113
688
+ 0.5208
689
+ 0.6902
690
+ 0.5266
691
+ GLoRIA [22]
692
+ 0.6319
693
+ 0.6938
694
+ 0.5710
695
+ 0.6659
696
+ 0.7007
697
+ 0.6083
698
+ BioViL [7]
699
+ 0.6137
700
+ 0.6958
701
+ 0.5461
702
+ 0.5382
703
+ 0.6910
704
+ 0.5375
705
+ Ours
706
+ 0.6561
707
+ 0.7066
708
+ 0.5917
709
+ 0.7396
710
+ 0.7670
711
+ 0.7006
712
+ Table 2.
713
+ Comparison with other state-of-the-art
714
+ methods on zero-shot Covid-19 classification task.
715
+ AUC, F1 and ACC scores are reported.
716
+ “Direct
717
+ covid-19” refers to directly use “Covid-19” to con-
718
+ struct the prompt sentence while “Covid-19 Descrip-
719
+ tion” refers to replace the name “Covid-19” with its
720
+ medical description.
721
+ thors. For zero-shot setting, we use the prompt as men-
722
+ tioned by BioViL [7]. For fine-tuning, we all use ResNet50
723
+ as the visual encoder as described in Sec. 4.3.
724
+ 4.5. Metrics
725
+ AUC refers to the area under the receiver operating charac-
726
+ teristic (ROC) curve, that is commonly used for detection
727
+ and binary classification tasks.
728
+ F1 and ACC are used as supplementary metrics for classi-
729
+ fication tasks. Specifically, F1 comprehensively measures
730
+ the recall and precision of the model, and ACC is the short
731
+ of Accuracy. The final binary prediction threshold is chosen
732
+ to maximise the F1 score. The ACC score is also calculated
733
+ under this threshold.
734
+ Pointing Game is used for evaluating the grounding perfor-
735
+ mance. In specific, we extract the region with max response
736
+ in the output heat-map, for one instance, if the region hit
737
+ the ground-truth mask, it is considered a positive prediction,
738
+ otherwise negative. Finally, accuracy can be calculated as
739
+ the pointing game score.
740
+ Dice and IOU are commonly used for segmentation tasks.
741
+ For zero-shot segmentation, we search the segmentation
742
+ threshold with 0.01 interval for all methods, and report the
743
+ maximal Dice score for each model.
744
+ Precision and Recall refer to the detection Precision and
745
+ Recall.
746
+ For medical, it is important that lesions are de-
747
+ tected even without fine segmentation.
748
+ Additionally, in
749
+ some hard cases, especially for the zero-shot setting, Dice
750
+ and IOU may be too strict to reflect the performance differ-
751
+ ence. Precision and recall scores can compensate for these.
752
+ We choose the IOU threshold as 0.1 to calculate the scores.
753
+ 5. Results
754
+ In this section, we will report the experimental results. In
755
+ general, we split the results into two parts: zero-shot setting
756
+ and fine-tuning setting. In the zero-shot case (Sec. 5.1), we
757
+ carry out the ablation study and compare it with the other
758
+ SOTA image-text pre-train methods. We mainly consider
759
+ classification and segmentation tasks; In the fine-tuning
760
+ case (Sec. 5.2), we evaluate the model’s transferability by
761
+ fine-tuning the model with 1%, 10%, and 100% data por-
762
+ tion. Additionally, we also add a disease grading down-
763
+ stream task, which can be seen as a fine-grade classification
764
+ task, showing that our pre-trained model can be transferred
765
+ to the downstream tasks at ease.
766
+ 5.1. Zero-shot
767
+ In this section, we compare our method with the other
768
+ state-of-the-art methods under zero-shot setting, classifica-
769
+ tion, and grounding. Due to the space limitation, we include
770
+ the entire ablation study in the supplementary material, re-
771
+ ferring to it for more details and analysis, and all compar-
772
+ isons here are made using our best model with position con-
773
+ trastive loss and entity description encoder.
774
+ 5.1.1. Classification
775
+ Seen Diseases. As shown in Tab. 1, we compare with ex-
776
+ isting methods on three widely-used datasets, demonstrat-
777
+ ing consistent performance improvement. Specifically, on
778
+ pneumonia and pneumothorax datasets, despite the images
779
+ being collected by different clinics with different diseases,
780
+ our model improves the AUC score from 0.83 to 0.87 on
781
+ RSNA pneumonia dataset and from 0.71 to 0.89 on SIIM-
782
+ ACR pneumothorax dataset, as shown in Tab. 1.
783
+ This
784
+ shows that our method can better deal with the multi-center
785
+ and multi-disease data distribution in medical. While on
786
+ ChestX-ray14 dataset, we improve the average AUC scores
787
+ from 0.69 to 0.77, we refer the reader to supplementary ma-
788
+ terial for a more detailed comparison of 14 diseases.
789
+ Unseen Diseases. In particular, we use covid-19 to evaluate
790
+ the systems. Note that, our considered setting is different
791
+
792
+ Methods
793
+ Pointing Game↑
794
+ Recall↑
795
+ Precision↑
796
+ IoU↑
797
+ Dice↑
798
+ GLoRIA [22]
799
+ 0.7607
800
+ 0.8330
801
+ 0.1621
802
+ 0.2182
803
+ 0.3468
804
+ BioViL [7]
805
+ 0.8342
806
+ 0.8521
807
+ 0.5034
808
+ 0.3029
809
+ 0.4386
810
+ Ours
811
+ 0.8721
812
+ 0.8661
813
+ 0.6420
814
+ 0.3172
815
+ 0.4649
816
+ (a) Zero-shot grounding on Pneumonia
817
+ Methods
818
+ Pointing Game↑
819
+ Recall↑
820
+ Precision↑
821
+ GLoRIA [22]
822
+ 0.0651
823
+ 0.2377
824
+ 0.0585
825
+ BioViL [7]
826
+ 0.0252
827
+ 0.1963
828
+ 0.1429
829
+ Ours
830
+ 0.1975
831
+ 0.3562
832
+ 0.1940
833
+ (b) Zero-shot grounding on Pneumothorax
834
+ Table 3. Comparison with other state-of-the-art methods on zero-shot region grounding tasks. (a) shows the results on RSNA Pneumonia
835
+ dataset. (b) shows the results on SIIM-ACR Pneumothorax dataset. The pneumothorax region tends to be thin and narrow and much more
836
+ challenging for grounding, we thus only consider pointing game, recall, and precision. Our method can achieve better performance on
837
+ different metrics, especially on the pointing game score. ConVIRT as the basic method proposed earliest can not realize this function.
838
+ Prompt Type
839
+ Direct covid-19
840
+ Covid-19 Description
841
+ Methods
842
+ Pointing Game↑
843
+ Recall↑
844
+ Precision↑
845
+ IoU↑
846
+ Dice↑
847
+ Pointing Game↑
848
+ AR↑
849
+ AP↑
850
+ IoU↑
851
+ Dice↑
852
+ GLoRIA [22]
853
+ 0.0364
854
+ 0.2906
855
+ 0.1073
856
+ 0.0645
857
+ 0.1141
858
+ 0.2727
859
+ 0.2821
860
+ 0.1336
861
+ 0.0596
862
+ 0.1075
863
+ BioViL [7]
864
+ 0.4000
865
+ 0.2564
866
+ 0.2703
867
+ 0.1198
868
+ 0.1967
869
+ 0.1818
870
+ 0.2393
871
+ 0.1637
872
+ 0.0861
873
+ 0.1427
874
+ Ours
875
+ 0.1818
876
+ 0.1880
877
+ 0.1497
878
+ 0.0747
879
+ 0.1289
880
+ 0.5818
881
+ 0.5214
882
+ 0.4959
883
+ 0.1373
884
+ 0.2278
885
+ Table 4. Comparison with other state-of-the-art methods on zero-shot covid-19 opacity region grounding task. “Direct covid-19” refers
886
+ to directly use “Covid-19” to construct the prompt sentence while “Covid-19 Description” refers to replace the name “Covid-19“ with its
887
+ medical description. Our method can achieve better performance on different metrics.
888
+ from existing approaches, where all entities have been ex-
889
+ posed to the model at training time, and prediction can be
890
+ made by a retrieval-type approach, i.e., compute the simi-
891
+ larity between the image and the entity embedding by en-
892
+ coding the disease name with a language encoder [7], while
893
+ we are considering a stricter setting for openset classifica-
894
+ tion. Covid-19 is a new disease that only appeared in 2019,
895
+ MIMIC-CXR reports collected in the year 2015 do not in-
896
+ clude any entity of covid-19, thus it requires the system to
897
+ have the ability to diagnose truly unseen diseases.
898
+ As shown in Tab. 2, existing approaches that only rely
899
+ on disease name struggles to make the correct diagnosis.
900
+ While with our proposed approach by introducing medical
901
+ knowledge, i.e., using entity descriptions, our methods can
902
+ understand the complex medical entity descriptions unseen
903
+ in the training set, and significantly boost the performance
904
+ 0.66 to 0.74 on AUC and from 0.59 to 0.70 on ACC.
905
+ 5.1.2. Grounding
906
+ In addition to the plain diagnosis, explainability can be
907
+ equally critical in healthcare, improving the reliability and
908
+ trustiness of the machine learning systems. Here, we con-
909
+ sider providing explainability by grounding the abnormal-
910
+ ity in the prediction and compare against the existing ap-
911
+ proaches.
912
+ Similarly, we split the diseases into seen and
913
+ unseen ones, depending on whether their names have ap-
914
+ peared in the medical reports. Specifically, “Pneumonia”
915
+ and “Pneumothorax” are viewed as seen, and “Covid-19” is
916
+ viewed as unseen. Due to the space limitation, we refer the
917
+ reader to supplementary material for visualization results.
918
+ Seen Diseases.
919
+ We show the results for grounding on
920
+ RSNA Pneumonia opacity and SIIM-ACR Pneumothorax
921
+ collapse in Tab. 3. As shown in Tab. 3a, our proposed model
922
+ surpasses existing approaches on all metrics, for example,
923
+ we improve the pointing game score from 0.83 to 0.87, the
924
+ detection Recall from 0.85 to 0.87, the detection precision
925
+ from 0.50 to 0.64, the IOU from 0.30 to 0.32 and the Dice
926
+ from 0.44 to 0.46. While on SIIM-ACR dataset (Tab. 3b),
927
+ the pneumothorax region tends to be thin and narrow, local-
928
+ izing it can often be more challenging than that of opacity
929
+ grounding [7], we thus only consider pointing game, recall,
930
+ and precision. Similarly, our method can achieve signifi-
931
+ cantly better performance than prior approaches.
932
+ Unseen Diseases. We also conduct the zero-shot ground-
933
+ ing experiment on the unseen disease, namely, Covid-19, as
934
+ shown in Tab. 4. Our model has shown consistent improve-
935
+ ments in all metrics, e.g., boosting the pointing game score
936
+ from 0.40 to 0.58. One observation to be noticed is that, re-
937
+ sults in Tab. 4 are mostly consistent with those in Tab. 2, i.e.,
938
+ better classification results tend to lead to better grounding.
939
+ Overall, our model with knowledge-enhanced language en-
940
+ coding has facilitated the visual encoder to learn underlying
941
+ evidence relating to the diseases, therefore, leading to more
942
+ interpretable representations than prior approaches.
943
+ 5.2. Fine-tuning
944
+ In this section, we consider the fine-tuning scenario, with
945
+ the pre-trained model as initialization, and trained end-to-
946
+ end on the downstream tasks. We test on three different
947
+ tasks, namely, classification, segmentation, and grading. In
948
+ classification and segmentation, the test splits and metrics
949
+ are the same as in the “zero-shot” section. Grading is a new
950
+ task we introduce in fine-tuning setting, which can be seen
951
+ as a fine-grained classification task.
952
+
953
+ Dataset
954
+ Pneumonia
955
+ Pneumothorax
956
+ Covid-19
957
+ ChestX-ray14
958
+ Data Portion
959
+ 1%
960
+ 10%
961
+ 100%
962
+ 1%
963
+ 10%
964
+ 100%
965
+ 1%
966
+ 10%
967
+ 100%
968
+ 1%
969
+ 10%
970
+ 100%
971
+ Scratch
972
+ 0.7107
973
+ 0.8150
974
+ 0.8626
975
+ 0.4347
976
+ 0.6120
977
+ 0.6571
978
+ 0.7861
979
+ 0.9162
980
+ 0.9554
981
+ 0.6005
982
+ 0.7365
983
+ 0.7924
984
+ ConVIRT [56]
985
+ 0.8398
986
+ 0.8562
987
+ 0.8761
988
+ 0.7134
989
+ 0.7826
990
+ 0.9004
991
+ 0.8675
992
+ 0.9541
993
+ 0.9726
994
+ 0.6615
995
+ 0.7658
996
+ 0.8128
997
+ GLoRIA [22]
998
+ 0.8599
999
+ 0.8666
1000
+ 0.8846
1001
+ 0.7439
1002
+ 0.8538
1003
+ 0.9014
1004
+ 0.9065
1005
+ 0.9381
1006
+ 0.9728
1007
+ 0.6710
1008
+ 0.7642
1009
+ 0.8184
1010
+ BioViL [7]
1011
+ 0.8233
1012
+ 0.8538
1013
+ 0.8836
1014
+ 0.6948
1015
+ 0.7775
1016
+ 0.8689
1017
+ 0.8989
1018
+ 0.9529
1019
+ 0.9729
1020
+ 0.6952
1021
+ 0.7527
1022
+ 0.8245
1023
+ Ours
1024
+ 0.8731
1025
+ 0.8799
1026
+ 0.8931
1027
+ 0.8527
1028
+ 0.9071
1029
+ 0.9188
1030
+ 0.9224
1031
+ 0.9657
1032
+ 0.9729
1033
+ 0.7721
1034
+ 0.7894
1035
+ 0.8323
1036
+ Table 5. Comparison of AUC scores with other state-of-the-art methods on fine-tuning classification task. The macro average of AUC
1037
+ scores on 14 diseases are reported for ChestX-ray14 dataset.
1038
+ Diseases
1039
+ Pneumonia
1040
+ Pneumothorax
1041
+ Covid-19
1042
+ Data Portion
1043
+ 1%
1044
+ 10%
1045
+ 100%
1046
+ 1%
1047
+ 10%
1048
+ 100%
1049
+ 1%
1050
+ 10%
1051
+ 100%
1052
+ Scratch
1053
+ 0.4347
1054
+ 0.6047
1055
+ 0.7068
1056
+ 0.2133
1057
+ 0.3323
1058
+ 0.7447
1059
+ 0.1481
1060
+ 0.2367
1061
+ 0.3228
1062
+ ConVIRT [56]
1063
+ 0.5706
1064
+ 0.6491
1065
+ 0.7201
1066
+ 0.5406
1067
+ 0.6121
1068
+ 0.7352
1069
+ 0.1995
1070
+ 0.2724
1071
+ 0.3737
1072
+ GLoRIA [22]
1073
+ 0.6555
1074
+ 0.6907
1075
+ 0.7328
1076
+ 0.5673
1077
+ 0.5778
1078
+ 0.7694
1079
+ 0.1889
1080
+ 0.2809
1081
+ 0.3869
1082
+ BioViL [7]
1083
+ 0.6824
1084
+ 0.7038
1085
+ 0.7249
1086
+ 0.6267
1087
+ 0.6998
1088
+ 0.7849
1089
+ 0.2113
1090
+ 0.3239
1091
+ 0.4162
1092
+ Ours
1093
+ 0.7064
1094
+ 0.7162
1095
+ 0.7579
1096
+ 0.6659
1097
+ 0.7210
1098
+ 0.7937
1099
+ 0.2445
1100
+ 0.3539
1101
+ 0.4399
1102
+ Table 6. Comparison of Dice scores with other state-of-the-art methods on fine-tuning segmentation tasks. Three diseases are reported,
1103
+ and for each disease, three data portions, 1%, 10%, 100% are adopted to show the performance change under different data amounts.
1104
+ Methods
1105
+ 0
1106
+ 1
1107
+ 2
1108
+ 3
1109
+ AVG
1110
+ AUC↑
1111
+ F1↑
1112
+ ACC↑
1113
+ AUC↑
1114
+ F1↑
1115
+ ACC↑
1116
+ AUC↑
1117
+ F1↑
1118
+ ACC↑
1119
+ AUC↑
1120
+ F1↑
1121
+ ACC↑
1122
+ AUC↑
1123
+ F1↑
1124
+ ACC↑
1125
+ Scratch
1126
+ 0.7631
1127
+ 0.7036
1128
+ 0.6738
1129
+ 0.5383
1130
+ 0.3593
1131
+ 0.3223
1132
+ 0.6692
1133
+ 0.4328
1134
+ 0.7012
1135
+ 0.8420
1136
+ 0.5694
1137
+ 0.8770
1138
+ 0.7031
1139
+ 0.5163
1140
+ 0.6436
1141
+ ConVIRT [56]
1142
+ 0.8453
1143
+ 0.7769
1144
+ 0.7793
1145
+ 0.6099
1146
+ 0.3938
1147
+ 0.4629
1148
+ 0.7202
1149
+ 0.4843
1150
+ 0.6445
1151
+ 0.9047
1152
+ 0.6154
1153
+ 0.8809
1154
+ 0.7700
1155
+ 0.5676
1156
+ 0.6919
1157
+ GLoRIA [22]
1158
+ 0.8304
1159
+ 0.7577
1160
+ 0.7520
1161
+ 0.6208
1162
+ 0.3991
1163
+ 0.4922
1164
+ 0.7339
1165
+ 0.4958
1166
+ 0.7037
1167
+ 0.9246
1168
+ 0.6667
1169
+ 0.9102
1170
+ 0.7774
1171
+ 0.5798
1172
+ 0.7145
1173
+ BioViL [7]
1174
+ 0.8034
1175
+ 0.7378
1176
+ 0.7148
1177
+ 0.6035
1178
+ 0.3912
1179
+ 0.4570
1180
+ 0.6860
1181
+ 0.4497
1182
+ 0.6777
1183
+ 0.9229
1184
+ 0.6500
1185
+ 0.9160
1186
+ 0.7540
1187
+ 0.5572
1188
+ 0.6914
1189
+ Ours
1190
+ 0.8502
1191
+ 0.7646
1192
+ 0.7539
1193
+ 0.6641
1194
+ 0.4140
1195
+ 0.5392
1196
+ 0.7605
1197
+ 0.5266
1198
+ 0.7031
1199
+ 0.8845
1200
+ 0.6250
1201
+ 0.9160
1202
+ 0.7898
1203
+ 0.5826
1204
+ 0.7280
1205
+ Table 7. Comparison with other state-of-the-art methods on fine-tuning edema severity grading multi-class classification task. AUC score
1206
+ is reported in the Table. “0,1,2,3” in the table represents the severity level and final macro average scores are reported.
1207
+ 5.2.1. Classification
1208
+ We experiment on four different datasets, using 1%, 10%,
1209
+ 100% of the data for fine-tuning, that is consistent with the
1210
+ existing work [7,22,56]. As shown in Tab. 5, our model has
1211
+ demonstrated substantial improvements in the AUC scores
1212
+ over the existing approaches across all datasets, reflecting
1213
+ that our pre-trained representation is of higher quality than
1214
+ existing models. We refer the readers to the supplementary
1215
+ material for more detailed comparison results.
1216
+ 5.2.2. Segmentation
1217
+ In Tab. 6, we conduct fine-tuning experiments on three dif-
1218
+ ferent diseases for segmentation. We pick 1%, 10%, 100%
1219
+ of the data for fine-tuning. For all three different diseases
1220
+ with different image distributions, our methods surpass the
1221
+ existing state-of-the-art methods by a large margin, espe-
1222
+ cially under the low-data regime.
1223
+ 5.2.3. Grading
1224
+ Besides diagnosis, grading the disease severity level also
1225
+ plays an important role. Here, we adopt our pre-trained fea-
1226
+ tures and train them for the multi-class classification task,
1227
+ with 0 to 3 representing different severity levels. As shown
1228
+ in Tab. 7, for each level, the AUC, F1, and ACC scores are
1229
+ calculated as one class against all other ones, for example,
1230
+ 0 vs {1, 2, 3}. Final macro average scores of four levels are
1231
+ computed. On the majority of severity levels, our method
1232
+ can achieve the best results.
1233
+ 6. Conclusion
1234
+ In this paper, we introduce a novel medical knowledge
1235
+ enhanced VLP model. First, we propose a report filter to
1236
+ extract useful medical entities with more useful supervi-
1237
+ sion signals, simplifying complex raw reports with mini-
1238
+ mal information loss. Second, we translate entities into de-
1239
+ tailed medical descriptions and embed them with a text en-
1240
+ coder enabling the network to understand complex medical
1241
+ expert-level knowledge. Finally, a transformer-based struc-
1242
+ ture is proposed to do local region alignment. In experi-
1243
+ ments, We evaluate our method on different datasets under
1244
+ various settings. Our method shows strong zero-shot clas-
1245
+ sification and grounding abilities, even facing unseen dis-
1246
+ eases. Besides, in fine-tuning setting, our method still out-
1247
+ performs state-of-the-art methods significantly, showing the
1248
+ superiority of our method.
1249
+
1250
+ References
1251
+ [1] Society for imaging informatics in medicine: Siim-
1252
+ acr pneumothorax segmentation. https://www.
1253
+ kaggle.com/c/siim-acr-pneumothorax-
1254
+ segmentation. 2019. 2, 5
1255
+ [2] Emily Alsentzer, John Murphy, William Boag, Wei-
1256
+ Hung Weng, Di Jin, Tristan Naumann, and Matthew
1257
+ McDermott. Publicly available clinical BERT embed-
1258
+ dings. In Proceedings of the 2nd Clinical Natural Lan-
1259
+ guage Processing Workshop, pages 72–78, Minneapo-
1260
+ lis, Minnesota, USA, June 2019. Association for Com-
1261
+ putational Linguistics. 5
1262
+ [3] Emily Alsentzer, John R Murphy, Willie Boag, Wei-
1263
+ Hung Weng, Di Jin, Tristan Naumann, WA Redmond,
1264
+ and Matthew BA McDermott. Publicly available clin-
1265
+ ical bert embeddings.
1266
+ NAACL HLT 2019, page 72,
1267
+ 2019. 4
1268
+ [4] Alan R Aronson and Franc¸ois-Michel Lang.
1269
+ An
1270
+ overview of metamap: historical perspective and re-
1271
+ cent advances. Journal of the American Medical In-
1272
+ formatics Association, 17(3):229–236, 2010. 2
1273
+ [5] Federico
1274
+ Bianchi,
1275
+ Giuseppe
1276
+ Attanasio,
1277
+ Raphael
1278
+ Pisoni, Silvia Terragni, Gabriele Sarti, and Sri Lak-
1279
+ shmi. Contrastive language-image pre-training for the
1280
+ italian language.
1281
+ arXiv preprint arXiv:2108.08688,
1282
+ 2021. 2
1283
+ [6] Olivier Bodenreider.
1284
+ The unified medical lan-
1285
+ guage system (umls): integrating biomedical termi-
1286
+ nology.
1287
+ Nucleic acids research, 32(suppl 1):D267–
1288
+ D270, 2004. 2, 4
1289
+ [7] Benedikt Boecking, Naoto Usuyama, Shruthi Ban-
1290
+ nur, Daniel C Castro, Anton Schwaighofer, Stephanie
1291
+ Hyland, Maria Wetscherek, Tristan Naumann, Aditya
1292
+ Nori, Javier Alvarez-Valle, et al. Making the most of
1293
+ text semantics to improve biomedical vision–language
1294
+ processing.
1295
+ In European conference on computer
1296
+ vision, pages 1–21, 2022.
1297
+ Official Implementa-
1298
+ tion: https://github.com/microsoft/hi-
1299
+ ml/tree/main/hi-ml-multimodal. 2, 3, 5,
1300
+ 6, 7, 8, 17
1301
+ [8] Geeticka Chauhan, Ruizhi Liao, William Wells, Jacob
1302
+ Andreas, Xin Wang, Seth Berkowitz, Steven Horng,
1303
+ Peter Szolovits, and Polina Golland. Joint modeling of
1304
+ chest radiographs and radiology reports for pulmonary
1305
+ edema assessment.
1306
+ In International Conference on
1307
+ Medical Image Computing and Computer-Assisted In-
1308
+ tervention, pages 529–539. Springer, 2020. 2, 5
1309
+ [9] Sihong Chen, Jing Qin, Xing Ji, Baiying Lei, Tianfu
1310
+ Wang, Dong Ni, and Jie-Zhi Cheng. Automatic scor-
1311
+ ing of multiple semantic attributes with multi-task
1312
+ feature leverage: a study on pulmonary nodules in
1313
+ ct images.
1314
+ IEEE transactions on medical imaging,
1315
+ 36(3):802–814, 2016. 2
1316
+ [10] Yen-Chun Chen, Linjie Li, Licheng Yu, Ahmed
1317
+ El Kholy, Faisal Ahmed, Zhe Gan, Yu Cheng, and
1318
+ Jingjing Liu. Uniter: Universal image-text represen-
1319
+ tation learning. In European conference on computer
1320
+ vision, pages 104–120. Springer, 2020. 2
1321
+ [11] Hui Cui, Yiyue Xu, Wanlong Li, Linlin Wang, and
1322
+ Henry Duh. Collaborative learning of cross-channel
1323
+ clinical attention for radiotherapy-related esophageal
1324
+ fistula prediction from ct. In International Conference
1325
+ on Medical Image Computing and Computer-Assisted
1326
+ Intervention, pages 212–220. Springer, 2020. 2
1327
+ [12] Shivang Desai, Ahmad Baghal, Thidathip Wong-
1328
+ surawat, Piroon Jenjaroenpun, Thomas Powell, Shay-
1329
+ maa Al-Shukri, Kim Gates, Phillip Farmer, Michael
1330
+ Rutherford, Geri Blake, et al. Chest imaging repre-
1331
+ senting a covid-19 positive rural us population. Scien-
1332
+ tific data, 7(1):1–6, 2020. 2, 5
1333
+ [13] Foivos I Diakogiannis, Franc¸ois Waldner, Peter Cac-
1334
+ cetta, and Chen Wu.
1335
+ Resunet-a:
1336
+ A deep learn-
1337
+ ing framework for semantic segmentation of remotely
1338
+ sensed data. ISPRS Journal of Photogrammetry and
1339
+ Remote Sensing, 162:94–114, 2020. 5
1340
+ [14] Alexey
1341
+ Dosovitskiy,
1342
+ Lucas
1343
+ Beyer,
1344
+ Alexander
1345
+ Kolesnikov,
1346
+ Dirk
1347
+ Weissenborn,
1348
+ Xiaohua
1349
+ Zhai,
1350
+ Thomas Unterthiner, Mostafa Dehghani, Matthias
1351
+ Minderer, Georg Heigold, Sylvain Gelly, et al.
1352
+ An
1353
+ image is worth 16x16 words: Transformers for image
1354
+ recognition at scale. In International Conference on
1355
+ Learning Representations, 2020. 3
1356
+ [15] Jared A Dunnmon, Alexander J Ratner, Khaled
1357
+ Saab, Nishith Khandwala, Matthew Markert, Hersh
1358
+ Sagreiya, Roger Goldman, Christopher Lee-Messer,
1359
+ Matthew P Lungren, Daniel L Rubin, et al. Cross-
1360
+ modal data programming enables rapid medical ma-
1361
+ chine learning. Patterns, 1(2):100019, 2020. 1
1362
+ [16] Bradley J Erickson, Panagiotis Korfiatis, Zeynettin
1363
+ Akkus, and Timothy L Kline. Machine learning for
1364
+ medical imaging. Radiographics, 37(2):505, 2017. 1
1365
+ [17] Andre Esteva, Brett Kuprel, Roberto A Novoa, Justin
1366
+ Ko, Susan M Swetter, Helen M Blau, and Sebas-
1367
+ tian Thrun.
1368
+ Dermatologist-level classification of
1369
+ skin cancer with deep neural networks.
1370
+ nature,
1371
+ 542(7639):115–118, 2017. 1
1372
+ [18] Leyuan Fang, Chong Wang, Shutao Li, Hossein Rab-
1373
+ bani, Xiangdong Chen, and Zhimin Liu.
1374
+ Attention
1375
+ to lesion: Lesion-aware convolutional neural network
1376
+ for retinal optical coherence tomography image clas-
1377
+ sification.
1378
+ IEEE transactions on medical imaging,
1379
+ 38(8):1959–1970, 2019. 2
1380
+
1381
+ [19] Ary L Goldberger, Luis AN Amaral, Leon Glass,
1382
+ Jeffrey M Hausdorff, Plamen Ch Ivanov, Roger G
1383
+ Mark, Joseph E Mietus, George B Moody, Chung-
1384
+ Kang Peng, and H Eugene Stanley. Physiobank, phys-
1385
+ iotoolkit, and physionet: components of a new re-
1386
+ search resource for complex physiologic signals. cir-
1387
+ culation, 101(23):e215–e220, 2000. 5
1388
+ [20] Ivan Gonzalez-Diaz.
1389
+ Dermaknet: Incorporating the
1390
+ knowledge of dermatologists to convolutional neural
1391
+ networks for skin lesion diagnosis.
1392
+ IEEE journal
1393
+ of biomedical and health informatics, 23(2):547–559,
1394
+ 2018. 2
1395
+ [21] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian
1396
+ Sun.
1397
+ Deep residual learning for image recognition.
1398
+ In Proceedings of the IEEE conference on computer
1399
+ vision and pattern recognition, pages 770–778, 2016.
1400
+ 5
1401
+ [22] Shih-Cheng Huang, Liyue Shen, Matthew P Lungren,
1402
+ and Serena Yeung. Gloria: A multimodal global-local
1403
+ representation learning framework for label-efficient
1404
+ medical image recognition.
1405
+ In Proceedings of the
1406
+ IEEE/CVF International Conference on Computer Vi-
1407
+ sion, pages 3942–3951, 2021. Official Implementa-
1408
+ tion: https://github.com/marshuang80/
1409
+ gloria. 2, 3, 5, 6, 7, 8, 17
1410
+ [23] Xin Huang, Yu Fang, Mingming Lu, Fengqi Yan, Jun
1411
+ Yang, and Yilu Xu. Dual-ray net: automatic diagno-
1412
+ sis of thoracic diseases using frontal and lateral chest
1413
+ x-rays. Journal of Medical Imaging and Health Infor-
1414
+ matics, 10(2):348–355, 2020. 2
1415
+ [24] Sarfaraz Hussein, Kunlin Cao, Qi Song, and Ulas
1416
+ Bagci.
1417
+ Risk stratification of lung nodules using 3d
1418
+ cnn-based multi-task learning. In International con-
1419
+ ference on information processing in medical imaging,
1420
+ pages 249–260. Springer, 2017. 2
1421
+ [25] Jeremy Irvin, Pranav Rajpurkar, Michael Ko, Yifan
1422
+ Yu, Silviana Ciurea-Ilcus, Chris Chute, Henrik Mark-
1423
+ lund, Behzad Haghgoo, Robyn Ball, Katie Shpan-
1424
+ skaya, et al.
1425
+ Chexpert: A large chest radiograph
1426
+ dataset with uncertainty labels and expert comparison.
1427
+ In Proceedings of the AAAI conference on artificial in-
1428
+ telligence, volume 33, pages 590–597, 2019. 1, 2
1429
+ [26] Saahil Jain, Ashwin Agrawal, Adriel Saporta, Steven
1430
+ Truong, Tan Bui, Pierre Chambon, Yuhao Zhang,
1431
+ Matthew P Lungren, Andrew Y Ng, Curtis Langlotz,
1432
+ et al. Radgraph: Extracting clinical entities and re-
1433
+ lations from radiology reports.
1434
+ In Thirty-fifth Con-
1435
+ ference on Neural Information Processing Systems
1436
+ Datasets and Benchmarks Track (Round 1), 2021. 2,
1437
+ 3, 5
1438
+ [27] Chao Jia, Yinfei Yang, Ye Xia, Yi-Ting Chen, Zarana
1439
+ Parekh, Hieu Pham, Quoc Le, Yun-Hsuan Sung, Zhen
1440
+ Li, and Tom Duerig. Scaling up visual and vision-
1441
+ language representation learning with noisy text su-
1442
+ pervision.
1443
+ In International Conference on Machine
1444
+ Learning, pages 4904–4916. PMLR, 2021. 2
1445
+ [28] AEWP Johnson, Tom Pollard, Roger Mark, Seth
1446
+ Berkowitz, and Steven Horng. Mimic-cxr database.
1447
+ PhysioNet10, 13026:C2JT1Q, 2019. 1, 2, 5
1448
+ [29] Junnan Li, Dongxu Li, Caiming Xiong, and Steven
1449
+ Hoi. Blip: Bootstrapping language-image pre-training
1450
+ for unified vision-language understanding and gener-
1451
+ ation. arXiv preprint arXiv:2201.12086, 2022. 1
1452
+ [30] Junnan Li, Ramprasaath Selvaraju, Akhilesh Gotmare,
1453
+ Shafiq Joty, Caiming Xiong, and Steven Chu Hong
1454
+ Hoi. Align before fuse: Vision and language represen-
1455
+ tation learning with momentum distillation. Advances
1456
+ in neural information processing systems, 34:9694–
1457
+ 9705, 2021. 1, 2
1458
+ [31] Liu Li, Mai Xu, Xiaofei Wang, Lai Jiang, and Han-
1459
+ ruo Liu. Attention based glaucoma detection: a large-
1460
+ scale database and cnn model. In Proceedings of the
1461
+ IEEE/CVF conference on computer vision and pattern
1462
+ recognition, pages 10571–10580, 2019. 2
1463
+ [32] Liunian Harold Li, Mark Yatskar, Da Yin, Cho-Jui
1464
+ Hsieh, and Kai-Wei Chang. Visualbert: A simple and
1465
+ performant baseline for vision and language. arXiv
1466
+ preprint arXiv:1908.03557, 2019. 2
1467
+ [33] Xiaomeng Li, Xiaowei Hu, Lequan Yu, Lei Zhu, Chi-
1468
+ Wing Fu, and Pheng-Ann Heng. Canet: cross-disease
1469
+ attention network for joint diabetic retinopathy and di-
1470
+ abetic macular edema grading. IEEE transactions on
1471
+ medical imaging, 39(5):1483–1493, 2019. 2
1472
+ [34] Qing Liao, Ye Ding, Zoe L Jiang, Xuan Wang,
1473
+ Chunkai Zhang, and Qian Zhang.
1474
+ Multi-task deep
1475
+ convolutional neural network for cancer diagnosis.
1476
+ Neurocomputing, 348:66–73, 2019. 2
1477
+ [35] Ilya Loshchilov and Frank Hutter. Decoupled weight
1478
+ decay regularization. In International Conference on
1479
+ Learning Representations, 2018. 5
1480
+ [36] Gabriel Maicas, Andrew P Bradley, Jacinto C Nasci-
1481
+ mento, Ian Reid, and Gustavo Carneiro. Training med-
1482
+ ical image analysis systems like radiologists. In In-
1483
+ ternational Conference on Medical Image Computing
1484
+ and Computer-Assisted Intervention, pages 546–554.
1485
+ Springer, 2018. 2
1486
+ [37] Matthew BA McDermott, Tzu Ming Harry Hsu, Wei-
1487
+ Hung Weng, Marzyeh Ghassemi, and Peter Szolovits.
1488
+ Chexpert++: Approximating the chexpert labeler for
1489
+ speed, differentiability, and probabilistic output.
1490
+ In
1491
+ Machine Learning for Healthcare Conference, pages
1492
+ 913–927. PMLR, 2020. 2
1493
+
1494
+ [38] Masahiro
1495
+ Mitsuhara,
1496
+ Hiroshi
1497
+ Fukui,
1498
+ Yusuke
1499
+ Sakashita,
1500
+ Takanori
1501
+ Ogata,
1502
+ Tsubasa
1503
+ Hirakawa,
1504
+ Takayoshi Yamashita, and Hironobu Fujiyoshi. Em-
1505
+ bedding human knowledge into deep neural network
1506
+ via attention map. arXiv preprint arXiv:1905.03540,
1507
+ 2019. 2
1508
+ [39] Yasuhide Miura, Yuhao Zhang, Emily Tsai, Curtis
1509
+ Langlotz, and Dan Jurafsky. Improving factual com-
1510
+ pleteness and consistency of image-to-text radiology
1511
+ report generation. In Proceedings of the 2021 Confer-
1512
+ ence of the North American Chapter of the Associa-
1513
+ tion for Computational Linguistics: Human Language
1514
+ Technologies, pages 5288–5304, 2021. 1
1515
+ [40] Philip M¨uller, Georgios Kaissis, Congyu Zou, and
1516
+ Daniel R¨uckert. Joint learning of localized representa-
1517
+ tions from medical images and reports. arXiv preprint
1518
+ arXiv:2112.02889, 2021. 2, 3
1519
+ [41] Maya Pavlova, Naomi Terhljan, Audrey G Chung,
1520
+ Andy Zhao, Siddharth Surana, Hossein Aboutalebi,
1521
+ Hayden Gunraj, Ali Sabri, Amer Alaref, and Alexan-
1522
+ der Wong.
1523
+ Covid-net cxr-2:
1524
+ An enhanced deep
1525
+ convolutional neural network design for detection of
1526
+ covid-19 cases from chest x-ray images. Frontiers in
1527
+ Medicine, 9, 2022. 2, 5
1528
+ [42] Yifan Peng, Xiaosong Wang, Le Lu, Mohammadhadi
1529
+ Bagheri, Ronald Summers, and Zhiyong Lu.
1530
+ Neg-
1531
+ bio: a high-performance tool for negation and un-
1532
+ certainty detection in radiology reports. AMIA Sum-
1533
+ mits on Translational Science Proceedings, 2018:188,
1534
+ 2018. 2
1535
+ [43] Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya
1536
+ Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sas-
1537
+ try, Amanda Askell, Pamela Mishkin, Jack Clark,
1538
+ et al. Learning transferable visual models from natural
1539
+ language supervision. In International Conference on
1540
+ Machine Learning, pages 8748–8763. PMLR, 2021. 1
1541
+ [44] George Shih, Carol C Wu, Safwan S Halabi, Marc D
1542
+ Kohli, Luciano M Prevedello, Tessa S Cook, Arjun
1543
+ Sharma, Judith K Amorosa, Veronica Arteaga, Maya
1544
+ Galperin-Aizenberg, et al. Augmenting the national
1545
+ institutes of health chest radiograph dataset with ex-
1546
+ pert annotations of possible pneumonia. Radiology.
1547
+ Artificial intelligence, 1(1), 2019. 2, 5
1548
+ [45] Akshay Smit, Saahil Jain, Pranav Rajpurkar, Anuj Pa-
1549
+ reek, Andrew Y Ng, and Matthew Lungren.
1550
+ Com-
1551
+ bining automatic labelers and expert annotations for
1552
+ accurate radiology report labeling using bert. In Pro-
1553
+ ceedings of the 2020 Conference on Empirical Meth-
1554
+ ods in Natural Language Processing (EMNLP), pages
1555
+ 1500–1519, 2020. 2
1556
+ [46] Jiaxing Tan, Yumei Huo, Zhengrong Liang, and Li-
1557
+ hong Li. Expert knowledge-infused deep learning for
1558
+ automatic lung nodule detection. Journal of X-ray Sci-
1559
+ ence and Technology, 27(1):17–35, 2019. 2
1560
+ [47] Haiming Tang, Nanfei Sun, and Yi Li. Deep learn-
1561
+ ing segmentation model for automated detection of the
1562
+ opacity regions in the chest x-rays of the covid-19 pos-
1563
+ itive patients and the application for disease severity.
1564
+ medRxiv preprint, 2020. 2, 5
1565
+ [48] Joseph J Titano, Marcus Badgeley, Javin Schefflein,
1566
+ Margaret Pain, Andres Su, Michael Cai, Nathaniel
1567
+ Swinburne, John Zech, Jun Kim, Joshua Bederson,
1568
+ et al. Automated deep-neural-network surveillance of
1569
+ cranial images for acute neurologic events.
1570
+ Nature
1571
+ medicine, 24(9):1337–1341, 2018. 1
1572
+ [49] Kun Wang, Xiaohong Zhang, Sheng Huang, Feiyu
1573
+ Chen, Xiangbo Zhang, and Luwen Huangfu. Learn-
1574
+ ing to recognize thoracic disease in chest x-rays with
1575
+ knowledge-guided deep zoom neural networks. IEEE
1576
+ Access, 8:159790–159805, 2020. 2
1577
+ [50] Xiaosong Wang, Yifan Peng, Le Lu, Zhiyong Lu,
1578
+ Mohammadhadi Bagheri, and Ronald M Summers.
1579
+ Chestx-ray8: Hospital-scale chest x-ray database and
1580
+ benchmarks on weakly-supervised classification and
1581
+ localization of common thorax diseases. In Proceed-
1582
+ ings of the IEEE conference on computer vision and
1583
+ pattern recognition, pages 2097–2106, 2017. 2, 5
1584
+ [51] Joy T Wu, Nkechinyere Nneka Agu, Ismini Lourent-
1585
+ zou,
1586
+ Arjun
1587
+ Sharma,
1588
+ Joseph
1589
+ Alexander
1590
+ Paguio,
1591
+ Jasper Seth Yao, Edward Christopher Dee, William G
1592
+ Mitchell, Satyananda Kashyap, Andrea Giovannini,
1593
+ et al. Chest imagenome dataset for clinical reason-
1594
+ ing. In Thirty-fifth Conference on Neural Information
1595
+ Processing Systems Datasets and Benchmarks Track
1596
+ (Round 2), 2021. 2
1597
+ [52] Xiaozheng Xie, Jianwei Niu, Xuefeng Liu, Zhengsu
1598
+ Chen, Shaojie Tang, and Shui Yu. A survey on in-
1599
+ corporating domain knowledge into deep learning for
1600
+ medical image analysis.
1601
+ Medical Image Analysis,
1602
+ 69:101985, 2021. 2
1603
+ [53] Yutong Xie, Yong Xia, Jianpeng Zhang, Yang Song,
1604
+ Dagan Feng, Michael Fulham, and Weidong Cai.
1605
+ Knowledge-based collaborative deep learning for
1606
+ benign-malignant lung nodule classification on chest
1607
+ ct. IEEE transactions on medical imaging, 38(4):991–
1608
+ 1004, 2018. 2
1609
+ [54] Wenkai Yang, Juanjuan Zhao, Yan Qiang, Xiaotang
1610
+ Yang, Yunyun Dong, Qianqian Du, Guohua Shi, and
1611
+ Muhammad Bilal Zia.
1612
+ Dscgans: Integrate domain
1613
+ knowledge in training dual-path semi-supervised con-
1614
+ ditional generative adversarial networks and s3vm for
1615
+ ultrasonography thyroid nodules classification. In In-
1616
+ ternational conference on medical image computing
1617
+
1618
+ and computer-assisted intervention, pages 558–566.
1619
+ Springer, 2019. 2
1620
+ [55] Ke Yu, Shantanu Ghosh, Zhexiong Liu, Christopher
1621
+ Deible, and Kayhan Batmanghelich. Anatomy-guided
1622
+ weakly-supervised abnormality localization in chest
1623
+ x-rays. In International Conference on Medical Im-
1624
+ age Computing and Computer-Assisted Intervention,
1625
+ pages 658–668. Springer, 2022. 3, 5, 14, 15
1626
+ [56] Yuhao Zhang, Hang Jiang, Yasuhide Miura, Christo-
1627
+ pher D Manning, and Curtis P Langlotz. Contrastive
1628
+ learning of medical visual representations from paired
1629
+ images and text. In Machine Learning for Healthcare,
1630
+ 2022. Highest Starred Implementation: https://
1631
+ github.com/edreisMD/ConVIRT-pytorch.
1632
+ 2, 3, 4, 5, 6, 8, 17
1633
+
1634
+ Supplementary
1635
+ A. The Entity Description Base and Position Set
1636
+ 14
1637
+ B. Details of Fusion Module
1638
+ 16
1639
+ C. Ablation Study
1640
+ 16
1641
+ D. Detailed results on ChestX-ray14
1642
+ 17
1643
+ E. Visualization Results
1644
+ 18
1645
+
1646
+ A. The Entity Description Base and Position Set
1647
+ Tab. 8 shows the descriptions we used to translate different entities. We have kept 75 entities in query set Q, following [55].
1648
+ “Tail abnorm obs” entity represents some tailed entities and “exluded obs” represents some entities useless for diagnosis.
1649
+ The last “covid-19” description row is only referred to for inference since it does not appear in pre-train reports.
1650
+ Table 8. The Entity description used for translate single entity name. The description can be easily found from the open website.
1651
+ Entity
1652
+ Description
1653
+ normal
1654
+ It means the absence of diseases and infirmity, indicating the structure is normal.
1655
+ clear
1656
+ The lungs are clear and normal. No evidence for other diseases on lung.
1657
+ sharp
1658
+ This means that an anatomical structure s boundary or edge is clear and normal, meaning it is free of diseases.
1659
+ sharply
1660
+ “Sharply seen means that an anatomical structure is clearly visible.
1661
+ unremarkable
1662
+ This represents some anatomical structures are normal, usually modifying cardiac and mediastinal silhouettes.
1663
+ intact
1664
+ The bonny structure is complete and normal, meaning no fractures.
1665
+ stable
1666
+ The modified anatomical structures are normal and stable. No evidence for diseases.
1667
+ free
1668
+ It usually refers to free air and is associate with pneumothorax, atelectasis, pneumoperitoneum and emphysema.
1669
+ effusion
1670
+ A pleural effusion is accumulation of excessive fluid in the pleural space, the potential space that surrounds each lung. A pleural
1671
+ effusion infiltrates the space between the visceral pleura and the parietal pleura.
1672
+ opacity
1673
+ It is defined as an area of hazy opacification due to air displacement by fluid, airway collapse, fibrosis, or a neoplastic process. It is
1674
+ causes include infections, interstitial lung disease, and pulmonary edema.
1675
+ pneumothorax
1676
+ A pneumothorax is an abnormal collection of air in the pleural space between the lung and the chest wall. It may be caused by
1677
+ pneumonia or fibrosis and other diseases.
1678
+ edema
1679
+ Pulmonary edema, also known as pulmonary congestion, is excessive liquid accumulation in the tissue and air spaces of the lungs. It
1680
+ will show fluid in the alveolar walls.
1681
+ atelectasis
1682
+ It is the collapse or closure of a lung resulting in reduced or absent gas exchange. Findings can include lung opacification and loss of
1683
+ lung volume.
1684
+ tube
1685
+ It is a surgical drain that is inserted through the chest wall and into the pleural space or the mediastinum to remove undesired substances
1686
+ such as air.
1687
+ consolidation
1688
+ It is a region of normally compressible lung tissue that has filled with liquid instead of air. Consolidation must be present to diagnose
1689
+ pneumonia: the signs of lobar pneumonia are characteristic and clinically referred to as consolidation.
1690
+ process
1691
+ Acute process means there is abnormality in the anotomy structure.
1692
+ abnormality
1693
+ It means the exist of diseases and infirmity, indicating the structure is abnormal.
1694
+ enlarge
1695
+ It usually modifies cardiac silhouette and heart. Cardiomegaly is a medical condition in which the heart is enlarged.
1696
+ tip
1697
+ It refers to the top head of the tube.
1698
+ low
1699
+ The presence of low lung volumes may be a sign of a restrictive lung condition such as pulmonary fibrosis or sarcoidosis.
1700
+ pneumonia
1701
+ Pneumonia is an inflammatory condition of the lung primarily small air sacs known as alveoli. Pneumonia may present with opacities.
1702
+ Complications such as pleural effusion may also be found increasing the diagnostic accuracy of lung consolidation and pleural effusion
1703
+ line
1704
+ It refers to venous access line ot PICC lines.
1705
+ congestion
1706
+ Pulmonary congestion is defined as accumulation of fluid in the lungs, resulting in impaired gas exchange and arterial hypoxemia.
1707
+ catheter
1708
+ catheter is a tube placed in the body to drain and collect urine from the bladder
1709
+ cardiomegaly
1710
+ Cardiomegaly (sometimes megacardia or megalocardia) is a medical condition in which the heart is enlarged.
1711
+ fracture
1712
+ Fracture is a break in a rib bone.
1713
+ air
1714
+ It refers to the free air or gas in pleural space, indicating pneumothorax. Air displacement by fluid may lead to opacity.
1715
+ tortuous
1716
+ The Aorta is slightly tortuous. Sometimes it may refer to varicose veins
1717
+ lead
1718
+ It refers to the leading head of the tube.
1719
+ disease
1720
+ It means the exist of diseases and abnormalty, indicating the structure is abnormal.
1721
+ calcification
1722
+ Pulmonary calcification is a common asymptomatic finding. Pulmonary calcifications are caused mainly by two mechanisms: the
1723
+ dystrophic form and the metastatic form
1724
+ prominence
1725
+ It means the exist of some observation.
1726
+ device
1727
+ It refer to some equipments like picc tub, valve catheter, pacemaker hardware, arthroplastmarker icd defib, device support equipment
1728
+ and mediport
1729
+ engorgement
1730
+ Pulmonary vascular engorgement means obstruction of the normal flux of blood within the blood vessel network of the lung resulting
1731
+ in engorgement of pulmonary vessels
1732
+ picc
1733
+ A peripherally inserted central catheter (PICC), also called a PICC line, is a long, thin tube that s inserted through a vein in your arm
1734
+ and passed through to the larger veins near your heart.
1735
+ clip
1736
+ Surgical clips or vascular clips usually represent the one kind of medical equipments.
1737
+ elevation
1738
+ If tissues or anatomical structures are elevated, they are raised up higher than the normal location.
1739
+ expand
1740
+ It means the lungs are normally expanded and clear, indicating the absence of pneumothorax.
1741
+ nodule
1742
+ A lung nodule or pulmonary nodule is a relatively small focal density in the lung. it may be confused with the projection of a structure
1743
+ of the chest wall or skin, such as a nipple, a healing rib fracture or lung cancer.
1744
+ wire
1745
+ Sternotomis wires means the center line of the chest.
1746
+ fluid
1747
+ It refers to the water of liquid in the lung and it may indicate edema and other diseases.
1748
+ degenerative
1749
+ Degenerative disease is the result of a continuous process based on degenerative cell changes
1750
+ pacemaker
1751
+ pacemaker device usually represents the one kind of medical equipments.
1752
+ thicken
1753
+ Pleural thickening is an increase in the bulkiness of one or both of the pulmonary pleurae. It may cause by pulmonary Infection,
1754
+ empyema, tuberculosis or lung cancer.
1755
+
1756
+ Entity
1757
+ Description
1758
+ marking
1759
+ It represents interstitial markings or bronchovascular markings
1760
+ scar
1761
+ A scar (or scar tissue) is an area of fibrous tissue that replaces normal tissues after an injury.
1762
+ hyperinflate
1763
+ Hyperinflated lungs are larger-than-normal lungs as a result of trapped air.
1764
+ blunt
1765
+ Blunting of the costophrenic angles is usually caused by a pleural effusion, as already discussed. Other causes of costophrenic angle
1766
+ blunting include lung disease in the region of the costophrenic angle, and lung hyperexpansion.
1767
+ loss
1768
+ The etiology of lung volume loss can be listed as follow: airway obstruction or compression, obesity, scoliosis, restrictive diseases
1769
+ such as pulmonary fibrosis and interstitial lung disease, tuberculosis.
1770
+ widen
1771
+ The mediastinum is not widened or enlarged.
1772
+ collapse
1773
+ Collapse lung refers to pneumothorax or atelectasis.
1774
+ density
1775
+ The density (more precisely, the volumetric mass density; also known as specific mass), of a substance is its mass per unit volume.
1776
+ emphysema
1777
+ Emphysema, or pulmonary emphysema, is a lower respiratory tract disease, characterized by air-filled spaces (pneumatosis) in the
1778
+ lungs, that can vary in size and may be very large.
1779
+ aerate
1780
+ Aeration (also called aerification or aeriation) is the process by which air is circulated through, mixed with or dissolved in a liquid or
1781
+ other substances that act as a fluid (such as soil).
1782
+ mass
1783
+ A lung mass is an abnormal growth or area in the lungs and it can also view as lung cancer.
1784
+ crowd
1785
+ Crowding of the bronchovascular structures is an important direct sign of volume loss. The atelectatic lung enhances densely after
1786
+ contrast administration because of closeness of the pulmonary arteries and arterioles within the collapsed lobe.
1787
+ infiltrate
1788
+ A pulmonary infiltrate is a substance denser than air, such as pus, blood, or protein, which lingers within the parenchyma of the lungs.
1789
+ Pulmonary infiltrates are associated with pneumonia, tuberculosis and sarcoidosis.
1790
+ obscure
1791
+ Some anatomy structures are not clear and is difficult to understand or see.
1792
+ deformity
1793
+ It means some body parts are abnormal or unjuried.
1794
+ hernia
1795
+ Lung hernia (Sibson hernia) is a protrusion of lung outside of thoracic wall. the hernia is noted after chest trauma, thoracic surgery or
1796
+ certain pulmonary diseases.
1797
+ drainage
1798
+ Tube drainage represents the one kind of medical equipment.
1799
+ distention
1800
+ Distension generally refers to an enlargement, dilation, or ballooning effect. It may refer to: Abdominal distension.
1801
+ shift
1802
+ The mediastinal shift is the deviation of the mediastinal structures towards one side of the chest cavity, usually seen on chest radiograph.
1803
+ It indicates a severe asymmetry of intrathoracic pressures.
1804
+ stent
1805
+ Tracheal stent represents the one kind of medical equipments
1806
+ pressure
1807
+ Pulmonary venous pressure is intermediate between mean PAP and LAP over all physiologic pressures
1808
+ lesion
1809
+ Lung nodules, pulmonary nodules, white spots, lesions—these terms all describe the same phenomenon: an abnormality in the lungs.
1810
+ finding
1811
+ Some observation on body parts, usually indicating abnormalty.
1812
+ borderline
1813
+ Borderline size of the cardiac silhouette means the cardiac silhouette is not enlarged and normal.
1814
+ hardware
1815
+ It represents the one kind of medical equipments.
1816
+ dilation
1817
+ The state of being larger or more open than normal
1818
+ chf
1819
+ Heart failure — sometimes known as congestive heart failure — occurs when the heart muscle doesn’t pump blood as well as it should.
1820
+ When this happens, blood often backs up and fluid can build up in the lungs, causing shortness of breath.
1821
+ redistribution
1822
+ If the pulmonary edema is due to heart failure or fluid overload, you may also see cardiomegaly and distension of the pulmonary veins,
1823
+ particularly in the upper lung fields.
1824
+ aspiration
1825
+ Aspiration pneumonia occurs when food or liquid is breathed into the airways or lungs, instead of being swallowed.
1826
+ tail abnorm obs
1827
+ Some very rare diseases.
1828
+ excluded obs
1829
+ Some meaningless observations.
1830
+ covid-19
1831
+ It is a contagious disease caused by a virus. Ground-glass opacities, consolidation, thickening, pleural effusions commonly appear in
1832
+ infection.
1833
+ Additionally, we keep 51 positive positions, following [55], to form the position set P, as {trachea, left hilar, right hilar,
1834
+ hilar unspec, left pleural, right pleural, pleural unspec, heart size, heart border, left diaphragm, right diaphragm, di-
1835
+ aphragm unspec, retrocardiac, lower left lobe, upper left lobe, lower right lobe middle right lobe, upper right lobe,
1836
+ left lower lung,
1837
+ left mid lung,
1838
+ left upper lung left apical lung,
1839
+ left lung unspec,
1840
+ right lower lung,
1841
+ right mid lung,
1842
+ right upper lung right apical lung, right lung unspec, lung apices, lung bases, left costophrenic right costophrenic,
1843
+ costophrenic unspec, cardiophrenic sulcus, mediastinal, spine clavicle, rib, stomach, right atrium, right ventricle, aorta,
1844
+ svc, interstitium, parenchymal, cavoatrial junction, cardiopulmonary, pulmonary, lung volumes, unspecified, other}.
1845
+ “Other” is used to reprepresnt some tailed positions.
1846
+
1847
+ B. Details of Fusion Module
1848
+ In the transformer-based fusion module, the queries are first passed through a self-attention layer and then followed by a
1849
+ multi-head attention layer between the modified queries and image features. In each head, the image features are processed
1850
+ by a linear key head and a linear value head as key embeddings and value embeddings independently. The value is weighted-
1851
+ added based on the attention map, which is calculated by the soft-max dot product of the keys and queries. Finally, a feed-
1852
+ forward network gathers the vector of different heads resulting in the output of this layer. The output vector of the former
1853
+ layer is considered as the entity query vector of the next layer. In formulation, if denoting Φi
1854
+ fusion(·, ·) : RN×D2 ×RP 2×D2 �→
1855
+ RN×D2 as the i-th layer, the procedure is expressed as:
1856
+ Φi
1857
+ fusion(ri−1, V) = ri, r0 = Q.
1858
+ (9)
1859
+ C. Ablation Study
1860
+ Our final method mainly contains three key parts, transformer-based fusion module, position location contrastive
1861
+ loss (PosCL), and entity description encoder (DE). We gradually remove the modules to analyze their effectiveness.
1862
+ “w/o (DE)” refers to removing DE module and “w/o (PosCL+DE)” refers to only maintaining the fusion module with basic
1863
+ CE loss. Tab. 9 and Tab. 10 shows the quantitative results.
1864
+ Transformer Decoder. The lines about “w/o (PosCL + DE)” in tables demonstrate the performance of the basic model
1865
+ modified only by base CE loss. This model can exceed many former methods. This indicates the complex syntax will hurt
1866
+ the network to capture the useful entities significantly and our filtering operation combined with medical NER can greatly
1867
+ relieve the problem.
1868
+ Position Contrastive Loss. The PosCL can significantly help the network to ground the abnormalities. As shown in the
1869
+ results by adding PosCL the classification results can be further improved, e.g., from 0.75 to 0.76 on AUC in ChestX-ray14
1870
+ dataset. Besides classification, location contrastive loss can bring more gain in grounding. These results show position is
1871
+ another vital element in reports especially for grounding tasks. Our filtered triplets can conclude and clean the reports with
1872
+ little information loss and make the network learn the report information more straightforward.
1873
+ Entity Description Encoder. By adding entity descriptions, we want to realize two goals. First, in addition to just learning
1874
+ from the image-report data, the network can actively learn the relationship between different entities based on the entity
1875
+ descriptions. As shown in tables, adding descriptions in most scenarios can help the network better understand the entity and
1876
+ bring gain to the final metric scores. Second,the description encoder enables our model to handle openset new diseases.
1877
+ Since the entity list is a close set during pre-training, our method will be only able to handle the seen diseases without
1878
+ DE, while, with a description encoder, our method can handle unseen diseases and understand complex medical disease
1879
+ knowledge.
1880
+ Dataset
1881
+ RSNA Pneumonia
1882
+ SIIM-ACR Pneumothorax
1883
+ ChestX-ray14
1884
+ Methods
1885
+ AUC↑
1886
+ F1↑
1887
+ ACC↑
1888
+ AUC↑
1889
+ F1↑
1890
+ ACC↑
1891
+ AUC↑
1892
+ F1↑
1893
+ ACC↑
1894
+ w/o (PosCL + DE)
1895
+ 0.8532
1896
+ 0.6079
1897
+ 0.7669
1898
+ 0.8768
1899
+ 0.6672
1900
+ 0.8187
1901
+ 0.7502
1902
+ 0.2374
1903
+ 0.8541
1904
+ w/o (DE)
1905
+ 0.8537
1906
+ 0.6241
1907
+ 0.8146
1908
+ 0.9017
1909
+ 0.7008
1910
+ 0.8584
1911
+ 0.7621
1912
+ 0.2452
1913
+ 0.8606
1914
+ Ours
1915
+ 0.8694
1916
+ 0.6342
1917
+ 0.8002
1918
+ 0.8924
1919
+ 0.6833
1920
+ 0.8428
1921
+ 0.7676
1922
+ 0.2525
1923
+ 0.8619
1924
+ Table 9. Ablation study on zero-shot classification task. AUC, F1 and ACC scores are reported. For ChestX-ray 14, the metrics all refer to
1925
+ the macro average on the 14 diseases.
1926
+ Methods
1927
+ Pointing Game↑
1928
+ Recall↑
1929
+ Precision↑
1930
+ IoU↑
1931
+ Dice↑
1932
+ w/o (PosCL + DE)
1933
+ 0.7979
1934
+ 0.8961
1935
+ 0.4036
1936
+ 0.2783
1937
+ 0.4230
1938
+ w/o (DE)
1939
+ 0.8424
1940
+ 0.8226
1941
+ 0.6520
1942
+ 0.3118
1943
+ 0.4610
1944
+ Ours
1945
+ 0.8721
1946
+ 0.8661
1947
+ 0.6420
1948
+ 0.3172
1949
+ 0.4649
1950
+ (a) Zero-shot grounding on Pneumonia
1951
+ Methods
1952
+ Pointing Game↑
1953
+ Recall↑
1954
+ Precision↑
1955
+ w/o (PosCL + DE)
1956
+ 0.1786
1957
+ 0.3151
1958
+ 0.1336
1959
+ w/o (DE)
1960
+ 0.2080
1961
+ 0.3178
1962
+ 0.1711
1963
+ Ours
1964
+ 0.1975
1965
+ 0.3562
1966
+ 0.1940
1967
+ (b) Zero-shot grounding on Pneumothorax
1968
+ Table 10. Ablation study on zero-shot grounding tasks. (a) shows the results on RSNA Pneumonia dataset. (b) shows the results on
1969
+ SIIM-ACR Pneumothorax dataset.
1970
+
1971
+ D. Detailed results on ChestX-ray14
1972
+ We further show the detailed performance of 14 different diseases on ChestX-ray14 dataset. Tab. 11 shows the results on
1973
+ the zero-shot setting. Our method can exceed the former methods for most diseases. The radar Fig. 3Y shows more visually
1974
+ how our model compares with other solutions under the zero-shot setting. Our method can exceed the former methods for
1975
+ most diseases. Under 100% fine-tuning settings, we achieved similarly excellent results as shown in Tab. 12.
1976
+ Methods
1977
+ Ate.
1978
+ Car.
1979
+ Eff.
1980
+ Inf.
1981
+ Mas.
1982
+ Nod.
1983
+ Pna.
1984
+ Pnx.
1985
+ Con.
1986
+ Ede.
1987
+ Emp.
1988
+ Fib.
1989
+ Thi.
1990
+ Her.
1991
+ AVG
1992
+ ConVIRT [56]
1993
+ 0.4533 0.4601 0.7262 0.6238 0.6790 0.6322 0.6097 0.6698 0.6855 0.7699 0.4701 0.5293 0.6098 0.6220 0.6101
1994
+ GLoRIA [22]
1995
+ 0.6680 0.7647 0.7975 0.6159 0.6722 0.5293 0.6755 0.4785 0.7306 0.8212 0.6033 0.5104 0.6721 0.7144 0.6610
1996
+ BioViL [7]
1997
+ 0.5026 0.6328 0.7914 0.5791 0.7029 0.6126 0.6866 0.7516 0.7455 0.8533 0.7136 0.6751 0.6560 0.7692 0.6909
1998
+ w/o (PosCL + DE) 0.7131 0.8100 0.8635 0.6361 0.7776 0.6740 0.6903 0.8124 0.7915 0.8869 0.7480 0.6780 0.6429 0.7784 0.7502
1999
+ w/o (DE)
2000
+ 0.7420 0.8270 0.8663 0.6336 0.7867 0.6974 0.7238 0.8310 0.8037 0.8887 0.7865 0.6715 0.5414 0.8691 0.7621
2001
+ ours
2002
+ 0.7506 0.8299 0.8636 0.6280 0.7885 0.6947 0.7236 0.8361 0.8079 0.8888 0.7950 0.6511 0.5783 0.9097 0.7676
2003
+ Table 11. Comparison with other state-of-the-art methods on zero-shot ChestX-ray 14 diseases classification task. For each disease,
2004
+ AUC score is reported and the macro average AUC score is also reported. We use the first three letters to represent one disease but for
2005
+ “pneumonia” and “pneumothorax” we use the first two and the last letters.
2006
+ Methods
2007
+ Ate.
2008
+ Car.
2009
+ Eff.
2010
+ Inf.
2011
+ Mas.
2012
+ Nod.
2013
+ Pna.
2014
+ Pnx.
2015
+ Con.
2016
+ Ede.
2017
+ Emp.
2018
+ Fib.
2019
+ Thi.
2020
+ Her.
2021
+ AVG
2022
+ Scratch
2023
+ 0.7835 0.8116 0.8563 0.6537 0.7788 0.6912 0.7004 0.8561 0.8090 0.8869 0.8564 0.7534 0.7454 0.9106 0.7924
2024
+ ConVIRT [56] 0.8012 0.8360 0.8511 0.6613 0.8004 0.7490 0.6998 0.8666 0.8079 0.9023 0.9014 0.7933 0.7468 0.9627 0.8128
2025
+ GLoRIA [22]
2026
+ 0.8263 0.8326 0.8596 0.6641 0.8179 0.7348 0.7104 0.8452 0.8129 0.8977 0.9310 0.7886 0.7608 0.9750 0.8184
2027
+ BioViL [7]
2028
+ 0.8185 0.8543 0.8607 0.6660 0.8302 0.7633 0.7090 0.8595 0.8287 0.9031 0.9251 0.7912 0.7638 0.9696 0.8245
2029
+ ours
2030
+ 0.8291 0.8594 0.8719 0.6565 0.8382 0.7647 0.7378 0.8807 0.8275 0.9083 0.9224 0.7977 0.7784 0.9796 0.8323
2031
+ Table 12. Comparison with other state-of-the-art methods on fine-tuning ChestX-ray 14 diseases classification task. For each disease,
2032
+ AUC score is reported and the macro average AUC score is also reported. We use the first three letters to represent one disease but for
2033
+ “pneumonia” and “pneumothorax” we use the first two and the last letters.
2034
+ Figure 3. The radar figure of our method and other
2035
+ methods of ChestX-ray14 14 diseases. AUC scores
2036
+ are reported and, as shown, our method exceeds the
2037
+ previous state-of-the-art on most diseases.
2038
+
2039
+ E. Visualization Results
2040
+ Fig. 4 shows visualization results of our model on zero-shot grounding task. As shown in figure, the ground truth of
2041
+ “Pneumonia” is given by bounding box and generally related to a large area region. Thus the metrics on this are higher than
2042
+ other two datasets. Our network captures its regions very well. For “Pneumothorax”, its abnormality pattern is different from
2043
+ other diseases, which aim to capturing the collapsed part of the lung, rendering darker areas on the images rather than brighter
2044
+ opacity. Its ground-truth masks are generally thin and narrow while our network can still highlight its location. For “Covid-
2045
+ 19”, its image textual was similar to “Pneumonia”, but since this is a totally new disease, grounding its regions is much more
2046
+ challenging. It requires the model to build relationships between them based on their complex definition and symptoms. The
2047
+ visualization results suggest that our model successfully achieve this, supporting that, for other unseen diseases, our model
2048
+ can also understand their complex descriptions.
2049
+ (a) Pneumonia
2050
+ (b) Pneumothorax
2051
+ (c) Covid-19
2052
+ GT
2053
+ Prediction
2054
+ GT
2055
+ Prediction
2056
+ GT
2057
+ Prediction
2058
+ GT
2059
+ Prediction
2060
+ GT
2061
+ Prediction
2062
+ GT
2063
+ Prediction
2064
+ (a) Pneumonia
2065
+ (b) Pneumothorax
2066
+ (c) Covid-19
2067
+ GT
2068
+ Prediction
2069
+ GT
2070
+ Prediction
2071
+ GT
2072
+ Prediction
2073
+ Figure 4. The visualization of zero-shot grounding results of our method. Each column represents the results on one disease and the left
2074
+ in it is the ground-truth and right is the heatmap predication of our model. The brighter the red on the figure, the more likely the model
2075
+ considering this region to be associated with abnormalities.
2076
+
2077
+ (A)
MdE0T4oBgHgl3EQfSwDa/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
NdFJT4oBgHgl3EQfGyyu/content/tmp_files/2301.11449v1.pdf.txt ADDED
@@ -0,0 +1,767 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A REALIZATION OF POSET ASSOCIAHEDRA
2
+ ANDREW SACK
3
+ Abstract. Given any connected poset P, we give a simple realization of Galashin’s poset
4
+ associahedron A (P) as a convex polytope in RP . The realization is inspired by the de-
5
+ scription of A (P) as a compactification of the configuration space of order-preserving
6
+ maps P → R. In addition, we give an analogous realization for Galashin’s affine poset
7
+ cyclohedra.
8
+ 1. Introduction
9
+ Given a finite connected poset P, the poset associahedron A (P) is a simple, convex
10
+ polytope of dimension |P| − 2 introduced by Galashin [6]. Poset associahedra arise as a
11
+ natural generalization of Stasheff’s associahedra [7, 11, 15, 16], and were originally discovered
12
+ by considering compactifications of the configuration space of order-preserving maps P → R.
13
+ These compactifications are generalizations of the Axelrod–Singer compactification of the
14
+ configuration space of points on a line [1, 8, 13]. Galashin constructed poset associahedra
15
+ by performing stellar subdivisions on the polar dual of Stanley’s order polytope [14], but did
16
+ not provide an explicit realization. Various poset associahedra and cyclohedra have already
17
+ been studied including permutohedra, associahedra, operahedra [9], type B permutohedra [5],
18
+ and cyclohedra [2].
19
+ Poset associahedra bear resemblance to graph associahedra, where the face lattice of each
20
+ is described by a tubing criterion. However, neither class is a subset of the other. When
21
+ Carr and Devadoss introduced graph associahedra in [3], they distinguish between bracketings
22
+ and tubings of a path, where the idea of bracketings does not naturally extend to any simple
23
+ graph.
24
+ In the case of poset associahedra, the idea of bracketings does extend to every
25
+ connected poset.
26
+ Galashin [6] also introduces affine posets, and analagous affine order polytopes and affine
27
+ poset cyclohedra. In this paper, we provide a simple realization of poset associahedra and
28
+ affine poset cyclohedra as an intersection of half spaces, inspired by the compactification
29
+ description and by a similar realization of graph associahedra due to Devadoss [4]. In inde-
30
+ pendent work [10], Mantovani, Padrol, and Pilaud found a realization of poset associahedra
31
+ as sections of graph associahedra. The authors of [10] also generalize from posets to oriented
32
+ building sets (which combine a building set with an oriented matroid).
33
+ Date: January 30, 2023.
34
+ Key
35
+ words
36
+ and
37
+ phrases. Poset,
38
+ associahedron,
39
+ cyclohedron,
40
+ realization,
41
+ configuration
42
+ space,
43
+ compactification.
44
+ This material is based upon work supported by the National Science Foundation Graduate Research
45
+ Fellowship Program under Grant No. DGE-2034835. Any opinions, findings, and conclusions or recommen-
46
+ dations expressed in this material are those of the author(s) and do not necessarily reflect the views of the
47
+ National Science Foundation.
48
+ 1
49
+ arXiv:2301.11449v1 [math.CO] 26 Jan 2023
50
+
51
+ 1
52
+ 2
53
+ 3
54
+ 4
55
+ 5
56
+ 1
57
+ 2
58
+ 3
59
+ 4
60
+ 1
61
+ 2
62
+ 3
63
+ 4
64
+ 5
65
+ 1
66
+ 2
67
+ 3
68
+ 4
69
+ 5
70
+ 1
71
+ 2
72
+ 3
73
+ 4
74
+ 1
75
+ 2
76
+ 3
77
+ 4
78
+ 5
79
+ Examples
80
+ Non-examples
81
+ Figure 1. Examples and non-examples of proper tubings.
82
+ 2. Background
83
+ 2.1. Poset Associahedra. We start by defining the poset associahedron.
84
+ Definition 2.1. Let (P, ⪯) be a finite poset. We make the following definitions:
85
+ • A subset τ ⊆ P is connected if it is connected as an induced subgraph of the Hasse
86
+ diagram of P.
87
+ • τ ⊆ P is convex if whenever a, c ∈ τ and b ∈ P such that a ⪯ b ⪯ c, then b ∈ τ.
88
+ • A tube of P is a connected, convex subset τ ⊆ P such that 2 ≤ |τ|.
89
+ • A tube τ is proper if |τ| ≤ |P| − 1.
90
+ • Two tubes σ, τ ⊆ P are nested if σ ⊆ τ or τ ⊆ σ. Tubes σ and τ are disjoint if
91
+ τ ∩ σ = ∅.
92
+ • For disjoint tubes σ, τ we say σ ≺ τ if there exists a ∈ σ, b ∈ τ such that a ≺ b.
93
+ • A proper tubing T of P is a set of proper tubes of P such that any pair of tubes
94
+ is nested or disjoint and the relation ≺ extends to a partial order on T. That is,
95
+ whenever τ1, . . . , τk ∈ T with τ1 ≺ · · · ≺ τk then τk ̸≺ τ1. This is referred to as the
96
+ acyclic tubing condition.
97
+ • A proper tubing T is maximal if it is maximal by inclusion on the set of all proper
98
+ tubings.
99
+ Figure 1 shows examples and non-examples of proper tubings.
100
+ Definition 2.2. For a finite poset P, the poset associahedron A (P) is a simple, convex
101
+ polytope of dimension |P| − 2 whose face lattice is isomorphic to the set of proper tubings
102
+ ordered by reverse inclusion. That is, if FT is the face corresponding to T, then FS ⊂ FT if
103
+ one can make S from T by adding tubes. Vertices of A (P) correspond to maximal tubings
104
+ of P.
105
+ We realize poset associahedra as an intersection of half-spaces. Let P be a finite poset
106
+ and let n = |P|. We work in the ambient space RP
107
+ Σ=0, the space of real-valued functions on
108
+ P that sum to 0. For a subset τ ⊆ P, define a linear function ατ on RP
109
+ Σ=0 by
110
+ ατ(p) :=
111
+
112
+ i≺·j
113
+ i,j∈τ
114
+ pj − pi.
115
+ Here the sum is taken over all covering relations contained in τ. We define the half-space hτ
116
+ and the hyperplane Hτ by
117
+ hτ := {p ∈ RP
118
+ Σ=0 | ατ(p) ≥ n2|τ|}
119
+ and
120
+ Hτ := {p ∈ RP
121
+ Σ=0 | ατ(p) = n2|τ|}.
122
+ The following is our main result in the finite case:
123
+ 2
124
+
125
+ -4
126
+ -3
127
+ -2
128
+ -1
129
+ 0
130
+ 1
131
+ 2
132
+ 3
133
+ 4
134
+ 5
135
+ 6
136
+ 7
137
+ 8
138
+ 9
139
+ 10
140
+ 11
141
+ 12
142
+ ...
143
+ ...
144
+ -4
145
+ -3
146
+ -2
147
+ -1
148
+ 0
149
+ 1
150
+ 2
151
+ 3
152
+ 4
153
+ 5
154
+ 6
155
+ 7
156
+ 8
157
+ 9
158
+ 10
159
+ 11
160
+ 12
161
+ ...
162
+ ...
163
+ ˜P
164
+ A maximal tubing of ˜P
165
+ Figure 2.
166
+ An affine poset of order 4 and a maximal tubing
167
+ Theorem 2.3. If P is a finite, connected poset, the intersection of HP with hτ for all proper
168
+ tubes τ gives a realization of A (P).
169
+ 2.2. Affine Poset Cyclohedra. Now we describe affine poset cyclohedra.
170
+ Definition 2.4. An affine poset of order n ≥ 1 is a poset ˜P = (Z, ⪯) such that:
171
+ (1) For all i ∈ Z, i ⪯ i + n;
172
+ (2) ˜P is n-periodic: For all i, j ∈ Z, i ⪯ j ⇔ i + n ⪯ j + n;
173
+ (3) ˜P is strongly connected: for all i, j ∈ Z, there exists k ∈ Z such that i ⪯ j + kn.
174
+ The order of ˜P is denoted | ˜P| := n.
175
+ Following Galashin [6], we give analagous versions of Definition 2.1. We give them only
176
+ where they differ from the finite case.
177
+ Definition 2.5. Let ˜P = (Z, ⪯) be an affine poset.
178
+ • A tube of ˜P is a connected, convex subset τ ⊆ P such that 2 ≤ |τ| and either τ = ˜P
179
+ or τ has at most one element in each residue class modulo n.
180
+ • A collection of tubes T is n-periodic is for all τ ∈ T, k ∈ Z, τ + kn ∈ T.
181
+ • A proper tubing T of ˜P is an n-periodic set of proper tubes of ˜P that satisfies the
182
+ acyclic tubing condition and such that any pair of tubes is nested or disjoint.
183
+ Figure 2 gives an example of an affine poset of order 4 and a maximal tubing of that poset.
184
+ Definition 2.6. For an affine poset ˜P, the affine poset cyclohedron C ( ˜P) is a simple, convex
185
+ polytope of dimension | ˜P| − 1 whose face lattice is isomorphic to the set of proper tubings
186
+ ordered by reverse inclusion. Vertices of C ( ˜P) correspond to maximal tubings of ˜P.
187
+ We also realize affine poset cyclohedra as an intersection of half-spaces. Let ˜P be an affine
188
+ poset and let n = | ˜P|. Fix some constant c ∈ R+. We define the space of affine maps R ˜P as
189
+ the set of bi-infinite sequences ˜x = (˜xi)i∈Z such that ˜xi = ˜xi+n + c for all i ∈ Z. Let C ⊂ R ˜P
190
+ be the subspace consisting of all constant maps. We work in the ambient space R ˜P/C where
191
+ the constant c in the definition of affine maps is given by c = n2(n+1).
192
+ 3
193
+
194
+ a
195
+ b
196
+ c
197
+ d
198
+ e
199
+
200
+ ab
201
+ c
202
+ de
203
+
204
+ ab
205
+ cde
206
+
207
+ abcde
208
+ a
209
+ b
210
+ c
211
+ d
212
+ e
213
+ f
214
+
215
+ ab
216
+ c
217
+ d
218
+ e
219
+ f
220
+
221
+ abc
222
+ d
223
+ e
224
+ f
225
+
226
+ abcd
227
+ e
228
+ f
229
+
230
+ abcde
231
+ f
232
+
233
+ abcdef
234
+ Figure 3.
235
+ Multiplication of a word and of a generalized word
236
+ For a finite subset τ ⊆ P, define a linear function ατ on R ˜P/C by
237
+ ατ(˜x) :=
238
+
239
+ i≺·j
240
+ i,j∈τ
241
+ ˜xj − ˜xi.
242
+ Again, the sum is taken over all covering relations contained in τ. We define the half-space
243
+ hτ and the hyperplane Hτ by
244
+ hτ := {p ∈ R
245
+ ˜P/C | ατ(p) ≥ n2|τ|}
246
+ and
247
+ Hτ := {p ∈ R
248
+ ˜P/C | ατ(p) = n2|τ|}.
249
+ Remark 2.7. Observe that for any tube τ and k ∈ Z, hτ = hτ+kn.
250
+ The following is our main result in the affine case:
251
+ Theorem 2.8. If ˜P is an affine poset, the intersection of hτ for all proper tubes τ gives a
252
+ realization of C ( ˜P).
253
+ 2.3. An interpretation of tubings. When P is a chain, A (P) recovers the classical as-
254
+ sociahedron.
255
+ There is a simple interpretation of proper tubings that explains all of the
256
+ conditions above in terms of generalized words.
257
+ We can understand the classical associahedron as follows: Let P = ({1, ..., n}, ≤) be a
258
+ chain. We can think of the chain as a word we want to multiply together with the rule that
259
+ two elements can be multiplied if they are connected by an edge. A maximal tubing of P
260
+ is a way of disambiguating the order in which one performs the multiplication. If a pair of
261
+ adjacent elements x and y have a pair of brackets around them, they contract along the edge
262
+ connecting them and replace x and y by their product.
263
+ Similarly, we can understand the Hasse diagram of an arbitrary poset P as a generalized
264
+ word we would like to multiply together. Again, we are allowed to multiply two elements
265
+ if they are connected by an edge, but when multiplying elements, we contract along the
266
+ edge connecting them and then take the transitive reduction of the resulting directed graph.
267
+ That is, we identify the two elements and take the resulting quotient poset. A maximal
268
+ 4
269
+
270
+ tubing is again a way of disambiguating the order of the multiplication. See Figure 3 for
271
+ an illustration of this multiplication. This perspective is discussed in relation to operahedra
272
+ in [9, Section 2.1] when the Hasse diagram of P is a rooted tree.
273
+ 3. Configuration spaces and compactifications
274
+ We turn our attention to the relationship between poset associahedra and configuration
275
+ spaces. For a poset P, the order cone
276
+ L (P) := {p ∈ RP
277
+ Σ=0 | pi ≤ pj for all i ⪯ j}
278
+ is the set of order preserving maps P → R whose values sum to 0.
279
+ Fix a constant c ∈ R+. The order polytope, first defined by Stanley [14] and extended by
280
+ Galashin [6], is the (|P| − 2)-dimensional polytope
281
+ O(P) := {p ∈ L (P) | αP(p) = c}.
282
+ Remark 3.1. When P is bounded, that is, has a unique maximum ˆ1 and minimum ˆ0,
283
+ this construction is projectively equivalent to Stanley’s order polytope where we replace the
284
+ conditions of the coordinates summing to 0 and αP(p) = c with the conditions pˆ0 = 0 and
285
+ pˆ1 = 1, see [6, Remark 2.5].
286
+ Galashin [6] obtains the poset associahedra by an alternative compactification of O◦(P),
287
+ the interior of O(P). We describe this compactification informally, as it serves as motivation
288
+ for the realization in Theorem 2.3.
289
+ A point is on the boundary of O(P) when any of the inequalities in the order cone achieve
290
+ equality. The faces of of O(P) are in bijection with proper tubings of P such that all tubes
291
+ are disjoint. Let T be such a tubing. If p is in the face corresponding to T and τ ∈ T then
292
+ pi = pj for i, j ∈ τ.
293
+ We can think of the point p in the face corresponding to T as being “what happens in
294
+ O(P)” when for each τ ∈ T, the coordinates are infinitesimally close. However, by taking
295
+ all coordinates in τ to be equal, we lose information about their relative ordering. In A (P),
296
+ we still think of the coordinates in τ as being infinitesimally close, but we are still inter-
297
+ ested in their configuration. Upon zooming in, this is parameterized by the order polytope
298
+ of the subposet (τ, ⪯). We iterate this process, allowing points in τ to be infinitesimally
299
+ closer, and so on. We illustrate this in Figure 4. This idea is a common explanation of the
300
+ Axelrod–Singer compactification of O◦(P) when P is a chain, see [1, 8, 13].
301
+ The idea of the realization in Theorem 2.3 is to replace the notions of infinitesimally
302
+ close and infinitesimally closer with being exponentially close and exponentially closer. For
303
+ p ∈ L (P), ατ acts a measure of how close the coordinates of p|τ are. We can make this
304
+ precise with the following definition and lemma.
305
+ Definition 3.2. For S ⊆ P and p ∈ RP, define the diameter of p relative to S by
306
+ diamS(p) = max
307
+ i,j∈S |pi − pj|.
308
+ That is, diamS(p) is the diameter of {pi : i ∈ S} as a subset of R.
309
+ Lemma 3.3. Let τ ⊆ P be a tube and let p ∈ L (P). Then
310
+ diamτ(p) ≤ ατ(p) ≤ n2
311
+ 4 diamτ(p).
312
+ 5
313
+
314
+ 1
315
+ 2
316
+ 3
317
+ 4
318
+ 5
319
+ 6
320
+ 123
321
+ 456
322
+ 1
323
+ 2
324
+ 3
325
+ 4
326
+ 5
327
+ 6
328
+ 1
329
+ 2
330
+ 3
331
+ 5
332
+ 4
333
+ 6
334
+ Tubing in O(P)
335
+ Point in O(P)
336
+ Tubing in A (P)
337
+ Point in A (P)
338
+ Figure 4.
339
+ A vertex in O(P) vs. A (P).
340
+ Proof. By the triangle inequality and as τ is connected, diamτ(p) ≤ ατ(p). For the other
341
+ inequality,
342
+ ατ(p) =
343
+
344
+ i≺·j
345
+ i,j∈τ
346
+ pj − pi
347
+
348
+
349
+ i≺·j
350
+ i,j∈τ
351
+ diamτ(p)
352
+ ≤ 1
353
+ 4n2 diamτ(p)
354
+ The inequality in the last line comes from the fact that there are at most n2
355
+ 4 covering
356
+ relations in P, which follows from Mantel’s Theorem and the fact that Hasse diagrams are
357
+ triangle-free.
358
+
359
+ In particular, for p ∈ L (P), if p ∈ Hτ, then {pi | i ∈ τ} is clustered tightly together
360
+ compared to any tube containing τ. If p ∈ hτ, then {pi | i ∈ τ} is spread far apart compared
361
+ to any tube contained in τ.
362
+ 4. Realizing poset associahedra
363
+ We are now prepared to prove Theorem 2.3. Define
364
+ A (P) :=
365
+
366
+ σ⊂P
367
+ hσ ∩ HP
368
+ where the intersection is over all tubes of P. Note that A (P) ⊆ L (P) as if i ≺· j is a
369
+ covering relation, then for p ∈ h{i,j}, pi ≤ pj.
370
+ Theorem 2.3 follows as a result of three lemmas:
371
+ Lemma 4.1. If T is a maximal tubing, then
372
+ vT :=
373
+
374
+ τ∈T∪{P}
375
+
376
+ is a point.
377
+ 6
378
+
379
+ Lemma 4.2. If T is a collection of tubes that do not form a proper tubing, then
380
+
381
+ τ∈T
382
+ Hτ ∩ A (P) = ∅.
383
+ Lemma 4.3. If T is a maximal tubing and τ /∈ T is a proper tube, then ατ(vT) > n2|τ|. That
384
+ is, vT lies in the interior of hτ.
385
+ Lemma 4.1 follows from a standard induction argument.
386
+ Proof of Lemma 4.2. If T is not a collection of tubes that do proper tubing, then at least
387
+ one of the following two cases holds:
388
+ (1) There is a pair of non-nested and non-disjoint tubes τ1, τ2 in T.
389
+ (2) There is a sequence of disjoint tubes τ1, ..., τk such that τ1 ≺ · · · ≺ τk ≺ τ1.
390
+ The idea of the proof is as follows: For S ⊆ P, define the convex hull of S as
391
+ conv(σ) := {b ∈ P | ∃a, c ∈ S : a ≤ b ≤ c}.
392
+ Observe that if p ∈ L (P), then diamS(p) ≤ diamconv(S)(p). Take σ = conv(τ1 ∪ · · · ∪ τk).
393
+ One can show that σ is a tube, so Lemma 3.3 tells us that for each τi, diamτi(p) is very
394
+ small compared to n2|σ|. As the tubes either intersect or are cyclic, one can show this forces
395
+ diamσ(p) to also be small, so ασ(p) < n2|σ|.
396
+ More concretely, suppose that
397
+ p ∈
398
+
399
+ Hτi ∩ L (P).
400
+ Note that for all i, |σ| > |τi| + 1 and diamτi(p) ≤ n2(|σ|−1). In case (1), let a, b ∈ σ. There
401
+ exists some x ∈ τ1 ∩ τ2, so
402
+ |pa − pb| ≤ |pa − px| + |px − pb|
403
+ ≤ diamτ1(p) + diamτ2(p)
404
+ ≤ 2n2(|σ|−1)
405
+ < n2(|σ|).
406
+ Hence diamσ(p) < n2|σ|, so by Lemma 3.3, p /∈ hσ.
407
+ Now we move to case (2). Suppose there is a sequence of disjoint tubes τ1, ..., τk such that
408
+ for each i there exists xi, yi ∈ ��i where xi ≺ yi+1 where we take the indices mod k. Then:
409
+ pyi − diamτi(p) ≤ pxi
410
+ pxi ≤ pyi+1
411
+ pyi+1 ≤ pxi+1 + diamτi+1
412
+ Furthermore, since τi and τi+1 are disjoint, |τi| ≤ |σ|−2 and diamτi ≤ n2(|σ|−2). Combining
413
+ these we get
414
+ pyi ≤ pyi+1 + 2n2(|σ|−2).
415
+ Then we have:
416
+ py1 ≤ pyi + 2in2(|σ|−2)
417
+ and
418
+ pyi + 2in2(|σ|−2) ≤ py1 + 2(k + 1)n2(|σ|−2).
419
+ 7
420
+
421
+ 4
422
+ 5
423
+ 2
424
+ 1
425
+ 3
426
+ 6
427
+ 7
428
+ 8
429
+ 9
430
+ τ
431
+ 4
432
+ 5
433
+ 2
434
+ 1
435
+ 3
436
+ 6
437
+ 7
438
+ 8
439
+ 9
440
+ τ
441
+ σ
442
+ A
443
+ B
444
+ Maximal Tubing T and tube τ
445
+ σ, A, and B labelled
446
+ Figure 5. An example illustrating the proof of Lemma 4.3.
447
+ A
448
+ B
449
+ σ
450
+ τ
451
+ Figure 6.
452
+ If diamA(p) and diamB(p) are small and diamσ(p) is large, then
453
+ diamτ(p) is large.
454
+ These yield
455
+ py1 − pyi ≤ 2in2(|σ|−2)
456
+ and
457
+ pyi − py1 ≤ 2(k − i + 1)n2(|σ|−2).
458
+ As i, k − i + 1 ≤ k ≤ n
459
+ 2, we have |py1 − pyi| ≤ n2(|σ|−1). Finally, if zi ∈ τi, zj ∈ τj, then
460
+ |pzi − pzj| ≤ |pzi − pyi| + |pyi − py1| + |py1 − pyj| + |pyj − pzj|
461
+ ≤ 4n2(|σ|−1)
462
+ < n2|σ|.
463
+ Hence diamσ(p) < n2|σ|, and by Lemma 3.3, p /∈ hσ.
464
+
465
+ Proof of Lemma 4.3. Let T be a maximal tubing of P and let τ /∈ T be a tube. Define the
466
+ convex hull of τ relative to T by
467
+ convT(τ) := min{σ ∈ T | τ ⊂ σ}.
468
+ Let σ = convT(τ). T partitions σ into a lower set A and an upper set B where A and B
469
+ are either tubes or singletons. Furthermore, A and B both intersect τ. See Figure 5 for an
470
+ example illustrating this.
471
+ The idea of the proof is as follows: Let p = vT. By Lemma 3.3, diamA(p) and diamB(p)
472
+ are both very small compared to diamσ(p). Then for any a ∈ A, b ∈ B, |pa − pb| must be
473
+ large. As τ intersects both A and B, diamτ(p) must be large and hence p ∈ hτ. See Figure 6
474
+ for an illustration of this. More precisely, we show that for any i ∈ A, j ∈ B, pj −pi > (n2)|τ|,
475
+ which implies that p lies in the interior of hτ.
476
+ 8
477
+
478
+ Observe that:�
479
+ x≺·y
480
+ py − px =
481
+
482
+ x≺·y
483
+ x,y∈A
484
+ (py − px)
485
+
486
+ ��
487
+
488
+ ≤(n2)|σ|−1
489
+ < 1
490
+ 8 (n2)|σ|
491
+ +
492
+
493
+ x≺·y
494
+ x,y∈B
495
+ (py − px)
496
+
497
+ ��
498
+
499
+ ≤(n2)|σ|−1
500
+ < 1
501
+ 8 (n2)|σ|
502
+ +
503
+
504
+ x≺·y
505
+ x∈A,y∈B
506
+ (py − px).
507
+ Fix i ∈ A and j ∈ B. By Lemma 3.3, for any x ∈ A, y ∈ B,
508
+ py − px ≤ pj − pi + diamA(p) + diamB(p)
509
+ ≤ pj + pi + 2n2(|σ|−1).
510
+ Again, noting that the number of covering relations in σ is at most n2
511
+ 4 we obtain:
512
+
513
+ x≺·σy
514
+ x∈A,y∈B
515
+ (py − px) ≤
516
+
517
+ x≺·σy
518
+ x∈A,y∈B
519
+ (pj − pi + 2(n2)|σ|−1)
520
+ ≤ n2
521
+ 4
522
+
523
+ pj − pi + 2(n2)|σ|−1�
524
+ = n2
525
+ 4 (pj − pi) + 1
526
+ 2(n2)|σ|.
527
+ Combining all of this we get:
528
+
529
+ x≺·σy
530
+ py − px = (n2)|σ|
531
+ < 1
532
+ 8(n2)|σ| + 1
533
+ 8(n2)|σ| + 1
534
+ 2(n2)|σ| + n2
535
+ 4 (pj − pi)
536
+ ≤ 3
537
+ 4(n2)|σ| + n2
538
+ 4 (pj − pi)
539
+ Then (n2)|σ|−1 < (pj − pi) and as |τ| ≤ |σ| − 1, p is in the interior of hτ.
540
+
541
+ Remark 4.4. A similar approach for realizing graph associahedra is taken by Devadoss [4].
542
+ One difference is that Devadoss realizes graph associahedra by cutting off slices of a simplex
543
+ whereas we cut off slices of an order polytope.
544
+ 5. Realizing affine poset cyclohedra
545
+ The proofs in the affine case are nearly identical to the finite case with some additional
546
+ technical components. The similarity comes from the fact that Lemma 3.3 still applies. We
547
+ highlight where the proofs are different. Let ˜P be an affine poset of order n.
548
+ Define
549
+ C ( ˜P) :=
550
+
551
+ σ⊂P
552
+
553
+ and
554
+ L ( ˜P) := {p ∈ R
555
+ ˜P/C | pi ≤ pj for all i ⪯ j}.
556
+ where the intersection is over all tubes of ˜P. Note that C ( ˜P) ⊆ L ( ˜P) as if i ≺· j is a
557
+ covering relation, then for p ∈ h{i,j}, pi ≤ pj. Theorem 2.8 follows as a result of 3 lemmas:
558
+ 9
559
+
560
+ Lemma 5.1. If T is a maximal tubing, then
561
+ vT :=
562
+
563
+ τ∈T
564
+
565
+ is a point.
566
+ Lemma 5.2. If T is a collection of tubes that do not form a proper tubing, then
567
+
568
+ τ∈T
569
+ Hτ ∩ C ( ˜P) = ∅.
570
+ Lemma 5.3. If T is a maximal tubing and τ /∈ T is a proper tube, then ατ(vT) > n2|τ|. That
571
+ is, vT lies in the interior of hτ.
572
+ Proof of Lemma 5.1. Let T be a maximal tubing and take any σ ∈ T such that |τ| = n.
573
+ Then restricting to ˜P|σ, Lemma 4.1 implies that
574
+
575
+ τ∈T
576
+ τ⊆σ
577
+
578
+ is a point. However, as T is n-periodic,
579
+
580
+ τ∈T
581
+ τ⊆σ
582
+ Hτ =
583
+
584
+ τ∈T
585
+ Hτ.
586
+
587
+ Proof of Lemma 5.2. By Remark 2.7, we can assume T is n-periodic. The proof is almost
588
+ identical to the proof of Lemma 4.2. Define
589
+ L ( ˜P) := {p ∈ R
590
+ ˜P/C | pi ≤ pj for all i ⪯ j}.
591
+ and note that
592
+ L ( ˜P) ⊆ R
593
+ ˜P/C
594
+
595
+ i,j∈ ˜P
596
+ i≺·j
597
+ h{i,j}.
598
+ Let
599
+ p ∈
600
+
601
+ Hτi ∩ L ( ˜P).
602
+ We again break into two cases:
603
+ (1) There is a pair of non-nested and non-disjoint tubes τ1, τ2 in T.
604
+ (2) All tubes in T are pairwise nested or disjoint and there is a sequence of disjoint tubes
605
+ τ1, ..., τk such that τ1 ≺ · · · ≺ τk ≺ τ1.
606
+ The only difference in the proof occurs in case (1). Here, it is possible that there exists
607
+ x ∈ τ1 ∪τ2 such that x+n ∈ τ1 ∪τ2 as well. In this case, the proof of Lemma 4.2 still implies
608
+ that diamτ1∪τ2(p) ≤ diamτ1(p) + diamτ2(p) ≤ 2n2n. However, |px+n − px| = n2(n+1).
609
+
610
+ Proof of Lemma 5.3. Let T be a maximal tubing and τ /∈ T be a proper tube. Let p = vT.
611
+ We claim that ατ(p) > n2|τ|.
612
+ The only difference from the proof of Lemma 4.3 is that τ may not be contained by any
613
+ tube in τ so convT(τ) may not be well-defined. In this case, there exists A ∈ T such that
614
+ 10
615
+
616
+ ˆ0
617
+ a
618
+ b
619
+ c
620
+ ˆ1
621
+ P
622
+ ε = 1
623
+ 3
624
+ ε = 1
625
+ 9
626
+ ε =
627
+ 1
628
+ 27
629
+ Figure 7.
630
+ O(P) as a limit of A (P)
631
+ |A| = n, A ∩ τ ̸= ∅, and (A + n) ∩ τ ̸= ∅. Here, (A + n) acts the same as B in the finite
632
+ case, except the argument is much simpler.
633
+ Let i ∈ A ∩ τ, j ∈ (A + n) ∩ τ. Observe that diamA(p), diam(A+n)(p) ≤ n2n and that
634
+ i + n ∈ (A + n). Then
635
+ |pj − pi| ≥ (pj − n2n) − pi
636
+ ≥ pi+n − pi
637
+ = n2(n+1).
638
+ Hence diamτ(p) > n2|τ| and by Lemma 3.3, ατ(p) > n2|τ|.
639
+
640
+ 6. Remarks and Questions
641
+ Remark 6.1. Let (P, ⪯) be a bounded poset. In Remark 3.1, we discuss how O(P) can be
642
+ realized as the set of all p ∈ RP such that pˆ0 = 0, pˆ1 = 1, and pi ≤ pj whenever i ⪯ j. We
643
+ can similarly realize A (P) as follows: Fix 0 < ε <
644
+ 1
645
+ n2.
646
+ For a proper tube τ ⊂ P, let
647
+ h′
648
+ τ = {p ∈ RP | ατ(p) < εn−|τ|}.
649
+ Then A (P) is realized as the intersection over all h′
650
+ τ with the hyperplanes
651
+ {pˆ0 = 0} and {pˆ1 = 1}.
652
+ Letting ε → 0, we obtain O(P) as a limit of A (P) as shown in Figure 7.
653
+ Remark 6.2. The key piece to the realizations in Theorems 2.3 and 2.8 is the linear form
654
+ ατ, where ατ acts as an approximation of diamτ. In particular, let τ be a tube and let
655
+ p ∈ L (P). Then:
656
+ • ατ(p) ≥ 0.
657
+ • ατ(p) = 0 ⇔ p|τ is constant.
658
+ • If σ ⊆ τ is a tube, then ασ(p) ≤ ατ(p).
659
+ However, there are many other options for choice of ατ that could fill this role. Some other
660
+ options include:
661
+ 11
662
+
663
+ (1) Sum over all pairs i ≺ j in τ.
664
+ ατ(p) =
665
+
666
+ i≺j
667
+ i,j∈τ
668
+ pj − pi.
669
+ (2) Let A and B be the set of minima and maxima of the restriction P|τ respectively.
670
+ ατ(p) =
671
+
672
+ i≺j
673
+ i∈A,j∈B
674
+ pj − pi.
675
+ (3) Fix a spanning tree T in the Hasse diagram of τ. Let E = {(i, j) | i ≺·T j} be the set
676
+ of edges in T.
677
+ ατ(p) =
678
+
679
+ (i,j)∈E
680
+ pj − pi.
681
+ An advantage of this option is that we would have
682
+ diamτ(p) ≤ ατ(p) ≤ (n − 1) diamτ(p).
683
+ A similar realization can be obtained for each choice of of ατ.
684
+ Question 6.3. Recall that for a simple d-dimensional polytope P, the f-vector and h-vector
685
+ of P are given by (f0, . . . , fd) and (h0, . . . , hd) where fi is the number of i-dimensional faces
686
+ and
687
+ d
688
+
689
+ i=0
690
+ fiti =
691
+ d
692
+
693
+ i=0
694
+ hi(t + 1)i.
695
+ Postnikov, Reiner, and Williams [12] found a statistic on maximal tubings of graph associa-
696
+ hedra of chordal graphs where
697
+
698
+ T
699
+ tstat(T) =
700
+
701
+ hiti.
702
+ In particular, they define a map T �→ wT from maximal tubings of a graph on n vertices
703
+ to the set of permutations Sn such that stat(T) = des(wT), the number of descents of wT.
704
+ It would be interesting to find a similar statistic on maximal tubings of poset associahedra.
705
+ For a simple polytope P, one can orient the edges of P according to a generic linear form
706
+ and take stat(v) = outdegree(v) [17, §8.2]. It may be possible to use our realization to find
707
+ the desired statistic.
708
+ Acknowledgements
709
+ The author is grateful to Pavel Galashin for his many helpful comments and suggestions
710
+ and to Stefan Forcey for fruitful conversations.
711
+ References
712
+ [1]
713
+ Scott Axelrod and Isadore M Singer. “Chern-Simons perturbation theory. II”. In: Jour-
714
+ nal of Differential Geometry 39.1 (1994), pp. 173–213.
715
+ [2]
716
+ Raoul Bott and Clifford Taubes. “On the self-linking of knots”. In: Journal of Mathe-
717
+ matical Physics 35.10 (1994), pp. 5247–5287.
718
+ [3]
719
+ Michael Carr and Satyan L Devadoss. “Coxeter complexes and graph-associahedra”.
720
+ In: Topology and its Applications 153.12 (2006), pp. 2155–2168.
721
+ 12
722
+
723
+ [4]
724
+ Satyan L Devadoss. “A realization of graph associahedra”. In: Discrete Mathematics
725
+ 309.1 (2009), pp. 271–276.
726
+ [5]
727
+ Sergey Fomin and Nathan Reading. “Root systems and generalized associahedra”. In:
728
+ arXiv preprint math/0505518 (2005).
729
+ [6]
730
+ Pavel Galashin. “Poset associahedra”. In: arXiv preprint arXiv:2110.07257 (2021).
731
+ [7]
732
+ Mark Haiman. “Constructing the associahedron”. In: Unpublished manuscript, MIT
733
+ (1984).
734
+ [8]
735
+ Pascal Lambrechts, Victor Turchin, and Ismar Voli´c. “Associahedron, cyclohedron and
736
+ permutohedron as compactifications of configuration spaces”. In: Bulletin of the Belgian
737
+ Mathematical Society-Simon Stevin 17.2 (2010), pp. 303–332.
738
+ [9]
739
+ Guillaume Laplante-Anfossi. “The diagonal of the operahedra”. In: Advances in Math-
740
+ ematics 405 (2022), p. 108494.
741
+ [10]
742
+ Chiara Mantovani, Arnau Padrol, and Vincent Pilaud. “Acyclonestohedra: when ori-
743
+ ented matroids meet nestohedra”. in prep.
744
+ [11]
745
+ Kyle Petersen. Eulerian Numbers. Oct. 2015. isbn: 978-1-4939-3090-6. doi: 10.1007/
746
+ 978-1-4939-3091-3.
747
+ [12]
748
+ Alex Postnikov, Victor Reiner, and Lauren Williams. “Faces of Generalized Permuto-
749
+ hedra”. In: Documenta Mathematica 13 (2008), pp. 207–273.
750
+ [13]
751
+ Dev P Sinha. “Manifold-theoretic compactifications of configuration spaces”. In: Selecta
752
+ Mathematica 10.3 (2004), pp. 391–428.
753
+ [14]
754
+ Richard P Stanley. “Two poset polytopes”. In: Discrete & Computational Geometry
755
+ 1.1 (1986), pp. 9–23.
756
+ [15]
757
+ Jim Stasheff. “From Operads to ‘Physically’ Inspired Theories”. In: (Sept. 1996).
758
+ [16]
759
+ Dov Tamari. “Mono¨ıdes pr´eordonn´es et chaˆınes de Malcev”. In: Bulletin de la Soci´et´e
760
+ math´ematique de France 82 (1954), pp. 53–96.
761
+ [17]
762
+ G¨unter M Ziegler. Lectures on polytopes. Vol. 152. Springer Science & Business Media,
763
+ 2012.
764
+ Department of Mathematics, University of California, Los Angeles, CA 90095, USA
765
+ Email address: andrewsack@math.ucla.edu
766
+ 13
767
+
NdFJT4oBgHgl3EQfGyyu/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,438 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf,len=437
2
+ page_content='A REALIZATION OF POSET ASSOCIAHEDRA ANDREW SACK Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
3
+ page_content=' Given any connected poset P, we give a simple realization of Galashin’s poset associahedron A (P) as a convex polytope in RP .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
4
+ page_content=' The realization is inspired by the de- scription of A (P) as a compactification of the configuration space of order-preserving maps P → R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
5
+ page_content=' In addition, we give an analogous realization for Galashin’s affine poset cyclohedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
6
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
7
+ page_content=' Introduction Given a finite connected poset P, the poset associahedron A (P) is a simple, convex polytope of dimension |P| − 2 introduced by Galashin [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
8
+ page_content=' Poset associahedra arise as a natural generalization of Stasheff’s associahedra [7, 11, 15, 16], and were originally discovered by considering compactifications of the configuration space of order-preserving maps P → R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
9
+ page_content=' These compactifications are generalizations of the Axelrod–Singer compactification of the configuration space of points on a line [1, 8, 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
10
+ page_content=' Galashin constructed poset associahedra by performing stellar subdivisions on the polar dual of Stanley’s order polytope [14], but did not provide an explicit realization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
11
+ page_content=' Various poset associahedra and cyclohedra have already been studied including permutohedra, associahedra, operahedra [9], type B permutohedra [5], and cyclohedra [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
12
+ page_content=' Poset associahedra bear resemblance to graph associahedra, where the face lattice of each is described by a tubing criterion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
13
+ page_content=' However, neither class is a subset of the other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
14
+ page_content=' When Carr and Devadoss introduced graph associahedra in [3], they distinguish between bracketings and tubings of a path, where the idea of bracketings does not naturally extend to any simple graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
15
+ page_content=' In the case of poset associahedra, the idea of bracketings does extend to every connected poset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
16
+ page_content=' Galashin [6] also introduces affine posets, and analagous affine order polytopes and affine poset cyclohedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
17
+ page_content=' In this paper, we provide a simple realization of poset associahedra and affine poset cyclohedra as an intersection of half spaces, inspired by the compactification description and by a similar realization of graph associahedra due to Devadoss [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
18
+ page_content=' In inde- pendent work [10], Mantovani, Padrol, and Pilaud found a realization of poset associahedra as sections of graph associahedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
19
+ page_content=' The authors of [10] also generalize from posets to oriented building sets (which combine a building set with an oriented matroid).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
20
+ page_content=' Date: January 30, 2023.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
21
+ page_content=' Key words and phrases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
22
+ page_content=' Poset, associahedron, cyclohedron, realization, configuration space, compactification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
23
+ page_content=' This material is based upon work supported by the National Science Foundation Graduate Research Fellowship Program under Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
24
+ page_content=' DGE-2034835.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
25
+ page_content=' Any opinions, findings, and conclusions or recommen- dations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
26
+ page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
27
+ page_content='11449v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
28
+ page_content='CO] 26 Jan 2023 1 2 3 4 5 1 2 3 4 1 2 3 4 5 1 2 3 4 5 1 2 3 4 1 2 3 4 5 Examples Non-examples Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
29
+ page_content=' Examples and non-examples of proper tubings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
30
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
31
+ page_content=' Background 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
32
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
33
+ page_content=' Poset Associahedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
34
+ page_content=' We start by defining the poset associahedron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
35
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
36
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
37
+ page_content=' Let (P, ⪯) be a finite poset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
38
+ page_content=' We make the following definitions: A subset τ ⊆ P is connected if it is connected as an induced subgraph of the Hasse diagram of P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
39
+ page_content=' τ ⊆ P is convex if whenever a, c ∈ τ and b ∈ P such that a ⪯ b ⪯ c, then b ∈ τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
40
+ page_content=' A tube of P is a connected, convex subset τ ⊆ P such that 2 ≤ |τ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
41
+ page_content=' A tube τ is proper if |τ| ≤ |P| − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
42
+ page_content=' Two tubes σ, τ ⊆ P are nested if σ ⊆ τ or τ ⊆ σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
43
+ page_content=' Tubes σ and τ are disjoint if τ ∩ σ = ∅.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
44
+ page_content=' For disjoint tubes σ, τ we say σ ≺ τ if there exists a ∈ σ, b ∈ τ such that a ≺ b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
45
+ page_content=' A proper tubing T of P is a set of proper tubes of P such that any pair of tubes is nested or disjoint and the relation ≺ extends to a partial order on T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
46
+ page_content=' That is, whenever τ1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
47
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
48
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
49
+ page_content=' , τk ∈ T with τ1 ≺ · · · ≺ τk then τk ̸≺ τ1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
50
+ page_content=' This is referred to as the acyclic tubing condition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
51
+ page_content=' A proper tubing T is maximal if it is maximal by inclusion on the set of all proper tubings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
52
+ page_content=' Figure 1 shows examples and non-examples of proper tubings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
53
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
54
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
55
+ page_content=' For a finite poset P, the poset associahedron A (P) is a simple, convex polytope of dimension |P| − 2 whose face lattice is isomorphic to the set of proper tubings ordered by reverse inclusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
56
+ page_content=' That is, if FT is the face corresponding to T, then FS ⊂ FT if one can make S from T by adding tubes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
57
+ page_content=' Vertices of A (P) correspond to maximal tubings of P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
58
+ page_content=' We realize poset associahedra as an intersection of half-spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
59
+ page_content=' Let P be a finite poset and let n = |P|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
60
+ page_content=' We work in the ambient space RP Σ=0, the space of real-valued functions on P that sum to 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
61
+ page_content=' For a subset τ ⊆ P, define a linear function ατ on RP Σ=0 by ατ(p) := � i≺·j i,j∈τ pj − pi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
62
+ page_content=' Here the sum is taken over all covering relations contained in τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
63
+ page_content=' We define the half-space hτ and the hyperplane Hτ by hτ := {p ∈ RP Σ=0 | ατ(p) ≥ n2|τ|} and Hτ := {p ∈ RP Σ=0 | ατ(p) = n2|τ|}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
64
+ page_content=' The following is our main result in the finite case: 2 4 3 2 1 0 1 2 3 4 5 6 7 8 9 10 11 12 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
65
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
66
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
67
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
68
+ page_content=' 4 3 2 1 0 1 2 3 4 5 6 7 8 9 10 11 12 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
69
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
70
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
71
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
72
+ page_content=' ˜P A maximal tubing of ˜P Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
73
+ page_content=' An affine poset of order 4 and a maximal tubing Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
74
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
75
+ page_content=' If P is a finite, connected poset, the intersection of HP with hτ for all proper tubes τ gives a realization of A (P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
76
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
77
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
78
+ page_content=' Affine Poset Cyclohedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
79
+ page_content=' Now we describe affine poset cyclohedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
80
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
81
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
82
+ page_content=' An affine poset of order n ≥ 1 is a poset ˜P = (Z, ⪯) such that: (1) For all i ∈ Z, i ⪯ i + n;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
83
+ page_content=' (2) ˜P is n-periodic: For all i, j ∈ Z, i ⪯ j ⇔ i + n ⪯ j + n;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
84
+ page_content=' (3) ˜P is strongly connected: for all i, j ∈ Z, there exists k ∈ Z such that i ⪯ j + kn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
85
+ page_content=' The order of ˜P is denoted | ˜P| := n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
86
+ page_content=' Following Galashin [6], we give analagous versions of Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
87
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
88
+ page_content=' We give them only where they differ from the finite case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
89
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
90
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
91
+ page_content=' Let ˜P = (Z, ⪯) be an affine poset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
92
+ page_content=' A tube of ˜P is a connected, convex subset τ ⊆ P such that 2 ≤ |τ| and either τ = ˜P or τ has at most one element in each residue class modulo n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
93
+ page_content=' A collection of tubes T is n-periodic is for all τ ∈ T, k ∈ Z, τ + kn ∈ T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
94
+ page_content=' A proper tubing T of ˜P is an n-periodic set of proper tubes of ˜P that satisfies the acyclic tubing condition and such that any pair of tubes is nested or disjoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
95
+ page_content=' Figure 2 gives an example of an affine poset of order 4 and a maximal tubing of that poset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
96
+ page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
97
+ page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
98
+ page_content=' For an affine poset ˜P, the affine poset cyclohedron C ( ˜P) is a simple, convex polytope of dimension | ˜P| − 1 whose face lattice is isomorphic to the set of proper tubings ordered by reverse inclusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
99
+ page_content=' Vertices of C ( ˜P) correspond to maximal tubings of ˜P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
100
+ page_content=' We also realize affine poset cyclohedra as an intersection of half-spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
101
+ page_content=' Let ˜P be an affine poset and let n = | ˜P|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
102
+ page_content=' Fix some constant c ∈ R+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
103
+ page_content=' We define the space of affine maps R ˜P as the set of bi-infinite sequences ˜x = (˜xi)i∈Z such that ˜xi = ˜xi+n + c for all i ∈ Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
104
+ page_content=' Let C ⊂ R ˜P be the subspace consisting of all constant maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
105
+ page_content=' We work in the ambient space R ˜P/C where the constant c in the definition of affine maps is given by c = n2(n+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
106
+ page_content=' 3 a b c d e → ab c de → ab cde → abcde a b c d e f → ab c d e f → abc d e f → abcd e f → abcde f → abcdef Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
107
+ page_content=' Multiplication of a word and of a generalized word For a finite subset τ ⊆ P, define a linear function ατ on R ˜P/C by ατ(˜x) := � i≺·j i,j∈τ ˜xj − ˜xi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
108
+ page_content=' Again, the sum is taken over all covering relations contained in τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
109
+ page_content=' We define the half-space hτ and the hyperplane Hτ by hτ := {p ∈ R ˜P/C | ατ(p) ≥ n2|τ|} and Hτ := {p ∈ R ˜P/C | ατ(p) = n2|τ|}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
110
+ page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
111
+ page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
112
+ page_content=' Observe that for any tube τ and k ∈ Z, hτ = hτ+kn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
113
+ page_content=' The following is our main result in the affine case: Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
114
+ page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
115
+ page_content=' If ˜P is an affine poset, the intersection of hτ for all proper tubes τ gives a realization of C ( ˜P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
116
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
117
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
118
+ page_content=' An interpretation of tubings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
119
+ page_content=' When P is a chain, A (P) recovers the classical as- sociahedron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
120
+ page_content=' There is a simple interpretation of proper tubings that explains all of the conditions above in terms of generalized words.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
121
+ page_content=' We can understand the classical associahedron as follows: Let P = ({1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
122
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
123
+ page_content=', n}, ≤) be a chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
124
+ page_content=' We can think of the chain as a word we want to multiply together with the rule that two elements can be multiplied if they are connected by an edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
125
+ page_content=' A maximal tubing of P is a way of disambiguating the order in which one performs the multiplication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
126
+ page_content=' If a pair of adjacent elements x and y have a pair of brackets around them, they contract along the edge connecting them and replace x and y by their product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
127
+ page_content=' Similarly, we can understand the Hasse diagram of an arbitrary poset P as a generalized word we would like to multiply together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
128
+ page_content=' Again, we are allowed to multiply two elements if they are connected by an edge, but when multiplying elements, we contract along the edge connecting them and then take the transitive reduction of the resulting directed graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
129
+ page_content=' That is, we identify the two elements and take the resulting quotient poset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
130
+ page_content=' A maximal 4 tubing is again a way of disambiguating the order of the multiplication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
131
+ page_content=' See Figure 3 for an illustration of this multiplication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
132
+ page_content=' This perspective is discussed in relation to operahedra in [9, Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
133
+ page_content='1] when the Hasse diagram of P is a rooted tree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
134
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
135
+ page_content=' Configuration spaces and compactifications We turn our attention to the relationship between poset associahedra and configuration spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
136
+ page_content=' For a poset P, the order cone L (P) := {p ∈ RP Σ=0 | pi ≤ pj for all i ⪯ j} is the set of order preserving maps P → R whose values sum to 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
137
+ page_content=' Fix a constant c ∈ R+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
138
+ page_content=' The order polytope, first defined by Stanley [14] and extended by Galashin [6], is the (|P| − 2)-dimensional polytope O(P) := {p ∈ L (P) | αP(p) = c}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
139
+ page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
140
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
141
+ page_content=' When P is bounded, that is, has a unique maximum ˆ1 and minimum ˆ0, this construction is projectively equivalent to Stanley’s order polytope where we replace the conditions of the coordinates summing to 0 and αP(p) = c with the conditions pˆ0 = 0 and pˆ1 = 1, see [6, Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
142
+ page_content='5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
143
+ page_content=' Galashin [6] obtains the poset associahedra by an alternative compactification of O◦(P), the interior of O(P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
144
+ page_content=' We describe this compactification informally, as it serves as motivation for the realization in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
145
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
146
+ page_content=' A point is on the boundary of O(P) when any of the inequalities in the order cone achieve equality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
147
+ page_content=' The faces of of O(P) are in bijection with proper tubings of P such that all tubes are disjoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
148
+ page_content=' Let T be such a tubing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
149
+ page_content=' If p is in the face corresponding to T and τ ∈ T then pi = pj for i, j ∈ τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
150
+ page_content=' We can think of the point p in the face corresponding to T as being “what happens in O(P)” when for each τ ∈ T, the coordinates are infinitesimally close.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
151
+ page_content=' However, by taking all coordinates in τ to be equal, we lose information about their relative ordering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
152
+ page_content=' In A (P), we still think of the coordinates in τ as being infinitesimally close, but we are still inter- ested in their configuration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
153
+ page_content=' Upon zooming in, this is parameterized by the order polytope of the subposet (τ, ⪯).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
154
+ page_content=' We iterate this process, allowing points in τ to be infinitesimally closer, and so on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
155
+ page_content=' We illustrate this in Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
156
+ page_content=' This idea is a common explanation of the Axelrod–Singer compactification of O◦(P) when P is a chain, see [1, 8, 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
157
+ page_content=' The idea of the realization in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
158
+ page_content='3 is to replace the notions of infinitesimally close and infinitesimally closer with being exponentially close and exponentially closer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
159
+ page_content=' For p ∈ L (P), ατ acts a measure of how close the coordinates of p|τ are.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
160
+ page_content=' We can make this precise with the following definition and lemma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
161
+ page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
162
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
163
+ page_content=' For S ⊆ P and p ∈ RP, define the diameter of p relative to S by diamS(p) = max i,j∈S |pi − pj|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
164
+ page_content=' That is, diamS(p) is the diameter of {pi : i ∈ S} as a subset of R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
165
+ page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
166
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
167
+ page_content=' Let τ ⊆ P be a tube and let p ∈ L (P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
168
+ page_content=' Then diamτ(p) ≤ ατ(p) ≤ n2 4 diamτ(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
169
+ page_content=' 5 1 2 3 4 5 6 123 456 1 2 3 4 5 6 1 2 3 5 4 6 Tubing in O(P) Point in O(P) Tubing in A (P) Point in A (P) Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
170
+ page_content=' A vertex in O(P) vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
171
+ page_content=' A (P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
172
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
173
+ page_content=' By the triangle inequality and as τ is connected, diamτ(p) ≤ ατ(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
174
+ page_content=' For the other inequality, ατ(p) = � i≺·j i,j∈τ pj − pi ≤ � i≺·j i,j∈τ diamτ(p) ≤ 1 4n2 diamτ(p) The inequality in the last line comes from the fact that there are at most n2 4 covering relations in P, which follows from Mantel’s Theorem and the fact that Hasse diagrams are triangle-free.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
175
+ page_content=' □ In particular, for p ∈ L (P), if p ∈ Hτ, then {pi | i ∈ τ} is clustered tightly together compared to any tube containing τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
176
+ page_content=' If p ∈ hτ, then {pi | i ∈ τ} is spread far apart compared to any tube contained in τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
177
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
178
+ page_content=' Realizing poset associahedra We are now prepared to prove Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
179
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
180
+ page_content=' Define A (P) := � σ⊂P hσ ∩ HP where the intersection is over all tubes of P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
181
+ page_content=' Note that A (P) ⊆ L (P) as if i ≺· j is a covering relation, then for p ∈ h{i,j}, pi ≤ pj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
182
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
183
+ page_content='3 follows as a result of three lemmas: Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
184
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
185
+ page_content=' If T is a maximal tubing, then vT := � τ∈T∪{P} Hτ is a point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
186
+ page_content=' 6 Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
187
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
188
+ page_content=' If T is a collection of tubes that do not form a proper tubing, then � τ∈T Hτ ∩ A (P) = ∅.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
189
+ page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
190
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
191
+ page_content=' If T is a maximal tubing and τ /∈ T is a proper tube, then ατ(vT) > n2|τ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
192
+ page_content=' That is, vT lies in the interior of hτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
193
+ page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
194
+ page_content='1 follows from a standard induction argument.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
195
+ page_content=' Proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
196
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
197
+ page_content=' If T is not a collection of tubes that do proper tubing, then at least one of the following two cases holds: (1) There is a pair of non-nested and non-disjoint tubes τ1, τ2 in T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
198
+ page_content=' (2) There is a sequence of disjoint tubes τ1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
199
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
200
+ page_content=', τk such that τ1 ≺ · · · ≺ τk ≺ τ1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
201
+ page_content=' The idea of the proof is as follows: For S ⊆ P, define the convex hull of S as conv(σ) := {b ∈ P | ∃a, c ∈ S : a ≤ b ≤ c}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
202
+ page_content=' Observe that if p ∈ L (P), then diamS(p) ≤ diamconv(S)(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
203
+ page_content=' Take σ = conv(τ1 ∪ · · · ∪ τk).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
204
+ page_content=' One can show that σ is a tube, so Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
205
+ page_content='3 tells us that for each τi, diamτi(p) is very small compared to n2|σ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
206
+ page_content=' As the tubes either intersect or are cyclic, one can show this forces diamσ(p) to also be small, so ασ(p) < n2|σ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
207
+ page_content=' More concretely, suppose that p ∈ � Hτi ∩ L (P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
208
+ page_content=' Note that for all i, |σ| > |τi| + 1 and diamτi(p) ≤ n2(|σ|−1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
209
+ page_content=' In case (1), let a, b ∈ σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
210
+ page_content=' There exists some x ∈ τ1 ∩ τ2, so |pa − pb| ≤ |pa − px| + |px − pb| ≤ diamτ1(p) + diamτ2(p) ≤ 2n2(|σ|−1) < n2(|σ|).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
211
+ page_content=' Hence diamσ(p) < n2|σ|, so by Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
212
+ page_content='3, p /∈ hσ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
213
+ page_content=' Now we move to case (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
214
+ page_content=' Suppose there is a sequence of disjoint tubes τ1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
215
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
216
+ page_content=', τk such that for each i there exists xi, yi ∈ τi where xi ≺ yi+1 where we take the indices mod k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
217
+ page_content=' Then: pyi − diamτi(p) ≤ pxi pxi ≤ pyi+1 pyi+1 ≤ pxi+1 + diamτi+1 Furthermore, since τi and τi+1 are disjoint, |τi| ≤ |σ|−2 and diamτi ≤ n2(|σ|−2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
218
+ page_content=' Combining these we get pyi ≤ pyi+1 + 2n2(|σ|−2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
219
+ page_content=' Then we have: py1 ≤ pyi + 2in2(|σ|−2) and pyi + 2in2(|σ|−2) ≤ py1 + 2(k + 1)n2(|σ|−2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
220
+ page_content=' 7 4 5 2 1 3 6 7 8 9 τ 4 5 2 1 3 6 7 8 9 τ σ A B Maximal Tubing T and tube τ σ, A, and B labelled Figure 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
221
+ page_content=' An example illustrating the proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
222
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
223
+ page_content=' A B σ τ Figure 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
224
+ page_content=' If diamA(p) and diamB(p) are small and diamσ(p) is large, then diamτ(p) is large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
225
+ page_content=' These yield py1 − pyi ≤ 2in2(|σ|−2) and pyi − py1 ≤ 2(k − i + 1)n2(|σ|���2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
226
+ page_content=' As i, k − i + 1 ≤ k ≤ n 2, we have |py1 − pyi| ≤ n2(|σ|−1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
227
+ page_content=' Finally, if zi ∈ τi, zj ∈ τj, then |pzi − pzj| ≤ |pzi − pyi| + |pyi − py1| + |py1 − pyj| + |pyj − pzj| ≤ 4n2(|σ|−1) < n2|σ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
228
+ page_content=' Hence diamσ(p) < n2|σ|, and by Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
229
+ page_content='3, p /∈ hσ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
230
+ page_content=' □ Proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
231
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
232
+ page_content=' Let T be a maximal tubing of P and let τ /∈ T be a tube.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
233
+ page_content=' Define the convex hull of τ relative to T by convT(τ) := min{σ ∈ T | τ ⊂ σ}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
234
+ page_content=' Let σ = convT(τ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
235
+ page_content=' T partitions σ into a lower set A and an upper set B where A and B are either tubes or singletons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
236
+ page_content=' Furthermore, A and B both intersect τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
237
+ page_content=' See Figure 5 for an example illustrating this.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
238
+ page_content=' The idea of the proof is as follows: Let p = vT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
239
+ page_content=' By Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
240
+ page_content='3, diamA(p) and diamB(p) are both very small compared to diamσ(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
241
+ page_content=' Then for any a ∈ A, b ∈ B, |pa − pb| must be large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
242
+ page_content=' As τ intersects both A and B, diamτ(p) must be large and hence p ∈ hτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
243
+ page_content=' See Figure 6 for an illustration of this.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
244
+ page_content=' More precisely, we show that for any i ∈ A, j ∈ B, pj −pi > (n2)|τ|, which implies that p lies in the interior of hτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
245
+ page_content=' 8 Observe that:� x≺·y py − px = � x≺·y x,y∈A (py − px) � �� � ≤(n2)|σ|−1 < 1 8 (n2)|σ| + � x≺·y x,y∈B (py − px) � �� � ≤(n2)|σ|−1 < 1 8 (n2)|σ| + � x≺·y x∈A,y∈B (py − px).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
246
+ page_content=' Fix i ∈ A and j ∈ B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
247
+ page_content=' By Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
248
+ page_content='3, for any x ∈ A, y ∈ B, py − px ≤ pj − pi + diamA(p) + diamB(p) ≤ pj + pi + 2n2(|σ|−1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
249
+ page_content=' Again, noting that the number of covering relations in σ is at most n2 4 we obtain: � x≺·σy x∈A,y∈B (py − px) ≤ � x≺·σy x∈A,y∈B (pj − pi + 2(n2)|σ|−1) ≤ n2 4 � pj − pi + 2(n2)|σ|−1� = n2 4 (pj − pi) + 1 2(n2)|σ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
250
+ page_content=' Combining all of this we get: � x≺·σy py − px = (n2)|σ| < 1 8(n2)|σ| + 1 8(n2)|σ| + 1 2(n2)|σ| + n2 4 (pj − pi) ≤ 3 4(n2)|σ| + n2 4 (pj − pi) Then (n2)|σ|−1 < (pj − pi) and as |τ| ≤ |σ| − 1, p is in the interior of hτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
251
+ page_content=' □ Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
252
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
253
+ page_content=' A similar approach for realizing graph associahedra is taken by Devadoss [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
254
+ page_content=' One difference is that Devadoss realizes graph associahedra by cutting off slices of a simplex whereas we cut off slices of an order polytope.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
255
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
256
+ page_content=' Realizing affine poset cyclohedra The proofs in the affine case are nearly identical to the finite case with some additional technical components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
257
+ page_content=' The similarity comes from the fact that Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
258
+ page_content='3 still applies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
259
+ page_content=' We highlight where the proofs are different.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
260
+ page_content=' Let ˜P be an affine poset of order n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
261
+ page_content=' Define C ( ˜P) := � σ⊂P hσ and L ( ˜P) := {p ∈ R ˜P/C | pi ≤ pj for all i ⪯ j}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
262
+ page_content=' where the intersection is over all tubes of ˜P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
263
+ page_content=' Note that C ( ˜P) ⊆ L ( ˜P) as if i ≺· j is a covering relation, then for p ∈ h{i,j}, pi ≤ pj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
264
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
265
+ page_content='8 follows as a result of 3 lemmas: 9 Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
266
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
267
+ page_content=' If T is a maximal tubing, then vT := � τ∈T Hτ is a point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
268
+ page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
269
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
270
+ page_content=' If T is a collection of tubes that do not form a proper tubing, then � τ∈T Hτ ∩ C ( ˜P) = ∅.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
271
+ page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
272
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
273
+ page_content=' If T is a maximal tubing and τ /∈ T is a proper tube, then ατ(vT) > n2|τ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
274
+ page_content=' That is, vT lies in the interior of hτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
275
+ page_content=' Proof of Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
276
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
277
+ page_content=' Let T be a maximal tubing and take any σ ∈ T such that |τ| = n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
278
+ page_content=' Then restricting to ˜P|σ, Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
279
+ page_content='1 implies that � τ∈T τ⊆σ Hτ is a point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
280
+ page_content=' However, as T is n-periodic, � τ∈T τ⊆σ Hτ = � τ∈T Hτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
281
+ page_content=' □ Proof of Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
282
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
283
+ page_content=' By Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
284
+ page_content='7, we can assume T is n-periodic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
285
+ page_content=' The proof is almost identical to the proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
286
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
287
+ page_content=' Define L ( ˜P) := {p ∈ R ˜P/C | pi ≤ pj for all i ⪯ j}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
288
+ page_content=' and note that L ( ˜P) ⊆ R ˜P/C � i,j∈ ˜P i≺·j h{i,j}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
289
+ page_content=' Let p ∈ � Hτi ∩ L ( ˜P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
290
+ page_content=' We again break into two cases: (1) There is a pair of non-nested and non-disjoint tubes τ1, τ2 in T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
291
+ page_content=' (2) All tubes in T are pairwise nested or disjoint and there is a sequence of disjoint tubes τ1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
292
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
293
+ page_content=', τk such that τ1 ≺ · · · ≺ τk ≺ τ1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
294
+ page_content=' The only difference in the proof occurs in case (1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
295
+ page_content=' Here, it is possible that there exists x ∈ τ1 ∪τ2 such that x+n ∈ τ1 ∪τ2 as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
296
+ page_content=' In this case, the proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
297
+ page_content='2 still implies that diamτ1∪τ2(p) ≤ diamτ1(p) + diamτ2(p) ≤ 2n2n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
298
+ page_content=' However, |px+n − px| = n2(n+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
299
+ page_content=' □ Proof of Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
300
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
301
+ page_content=' Let T be a maximal tubing and τ /∈ T be a proper tube.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
302
+ page_content=' Let p = vT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
303
+ page_content=' We claim that ατ(p) > n2|τ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
304
+ page_content=' The only difference from the proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
305
+ page_content='3 is that τ may not be contained by any tube in τ so convT(τ) may not be well-defined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
306
+ page_content=' In this case, there exists A ∈ T such that 10 ˆ0 a b c ˆ1 P ε = 1 3 ε = 1 9 ε = 1 27 Figure 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
307
+ page_content=' O(P) as a limit of A (P) |A| = n, A ∩ τ ̸= ∅, and (A + n) ∩ τ ̸= ∅.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
308
+ page_content=' Here, (A + n) acts the same as B in the finite case, except the argument is much simpler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
309
+ page_content=' Let i ∈ A ∩ τ, j ∈ (A + n) ∩ τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
310
+ page_content=' Observe that diamA(p), diam(A+n)(p) ≤ n2n and that i + n ∈ (A + n).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
311
+ page_content=' Then |pj − pi| ≥ (pj − n2n) − pi ≥ pi+n − pi = n2(n+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
312
+ page_content=' Hence diamτ(p) > n2|τ| and by Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
313
+ page_content='3, ατ(p) > n2|τ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
314
+ page_content=' □ 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
315
+ page_content=' Remarks and Questions Remark 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
316
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
317
+ page_content=' Let (P, ⪯) be a bounded poset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
318
+ page_content=' In Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
319
+ page_content='1, we discuss how O(P) can be realized as the set of all p ∈ RP such that pˆ0 = 0, pˆ1 = 1, and pi ≤ pj whenever i ⪯ j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
320
+ page_content=' We can similarly realize A (P) as follows: Fix 0 < ε < 1 n2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
321
+ page_content=' For a proper tube τ ⊂ P, let h′ τ = {p ∈ RP | ατ(p) < εn−|τ|}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
322
+ page_content=' Then A (P) is realized as the intersection over all h′ τ with the hyperplanes {pˆ0 = 0} and {pˆ1 = 1}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
323
+ page_content=' Letting ε → 0, we obtain O(P) as a limit of A (P) as shown in Figure 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
324
+ page_content=' Remark 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
325
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
326
+ page_content=' The key piece to the realizations in Theorems 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
327
+ page_content='3 and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
328
+ page_content='8 is the linear form ατ, where ατ acts as an approximation of diamτ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
329
+ page_content=' In particular, let τ be a tube and let p ∈ L (P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
330
+ page_content=' Then: ατ(p) ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
331
+ page_content=' ατ(p) = 0 ⇔ p|τ is constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
332
+ page_content=' If σ ⊆ τ is a tube, then ασ(p) ≤ ατ(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
333
+ page_content=' However, there are many other options for choice of ατ that could fill this role.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
334
+ page_content=' Some other options include: 11 (1) Sum over all pairs i ≺ j in τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
335
+ page_content=' ατ(p) = � i≺j i,j∈τ pj − pi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
336
+ page_content=' (2) Let A and B be the set of minima and maxima of the restriction P|τ respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
337
+ page_content=' ατ(p) = � i≺j i∈A,j∈B pj − pi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
338
+ page_content=' (3) Fix a spanning tree T in the Hasse diagram of τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
339
+ page_content=' Let E = {(i, j) | i ≺·T j} be the set of edges in T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
340
+ page_content=' ατ(p) = � (i,j)∈E pj − pi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
341
+ page_content=' An advantage of this option is that we would have diamτ(p) ≤ ατ(p) ≤ (n − 1) diamτ(p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
342
+ page_content=' A similar realization can be obtained for each choice of of ατ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
343
+ page_content=' Question 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
344
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
345
+ page_content=' Recall that for a simple d-dimensional polytope P, the f-vector and h-vector of P are given by (f0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
346
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
347
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
348
+ page_content=' , fd) and (h0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
349
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
350
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
351
+ page_content=' , hd) where fi is the number of i-dimensional faces and d � i=0 fiti = d � i=0 hi(t + 1)i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
352
+ page_content=' Postnikov, Reiner, and Williams [12] found a statistic on maximal tubings of graph associa- hedra of chordal graphs where � T tstat(T) = � hiti.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
353
+ page_content=' In particular, they define a map T �→ wT from maximal tubings of a graph on n vertices to the set of permutations Sn such that stat(T) = des(wT), the number of descents of wT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
354
+ page_content=' It would be interesting to find a similar statistic on maximal tubings of poset associahedra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
355
+ page_content=' For a simple polytope P, one can orient the edges of P according to a generic linear form and take stat(v) = outdegree(v) [17, §8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
356
+ page_content='2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
357
+ page_content=' It may be possible to use our realization to find the desired statistic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
358
+ page_content=' Acknowledgements The author is grateful to Pavel Galashin for his many helpful comments and suggestions and to Stefan Forcey for fruitful conversations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
359
+ page_content=' References [1] Scott Axelrod and Isadore M Singer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
360
+ page_content=' “Chern-Simons perturbation theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
361
+ page_content=' II”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
362
+ page_content=' In: Jour- nal of Differential Geometry 39.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
363
+ page_content='1 (1994), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
364
+ page_content=' 173–213.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
365
+ page_content=' [2] Raoul Bott and Clifford Taubes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
366
+ page_content=' “On the self-linking of knots”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
367
+ page_content=' In: Journal of Mathe- matical Physics 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
368
+ page_content='10 (1994), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
369
+ page_content=' 5247–5287.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
370
+ page_content=' [3] Michael Carr and Satyan L Devadoss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
371
+ page_content=' “Coxeter complexes and graph-associahedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
372
+ page_content=' In: Topology and its Applications 153.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
373
+ page_content='12 (2006), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
374
+ page_content=' 2155–2168.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
375
+ page_content=' 12 [4] Satyan L Devadoss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
376
+ page_content=' “A realization of graph associahedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
377
+ page_content=' In: Discrete Mathematics 309.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
378
+ page_content='1 (2009), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
379
+ page_content=' 271–276.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
380
+ page_content=' [5] Sergey Fomin and Nathan Reading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
381
+ page_content=' “Root systems and generalized associahedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
382
+ page_content=' In: arXiv preprint math/0505518 (2005).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
383
+ page_content=' [6] Pavel Galashin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
384
+ page_content=' “Poset associahedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
385
+ page_content=' In: arXiv preprint arXiv:2110.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
386
+ page_content='07257 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
387
+ page_content=' [7] Mark Haiman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
388
+ page_content=' “Constructing the associahedron”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
389
+ page_content=' In: Unpublished manuscript, MIT (1984).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
390
+ page_content=' [8] Pascal Lambrechts, Victor Turchin, and Ismar Voli´c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
391
+ page_content=' “Associahedron, cyclohedron and permutohedron as compactifications of configuration spaces”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
392
+ page_content=' In: Bulletin of the Belgian Mathematical Society-Simon Stevin 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
393
+ page_content='2 (2010), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
394
+ page_content=' 303–332.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
395
+ page_content=' [9] Guillaume Laplante-Anfossi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
396
+ page_content=' “The diagonal of the operahedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
397
+ page_content=' In: Advances in Math- ematics 405 (2022), p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
398
+ page_content=' 108494.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
399
+ page_content=' [10] Chiara Mantovani, Arnau Padrol, and Vincent Pilaud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
400
+ page_content=' “Acyclonestohedra: when ori- ented matroids meet nestohedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
401
+ page_content=' in prep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
402
+ page_content=' [11] Kyle Petersen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
403
+ page_content=' Eulerian Numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
404
+ page_content=' Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
405
+ page_content=' 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
406
+ page_content=' isbn: 978-1-4939-3090-6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
407
+ page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
408
+ page_content='1007/ 978-1-4939-3091-3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
409
+ page_content=' [12] Alex Postnikov, Victor Reiner, and Lauren Williams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
410
+ page_content=' “Faces of Generalized Permuto- hedra”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
411
+ page_content=' In: Documenta Mathematica 13 (2008), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
412
+ page_content=' 207–273.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
413
+ page_content=' [13] Dev P Sinha.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
414
+ page_content=' “Manifold-theoretic compactifications of configuration spaces”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
415
+ page_content=' In: Selecta Mathematica 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
416
+ page_content='3 (2004), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
417
+ page_content=' 391–428.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
418
+ page_content=' [14] Richard P Stanley.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
419
+ page_content=' “Two poset polytopes”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
420
+ page_content=' In: Discrete & Computational Geometry 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
421
+ page_content='1 (1986), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
422
+ page_content=' 9–23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
423
+ page_content=' [15] Jim Stasheff.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
424
+ page_content=' “From Operads to ‘Physically’ Inspired Theories”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
425
+ page_content=' In: (Sept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
426
+ page_content=' 1996).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
427
+ page_content=' [16] Dov Tamari.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
428
+ page_content=' “Mono¨ıdes pr´eordonn´es et chaˆınes de Malcev”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
429
+ page_content=' In: Bulletin de la Soci´et´e math´ematique de France 82 (1954), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
430
+ page_content=' 53–96.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
431
+ page_content=' [17] G¨unter M Ziegler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
432
+ page_content=' Lectures on polytopes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
433
+ page_content=' Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
434
+ page_content=' 152.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
435
+ page_content=' Springer Science & Business Media, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
436
+ page_content=' Department of Mathematics, University of California, Los Angeles, CA 90095, USA Email address: andrewsack@math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
437
+ page_content='ucla.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
438
+ page_content='edu 13' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/NdFJT4oBgHgl3EQfGyyu/content/2301.11449v1.pdf'}
PtE2T4oBgHgl3EQfVgea/content/tmp_files/2301.03824v1.pdf.txt ADDED
@@ -0,0 +1,2109 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03824v1 [astro-ph.EP] 10 Jan 2023
2
+ Draft version January 11, 2023
3
+ Typeset using LATEX preprint style in AASTeX63
4
+ Photosynthetic Fluorescence from Earth-Like Planets around Sun-Like and Cool Stars
5
+ Yu Komatsu,1, 2 Yasunori Hori,1, 2 Masayuki Kuzuhara,1, 2 Makiko Kosugi,1, 2, 3
6
+ Kenji Takizawa,1, 3 Norio Narita,4, 1, 5 Masashi Omiya,1, 2 Eunchul Kim,3
7
+ Nobuhiko Kusakabe,1, 2 Victoria Meadows,6, 7 and Motohide Tamura1, 2, 8
8
+ 1Astrobiology Center, 2-21-1 Osawa, Mitaka, Tokyo 181-8588, Japan.
9
+ 2National Astronomical Observatory of Japan, 2-21-1 Osawa, Mitaka, Tokyo 181-8588, Japan.
10
+ 3National Institute for Basic Biology, 38 Nishigonaka, Myodaiji, Okazaki, Aichi 444-8585, Japan.
11
+ 4Komaba Institute for Science, The University of Tokyo, 3-8-1 Komaba, Meguro, Tokyo 153-8902, Japan.
12
+ 5Instituto de Astrof´ısica de Canarias (IAC), 38205 La Laguna, Tenerife, Spain
13
+ 6Department of Astronomy and Astrobiology Program, University of Washington, Box 351580, Seattle, Washington
14
+ 98195, USA.
15
+ 7NASA Nexus for Exoplanet System Science, Virtual Planetary Laboratory Team, Box 351580, University of
16
+ Washington, Seattle, Washington 98195, USA.
17
+ 8Department of Astronomy, Graduate School of Science, The University of Tokyo, 7-3-1, Hongo, Bunkyo-ku, Tokyo
18
+ 113-0033, Japan.
19
+ (Received August 15; Revised November 12; Accepted November 15, 2022)
20
+ Submitted to ApJ
21
+ ABSTRACT
22
+ Remote sensing of the Earth has demonstrated that photosynthesis is traceable as the
23
+ vegetation red edge (VRE), which is the steep rise in the reflection spectrum of vegeta-
24
+ tion, and as solar-induced fluorescence. This study examined the detectability of bio-
25
+ logical fluorescence from two types of photosynthetic pigments, chlorophylls (Chls) and
26
+ bacteriochlorophylls (BChls), on Earth-like planets with oxygen-rich/poor and anoxic
27
+ atmospheres around the Sun and M dwarfs. Atmospheric absorption, such as H2O, CH4,
28
+ O2, and O3, and the VRE obscure the fluorescence emissions from Chls and BChls. We
29
+ found that BChl-based fluorescence for wavelengths of 1000–1100 nm, assuming the
30
+ spectrum of BChl b-bearing purple bacteria, could provide a suitable biosignature but
31
+ only in the absence of the water cloud coverage or other strong absorbers near 1000 nm.
32
+ The Chl fluorescence is weaker for several reasons, e.g., spectral blending with the
33
+ VRE. The apparent reflectance excess is greatly increased in both Chl and BChl cases
34
+ around TRAPPIST-1 due to fluorescence and stellar absorption lines. This could be a
35
+ promising feature for detecting the fluorescence around ultracool red dwarfs by follow-
36
+ up ground-based observations with high spectral resolution; however, it requires a long
37
+ time around Sun-like stars, even for a LUVOIR-like space mission. Moreover, the simul-
38
+ taneous detection of fluorescence and VRE is key to identifying traces of photosynthesis
39
+ Corresponding author: Yu Komatsu
40
+ yu.komatsu@nao.ac.jp
41
+
42
+ 2
43
+ Komatsu et al.
44
+ because absorption, reflectance, and fluorescence are physically connected. For further
45
+ validation of fluorescence detection, the nonlinear response of biological fluorescence as
46
+ a function of light intensity could be considered.
47
+ Keywords: astrobiology, planets and satellites: atmospheres, planets and satellites: sur-
48
+ faces, planets and satellites: terrestrial planets
49
+ 1. INTRODUCTION
50
+ The ultimate goal of characterizing rocky planets is to identify potential biosignatures, spec-
51
+ tral fingerprints of atmospheric gases, and surface features produced by biological activities
52
+ (Des Marais et al. 2002; Schwieterman et al. 2018; Meadows et al. 2018). The simultaneous identifi-
53
+ cation of oxygen, ozone, and methane on rocky habitable planets shows promise as a way to detect
54
+ Earth-like life. Oxygenic photosynthesis produces a unique feature in the reflection spectrum on a
55
+ planetary surface, called the vegetation red edge (VRE), as well as biosignature gases (Kiang et al.
56
+ 2007a). The VRE is the steep difference in the reflection spectrum of the surface vegetation around
57
+ 700 nm due to chlorophyll (Chl) absorption in the visible region and the large reflectance by cell
58
+ structures in the near-infrared (NIR) region (Gates et al. 1965; Jacquemoud & Baret 1990). Remote
59
+ sensing of the Earth and Earthshine observations provide spectral indices involved in the VRE, such
60
+ as the NDVI, which is a normalized difference in the reflection spectrum of the Earth between the
61
+ visible and NIR wavelength regions. The Moderate Resolution Imaging Spectroradiometer (MODIS)
62
+ onboard NASA’s Terra satellite at 16-day intervals at 500 m and 1 km resolutions shows that the
63
+ NDVI varies from
64
+ 0.05 to nearly 0.9, whose upper limit is obtained at a dense forest site during
65
+ the peak growing season (Huete et al. 2002). Whereas remote sensing observes local areas on Earth,
66
+ Earthshine observations provide disk-averaged spectra of the Earth, leading to fruitful insights into
67
+ exoplanet applications. The apparent reflectance change in the Earth’s disk-averaged spectrum due
68
+ to surface vegetation is less than 2% (Monta˜n´es-Rodr´ıguez et al. 2006). The NDVI calculated from
69
+ the Earthshine observations varies up to ∼0.10, depending on different views of the Earth, and is
70
+ reduced by cloud coverage (Tinetti et al. 2006). The application of NDVI to disk-averaged spectra
71
+ assuming Earth-like exoplanets requires caution because remote sensing observes only local areas on
72
+ the Earth to map vegetation. For instance, Livengood et al. (2011) found that additional spectral
73
+ bands to NDVI are required to distinguish between the Earth vegetation and the Moon surface.
74
+ The VRE signals from exoplanets around stars other than a Sun-like star are challenging to predict
75
+ due to the complexity of photosynthetic mechanisms in different light environments. However, the
76
+ VRE on exoplanets may still be recognizable as an anomalous time-varying due to seasonal variability
77
+ of the vegetation, and step-function-like spectroscopic feature at wavelengths different from those on
78
+ the Earth (Seager et al. 2005). Tinetti et al. (2006) proposed that if a three-photon photosynthetic
79
+ scheme were working on exoplanets around M dwarfs, where there was little or no visible light, then
80
+ the red edge of vegetation could also be shifted into the NIR. However, according to Takizawa et al.
81
+ (2017), even around M dwarfs, the evolution of photosynthesis in water may drive a preference for
82
+ using visible light rather than NIR, even after organisms colonize land surfaces. Moreover, the light
83
+ absorption properties of land vegetation could be optimized after long-term adaptive evolution de-
84
+ pending on stellar irradiations as estimated by Lehmer et al. (2021). Anoxygenic photosynthesis as
85
+ performed by organisms such as purple bacteria, is thought to precede the emergence of oxygenic
86
+
87
+ Photosynthetic fluorescence on Exoplanets
88
+ 3
89
+ photosynthesis, whose global effect was characterized by the great oxidation event (∼2.3 billion years
90
+ ago (Ga)). Sanrom´a et al. (2013) discussed the detectability of light reflected from purple bacteria
91
+ with bacteriochlorophyll (BChl) as a photosynthetic pigment. They showed that purple bacteria
92
+ exhibit detectable features, and their VRE peak is redder than higher plants, assuming an Earth-
93
+ like planet before the rise of oxygen.
94
+ In a comprehensive study of different pigment reflectivity,
95
+ Schwieterman et al. (2015) showed that both nonphotosynthetic pigments and photosynthetic pig-
96
+ ments affect the disk-averaged spectra. Furthermore, as for false positive detection, the reflectance
97
+ features of some minerals on the Earth are similar to the VRE ones (Seager et al. 2005; Schwieterman
98
+ 2018). Thus, extracting the VRE signal from reflected light should require knowledge of the surface
99
+ environment on an exoplanet and high-resolution spectroscopic observations.
100
+ Fluorescence is another photosynthesis-related phenomenon that could also be a remote-sensing
101
+ biosignature. Fluorescence is one of the de-excitation processes of photosynthetic pigments from the
102
+ excited states to the ground state, along with intersystem crossing and inner conversion. Photosyn-
103
+ thetic organisms on the Earth use Chls or BChls as light-absorbing pigments and electron donors/ac-
104
+ ceptors in the primary reactions of photosynthesis. The photon energy captured by Chls/BChls is
105
+ mainly transferred to the reaction center (RC), which is the pigment-protein complex at the center of
106
+ the photosystem used for photochemical reactions. A part of photon energy is, however, dissipated
107
+ as heat or emitted as fluorescence from light-harvesting antenna systems, which are pigment-protein
108
+ complexes surrounding RC that capture light energy and deliver the energy to the RC. Excess photon
109
+ energy is preferentially removed as heat dissipation, rather than fluorescence. As a result, fluores-
110
+ cence yield tends to be a smaller percentage of the excess energy and fluctuates with the degree
111
+ of the excitation energy transfer (EET) between Chls, and heat dissipation. The fluorescence yield
112
+ of photosynthetic organisms is estimated to be ∼5%, whereas that of free Chls/BChls in organic
113
+ solvents is ∼ 30% (Grimm et al. 2006).
114
+ Plants and other oxygenic phototrophs use two different photosystems in sequence, that is, pho-
115
+ tosystem II (PSII) and photosystem I (PSI). The energy level of the RC of PSII is higher, being
116
+ equivalent to 680 nm, than that of PSI. In general, Chl fluorescence is mainly emitted from PSII
117
+ because the excess light energy in PSI is immediately dissipated as heat. Therefore, the fluorescence
118
+ spectrum of a cell has a peak at 680 nm, and the distribution of fluorescence emission extends to
119
+ wavelengths up to 780 nm. Note that fluorescence emissions at 680 nm under highly concentrated
120
+ Chls conditions, such as a leaf structure, decrease due to reabsorption by peripheral Chls with a
121
+ red-absorption band. Conversely, the six BChls (BChl a, b, c, d, e, and g) used in non-oxygenic
122
+ photosynthetic bacteria, such as purple bacteria, green sulfur and nonsulfur bacteria and heliobac-
123
+ teria (Kiang et al. 2007b), mainly absorb far-red light in vivo. The BChl b in purple bacteria has
124
+ the longest wavelength absorbance (1010 nm) and fluorescence (1050 nm) emissions. However, the
125
+ detailed characteristics of fluorescence from BChls, such as fluorescence yield and its variation in
126
+ light environments, remain poorly understood.
127
+ In contrast to the VRE which tracks the vegetation mass in the remote sensing of the Earth, fluo-
128
+ rescence can be used as an indicator of active photosynthesis. The fluorescence signal emitted from
129
+ the global ground vegetation, which is called solar-induced fluorescence (SIF), can be detected by
130
+ remote sensing from satellites as excess light seen in the absorption of Fraunhofer lines in sunlight
131
+ reflected from the Earth, which is the apparent increase in the reflectance spectrum due to fluores-
132
+ cence (Maier et al. 2004). The observation of SIF is fundamentally challenging because the small SIF
133
+
134
+ 4
135
+ Komatsu et al.
136
+ signal is overwhelmed by large background signals in the reflected sunlight. Then, high-resolution
137
+ spectroscopy utilizes specific wavelengths with large solar absorption, which means the low intensity
138
+ of reflected light. The SIF is observed as the in-filling effect at these wavelengths. This methodology
139
+ works because a large contrast is ensured between the Sun and the reflected light from the Earth at
140
+ specific wavelengths. Thus, SIF has been observed in absorption bands by the Fourier high-dispersion
141
+ spectrometers onboard many environmental satellites (e.g., GOSAT (Hamazaki et al. 2005; Lee et al.
142
+ 2013), GOME-2 (Callies et al. 2000), and GOSAT-2 (Nakajima et al. 2012)), which produce the time-
143
+ series SIF map of Earth (Frankenberg et al. 2014; Sun et al. 2018). We can extract information on
144
+ the ground vegetation and atmospheric/surface environment, especially the gross primary production
145
+ (GPP), from the changes in the fluorescence map by calibrating the remote observations with the
146
+ results of local ground observations (Sun et al. 2018). Such as the SIF in Earth observations, the
147
+ detection of photosynthetic fluorescence in a planet around stars will investigate the surface envi-
148
+ ronment and vegetation conditions on exoplanets. High-resolution spectroscopy would be inevitable
149
+ for the exofluorescence detection, and the contrast between a planet and its host star should be high
150
+ enough at specific wavelengths. Biofluorescence, similar to that shown by coral reefs on Earth, has
151
+ been suggested as a new potential biosignature for exoplanets experiencing strong UV radiation from
152
+ F stars (O’Malley-James & Kaltenegger 2018) and M stars (O’Malley-James & Kaltenegger 2019).
153
+ It might work if the fluorescence were emitted very efficiently according to gained photons in their
154
+ habitats. As mentioned above, photosynthetic pigments are a potential emitter of biofluorescence.
155
+ However, the yield and detectability of photosynthetic fluorescence on the surface of exoplanets have
156
+ not yet been examined.
157
+ Finding surface biosignatures on Earth-like exoplanets, including the potential detectability of
158
+ biofluorescence, would be one of the important goals of future astronomy and may become possible
159
+ with future space missions such as the Large UV/Optical/IR Surveyor (LUVOIR) or the Habit-
160
+ able Exoplanet Observatory (HabEx), and next-generation extremely large ground-based telescopes
161
+ (TMT, ELT, and GMT) observing in reflected light. Thus, it is important to quantitatively evaluate
162
+ the detectability of any potential surface biosignature using expected specifications of specific future
163
+ missions.
164
+ This study made the first attempt to investigate the detectability of photosynthetic fluorescence on
165
+ Earth-like exoplanets. The remainder of this paper is structured as follows: Section 2 describes the
166
+ surface vegetation model for an Earth-like planet in the habitable zone and fluorescence emissions
167
+ based on the photoresponse of photosynthetic organisms. Section 3 shows the expected fluorescence
168
+ emissions in the reflected light spectra on an Earth-like planet around an M dwarf or the Sun. In Sec-
169
+ tion 4, we discuss the physiological conditions of photosynthesis that enhance fluorescence emissions
170
+ and its unique features for future detection, including false-positive signals and seasonal changes.
171
+ Additionally, we present the detectability of biofluorescence by a future space-based telescope assum-
172
+ ing the LUVOIR telescope parameters, and the key spectral feature possibly useful for the detection
173
+ by follow-up observations with high-dispersion spectroscopy. In the last section, we summarize our
174
+ paper.
175
+ 2. MATERIALS AND METHODS
176
+ We assume that the radiation from a planetary surface is the sum of the reflected light on the
177
+ surface and the fluorescence emission from photosynthesis. The outgoing flux on the surface and at
178
+
179
+ Photosynthetic fluorescence on Exoplanets
180
+ 5
181
+ Figure 1.
182
+ (a) Incident radiation and (b) photon flux density at the top of atmosphere (TOA) of an
183
+ Earth-like planet around the Sun, GJ667C, and TRAPPIST-1. The spectral data of the Sun, GJ667C, and
184
+ TRAPPIST-1 were obtained from Meftah et al. (2018), France et al. (2016), and Lincowski et al. (2018),
185
+ respectively.
186
+ the top of atmosphere (TOA) is given by:
187
+ F ↑
188
+ surface(λ)=F ↓
189
+ surface(λ)R(λ) + Ffluor.(λ),
190
+ (1)
191
+ F ↑
192
+ TOA(λ)=F ↑
193
+ surface(λ)T(λ),
194
+ (2)
195
+ where λ is the wavelength, T(λ) is the atmospheric transmittance (see Section 2.1), R(λ) is the
196
+ surface reflectance of a planet (see Section 2.3), F ↑
197
+ surface(λ) is the upward flux from a planetary
198
+ surface, F ↑
199
+ TOA(λ) is the reflected flux at the TOA, and Ffluor.(λ) is the net fluorescence emission from
200
+ photosynthesis. F ↓
201
+ surface(λ) = F ↓
202
+ TOA(λ)T(λ) is the downward flux from the planetary atmosphere to
203
+ the surface, where F ↓
204
+ TOA is the incident flux from a host star at the TOA (see Figure 1 and Section
205
+ 2.1 below).
206
+ We neglect the effects of thermal emission in all the cases and Rayleigh scattering
207
+ in most cases, as both processes contribute little radiation to our spectral region of interest (600-
208
+ 1000 nm). The transmittance T(λ) in the atmosphere of an Earth-like planet through geological
209
+ evolution was obtained from Rugheimer & Kaltenegger (2018), which was calculated by a 1D coupled
210
+ radiative/convective-photochemical model for a planetary atmosphere (see also Pavlov & Kasting
211
+ 2002; Kasting & Ackerman 1986; Segura et al. 2005).
212
+ 2.1. Stellar Radiation
213
+ Two nearby M dwarfs, GJ667 C and TRAPPIST-1, have candidate planets in a habitable zone (HZ).
214
+ We considered fluorescence emissions from photosynthesis on an Earth-like planet in an HZ around
215
+ GJ667 C, TRAPPIST-1, and the Sun. We extracted the incident stellar flux from high-resolution
216
+ spectral data for the Sun (Meftah et al. 2018), GJ667 C (France et al. 2016), and TRAPPIST-1
217
+ (Lincowski et al. 2018). The incident flux F ↓
218
+ TOA received by an Earth-like planet around GJ667 C,
219
+ and TRAPPIST-1 is scaled by the current location of GJ667C c, and TRAPPIST-1e. GJ667 C, and
220
+ TRAPPIST-1 are modeled as M1V and M8V stars. Figure 1 shows the incident flux received by an
221
+ Earth-like planet at the TOA around the Sun, GJ667 C, and TRAPPIST-1.
222
+ 2.2. Fluorescence from Photosynthesis
223
+
224
+ le3
225
+ tons/s/m2/μm)
226
+ lel
227
+ Sun
228
+ (un/zw/m)
229
+ 2.0
230
+ GJ667C
231
+ TRAPPIST-1
232
+ 0.8
233
+ 1.5
234
+ (mmol-pho
235
+ 0.6
236
+ Density
237
+ 1.0
238
+ 0.4
239
+ Flux
240
+ 0.5
241
+ Photon Flux
242
+ 0.2
243
+ 0.0
244
+ 0.0
245
+ 0
246
+ 250
247
+ 500
248
+ 750
249
+ 10001250
250
+ 15001750
251
+ 2000
252
+ 0
253
+ 250
254
+ 500
255
+ 750
256
+ 10001250150017502000
257
+ Wavelength(nm)
258
+ Wavelength[nm]6
259
+ Komatsu et al.
260
+ Fluorescence emissions from a planetary surface F
261
+
262
+ fluor. are expressed as:
263
+ F
264
+
265
+ fluor.(λ) = scvπF std
266
+ fluor. × f(λ),
267
+ (3)
268
+ where cv is the surface coverage of vegetation (see Section 2.3), s is the scaling factor from the stan-
269
+ dard observed fluorescence emission reflecting the photosynthetic activity, and F std
270
+ fluor. is the standard
271
+ fluorescence intensity from vegetation based on field measurements. The spectral shape of fluores-
272
+ cence emissions from a photosynthetic organism at wavelength λ is defined by f(λ). In this study,
273
+ F std
274
+ fluor. = 1.0 (W m−2 µm−1 sr−1) (Du et al. 2019; Yao et al. 2021) and s = 0, 1, 5, and 10. The net
275
+ fluorescence intensity Ffluor. is calculated by considering acquired photons at the habitat using F
276
+
277
+ fluor.
278
+ in Equation (3) as:
279
+ Ffluor.(λ) = χ
280
+ χ0
281
+ F
282
+
283
+ fluor.(λ),
284
+ (4)
285
+ χ ≡
286
+
287
+ n(λ)σ(λ)dλ,
288
+ (5)
289
+ χ0 ≡
290
+
291
+ nsun,ref.(λ)σchls(λ)dλ,
292
+ (6)
293
+ where χ is the light absorption efficiency, n(λ) is the photon flux density at the planetary surface, and
294
+ σ(λ) is the absorption coefficient of a photosynthetic pigment. χ0 represents the standard absorption
295
+ efficiency on Earth. The subscript chls on σ(λ) represents chlorophylls (see Chl:abs in Figure 2).
296
+ nsun,ref.(λ) is the photon flux density on the surface of the Earth from the reference solar spectral
297
+ irradiance at an air mass of 1.5 (National Renewable Energy Laboratory), which corresponds to a
298
+ typical irradiance for Earth vegetation.
299
+ We considered an incident flux from a star under two sky conditions, a clear sky and 60% cloud
300
+ cover, to estimate the reflectance at the TOA and χ on the ground, in accordance with the setup
301
+ for the simulation. We assumed the clear sky condition, if not specified, and the cloud condition
302
+ appeared only in Section 4.3.1 (Figure 12). In the cloudy condition, 60% of the radiation is reflected
303
+ in three kinds of clouds, and 40% of the radiation reaches the ground. For the clouds, we assumed that
304
+ 40% are low water clouds, 40% are high water clouds, and 20% are high ice clouds (Gao & Kaufman
305
+ 2003) at 1, 6, and 12 km altitude, respectively. To model Earth-like conditions, the effect of Rayleigh
306
+ scattering in a planetary atmosphere was also considered in the cloudy condition using a previously
307
+ described empirical approach by Bucholtz (1995) (see Appendix A for more details).
308
+ Equation (4) indicates that F
309
+
310
+ fluor. is linearly scaled to the number of incoming photons that are
311
+ absorbed by chlorophylls at the planetary surface.
312
+ In other words, chlorophylls can emit strong
313
+ fluorescence if the spectral shapes of n(λ) and σ(λ) match well.
314
+ Note that n(λ) is exactly the
315
+ same as F ↓
316
+ surface(λ), and its unit is shown in Figure 1(b) (F ↓
317
+ TOA in the figure). This treatment in
318
+ Equations (3) and (4) can be applied to the relationship between the incoming photons and the
319
+ photons emitted as fluorescence on an Earth-like planet around various stars other than the Sun.
320
+ Figure 2 shows the normalized spectra of fluorescence f(λ) and absorption coefficient σ(λ) for Chls
321
+ and BChls. The peak wavelength of f(λ) is red-shifted from that of σ(λ), which is called the Stokes
322
+ shift (Lakowicz 2006). There are two absorption bands in the σ(λ) of chlorophylls: the B band
323
+ (known as the Soret band) in the short-wavelength region and the Q band in the long-wavelength
324
+ region. The primary fluorescence emission is derived from the Q absorption band. In this study,
325
+
326
+ Photosynthetic fluorescence on Exoplanets
327
+ 7
328
+ Figure 2. Fluorescence (f(λ): solid curves) and photoabsorption (σ(λ): dashed curves) spectra for chloro-
329
+ phylls (Chl: black) and bacteriochlorophylls (BChl: red). The absorption coefficient of chlorophylls in units
330
+ of cm2 µg−1 was obtained from Feret et al. (2008). The fluorescence spectrum is expressed by the Gaussian
331
+ functions given in Frankenberg et al. (2012) and Guanter et al. (2010). For bacteriochlorophylls, f(λ) and
332
+ σ(λ) adopt those of the LH1–RC complex of a bacteriochlorophyll b containing purple photosynthetic bac-
333
+ teria (Magdaong et al. 2016). The nondimensional absorption spectrum for BChl is normalized at the peak
334
+ value in the longest absorption band, the Q band, of the Chl. Two fluorescence spectra are normalized at
335
+ their peak values.
336
+ we modeled f(λ) for Chls as the superposition of two Gaussian distributions (Frankenberg et al.
337
+ 2012; Guanter et al. 2010) with means of 680 nm (PSII) and 740 nm (PSI and PSII). σ(λ) for Chl
338
+ uses the model vegetation with chlorophylls (σchls(λ)) (Feret et al. 2008). We obtained f(λ) and
339
+ σ(λ) for BChls from the spectral data for the LH1–RC complex, the supramolecular complex of
340
+ the light-harvesting core antenna (LH1), and the RC in a bacteriochlorophyll b containing purple
341
+ photosynthetic bacteria (see Figure 3 in Magdaong et al. 2016)). Note that we used only σ(λ) in
342
+ the Q band for calculating χ and χ0 because free Chls and BChl–protein complexes in each solution
343
+ affect each spectrum in the B band to different degrees.
344
+ 2.3. Surface Vegetation
345
+ To determine the detectability of vegetation fluorescence, we use two leaf models for our exper-
346
+ iments: one which assumes the reflectance spectrum and fluorescence of standard chlorophyll and
347
+ another that uses a scaled version of the spectrum of bacteriochlorophyll. The reflectance of a planet
348
+ is expressed as R(λ) = �
349
+ i ciri(λ), where i denotes the surface type, ci is the fraction of the surface
350
+ coverage of type i, and ri the reflectance of type i. We obtained the reflection spectra for various
351
+ surface types including vegetation, ocean, and coast from the USGS Digital Spectral Library and
352
+ the ASTER Spectral Library (Baldridge et al. 2009). The detailed compositions used in this paper
353
+ are summarized in Table 1. The reflectance of the surface vegetation rv is estimated from radiation
354
+ transfer calculations for a modeled leaf (Jacquemoud & Baret 1990; Feret et al. 2008), using σ(λ)
355
+ over all the wavelengths shown in Figure 2. Figure 3 shows the reflectance of a Chl-based leaf (“stan-
356
+
357
+ Absorption coefficient (cm2/μg)
358
+ Normalized fluorescence
359
+ 0.16
360
+ 1.0
361
+ 0.14
362
+ 0.8
363
+ 0.12
364
+ 0.10
365
+ 0.6
366
+ 0.08
367
+ 0.4
368
+ 0.06
369
+ 0.04
370
+ 0.2
371
+ 0.02
372
+ 0.00
373
+ 0.0
374
+ 400
375
+ 600
376
+ 800
377
+ 1000
378
+ 1200
379
+ Wavelength (nm)
380
+ Chl: abs
381
+ Chl: fl
382
+ BChl: abs
383
+ BChl: fl8
384
+ Komatsu et al.
385
+ Figure 3. The reflectance of vegetation estimated from radiation transfer calculations for two leaf models:
386
+ Chl (“standard”) and BChl (“hypothetical”)
387
+ (Jacquemoud & Baret 1990; Feret et al. 2008).
388
+ The light
389
+ absorption spectrum for Chls and BChls uses σ(λ) in Figure 2.
390
+ dard”) and a BChl-based leaf (“hypothetical”). In the latter case, we assumed the vegetation on a
391
+ different planet has a photosynthetic pigment whose optical property is the same as BChl exhibiting
392
+ the VRE in the longer wavelength region as shown in Figure 3. As the input to the radiative transfer
393
+ calculations, we used the absorption spectra of Chl (Feret et al. 2008) and BChl (Magdaong et al.
394
+ 2016). The unitless absorption spectrum for BChl is normalized at the peak in that for Chl, unlike
395
+ the calculations of χ and χ0 in Section 2.2. As shown in Figure 3, both Chl- and BChl-based leaves
396
+ show a large reflectance (i.e., the VRE) in the wavelength ranges around 700–750 and 1000–1100 nm.
397
+ The green bump around 500 nm is observed in the reflectance for Chl, and larger and broader bumps
398
+ are observed from ∼500 to 950 nm for BChls by the larger difference in the wavelength between the
399
+ B and Q bands than observed for Chl. Like many kinds of photosynthetic organisms, the organisms
400
+ with BChl could have acquired accessory pigments such as carotenoids (Cars) that absorb photons
401
+ with wavelengths between the B and Q bands of Chl (Cogdell 1978). The effective light absorption by
402
+ accessory pigments can suppress the increase in reflectance. With or without accessory pigments, the
403
+ bump for BChl does not affect fluorescence emissions in the wavelength (see Figures 7, 8, and 10).
404
+ The low reflectance from ∼500 to 700 nm (1000 nm), due to the light absorption by Chls (BChls),
405
+ affects the reflectance of the planet. The degree of reduction in the overall planetary reflectance
406
+ varies depending on the surface coverage by vegetation.
407
+ 3. RESULTS
408
+ We considered three fluorescence cases on an Earth-like planet at different stages of atmospheric
409
+ evolution around the Sun, GJ667 C, and TRAPPIST-1 for different surface biosignatures: Earth-like
410
+ (Chl) vegetation, hypothetical BChl-based vegetation, and biological fluorescence without any surface
411
+ vegetation. Our models for the surface compositions, vegetation, fluorescence types, and atmospheric
412
+ compositions, i.e., transmittance, are summarized in Table 1. Mod-earth corresponds to the surface
413
+ condition for the Modern Earth, leading to a lesser contribution of fluorescence emissions than in the
414
+ other two cases. The veg-only models are considered optimistic conditions for fluorescence emissions
415
+ where vegetation covers the whole planetary surface. The veg-land models, with 70 % ocean, 2%
416
+ coast, and 28% land covered with the vegetation, lie between the mod-earth and veg-only models. As
417
+ mentioned in Section 2, we considered two leaf models for land vegetation: Chl-based vegetation and
418
+
419
+ 0.5
420
+ Reflectance
421
+ 0.4
422
+ 0.3
423
+ 0.2
424
+ Chl
425
+ 0.1
426
+ BChl
427
+ 500
428
+ 1000
429
+ 1500
430
+ 2000
431
+ Wavelength (nm)Photosynthetic fluorescence on Exoplanets
432
+ 9
433
+ BChl-based vegetation. For the atmospheric compositions of an Earth-like planet, we adopted the
434
+ Modern Earth model at 0.0 Ga (oxygen-rich atmosphere), the Paleoproterozoic Earth model at 2.0 Ga
435
+ (oxygen-poor atmosphere), and the Archean Earth model at 3.9 Ga (anoxic atmosphere) (see Table 1
436
+ in Rugheimer & Kaltenegger 2018). As an extreme case, we assumed the presence of photosynthetic
437
+ bacteria with BChl spread over the land and ocean on an Archean-Earth-like planet with no surface
438
+ vegetation. We assumed a clear sky for all atmospheric conditions in Section 3.
439
+ Model name
440
+ Surface compositions
441
+ Surface vegetation
442
+ Fluorescence type
443
+ T(λ)
444
+ cv
445
+ veg-only 0C
446
+ Chl surf.
447
+ Chl fluor.
448
+ 0.0 Ga
449
+ veg-only 2C
450
+ 100% vegetation
451
+ 2.0 Ga
452
+ 1.00
453
+ veg-only 0B
454
+ BChl surf.
455
+ BChl fluor.
456
+ 0.0 Ga
457
+ veg-only 2B
458
+ 2.0 Ga
459
+ veg-land 0C
460
+ Chl surf.
461
+ Chl fluor.
462
+ 0.0 Ga
463
+ veg-land 2C
464
+ 70% ocean, 2% coast
465
+ 2.0 Ga
466
+ 0.28
467
+ veg-land 0B
468
+ and 28% vegetation
469
+ BChl surf.
470
+ BChl fluor.
471
+ 0.0 Ga
472
+ veg-land 2B
473
+ 2.0 Ga
474
+ mod-earth 0C
475
+ Chl surf.
476
+ Chl fluor.
477
+ 0.0 Ga
478
+ mod-earth 2C
479
+ 70% ocean, 2% coast
480
+ 2.0 Ga
481
+ 0.168
482
+ mod-earth 0B
483
+ and 28 % mixed land
484
+ BChl surf.
485
+ BChl fluor.
486
+ 0.0 Ga
487
+ mod-earth 2B
488
+ (incl. 16.8% vegetation)
489
+ 2.0 Ga
490
+ anoxic B
491
+ 70% ocean, 2% coast and
492
+ -
493
+ BChl fluor.
494
+ 3.9 Ga
495
+ 0.72
496
+ 28% mixed land at 3.9 Ga
497
+ Table 1. Surface composition, vegetation, its fluorescence types, and atmospheric transmittance (T(λ))
498
+ for all the cases in this paper. Mixed land is composed of 60% vegetation (16.8% in total), 15% snow, 9%
499
+ granite, 9% basalt, and 7% sand (Baldridge et al. 2009); mixed land at 3.9 Ga means the land model of the
500
+ Archean Earth at 3.9 Ga, which is composed of 35% basalt, 40% granite, 15% snow, and 10% sand. Chl
501
+ surf. and BChl surf. correspond to reflection spectra of Chl and BChl in Figure 3, respectively. The spectral
502
+ shapes of fluorescence emissions f(λ) for Chl fluor. and BChl fluor. correspond to the fluorescence spectra
503
+ of Chl and BChl in Figure 2, respectively; their intensities Fflour. are scaled in Equations (3) and (4). cv is
504
+ given by the relationship between the surface coverage of vegetation and the fluorescence emission. s={0,
505
+ 1.0, 5.0, 10.0}. We obtained T(λ) at 0.0, 2.0, and 3.9 Ga from Rugheimer & Kaltenegger (2018).
506
+ 3.1. Case-1: Planets with Earth-Like Vegetation
507
+ In case-1, Earth-like vegetation (Chl) emits fluorescence on the surface of an Earth-like planet. The
508
+ fluorescence emissions from chlorophyll are visible at the wavelengths from 650 to 800 nm, as shown
509
+ in Figure 2. To determine the contribution of fluorescence from planets, the reflectance is defined
510
+ as F ↑
511
+ TOA(λ)/F ↓
512
+ TOA(λ) and calculated. Figures 4 and 5 show the reflectance of an Earth-like planet
513
+ with the Modern Earth’s atmosphere (0.0 Ga) and an oxygen-poor atmosphere (2.0 Ga), respectively.
514
+ The O2, O3, CH4, and H2O absorption features in the atmosphere are imprinted in the reflectivity
515
+ in the visible–NIR wavelengths from 600–800 nm. The oxygen-poor-atmosphere models show less
516
+ conspicuous patterns in the reflectance profile in the 700 to 750 nm wavelength region. The reflec-
517
+ tivity between 600 and 700 nm is nearly constant but increases with decreasing surface coverage of
518
+
519
+ 10
520
+ Komatsu et al.
521
+ vegetation. The VRE is observed as the steep rise in the reflectance from 700 to 750 nm (also see
522
+ Figure 3), whereas the reflectance excess due to fluorescence is quite small, even in optimistic condi-
523
+ tions (veg-only models). Note that the red curve with 1Ffluor. around the Sun in the mod-earth model
524
+ (Figure 4), corresponding to the modern earth fluorescence, is hardly seen. Around TRAPPIST-1,
525
+ however, sharp increase in the reflectance around 770 nm is due to the strong absorption of potassium
526
+ in the stellar atmosphere. As a result, we observed similar features in the light reflected from an
527
+ Earth-like planet with different atmospheric compositions around TRAPPIST-1 (see Section 4.3.2
528
+ for further discussion).
529
+ Figure 6 shows the reflectance excess due to fluorescence emissions on an Earth-like planet with
530
+ the Modern Earth’s atmosphere. Atmospheric absorptions, such as H2O, O2, and O3, weaken the
531
+ Gaussian features in the fluorescence emissions from an Earth-like planet around the Sun.
532
+ The
533
+ fluorescence from chlorophylls around 740 nm is less pronounced for a planet around M dwarfs than
534
+ one around the Sun because of weaker radiation flux in the wavelength region of 700–750 nm (see
535
+ Figure 1). In addition, a sudden increase in reflectance due to the VRE obscures the fluorescence
536
+ emission around 740 nm (see Figures 4 and 5). As a result, the Chl fluorescence around 680 nm
537
+ emitted from PSII on an Earth-like planet would be the most promising feature for detection (see
538
+ Figure 2). Note that nonphotochemical quenching processes can decrease the fluorescence intensity
539
+ around 680 nm, and the fluorescence emission is further reduced by the reabsorption of photons within
540
+ the canopy (Porcar-Castell et al. 2021).
541
+ 3.2. Case-2: Planets with Bacteriochlorophylls-Based Vegetation
542
+ In case-2, BChl-based vegetation, as the major photosynthetic pigment, covers the surface of a
543
+ planet. The BChls are assumed to emit the same degree of fluorescence intensity as the Earth’s
544
+ vegetation. As shown in Figure 2, fluorescence from BChls occurs in the wavelength range from 1000
545
+ to 1100 nm. In contrast to case-1, fluorescence emissions with 5 and 10Ffluor. show strong features
546
+ around 1050 nm in almost all conditions in Figures 7 and 8. Identifying the fluorescence on the Earth’s
547
+ vegetation level (≲ Ffluor.) is still challenging even in the optimistic case, that is, (a) veg-only 0B.
548
+ The reflectivity between 1000 and 1050 nm becomes slightly higher for mod-earth models with less
549
+ surface vegetation coverage. As shown in Figure 9, the BChl organisms efficiently absorb photons and
550
+ emit fluorescence with less absorption and scattering in the planetary atmosphere. The fluorescence
551
+ emissions from BChls that we assumed are invulnerable to blending with the steep increase in the
552
+ reflectance by the VRE. As a result, we found a more significant fluorescence contribution to the
553
+ reflected light in case-2.
554
+ Atmospheric properties, such as chemical compositions and cloud coverage, change the fluorescence
555
+ profile. The water absorption is weak for wavelengths from 1000 to 1100 nm. If the major absorption
556
+ bands of a photosynthetic pigment lie in wavelengths longer or shorter than 1000–1100 nm, the pres-
557
+ ence of water vapor in the atmosphere complicates the detection of fluorescence emissions. A strong
558
+ absorption due to CH4 in an oxygen-poor atmosphere also hides fluorescence near 1000 nm (see the
559
+ GJ667C models in Figure 8). The BChl organisms bearing BChl b and their Stokes shift are ideal for
560
+ detecting fluorescence in wavelengths longer than the characteristic wavelength of fluorescence from
561
+ Chls. Thus, fluorescence in the wavelength range of 1000 -1100 nm could be a suitable biosignature
562
+ for photosynthetic organisms, such as bacteriochlorophylls, on planetary surfaces unless they coexist
563
+ with strong absorbers near 1000 nm.
564
+
565
+ Photosynthetic fluorescence on Exoplanets
566
+ 11
567
+ Figure 4. Reflectance of an Earth-like planet with the Modern Earth’s atmosphere (0.0Ga) around the
568
+ Sun, GJ667C, and TRAPPIST-1. The three colors represent the reflected light from a planet with Ffluor.
569
+ (s = 1: red), 5Ffluor. (s = 5: blue), and 10Ffluor. (s = 10: green), where Ffluor. is the fluorescence emission
570
+ from chlorophylls observed on the Earth. No-fluorescence emission models are also indicated by gray lines.
571
+ We assumed Earth-like vegetation (chlorophylls) covers the planetary surface (see Table 1 for model details).
572
+ The reflectance is defined here as F ↑
573
+ TOA(λ)/F ↓
574
+ TOA(λ), where F ↑
575
+ TOA(λ) is the light reflected from the ground
576
+ at the top of atmosphere (TOA), and F ↓
577
+ TOA(λ) is the flux at TOA induced by stars. For each case around
578
+ TRAPPIST-1, the reflectance with a logarithmic scale is also shown as the inset plot.
579
+ The VRE with a sharp rise in the reflectance is observed in the wavelength range from 1050 to
580
+ 1100 nm in case-2, as shown in Figure 3. Reflectance excess due to BChl fluorescence is 0.01–0.05
581
+ for the Modern Earth atmosphere models (see Figure 9), whereas that due to the VRE is 0.4–0.5
582
+ (0.1–0.15) for veg-only models (veg-land and mod-earth models). Bacteriochrolophylls’ fluorescence
583
+ causes a slight increase in reflectance around 1000 -1100 nm compared to the VRE. Such nonprominent
584
+ fluorescence emission with a Gaussian shape in the wavelength different from the VRE feature can
585
+ be extracted from the reflectance profile using data processing such as principal component analysis
586
+ (PCA). Photosynthetic organisms different from those around the Sun are expected to exhibit VRE
587
+ and fluorescence features in different wavelengths. Thus, not only spectral features due to atmospheric
588
+ molecules but also the simultaneous detection of the VRE and the fluorescence will help identify
589
+ traces of photosynthesis on an exoplanet. Probably, when we found a possible signal of VRE, the
590
+ fluorescence would be useful for further validation, because the VRE signal is stronger than the
591
+ fluorescence one.
592
+ 3.3. Case-3: Anoxic World (without VRE)
593
+
594
+ (a) veg-only 0C
595
+ (b) veg-land oC
596
+ (c) mod-earth 0C
597
+ 0.8
598
+ 0.25
599
+ 0.25
600
+ 10 Fflour.
601
+ 0.20
602
+ 0.20
603
+ 5 Fflour.
604
+ 1 Fflour.
605
+ 0.15
606
+ 0.15-
607
+ 0.4
608
+ O Fflour.
609
+ 0.10
610
+ 0.10
611
+ 0.05
612
+ 0.05-
613
+ 0.0
614
+ 0.0Q
615
+ 0.0Q
616
+ 009
617
+ 650
618
+ 700
619
+ 750
620
+ 800
621
+ 600
622
+ 650
623
+ 700
624
+ 750
625
+ 800
626
+ 600
627
+ 650
628
+ 700
629
+ 750
630
+ 800
631
+ 0.8
632
+ 0.25
633
+ 0.25
634
+ 0.20
635
+ 0.20
636
+ J667C
637
+ 0.15
638
+ 0.15
639
+ 0.4-
640
+ 0.10
641
+ 0.10
642
+ 0.2
643
+ 0.05
644
+ 0.05
645
+ 0.0
646
+ 0.0Q
647
+ 0.00
648
+ 600
649
+ 650
650
+ 700
651
+ 750
652
+ 800
653
+ 600
654
+ 650
655
+ 700
656
+ 750
657
+ 800
658
+ 009
659
+ 650
660
+ 700
661
+ 750
662
+ 800
663
+ 0.8
664
+ 0.25
665
+ 0.25
666
+ 0.2010
667
+ 0.2010
668
+ TRAPPIST-1
669
+ 0.1510-
670
+ 0.15
671
+ 0.4
672
+ 600
673
+ 700
674
+ 800
675
+ 600
676
+ 700
677
+ 800
678
+ 600
679
+ 700
680
+ 800
681
+ 0.10
682
+ 0.10
683
+ 20.2
684
+ 0.05
685
+ 0.05
686
+ 0.0
687
+ 0.0Q
688
+ 0.0Q
689
+ 600
690
+ 650
691
+ 700
692
+ 750
693
+ 800
694
+ 600
695
+ 650
696
+ 700
697
+ 750
698
+ 800
699
+ 600
700
+ 650
701
+ 700
702
+ 750
703
+ 800
704
+ wavelength (nm)
705
+ wavelength (nm)
706
+ wavelength (nm)12
707
+ Komatsu et al.
708
+ Figure 5. The same as Figure 4, but for an Earth-like planet with an oxygen-poor atmosphere (2.0 Ga).
709
+ Figure 6. Reflectance excess due to chlorophyll fluorescence emissions on an Earth-like planet with the
710
+ Modern Earth’s atmosphere.
711
+
712
+ (a) veg-only 0C
713
+ (b) veg-land 0C
714
+ (c) mod-earth 0C
715
+ 0.10
716
+ 10 Fflour.
717
+ 0.03
718
+ 0.03
719
+ 5 Fflour.
720
+ 1 Fflour.
721
+ 0.02
722
+ 0.02
723
+ Sun
724
+ 0.05
725
+ 0.01
726
+ 0.01
727
+ 0.00
728
+ 0.00
729
+ 0.00
730
+ 650
731
+ 700
732
+ 750
733
+ 800
734
+ 650
735
+ 700
736
+ 750
737
+ 600
738
+ 800
739
+ 650
740
+ 600
741
+ 600
742
+ 700
743
+ 750
744
+ 800
745
+ 0.10
746
+ 0.03
747
+ 0.03
748
+ GJ667C
749
+ 0.02
750
+ 0.02
751
+ 0.05
752
+ 0.01
753
+ 0.01
754
+ 0.0Q
755
+ 0.0Q
756
+ 0.00
757
+ 600
758
+ 650
759
+ 700
760
+ 750
761
+ 800
762
+ 600
763
+ 650
764
+ 700
765
+ 750
766
+ 800
767
+ 600
768
+ 650
769
+ 700
770
+ 750
771
+ 800
772
+ 0.10-
773
+ 0.03
774
+ 0.03
775
+ 10-
776
+ Difference in
777
+ 10-
778
+ Reflectance
779
+ TRAPPIST-1
780
+ 0.02
781
+ 10-5
782
+ 10-5
783
+ 600
784
+ 700
785
+ 800
786
+ 600
787
+ 700
788
+ 800
789
+ 600
790
+ 700
791
+ 800
792
+ 0.05
793
+ 0.01
794
+ 0.01
795
+ 0.0Q
796
+ 0.0Q
797
+ 0.0Q
798
+ 600
799
+ 650
800
+ 700
801
+ 750
802
+ 800
803
+ 600
804
+ 650
805
+ 700
806
+ 750
807
+ 800
808
+ 600
809
+ 650
810
+ 700
811
+ 750
812
+ 800
813
+ wavelength (nm)
814
+ wavelength (nm)
815
+ wavelength (nm)(a) veg-only 2C
816
+ (b) veg-land 2C
817
+ (c) mod-earth 2C
818
+ 0.8
819
+ 0.25
820
+ 0.25
821
+ 10 Fflour.
822
+ 9 0.6
823
+ 0.20
824
+ 0.20
825
+ 5 Fflour.
826
+ 0.15
827
+ 0.15-
828
+ sun
829
+ 1 Fflour.
830
+ 0.4
831
+ O Fflour.
832
+ 0.10.
833
+ 0.10-
834
+ 0.05
835
+ 0.05-
836
+ 0.9
837
+ 0.00
838
+ 0.00
839
+ 009
840
+ 650
841
+ 700
842
+ 750
843
+ 800
844
+ 600
845
+ 650
846
+ 700
847
+ 750
848
+ 800
849
+ 600
850
+ 650
851
+ 700
852
+ 750
853
+ 800
854
+ 0.8
855
+ 0.25
856
+ 0.25
857
+ 0.20
858
+ 0.20
859
+ J667C
860
+ 0.15
861
+ 0.15
862
+ 0.4
863
+ 0.10.
864
+ 0.10
865
+ 0.2
866
+ 0.05
867
+ 0.05.
868
+ 0.0
869
+ 0.0Q:
870
+ 0.00
871
+ 600
872
+ 650
873
+ 700
874
+ 750
875
+ 800
876
+ 600
877
+ 650
878
+ 700
879
+ 750
880
+ 800
881
+ 600
882
+ 650
883
+ 700
884
+ 750
885
+ 800
886
+ 0.8
887
+ 0.25
888
+ 0.25
889
+ 10
890
+ 100
891
+ 0.20+
892
+ 0.20{0-1
893
+ TRAPPIST-1
894
+ 10
895
+ 0-1
896
+ 0.15↓0
897
+ -2
898
+ 0.4
899
+ 600
900
+ 700
901
+ 800
902
+ 600
903
+ 700
904
+ 800
905
+ 600
906
+ 700
907
+ 800
908
+ 0.10
909
+ 0.10
910
+ 0.2
911
+ 0.05
912
+ 0.05
913
+ 0.0
914
+ 0.0Q:
915
+ 0.0Q
916
+ 600
917
+ 650
918
+ 700
919
+ 750
920
+ 800
921
+ 600
922
+ 650
923
+ 700
924
+ 750
925
+ 800
926
+ 600
927
+ 650
928
+ 700
929
+ 750
930
+ 800
931
+ wavelength (nm)
932
+ wavelength (nm)
933
+ wavelength (nm)Photosynthetic fluorescence on Exoplanets
934
+ 13
935
+ Figure 7. The same as Figure 4 but for the reflectance of a planet covered with bacteriochlorophyll-based
936
+ vegetation.
937
+ Figure 8. The same as Figure 7, but for a planet with an oxygen-poor atmosphere (2.0 Ga).
938
+
939
+ (a) veg-only 2B
940
+ (b) veg-land 2B
941
+ (c) mod-earth 2B
942
+ 0.6
943
+ 0.20
944
+ 0.20
945
+ 10 Fflour.
946
+ 0.5
947
+ 5 Fflour.
948
+ 0.15
949
+ 0.15
950
+ 0.4
951
+ sun
952
+ 1 Fflour.
953
+ 0.3
954
+ 0.10
955
+ 0.10
956
+ O Fflour.
957
+ 0.2
958
+ 0.05
959
+ 0.05
960
+ 0.1
961
+ 0.0
962
+ 0.00
963
+ 0.00
964
+ 900
965
+ 950
966
+ 1000 1050 1100 1150 1200
967
+ 900
968
+ 950
969
+ 1000 1050 1100 1150 1200
970
+ 900
971
+ 950 1000 1050 1100 1150 1200
972
+ 0.6
973
+ 0.20
974
+ 0.20
975
+ 0.5
976
+ nce
977
+ 0.15
978
+ 0.15
979
+ J667C
980
+ 0.4
981
+ ctal
982
+ 0.3
983
+ 0.10
984
+ 0.10
985
+ D
986
+ G
987
+ 0.2
988
+ 0.05
989
+ 0.05
990
+ 0.1
991
+ 0.0
992
+ 0.00
993
+ 0.00
994
+ 900
995
+ 950
996
+ 1000 1050 1100 1150 1200
997
+ 900
998
+ 950 1000 1050 1100 1150 1200
999
+ 900
1000
+ 950 1000 1050 1100 1150 1200
1001
+ 0.6
1002
+ 0.20
1003
+ 0.20
1004
+ 0.5
1005
+ ince
1006
+ 0.15
1007
+ 0.15
1008
+ TRAPPIST-1
1009
+ 0.4
1010
+ Reflectar
1011
+ 0.3
1012
+ 0.10
1013
+ 0.10
1014
+ 0.2
1015
+ 0.05
1016
+ 0.05
1017
+ 0.1
1018
+ 0.0
1019
+ 0.00
1020
+ 0.00
1021
+ 900
1022
+ 950 1000 1050 1100 1150 1200
1023
+ 006
1024
+ 950 1000 1050 1100 1150 1200
1025
+ 006
1026
+ 950 1000 1050 1100 1150 1200
1027
+ wavelength (nm)
1028
+ wavelength (nm)
1029
+ wavelength (nm)(a) veg-only OB
1030
+ (b) veg-land OB
1031
+ (c) mod-earth 0B
1032
+ 0.6
1033
+ 0.20
1034
+ 0.20
1035
+ 10 Fflour.
1036
+ 0.5
1037
+ 5 Fflour.
1038
+ 0.15
1039
+ 0.15
1040
+ 0.4
1041
+ sun
1042
+ 1 Fflour.
1043
+ 0.3
1044
+ 0.10
1045
+ 0.10
1046
+ O Fflour.
1047
+ 0.2
1048
+ 0.05
1049
+ 0.05
1050
+ 0.1
1051
+ 0.0
1052
+ 0.00
1053
+ 0.00
1054
+ 900
1055
+ 950 1000 1050 1100 1150 1200
1056
+ 900
1057
+ 950 1000 1050 1100 1150 1200
1058
+ 900
1059
+ 950 1000 1050 1100 1150 1200
1060
+ 0.6
1061
+ 0.20
1062
+ 0.20
1063
+ 0.5
1064
+ nce
1065
+ 0.15
1066
+ 0.15
1067
+ 0.4
1068
+ ctal
1069
+ 0.3
1070
+ 0.10-
1071
+ 0.10-
1072
+ D
1073
+ G
1074
+ 0.2
1075
+ 0.05
1076
+ 0.05
1077
+ 0.1
1078
+ 0.0
1079
+ 0.0Q
1080
+ 0.00
1081
+ 900
1082
+ 950 1000 1050 1100 1150 1200
1083
+ 900
1084
+ 950 1000 1050 1100 1150 1200
1085
+ 900
1086
+ 950 1000 1050 1100 1150 1200
1087
+ 0.6
1088
+ 0.20
1089
+ 0.20
1090
+ 0.5
1091
+ ince
1092
+ 0.15
1093
+ 0.15
1094
+ TRAPPIST-1
1095
+ 0.4
1096
+ Reflectar
1097
+ 0.3
1098
+ 0.10
1099
+ 0.10
1100
+ 0.2
1101
+ 0.05
1102
+ 0.05
1103
+ 0.1
1104
+ 0.0
1105
+ 0.00
1106
+ 0.00
1107
+ 900
1108
+ 950 1000 1050 1100 1150 1200
1109
+ 006
1110
+ 950 1000 1050 1100 1150 1200
1111
+ 006
1112
+ 950 1000 1050 1100 1150 1200
1113
+ wavelength (nm)
1114
+ wavelength (nm)
1115
+ wavelength (nm)14
1116
+ Komatsu et al.
1117
+ Figure 9. Reflectance excess due to bacteriochlorophyll fluorescence emissions on an Earth-like planet with
1118
+ the Modern Earth’s atmosphere.
1119
+ In case-3, an Earth-like planet has the same reduced atmosphere as the Archean Earth at 3.9 Ga.
1120
+ Anoxic bacteria with photosynthetic pigments such as bacteriochlorophylls may spread over the
1121
+ surface of a planet with a CO2-rich atmosphere. Anoxic bacteria are assumed to live in the ocean
1122
+ and coast (i.e., cv = 0.72) and emit only fluorescence whose intensity is comparable to the standard
1123
+ emission from land plants, without the distinct reflectance of a vegetation surface.
1124
+ Fluorescence
1125
+ emissions from anoxic bacteria adopt those from bacteriochlorophylls on the Earth. Figure 10 shows
1126
+ the reflectance of an Archean-Earth-like planet with BChl-based bacteria. In the reflection spectra, a
1127
+ strong water absorption appears around 950 and 1150 nm. The relatively high reflectance across the
1128
+ wavelength range is mainly from the light reflected by the land. We observe fluorescence emissions
1129
+ in the wavelength range between 1000 and 1100 nm owing to the lack of light reflected from BChl-
1130
+ bearing oceanic bacteria, including the VRE feature. Intense absorption in the stellar atmosphere
1131
+ enhances the apparent reflectance of a planet around TRAPPIST-1 (see also Figures 4 and 5, and
1132
+ Section 4.3.2).
1133
+ 4. DISCUSSION
1134
+ This study demonstrated reflectance with photosynthetic fluorescence on an Earth-like planet
1135
+ around the Sun and two M dwarfs. This section reviews the biological processes of photosynthe-
1136
+ sis and then considers the future detection of biofluorescence on an exoplanet. In Section 4.1, we
1137
+ discuss the possible physiological conditions that enhance the fluorescence emissions on a planet
1138
+ based on our understanding of Chl fluorescence. In Section 4.2, we discuss the possible false positive
1139
+ or negative detection of fluorescence (Section 4.2.1), and the potential usage of the nonlinear photore-
1140
+
1141
+ (a) veg-only OB
1142
+ (b) veg-land OB
1143
+ (c) mod-earth 0B
1144
+ 0.15
1145
+ 0.04
1146
+ 0.04
1147
+ 10 Fflour.
1148
+ nce
1149
+ 5 Fflour.
1150
+ 0.03
1151
+ 0.03-
1152
+ 0.10
1153
+ 1 Fflour.
1154
+ sun
1155
+ 0.02
1156
+ 0.02
1157
+ 0.05
1158
+ 0.01
1159
+ 0.01
1160
+ 0.00:
1161
+ 0.00
1162
+ 0.00
1163
+ 900
1164
+ 1000
1165
+ 1100
1166
+ 1200
1167
+ 900
1168
+ 1000
1169
+ 1100
1170
+ 1200
1171
+ 900
1172
+ 1000
1173
+ 1100
1174
+ 1200
1175
+ 0.15
1176
+ 0.04
1177
+ 0.04
1178
+ 0.03
1179
+ 0.03
1180
+ J667C
1181
+ 0.02
1182
+ 0.02
1183
+ G
1184
+ 0.01
1185
+ 0.01
1186
+ 0.00
1187
+ 0.00
1188
+ 0.00
1189
+ 900
1190
+ 1000
1191
+ 1100
1192
+ 1200
1193
+ 900
1194
+ 1000
1195
+ 1100
1196
+ 1200
1197
+ 900
1198
+ 1000
1199
+ 1100
1200
+ 1200
1201
+ 0.15
1202
+ 0.04
1203
+ 0.04
1204
+ Difference in
1205
+ TRAPPIST-1
1206
+ ince
1207
+ 0.03
1208
+ 0.03-
1209
+ 0.10
1210
+ Reflectal
1211
+ 0.02
1212
+ 0.02-
1213
+ 0.05
1214
+ R
1215
+ 0.01
1216
+ 0.01-
1217
+ 0.00
1218
+ 0.00
1219
+ 0.00
1220
+ 900
1221
+ 1000
1222
+ 1100
1223
+ 1200
1224
+ 900
1225
+ 1000
1226
+ 1100
1227
+ 1200
1228
+ 900
1229
+ 1000
1230
+ 1100
1231
+ 1200
1232
+ wavelength (nm)
1233
+ wavelength (nm)
1234
+ wavelength (nm)Photosynthetic fluorescence on Exoplanets
1235
+ 15
1236
+ Figure 10. The reflectance of an Earth-like planet with an anoxic atmosphere and no land vegetation
1237
+ (anoxic B).
1238
+
1239
+ anoxic B
1240
+ 0.15
1241
+ Reflectance
1242
+ 0.10
1243
+ Sun
1244
+ 0.05
1245
+ 0.0Q
1246
+ 900
1247
+ 1000
1248
+ 1100
1249
+ 1200
1250
+ 0.15
1251
+ Reflectance
1252
+ 10 Fflour.
1253
+ GJ667C
1254
+ 0.10
1255
+ 5 Fflour.
1256
+ 1 Fflour.
1257
+ 0.05
1258
+ O Fflour.
1259
+ 0.00
1260
+ 006
1261
+ 1000
1262
+ 1100
1263
+ 1200
1264
+ 0.15
1265
+ Reflectance
1266
+ TRAPPIST-1
1267
+ 0.10
1268
+ 0.05
1269
+ 0.00
1270
+ 006
1271
+ 1000
1272
+ 1100
1273
+ 1200
1274
+ wavelength (nm)16
1275
+ Komatsu et al.
1276
+ sponse in fluorescence yield to excitation light intensity to distinguish between biofluorescence and
1277
+ the false positive/negative signals of fluorescence (Section 4.2.2). Finally, in Section 4.3, we show the
1278
+ fluorescence detection with telescopes. We present the detectability of fluorescence from an Earth
1279
+ twin around a Sun-like star u sing the noise model for a LUVOIR-A-like mission (Section 4.3.1), and
1280
+ the remarkable enhancement in the reflectance due to the absorption lines of stars, which could be
1281
+ a promising feature for detection by high-dispersion spectroscopy, especially around ultracool stars
1282
+ (Section 4.3.2).
1283
+ 4.1. Possible Physiological Conditions for Supporting Fluorescence Detection
1284
+ This study adopted the typical fluorescence spectrum of Chl-containing plants and LH1–RC purified
1285
+ from BChl b-bearing purple bacteria. The fluorescence spectrum of the LH1–RC complex suspended
1286
+ in buffer solution was measured under laboratory conditions with a low concentration of LH1–RC in
1287
+ the solution to avoid the reabsorption of fluorescence. Cells having LH1-RC in vivo would result in
1288
+ an ∼ 50 nm shift in the spectral peak wavelength toward longer wavelengths under dense conditions,
1289
+ because the reabsorption of fluorescence reduces the shorter-wavelength part of fluorescence. A red-
1290
+ shifted fluorescence spectrum should still be observable because it is located within the atmospheric
1291
+ window. For the fluorescence intensity of vascular plants on the ground, we referred to the standard
1292
+ value (Ffluor.) for the fluorescence model on exoplanets in our simulations. The possible detection of
1293
+ fluorescence emissions on exoplanets would require ≳ 5Ffluor. with BChl (see Figures 7, 8, and 10).
1294
+ There are four potential factors that increase the fluorescence yield in photosynthetic organisms from
1295
+ the biophysical viewpoint of photosynthetic studies on existing phototrophs on the Earth:
1296
+ 1. Increasing Chl/BChl concentration per land area
1297
+ A high concentration of Chls and BChls enhances their fluorescence intensity. In general, the
1298
+ Chl/BChl concentration in a cell increases for capturing as many photons as possible under
1299
+ low light conditions. Fluorescence increases linearly with Chl/BChl concentration when cell
1300
+ density is low. In contrast, the fluorescence intensity reaches a saturation level in highly dense
1301
+ environments due to the reabsorption of fluorescence by cells (Du et al. 2017).
1302
+ 2. Small spectral overlap between absorption and fluorescence
1303
+ The large separation between the main absorption band and its fluorescence band increases
1304
+ the fluorescence intensity of concentrated cells. In photosynthetic organisms, the excitation
1305
+ energy is transferred between Chls, and the Chl fluorescence tends to be emitted from long-
1306
+ wavelength Chls (LWC), which has the reddest absorption band in a photosystem because
1307
+ the excess excitation energy is easily trapped at the lowest energy level. A redshift in the
1308
+ peak wavelength of fluorescence and a blueshift in absorption, which can be caused by the
1309
+ modification of the vibronic interactions of pigments between surrounding proteins and solvent,
1310
+ reduce the spectral overlap between fluorescence and absorption. The fluorescence emission
1311
+ from LWCs is red-shifted to over 50 nm from that of bulk Chls in some conditions. Although
1312
+ most plants have a small amount of LWCs in PSII and the Chl fluorescence is absorbed well
1313
+ under high Chl concentrations, far-red absorbable LWC contributing to PSII has been reported
1314
+ in some eukaryote algae (Fujita & Ohki 2004; Wilhelm & Jakob 2006; Kotabov´a et al. 2014;
1315
+ Wolf et al. 2018; Kosugi et al. 2020). These algae show a significant fluorescence emission at
1316
+ far-red-light wavelengths (700–800 nm) at room temperature, and some of them decrease the
1317
+ overlap (Fujita & Ohki 2004; Kosugi et al. 2020).
1318
+
1319
+ Photosynthetic fluorescence on Exoplanets
1320
+ 17
1321
+ 3. Low photosynthetic efficiency
1322
+ Photon loss in photosynthetic processes reduces the photon yield of fluorescence. Excitation
1323
+ yield in PSII has increased throughout the evolutionary processes of photosystems. For ex-
1324
+ ample, the increase in light use efficiency in oxygenic photosynthesis on Earth was achieved
1325
+ by changing the light-harvesting antenna protein from the membrane superficial phycobili-
1326
+ some in cyanobacteria to the light-harvesting Chl binding protein in eukaryotic algae. Fur-
1327
+ thermore, the subsequent modification of LHCs achieved a higher photosynthetic quantum
1328
+ yield in the evolution process. The maximum excitation yield in PSII of vascular plants is
1329
+ estimated to be ∼ 0.9, whereas that of green algae and cyanobacteria is ∼ 0.8 and ∼ 0.6,
1330
+ respectively (Schuurmans et al. 2015). Suppose phototrophs on an exoplanet are in the early
1331
+ stage of evolution. In that case, the expected fluorescence yield may be high to compensate for
1332
+ the low efficiency of photon yields in primitive photosynthesis.
1333
+ 4. Suppression of heat dissipation
1334
+ Photon loss by the heat dissipation in photosynthetic pigments suppresses the photon yield of
1335
+ fluorescence. Heat dissipation occurs in the vibrational relaxation of excited pigment molecules,
1336
+ Chls, or accessory pigments such as carotenoids. Additionally, light-dependent protection mech-
1337
+ anisms to dissipate the excess light energy as heat are inherent in all the cyanobacteria, algae,
1338
+ and plants. The efficiency of heat dissipation largely depends on the molecular configuration
1339
+ and the environment of pigments binding to proteins. The energy conversion rate from light to
1340
+ heat in photosystems is crucial in estimating photosynthetic fluorescence on other planets.
1341
+ Therefore, the fluorescence yield in photosynthetic pigments should fluctuate over time due to pho-
1342
+ tosynthetic activity and heat dissipation.
1343
+ 4.2. Further Identification for Confirming Photosynthetic Fluorescence
1344
+ 4.2.1. Potential false positive/negative of biological fluorescence detection from exoplanets
1345
+ Photosynthetic pigments on an exoplanet may be different from those on Earth, and the wavelength
1346
+ relevant to fluorescence emission from exovegetation remains to be unknown. A possible fluorescence
1347
+ signal on other planets can be a false positive or negative detection of biological activities. Poten-
1348
+ tial main sources causing false positive/negative could be surface reflectance or fluorescence from
1349
+ minerals on exoplanets.
1350
+ Both Chl and BChl fluorescence in our study can be contaminated by
1351
+ mineral fluorescence, but it is not plausible to expect the fluorescent minerals to cover a fraction
1352
+ of a planetary surface comparable to Earth’s vegetation as far as our knowledge of the Earth’s
1353
+ environment.
1354
+ Recently, solar-induced mineral luminescence (SML) has been extracted from SIF
1355
+ data obtained by remote sensing of the Earth (K¨ohler et al. 2021). They revealed that about 10%
1356
+ of non-vegetated areas are weakly luminescent and speculated that luminescence came from some
1357
+ spots covered by carbonate with Mn2+ and was comparable to SIF (or Chl fluorescence). However,
1358
+ those areas are negligible on the planetary scale. On the other hand, mineral fluorescence could
1359
+ pollute, to an extent, fluorescence in near-infrared, which includes the BChl fluorescence. For in-
1360
+ stance, silicate (e.g., pyroxene and olivine) shows a prominent absorption around 1000 nm caused by
1361
+ Fe2+ (Bishop et al. 2019; Klima et al. 2011; Sunshine & Pieters 1998). Its fluorescence could appear
1362
+ in a slightly longer wavelength from the absorption, whose energy corresponds to the Stokes shift, like
1363
+ other near-infrared fluorescent materials (Jackson et al. 2021; Selvaggio et al. 2020). While there are
1364
+
1365
+ 18
1366
+ Komatsu et al.
1367
+ a variety of fluorescent minerals (e.g., fluorite, calcite, corundum), we do not deny the possibility that
1368
+ the unexpectedly strong mineral fluorescence could be observed on exotic planets such as a carbide
1369
+ exoplanet (Allen-Sutter et al. 2020) whose surface could be covered by diamond with lattice defects,
1370
+ e.g., due to nitrogen-vacancy center (Schirhagl et al. 2014). To understand potential fluorescence fea-
1371
+ tures from surface components of an exoplanet, e.g., rocks and minerals, characterizing atmospheric
1372
+ features is helpful. Besides, as mentioned so far, the simultaneous detection of vegetation reflectance
1373
+ (VRE) and fluorescence features could help identify photosynthesis.
1374
+ 4.2.2. Nonlinear photoresponse in photosynthesis
1375
+ Photosynthetic organisms regulate metabolic processes to maximize the use of available photons
1376
+ under light conditions and emit biological fluorescence by converting light energy via photochemical
1377
+ reactions. The nonlinear response of the fluorescence yield to the excitation light intensity would
1378
+ be a clue to finding the presence of photosynthetic organisms. If a planet is in an elliptical orbit,
1379
+ the incident flux received by the planet from its host star varies with time. Fluorescence emissions
1380
+ from nonbiological processes increase with incident light intensity. In contrast, a saturation level
1381
+ of the fluorescence intensity from biological activities, such as photosynthesis, exists because the
1382
+ quantum yields of Chl fluorescence vary according to the light environment and atmospheric CO2
1383
+ concentrations.
1384
+ The quantum yields of Chl fluorescence are primarily involved in the reduction
1385
+ states of electron acceptors of photosystems for electron transports and excitation energy quenching
1386
+ by photoprotection mechanisms (see Genty et al. 1989; Krause & Weis 1991; Baker 2008). A sudden
1387
+ intense light can induce the reduction in the electron acceptors of PSII, where oxidation of water to
1388
+ generate O2 occurs as a primary step in photosynthesis. The presence of photoprotection mechanisms
1389
+ also modulates the quantum yields of Chl fluorescence. When dark- or dim-light-adapted leaves are
1390
+ suddenly irradiated with intense light, Chl fluorescence quantum yields rapidly increase by up to five
1391
+ times. Accordingly, the relationship between fluorescence yield and excitation light intensity (i.e.,
1392
+ the number of absorbed photons) provides a hint to explore the origin of fluorescence on a planet.
1393
+ 4.3. Detectability of Biological Fluorescence by Future Telescopes
1394
+ 4.3.1. The Earth-Sun System as an Earth Twin in a LUVOIR-A-Like Mission
1395
+ We investigated the detectability of fluorescence from an Earth twin around a Sun-like star at 10 pc
1396
+ from the Earth, assuming a LUVOIR-A-like space telescope. Figure 11 presents the simulated spectra
1397
+ of a second Earth around a Sun-like star at 10 pc with the biological fluorescence. We applied the
1398
+ noise model used in Robinson et al. (2016) and Kopparapu et al. (2021), which accounts for planet
1399
+ photons, stellar photon noise, and background noise, e.g., zodi, exozodi, read-out, and dark current
1400
+ noises with the throughput assuming the LUVOIR-A telescope. The parameters and the formalism
1401
+ used in this paper are presented in Appendix B. Figures 11(a–c) show the results of the most optimistic
1402
+ model for the fluorescence signal (veg-only 0B) from the Earth-Sun system observed from 10 pc with
1403
+ a 15 m space telescope.
1404
+ The original data are the same as those of the Sun in Figure 7(a). In
1405
+ Figure 11(a), Fp/Fs observed at the telescope for each wavelength bin is shown as solid lines, with
1406
+ the random noise as the 1σ error bars for each bin, in 9000 hours of exposure time, where Fp is
1407
+ the reflected light from the planet and Fs is the starlight. Figure 11(b) depicts a magnification of
1408
+ the spectrum in Figure 11(a). Some error bars are outside the solid line, but the spectral feature of
1409
+ fluorescence emission is recognizable for each case in the figure. Figure 11(c) shows the SNR with
1410
+ the same observation time as that in Figure 11(a). The difference between 0 and 5 Ffluor. is larger
1411
+
1412
+ Photosynthetic fluorescence on Exoplanets
1413
+ 19
1414
+ than 1σ. To detect the fluorescence with 3σ error, ∼ 50000 hours of exposure time are required,
1415
+ and with 5σ, ∼ 100000 hours, ten years, are expected (not shown in figures). Thus, fluorescence
1416
+ detection would require years for observation, even by the LUVOIR-A-like space telescope, and it
1417
+ is extremely challenging to observe one target. In less optimistic models, namely, the veg-land 0B
1418
+ model around the Sun in Figure 7(b), the detection of fluorescence signals is even more challenging,
1419
+ as shown in Figure 11(d). As discussed in Section 3.2, the fluorescence in mod-earth 0B is difficult
1420
+ to identify. Moreover, cloud coverage obscures the VRE features as well as atmospheric features
1421
+ on exoplanets (Seager et al. 2005; Tinetti et al. 2006; Kaltenegger et al. 2007). The reflectance in
1422
+ Figure 12 indicates how clouds suppress the fluorescence signal. Even in the most optimistic model,
1423
+ the fluorescence in the reflectance is significantly reduced and can hardly be observed. In the mod-
1424
+ earth model, it is impossible to identify the fluorescence signals. The only possible way to observe
1425
+ surface vegetation with significant cloud coverage, except for atmospheric gases, would be the VRE
1426
+ (∼0.1 in reflectance in the optimistic model). Thus, the existence of water clouds that are expected
1427
+ in Earth-like planets with surface water seems to be critical for fluorescence detection. However,
1428
+ around TRAPPIST-1, as the relevant argument was shown in Session 4.3.2, we found that the Chl
1429
+ fluorescence in the K I lines was insensitive to the coverage by Earth clouds, which could be an
1430
+ advantage in the Chl detection over BChl one.
1431
+ The fluorescence feature would be poorly determined with 900 hours of exposure time with 1σ
1432
+ errors, whereas the VRE feature can be identified. Even for a LUVOIR-A-like space telescope, an
1433
+ enormous observational time would be needed to identify the fluorescence in addition to the VRE
1434
+ with more confidence for detecting traces of photosynthesis. We also investigated the detectability of
1435
+ fluorescence by a space telescope with a different diameter. A 6 m space telescope is recommended for
1436
+ future space missions, according to Astro2020 Decadal Survey. With a 6-m diameter, ∼ 300,000 hours
1437
+ of observation time are required to identify fluorescence. When we adopt a 30 m space telescope with
1438
+ 1σ errors, the required exposure time is reduced to ∼ 800 hours. Furthermore, one of the background
1439
+ noises, i.e., the readout noise, can be suppressed with data processing because of increasing reads in
1440
+ an exposure as implemented for H2RG infrared detectors (e.g., Brandt et al. 2017; Kuzuhara et al.
1441
+ 2018). When the readout noise is assumed to be zero all over the wavelengths, the required observation
1442
+ times are reduced to ∼ 250,000, ∼ 7,000 and ∼ 500 hours with the 6-, 15-, and 30-m diameters.
1443
+ 4.3.2. Apparent Enhancement in Fluorescence around Ultracool Stars and Possible Detection with
1444
+ High-Dispersion Spectroscopy
1445
+ Figure 13 shows the contribution of fluorescence around three host stars. Around TRAPPIST-1 the
1446
+ apparent enhancement in reflectance induced by fluorescence is significant compared to around the
1447
+ other two stars because TRAPPIST-1 has strong absorption features spanning the wavelengths of
1448
+ the fluorescence. Within the TRAPPIST-1 stellar absorption features, reflected light from the planet
1449
+ is reduced, allowing the fluorescence emission to become a much larger fraction of the outgoing
1450
+ flux (reflected + fluorescence) at these wavelengths. This is analogous to the methodology of SIF
1451
+ detection with remote sensing observations and the retrieval processes by determining how much the
1452
+ fluorescence influences the Fraunhofer lines (Maier et al. 2004). These spectroscopic features may be
1453
+ widely used for fluorescence detection around ultracool stars.
1454
+ Figure 13(a) shows that the reflectance is highly enhanced due to the absorption lines of K I in
1455
+ the stellar spectrum of TRAPPIST-1, which is not affected by water clouds (Figure 12). The degree
1456
+ of enhancement for each line depends on the atmospheric compositions of an Earth-like planet. Fig-
1457
+
1458
+ 20
1459
+ Komatsu et al.
1460
+ Figure 11. Simulated spectrum with the biological fluorescence on a second Earth around a Sun-like star
1461
+ at 10 pc from the Earth, assuming a LUVOIR-A-like space telescope. (a–c) The results from the veg-only
1462
+ 0B model and (d) Fp/Fs with the veg-land 0B model. (a) Fp/Fs with 9000 hours of observation time. The
1463
+ solid line shows Fp/Fs and the error bar indicates the noise at each wavelength. (b) A magnification of
1464
+ Fp/Fs in (a). (c) The SNR in (a).
1465
+ ure 13(b,c) presents a spiky feature due to absorption of FeH and VO, as commonly observed around
1466
+ ultracool stars. Therefore, observing the possible fluorescence signal with high spectral resolution
1467
+ using extremely large ground telescopes would be worthwhile.
1468
+ 5. CONCLUSIONS
1469
+ In this paper, we explored fluorescence from photosynthesis as a biosignature on an exoplanet for
1470
+ future observations in great detail and identified the situations in which the signal could be enhanced,
1471
+ and the regions of the spectrum where fluorescence from chlorophylls and bacteriochlorophylls could
1472
+ be most detectable for Earth-like planets around different stars. We also described how we could
1473
+ enhance the possibility to more definitively detect the action of photosynthesis. For direct imaging
1474
+ observations, however, we found that the detection of fluorescence emissions would be extremely
1475
+ challenging to observe and especially not feasible for the planned 6m space telescope. More details
1476
+ are provided as follows.
1477
+ We considered fluorescence emissions from Chl- and BChl-based vegetation in a clear-sky condition
1478
+ on an Earth-like planet around the Sun and two M dwarfs (GJ667 C and TRAPPIST-1). Chl- and
1479
+ BChl-based leaves show a VRE in wavelengths around 700–750 and 1000–1100 nm. The fluorescence
1480
+ emissions from Chls and BChls occur at wavelengths from 650 to 800 nm and 1000 to 1100 nm, cor-
1481
+ responding to the longest Q absorption band of each pigment. The two peaks of Chl fluorescence
1482
+
1483
+ 1e-9
1484
+ 1e-10
1485
+ 1.0
1486
+ (a)
1487
+ (b)
1488
+ 0.8
1489
+ 2.0
1490
+ 10 Fflour.
1491
+ 1.5
1492
+ 5 Fflour.
1493
+ F
1494
+ 0.4
1495
+ O Fflour.
1496
+ 1.0
1497
+ 0.2
1498
+ 0.5
1499
+ 0.0
1500
+ 0.0
1501
+ 006
1502
+ 950
1503
+ 1000 1050 1100 1150 1200
1504
+ 980
1505
+ 1000
1506
+ 1020
1507
+ 1040
1508
+ 1060
1509
+ Wavelength [nm]
1510
+ Wavelength [nm]
1511
+ 1e-10
1512
+ 3.5
1513
+ (C)
1514
+ d)
1515
+ 3.0
1516
+ 2.5
1517
+ 101
1518
+ FS 2.0
1519
+ SNR
1520
+ 1.5
1521
+ 10 Fflour.
1522
+ 5 Fflour.
1523
+ 1.0
1524
+ 1 Fflour.
1525
+ 0.5
1526
+ O Fflour.
1527
+ 100.
1528
+ 0.0
1529
+ 900
1530
+ 950
1531
+ 1000 1050 1100 1150 1200
1532
+ 900
1533
+ 950
1534
+ 1000 1050 1100 1150 1200
1535
+ Wavelength [nm]
1536
+ Wavelength[nmlPhotosynthetic fluorescence on Exoplanets
1537
+ 21
1538
+ Figure 12. The effect of cloud on the reflectance with veg-only 0B and 0C models. The models are the
1539
+ same as the veg-only 0B in Figure 7 and the veg-only 0C in Figure 4 but with cloud coverage.
1540
+ at 680 and 740 nm arise from the PSII and PSI, respectively. Thus, atmospheric absorption bands,
1541
+ such as H2O, CH4, O2, and O3, and the VRE could be overlapped with the fluorescence emissions
1542
+ from Chls and BChls. Chl fluorescence emission from PSI is blended with the steep VRE feature.
1543
+ Fluorescence emitted from PSII on an Earth-like planet is the most promising feature for observation,
1544
+ but it may also be reduced by nonphotochemical quenching processes and reabsorption of photons by
1545
+ surrounding Chls. Conversely, the fluorescence emitted from BChls is not suppressed by the sharp
1546
+ increase in the reflectance due to the VRE and atmospheric absorption by, for example, water va-
1547
+ por, except for CH4 absorption around 1000 nm. Therefore, the BChl fluorescence in the wavelength
1548
+ range of 1000–1100 nm, rather than Chl fluorescence, may be a more promising biosignature from
1549
+ photosynthetic organisms on a planetary surface. In both cases of Chl- and BChl-based vegetation,
1550
+ the simultaneous detection of the VRE and fluorescence is significant for identifying photosynthetic
1551
+ activity on an exoplanet, because we do not know exactly what kind of vegetation exists in the planet
1552
+ in principal and we need more information for further validation to identify the trace of photosyn-
1553
+ thesis. If BChl-bearing photosynthetic bacteria inhabit water without any leaf or tree structures,
1554
+ the fluorescence spectrum is the only surface reflectance feature that can be used to access such
1555
+ underwater photosynthetic organisms, although the fluorescence signal would be reduced according
1556
+ to the opacity of overlying liquid water.
1557
+ Based on our understanding of photosynthesis, the intensity of fluorescence is lower in photosyn-
1558
+ thetic bacteria compared to land plants. Here, we presented four factors that enhance the fluorescence
1559
+ emission for possible detection of biological fluorescence on an exoplanet: (1) increase in Chl/BChl
1560
+ concentration per land area, (2) small overlap of absorption and fluorescence spectrum, (3) low
1561
+
1562
+ veg-only OB
1563
+ veg-only 0C
1564
+ 0.5
1565
+ 1.2
1566
+ 0.4
1567
+ 1.0
1568
+ 0.3
1569
+ 0.8
1570
+ Sun
1571
+ 0.6
1572
+ 0.2
1573
+ 0.4
1574
+ 0.1
1575
+ 0.2
1576
+ 0.0
1577
+ 0.Q:
1578
+ 900
1579
+ 950 1000 1050 1100 1150 1200
1580
+ 720
1581
+ 740
1582
+ 760
1583
+ 780
1584
+ 800
1585
+ 0.5
1586
+ 1.2
1587
+ 0.4
1588
+ 1.0
1589
+ 10 Fflour.
1590
+ nc
1591
+ J667C
1592
+ 0.8
1593
+ 5 Fflour.
1594
+ 0.6
1595
+ 1 Fflour.
1596
+ efl
1597
+ 0.4
1598
+ O Fflour.
1599
+ R 0.1
1600
+ 0.2
1601
+ 0.0
1602
+ 0.0
1603
+ 006
1604
+ 950 1000 1050 1100 1150 1200
1605
+ 720
1606
+ 740
1607
+ 760
1608
+ 780
1609
+ 800
1610
+ 0.5
1611
+ 1.2
1612
+ 0.4
1613
+ TRAPPIST-1
1614
+ 1.0
1615
+ nc
1616
+ 0.8
1617
+ 0.6
1618
+ 0.2
1619
+ efl
1620
+ 0.4
1621
+ R
1622
+ 0.1
1623
+ 0.2
1624
+ 0.0
1625
+ 0.0
1626
+ 900
1627
+ 950 1000 1050 1100 1150 1200
1628
+ 720
1629
+ 740
1630
+ 760
1631
+ 780
1632
+ 800
1633
+ wavelength (nm)
1634
+ wavelength (nm)22
1635
+ Komatsu et al.
1636
+ Figure 13. The apparent enhancement of fluorescence in reflectance due to stellar absorption around the
1637
+ three template stars: (a) veg-only 0C model (Figure 4), (b) veg-only 0B model (Figure 7), and (c) anoxic B
1638
+ model (Figure 10).
1639
+ photosynthetic efficiency, and (4) suppression of heat dissipation. This study assumed a linear pho-
1640
+ toresponse of fluorescence to excitation light intensity. If a planet is on a large elliptical orbit and
1641
+ the telescope has sufficient sensitivity to temporally resolve changes in fluorescence as a function of
1642
+ time, the nonlinear photoresponse from the biological fluorescence can be identified. Assuming a
1643
+ LUVOIR-A-like mission, an enormous duration (around 9000 hours) would be required to detect the
1644
+ BChl fluorescence emission, whose fluorescence yield is 5–10 times larger than that of vegetation on
1645
+ Earth in the optimistic cases for an Earth-Sun twin at a distance of 10 pc from the Earth. In addition,
1646
+ the cloud coverage significantly affects the detection of fluorescence as well as other spectral features
1647
+ because the cloud more strongly obscures fluorescence emissions than the VRE feature. Interestingly,
1648
+ the fluorescence in the reflectance was found to be remarkably enhanced in all three cases around
1649
+ TRAPPIST-1 because of its strong absorption in the stellar atmosphere, like the SIF detection by
1650
+ remote sensing using Fraunhofer lines. The reflectance excess due to K I absorption and VO/FeH
1651
+ absorption can be a promising feature for characterizing the fluorescence around ultracool stars in
1652
+ Chl and BChl cases. Note that Chl fluorescence in K I lines was still prominent with water clouds.
1653
+ Thus, one of the most important future works would be the mock observation assuming a 30
1654
+ m class ground-based telescope to investigate how the apparent enhancement in reflectance due
1655
+ to stellar absorption could help the fluorescence detection around ultracool stars. In addition, to
1656
+ better support the future detection of fluorescence emissions on an exoplanet, further studies are
1657
+ required from various perspectives. For example, planetary spectra for a wide range of atmospheric
1658
+ and surface conditions consistent with biological fluorescence emission should be estimated and tested
1659
+
1660
+ (a) veg-land oC
1661
+ (b) veg-land OB
1662
+ (c) anoxic B
1663
+ 0.08
1664
+ 0.20
1665
+ 0.7-
1666
+ 10 Fflour.
1667
+ 5 Fflour.
1668
+ 0.06
1669
+ 0.15
1670
+ 0.5
1671
+ 1 Fflour.
1672
+ Sun
1673
+ 0.04
1674
+ 0.10.
1675
+ 0.3
1676
+ O Fflour.
1677
+ 0.02
1678
+ 0.05
1679
+ 0.1
1680
+ 0.9
1681
+ 0.00-
1682
+ 0.00.
1683
+ 766
1684
+ 767
1685
+ 768
1686
+ 769
1687
+ 770
1688
+ 771
1689
+ 1000
1690
+ 1020
1691
+ 1040
1692
+ 1060
1693
+ 1000
1694
+ 1020
1695
+ 1040
1696
+ 1060
1697
+ 0.08
1698
+ 0.20
1699
+ 0.7.
1700
+ 0.06-
1701
+ 0.15
1702
+ J667C
1703
+ 0.04-
1704
+ 0.10.
1705
+ 0.3
1706
+ G
1707
+ 0.02
1708
+ 0.05
1709
+ 0.1
1710
+ 0.9
1711
+ 0.00
1712
+ 0.00
1713
+ 767
1714
+ 770
1715
+ 766
1716
+ 768
1717
+ 769
1718
+ 771
1719
+ 1000
1720
+ 1020
1721
+ 1040
1722
+ 1060
1723
+ 1000
1724
+ 1020
1725
+ 1040
1726
+ 1060
1727
+ 0.5
1728
+ 0.08
1729
+ 0.20
1730
+ 0.4
1731
+ TRAPPIST-1
1732
+ Reflectance
1733
+ 0.06-
1734
+ 0.15
1735
+ 0.3
1736
+ 0.04-
1737
+ 0.10.
1738
+ 0.2
1739
+ 0.02
1740
+ 0.05-
1741
+ 0.1
1742
+ 0.9
1743
+ 0.00
1744
+ 0.00.
1745
+ 766
1746
+ 767
1747
+ 768
1748
+ 769
1749
+ 770
1750
+ 771
1751
+ 1000
1752
+ 1020
1753
+ 1040
1754
+ 1060
1755
+ 1000
1756
+ 1020
1757
+ 1040
1758
+ 1060
1759
+ wavelength (nm)
1760
+ wavelength (nm)
1761
+ wavelength (nm)Photosynthetic fluorescence on Exoplanets
1762
+ 23
1763
+ using radiation transfer calculations because our studies considered still-limited conditions. Moreover,
1764
+ we need to conduct simulations on how the fluorescence is observed on an exoplanet when a global SIF
1765
+ map data from remote sensing of the Earth are applied. Also, experimental validation of prominent
1766
+ NIR fluorescence emissions is needed in some species of photosynthetic organisms and conditions.
1767
+ ACKNOWLEDGMENTS
1768
+ We would like to thank one anonymous reviewer for constructive comments to improve the paper.
1769
+ We also thank Tatsuya Miyauchi, Haruki Oshio, Yu Someya, Tomoki Kiyono, and Masanori Takeda
1770
+ for fruitful discussions at NIES on SIF detection by remote sensing, which led to the draft idea of
1771
+ this study, and Kouki Hikosaka (Tohoku University) and Hibiki Noda (NIES) for further discussions
1772
+ and for introducing SIF identification by remote sensing. The data for the LUVOIR noise model was
1773
+ helpfully provided by Geronimo Villanueva and Ravi Kopparapu (NASA/Goddard). Y.H. and N.N.
1774
+ were supported by a Grant-in-Aid for Scientific Research on Innovative Areas (JSPS KAKENHI
1775
+ grant number 18H05439).
1776
+ PyAstronomy (https://github.com/sczesla/PyAstronomy) was used in
1777
+ mock observations assuming a space telescope. In several cases, numerical data were extracted from
1778
+ figures in published papers using WebPlotDigitizer (https://automeris.io/WebPlotDigitizer/).
1779
+ APPENDIX
1780
+ A. EMPIRICAL RAYLEIGH SCATTERING
1781
+ The effect of Rayleigh scattering is implemented empirically as follows (Bucholtz 1995):
1782
+ τR(λ)=βs(λ)Ts
1783
+ Ps
1784
+ � z′
1785
+ 0
1786
+ P(z)
1787
+ T(z)dz,
1788
+ (A1)
1789
+ where τR is the Rayleigh optical depth at altitude z′; T(z) and P(z) are the temperature and pressure
1790
+ at z, respectively. We adopted the T − P profile in the U.S. standard atmosphere 1976 from 0 to
1791
+ 60 km to compute the Rayleigh scattering cross-section in the atmosphere of an Earth-like planet.
1792
+ The actual T − P profile in the atmosphere of an Earth-like planet around a star other than the Sun
1793
+ is quite different from that in the Earth’s atmosphere. Rayleigh scattering, however, has a negligible
1794
+ effect on the transmittance at wavelengths from 600 to 1100 nm (≈ 6 % in transmittance at 600 nm,
1795
+ reducing with increasing wavelength, and then < 1 % at 1100 nm for an Earth-like planet around the
1796
+ Sun, for instance), which is closely related to the fluorescence from Chls and BChls. Ts and Ps are
1797
+ the temperature and pressure at standard conditions on Earth, respectively (Ts = 288.15 K and Ps
1798
+ = 1013.25 mbars). The total Rayleigh volume-scattering coefficient βs is expressed as:
1799
+ βs(λ) = Aλ−B−Cλ−D/λ,
1800
+ (A2)
1801
+ where the coefficients A, B, C, and D are empirically determined (see Table 3 in Bucholtz (1995)).
1802
+ B. LUVOIR NOISE MODEL
1803
+ We implemented a noise model assuming a LUVOIR-A-like mission. The formalism and the pa-
1804
+ rameters are based on Robinson et al. (2016), but, as shown in Table 2, we updated some parameters
1805
+
1806
+ 24
1807
+ Komatsu et al.
1808
+ Parameter
1809
+ Description
1810
+ Adopted Value
1811
+ D
1812
+ Mirror Diameter
1813
+ 6, 15, 30 m
1814
+ C
1815
+ Raw Contrast
1816
+ 10−10
1817
+ R
1818
+ Instrumental spectral resolution
1819
+ 70
1820
+ TTele
1821
+ Accounts for light lost due to contamination
1822
+ 0.95
1823
+ and inefficiencies in the main collecting area
1824
+ Tread
1825
+ Read-out efficiency
1826
+ 0.75
1827
+ TQE
1828
+ Raw quantum efficiency
1829
+ 0.9
1830
+ fpa
1831
+ Fraction of planetary light that falls within photometric aperture
1832
+ 1
1833
+ X
1834
+ Width of photometric aperture as multiple of λ/D
1835
+ 0.61 arcsec
1836
+ Nez
1837
+ Number of Exozodis
1838
+ 4.5
1839
+ De−
1840
+ Dark current (UVIS/NIR)
1841
+ 3E-5/2E-3 e−/s
1842
+ Re−
1843
+ Read noise per pixel (UVIS/NIR)a
1844
+ 0/2.5 e−
1845
+ θIWA
1846
+ Inner working angle of the coronagraph as multiple of λ/D
1847
+ 3
1848
+ λ0
1849
+ Diffraction limit at the wavelength
1850
+ 500 nm
1851
+ Table 2. Parameters for simulations based on a LUVOIR-A-like mission.
1852
+ aTaken from the Planetary Spectrum Generator for LUVOIR/A-VIS and A-NIR, which is maintained by
1853
+ NASA (https://psg.gsfc.nasa.gov/instrument.php).
1854
+ (with several treatments) following Kopparapu et al. (2021) for our simulations with the LUVOIR-A
1855
+ telescope.
1856
+ The total noise in the observation Ctotal is calculated by:
1857
+ Ctotal =Cp + Cs + Cb,
1858
+ (B3)
1859
+ where Cp is the number of planet photons, Cs is the stellar photon noise (leakage through the
1860
+ coronagraph), and Cb is the background noise, which is the sum of zodi Cz, exozodi Cez, dark current
1861
+ CD, and readout noise CR. The internal thermal noise is ignored because the thermal contribution is
1862
+ negligible in our wavelengths of interest. Note that the noise in Equation B3 corresponds to variance
1863
+ rather than the standard deviation. The noise count is expressed as:
1864
+ Cnoise =
1865
+
1866
+ Cp + Cs + 2Cb
1867
+ (B4)
1868
+ where the double Cb accounts for the on-off observation with and without the planet. The on-off
1869
+ observation corresponds to the subtraction of point spread functions of a central star. S/N for each
1870
+ wavelength λ is defined by:
1871
+ S/N = Cp
1872
+ Cnoise
1873
+ .
1874
+ (B5)
1875
+ The Fp and Fs are now defined to be the reflected light from a planet and the stellar flux acquired
1876
+ by the telescope at a wavelength (bin) λ. When observing Fp/Fs, the 1σ error at λ is given as:
1877
+ σ(λ)= Fp
1878
+ Fs
1879
+ 1
1880
+ S/N.
1881
+ (B6)
1882
+
1883
+ Photosynthetic fluorescence on Exoplanets
1884
+ 25
1885
+ The end-to-end throughput for planetary fluxes is calculated as:
1886
+ Ttotal =TTeleTcorToptTreadTQE,
1887
+ (B7)
1888
+ where TTele is an account for light lost due to contamination and inefficiencies in the main collecting
1889
+ area, Tread is the read-out efficiency, and TQE is the raw quantum efficiency for the detector. The
1890
+ coronagraphic Tcor and the optical Topt throughputs are the same as in Figure 9 in Kopparapu et al.
1891
+ (2021).
1892
+ We updated the formalism on noise from zodis, exozodis, and readout as follows; In Robinson et al.
1893
+ (2016), the spectral shape of zodis (exozodis) was assumed to be equal to that of the Sun (the host
1894
+ star). Instead, we explicitly adopt the normalized reflectance on solar zodis, ˜R⊙,λ, in the model
1895
+ to better account for the zodical light in a exoplanetary system. We calculate ˜R⊙,λ by tracing the
1896
+ spectral data from observations of the zodical light (see Figure 8 in Kawara et al. (2017) and Figure
1897
+ 10 in Tsumura et al. (2010)) with the normalization in the V band. Using ˜R⊙,λ, the noise from zodis
1898
+ is expressed as:
1899
+ Cz = πλ2D2
1900
+ 4hcR
1901
+ F⊙,λ(1au)
1902
+ F⊙,V (1au)
1903
+ ˜R⊙,λF0,V 10−Mz,V /2.5TtotalΩ∆texp,
1904
+ (B8)
1905
+ where F⊙,λ is the solar flux density at λ, F⊙,V is the solar flux density in the V band, h is the
1906
+ Planck constant, c is the speed of light, Mz,V = 23 mag arcsec−2 is the V -band zodical-light surface
1907
+ brightness, and ∆texp is the exposure time. The circular photometry aperture size is expressed as
1908
+ Ω = π(Xλ/D)2. Assuming the exozodis’s reflectance to be the same as ˜R⊙,λ, the noise from exozodis
1909
+ is written as:
1910
+ Cez = πλ2D2
1911
+ 4hcR
1912
+ �1au
1913
+ r
1914
+ �2 Fs,λ(1au)
1915
+ Fs,V (1au)
1916
+ Fs,V (1au)
1917
+ F⊙,V (1au)
1918
+ ˜R⊙,λF0,V Nez10−Mez,V /2.5TtotalΩ∆texp,
1919
+ (B9)
1920
+ where Fs,λ is the stellar flux density at λ, Fs,V is the stellar flux density in the V band, and r is the
1921
+ distance between the planet and the parent star. Mez,V = 22 mag arcsec−2 is the V -band exozodical
1922
+ light surface brightness. Even if the original treatment of exozodical light is adopted, our results
1923
+ do not significantly vary. We calculate the read-out noise (CR) to be CR = NpixNreadR2
1924
+ e− instead of
1925
+ CR = NpixNreadRe− in Robinson et al. (2016) to more realistically incorporate the noise propagation,
1926
+ where Npix is the number of contribution pixels, Nread is the number of reads at each observation,
1927
+ and Re− is the read noise count.
1928
+ REFERENCES
1929
+ Allen-Sutter, H., Garhart, E., Leinenweber, K.,
1930
+ et al. 2020, Planet. Sci. J., 1, 39
1931
+ Baker, N. R. 2008, Annu. Rev. Plant Biol., 59, 89
1932
+ Baldridge, A., Hook, S., Grove, C., & Rivera, G.
1933
+ 2009, Remote Sensing of Environment, 113, 711,
1934
+ doi: https://doi.org/10.1016/j.rse.2008.11.007
1935
+ Bishop, J. L., Bell III, J. F., Bell, J., & Moersch,
1936
+ J. E. 2019, Remote Compositional Analysis:
1937
+ Techniques for Understanding Spectroscopy,
1938
+ Mineralogy, and Geochemistry of Planetary
1939
+ Surfaces, Vol. 24 (Cambridge University Press)
1940
+
1941
+ 26
1942
+ Komatsu et al.
1943
+ Brandt, T. D., Rizzo, M., Groff, T., et al. 2017,
1944
+ Journal of Astronomical Telescopes,
1945
+ Instruments, and Systems, 3, 048002,
1946
+ doi: 10.1117/1.JATIS.3.4.048002
1947
+ Bucholtz, A. 1995, Applied Optics, 34, 2765
1948
+ Callies, J., Corpaccioli, E., Eisinger, M., Hahne,
1949
+ A., & Lefebvre, A. 2000, ESA bulletin, 102, 28
1950
+ Cogdell, R. J. 1978, Philosophical Transactions of
1951
+ the Royal Society of London. B, Biological
1952
+ Sciences, 284, 569
1953
+ Des Marais, D. J., Harwit, M. O., Jucks, K. W.,
1954
+ et al. 2002, Astrobiology, 2, 153
1955
+ Du, S., Liu, L., Liu, X., et al. 2019, Sensors, 19,
1956
+ 3009
1957
+ Du, S., Liu, L., Liu, X., & Hu, J. 2017, Remote
1958
+ Sensing, 9, 911
1959
+ Feret, J.-B., Fran¸cois, C., Asner, G. P., et al. 2008,
1960
+ Remote sensing of environment, 112, 3030
1961
+ France, K., Loyd, R. P., Youngblood, A., et al.
1962
+ 2016, The Astrophysical Journal, 820, 89
1963
+ Frankenberg, C., O’Dell, C., Berry, J., et al. 2014,
1964
+ Remote Sensing of Environment, 147, 1
1965
+ Frankenberg, C., O’Dell, C., Guanter, L., &
1966
+ McDuffie, J. 2012, Atmospheric Measurement
1967
+ Techniques, 5, 2081
1968
+ Fujita, Y., & Ohki, K. 2004, Plant and cell
1969
+ physiology, 45, 392
1970
+ Gao, B.-C., & Kaufman, Y. J. 2003, Journal of
1971
+ Geophysical Research: Atmospheres, 108
1972
+ Gates, D. M., Keegan, H. J., Schleter, J. C., &
1973
+ Weidner, V. R. 1965, Applied optics, 4, 11
1974
+ Genty, B., Briantais, J.-M., & Baker, N. R. 1989,
1975
+ Biochimica et Biophysica Acta (BBA)-General
1976
+ Subjects, 990, 87
1977
+ Grimm, B., Porra, R. J., R¨udiger, W., Scheer, H.,
1978
+ et al. 2006
1979
+ Guanter, L., Alonso, L., G´omez-Chova, L., et al.
1980
+ 2010, Journal of Geophysical Research:
1981
+ Atmospheres, 115
1982
+ Hamazaki, T., Kaneko, Y., Kuze, A., & Kondo, K.
1983
+ 2005, in Enabling sensor and platform
1984
+ technologies for spaceborne remote sensing, Vol.
1985
+ 5659, SPIE, 73–80
1986
+ Huete, A., Didan, K., Miura, T., et al. 2002,
1987
+ Remote sensing of environment, 83, 195
1988
+ Jackson, C. T., Jeong, S., Dorlhiac, G. F., &
1989
+ Landry, M. P. 2021, iScience, 24, 102156
1990
+ Jacquemoud, S., & Baret, F. 1990, Remote
1991
+ sensing of environment, 34, 75
1992
+ Kaltenegger, L., Traub, W. A., & Jucks, K. W.
1993
+ 2007, The Astrophysical Journal, 658, 598
1994
+ Kasting, J. F., & Ackerman, T. P. 1986, Science,
1995
+ 234, 1383
1996
+ Kawara, K., Matsuoka, Y., Sano, K., et al. 2017,
1997
+ Publications of the Astronomical Society of
1998
+ Japan, 69
1999
+ Kiang, N. Y., Segura, A., Tinetti, G., et al. 2007a,
2000
+ Astrobiology, 7, 252
2001
+ Kiang, N. Y., Siefert, J., & Blankenship, R. E.
2002
+ 2007b, Astrobiology, 7, 222
2003
+ Klima, R. L., Dyar, M. D., & Pieters, C. M. 2011,
2004
+ Meteorit. Planet. Sci., 46, 379
2005
+ K¨ohler, P., Fischer, W. W., Rossman, G. R., et al.
2006
+ 2021, Geophys. Res. Lett., 48
2007
+ Kopparapu, R., Arney, G., Haqq-Misra, J.,
2008
+ Lustig-Yaeger, h., & Villanueva, G. 2021, The
2009
+ Astrophysical Journal, 908, 164
2010
+ Kosugi, M., Ozawa, S.-I., Takahashi, Y., et al.
2011
+ 2020, Biochimica et Biophysica Acta
2012
+ (BBA)-Bioenergetics, 1861, 148139
2013
+ Kotabov´a, E., Jareˇsov´a, J., Kaˇna, R., et al. 2014,
2014
+ Biochimica et Biophysica Acta
2015
+ (BBA)-Bioenergetics, 1837, 734
2016
+ Krause, G., & Weis, E. 1991, Annual review of
2017
+ plant biology, 42, 313
2018
+ Kuzuhara, M., Hirano, T., Kotani, T., et al. 2018,
2019
+ in Ground-based and Airborne Instrumentation
2020
+ for Astronomy VII, Vol. 10702, International
2021
+ Society for Optics and Photonics, 1070260
2022
+ Lakowicz, J. R. 2006, Principles of fluorescence
2023
+ spectroscopy (Springer)
2024
+ Lee, J.-E., Frankenberg, C., van der Tol, C., et al.
2025
+ 2013, Proceedings of the Royal Society B:
2026
+ Biological Sciences, 280, 20130171
2027
+ Lehmer, O. R., Catling, D. C., Parenteau, M. N.,
2028
+ Kiang, N. Y., & Hoehler, T. M. 2021, Frontiers
2029
+ in Astronomy and Space Sciences, 8,
2030
+ doi: 10.3389/fspas.2021.689441
2031
+ Lincowski, A. P., Meadows, V. S., Crisp, D., et al.
2032
+ 2018, The Astrophysical Journal, 867, 76
2033
+ Livengood, T. A., Deming, L. D., A’hearn, M. F.,
2034
+ et al. 2011, Astrobiology, 11, 907
2035
+ Magdaong, N. C. M., Niedzwiedzki, D. M.,
2036
+ Goodson, C., & Blankenship, R. E. 2016, The
2037
+ Journal of Physical Chemistry B, 120, 5159
2038
+ Maier, S. W., G¨unther, K. P., & Stellmes, M.
2039
+ 2004, Digital imaging and spectral techniques:
2040
+ Applications to precision agriculture and crop
2041
+ physiology, 66, 207
2042
+
2043
+ Photosynthetic fluorescence on Exoplanets
2044
+ 27
2045
+ Meadows, V. S., Reinhard, C. T., Arney, G. N.,
2046
+ et al. 2018, Astrobiology, 18, 630
2047
+ Meftah, M., Dam´e, L., Bols´ee, D., et al. 2018,
2048
+ Astronomy & Astrophysics, 611, A1
2049
+ Monta˜n´es-Rodr´ıguez, P., Pall´e, E., Goode, P., &
2050
+ Mart´ın-Torres, F. 2006, The Astrophysical
2051
+ Journal, 651, 544
2052
+ Nakajima, M., Kuze, A., & Suto, H. 2012, in
2053
+ Sensors, Systems, and Next-Generation
2054
+ Satellites XVI, Vol. 8533, SPIE, 21–30
2055
+ O’Malley-James, J. T., & Kaltenegger, L. 2018,
2056
+ Monthly Notices of the Royal Astronomical
2057
+ Society, 481, 2487
2058
+ —. 2019, Monthly Notices of the Royal
2059
+ Astronomical Society, 488, 4530
2060
+ Pavlov, A., & Kasting, J. 2002, Astrobiology, 2, 27
2061
+ Porcar-Castell, A., Malenovsk`y, Z., Magney, T.,
2062
+ et al. 2021, Nature plants, 7, 998
2063
+ Robinson, T. D., Stapelfeldt, K. R., & Marley,
2064
+ M. S. 2016, Publications of the Astronomical
2065
+ Society of the Pacific, 128, 025003
2066
+ Rugheimer, S., & Kaltenegger, L. 2018, The
2067
+ Astrophysical Journal, 854, 19
2068
+ Sanrom´a, E., Pall´e, E., Parenteau, M., et al. 2013,
2069
+ The Astrophysical Journal, 780, 52
2070
+ Schirhagl, R., Chang, K., Loretz, M., & Degen,
2071
+ C. L. 2014, Annu. Rev. Phys. Chem., 65, 83
2072
+ Schuurmans, R. M., van Alphen, P., Schuurmans,
2073
+ J. M., Matthijs, H. C., & Hellingwerf, K. J.
2074
+ 2015, PloS one, 10, e0139061
2075
+ Schwieterman, E. W. 2018, Surface and Temporal
2076
+ Biosignatures, ed. H. J. Deeg & J. A. Belmonte
2077
+ (Cham: Springer International Publishing),
2078
+ 1–29, doi: 10.1007/978-3-319-30648-3 69-1
2079
+ Schwieterman, E. W., Cockell, C. S., & Meadows,
2080
+ V. S. 2015, Astrobiology, 15, 341
2081
+ Schwieterman, E. W., Kiang, N. Y., Parenteau,
2082
+ M. N., et al. 2018, Astrobiology, 18, 663
2083
+ Seager, S., Turner, E. L., Schafer, J., & Ford,
2084
+ E. B. 2005, Astrobiology, 5, 372
2085
+ Segura, A., Kasting, J. F., Meadows, V., et al.
2086
+ 2005, Astrobiology, 5, 706
2087
+ Selvaggio, G., Chizhik, A., Nißler, R., et al. 2020,
2088
+ Nat. Commun., 11, 1495
2089
+ Sun, Y., Frankenberg, C., Jung, M., et al. 2018,
2090
+ Remote Sensing of Environment, 209, 808
2091
+ Sunshine, J. M., & Pieters, C. M. 1998, Journal of
2092
+ Geophysical Research: Planets, 103, 13675
2093
+ Takizawa, K., Minagawa, J., Tamura, M.,
2094
+ Kusakabe, N., & Narita, N. 2017, Scientific
2095
+ reports, 7, 1
2096
+ Tinetti, G., Meadows, V. S., Crisp, D., et al. 2006,
2097
+ Astrobiology, 6, 881
2098
+ Tsumura, K., Battle, J., Bock, J., et al. 2010, The
2099
+ Astrophysical Journal, 719, 394
2100
+ Wilhelm, C., & Jakob, T. 2006, Photosynthesis
2101
+ Research, 87, 323
2102
+ Wolf, B. M., Niedzwiedzki, D. M., Magdaong, N.
2103
+ C. M., et al. 2018, Photosynthesis research, 135,
2104
+ 177
2105
+ Yao, L., Yang, D., Liu, Y., et al. 2021, A New
2106
+ Global Solar-induced Chlorophyll Fluorescence
2107
+ (SIF) Data Product from TanSat
2108
+ Measurements, Springer
2109
+
PtE2T4oBgHgl3EQfVgea/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
Q9E4T4oBgHgl3EQflA2r/content/tmp_files/2301.05156v1.pdf.txt ADDED
@@ -0,0 +1,731 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Hadronic observables from master-field simulations
2
+ Marco Cè,𝑎,∗ Mattia Bruno,𝑏 John Bulava,𝑐 Anthony Francis,𝑑 Patrick Fritzsch,𝑒
3
+ Jeremy R. Green,𝑐 Maxwell T. Hansen 𝑓 and Antonio Rago𝑔,ℎ
4
+ 𝑎Albert Einstein Center for Fundamental Physics (AEC) and Institut für Theoretische Physik, Universität
5
+ Bern, Sidlerstrasse 5, 3012 Bern, Switzerland
6
+ 𝑏Dipartimento di Fisica “Giuseppe Occhialini”, Università degli Studi di Milano-Bicocca and INFN -
7
+ Sezione di Milano Bicocca, Piazza della Scienza 3, 20126 Milan, Italy
8
+ 𝑐Deutsches Elektronen-Synchrotron DESY, Platanenallee 6, 15738 Zeuthen, Germany
9
+ 𝑑Institute of Physics, National Yang Ming Chiao Tung University, Hsinchu, Taiwan 30010
10
+ 𝑒School of Mathematics and Hamilton Mathematics Institute, Trinity College Dublin, Dublin 2, Ireland
11
+ 𝑓 Higgs Centre for Theoretical Physics, School of Physics and Astronomy, The University of Edinburgh,
12
+ Edinburgh EH9 3FD, United Kingdom
13
+ 𝑔IMADA and CP3, University of Southern Denmark, Odense, Denmark
14
+ ℎDepartment of Theoretical Physics, CERN, 1211 Geneva 23, Switzerland
15
+ E-mail: marcoce@itp.unibe.ch
16
+ Substantial progress has been made recently in the generation of master-field ensembles. This
17
+ has to be paired with efficient techniques to compute observables on gauge field configurations
18
+ with a large volume. Here we present the results of the computation of hadronic observables,
19
+ including hadron masses and meson decay constants, on large-volume and master-field ensembles
20
+ with physical volumes of up to (18 fm)4 and 𝑚 𝜋𝐿 up to 25, simulated using 𝑁f = 2 + 1 stabilized
21
+ Wilson fermions. We obtain sub-percent determinations from single gauge configurations with the
22
+ combined use of position-space techniques, volume averages and master-field error estimation.
23
+ The 39th International Symposium on Lattice Field Theory,
24
+ 8th-13th August, 2022,
25
+ Rheinische Friedrich-Wilhelms-Universität Bonn, Bonn, Germany
26
+ ∗Speaker
27
+ © Copyright owned by the author(s) under the terms of the Creative Commons
28
+ Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
29
+ https://pos.sissa.it/
30
+ arXiv:2301.05156v1 [hep-lat] 12 Jan 2023
31
+
32
+ Hadronic observables from master-field simulations
33
+ Marco Cè
34
+ 1.
35
+ Introduction
36
+ Gauge-field configurations in a lattice theory with a mass gap have the stochastic locality property,
37
+ that is, gauge-invariant local fields at large physical separations are stochastically independent.
38
+ The master-field paradigm introduced by Lüscher [1] proposes to use stochastic locality to obtain
39
+ observable estimates from a single or at most a few representative gauge-field configurations on very
40
+ large lattices, making use of the invariance under translations of the theory and of volume averages.
41
+ As a first application of this paradigm, stochastic locality has been used to compute the
42
+ topological susceptibility at 𝑇 > 𝑇𝑐 in master-field simulations of SU(3) Yang–Mills theory [2]. In
43
+ a theory with fermions such as QCD, numerical simulations are performed after integrating out
44
+ fermions exactly. Hadronic observables in QCD are expressed in terms of contractions of quark
45
+ propagators whose locality is not manifest. Moreover, the sheer size of the lattices requires stabilising
46
+ measures that have been studied in ref. [3]. These include a slight modification of the standard
47
+ 𝑂(𝑎)-improved lattice Dirac operator, replacing the HMC with the stochastic molecular dynamics
48
+ (SMD) algorithm, employing quadruple-precision lattice sums and uniform-norm stopping criteria
49
+ for the Dirac equation solver. Recent progress in master-field simulations has been presented at the
50
+ Lattice 2021 conference [4, 5] and at this conference [6]. In these proceedings we further develop
51
+ the position-space techniques introduced in ref. [5], by presenting an estimator for position-space
52
+ correlators that scales efficiently with the volume.
53
+ Estimation of observables on master fields is explained in details in ref. [1]. In summary, the
54
+ expectation value ⟨O(𝑥)⟩ of a local field O(𝑥) is obtained averaging over translations
55
+ ⟪O(𝑥)⟫ = 1
56
+ 𝑉
57
+ ∑︁
58
+ 𝑧
59
+ O(𝑥 + 𝑧),
60
+ ⟨O(𝑥)⟩ = ⟪O(𝑥)⟫ + 𝑂
61
+
62
+ 𝑉−1/2�
63
+ ,
64
+ (1)
65
+ with the variance of this estimator given by
66
+ 𝜎2
67
+ ⟪O⟫(𝑥) =
68
+
69
+ [⟪O(𝑥)⟫ − ⟨O(𝑥)⟩]2�
70
+ = 1
71
+ 𝑉
72
+ ∑︁
73
+ 𝑦
74
+ ⟨O(𝑦)O(0)⟩𝑐
75
+ = 1
76
+ 𝑉
77
+ ������
78
+ ∑︁
79
+ |𝑦|≤𝑅
80
+ ⟨O(𝑦)O(0)⟩𝑐 + 𝑂
81
+
82
+ e−𝑚𝑅�������
83
+ = 1
84
+ 𝑉
85
+ ������
86
+ ∑︁
87
+ |𝑦|≤𝑅
88
+ ⟪O(𝑦)O(0)⟫𝑐 + 𝑂
89
+
90
+ e−𝑚𝑅�
91
+ + 𝑂
92
+
93
+ 𝑉−1/2�������
94
+ ,
95
+ (2)
96
+ where in the second line we first used the fact that the connected correlator of the local field O(𝑥)
97
+ decays exponentially with spacetime separation, and then we applied again translation averages.
98
+ 2.
99
+ Position-space correlators
100
+ In this work we focus on correlation functions in position space
101
+ 𝐶𝑃𝑃(𝑥) → 𝑐2
102
+ 𝑃
103
+ 4𝜋2
104
+ 𝑚 𝜋
105
+ |𝑥| 𝐾1(𝑚 𝜋|𝑥|),
106
+ (3a)
107
+ 𝐶𝐴𝑃,𝜇(𝑥) → 𝑐𝐴𝑐𝑃
108
+ 4𝜋2
109
+ 𝑥𝜇
110
+ |𝑥|
111
+ 𝑚 𝜋
112
+ |𝑥| 𝐾2(𝑚 𝜋|𝑥|),
113
+ (3b)
114
+ 𝐶𝐴𝐴,𝜇𝜈(𝑥) →
115
+ 𝑐2
116
+ 𝐴
117
+ 4𝜋2
118
+
119
+ −𝛿𝜇𝜈
120
+ 1
121
+ 𝑥2 𝐾2(𝑚 𝜋|𝑥|) + 𝑥𝜇𝑥𝜈
122
+ 𝑥2
123
+ �𝑚 𝜋
124
+ |𝑥| 𝐾1(𝑚 𝜋|𝑥|) + 4
125
+ 𝑥2 𝐾2(𝑚 𝜋|𝑥|)
126
+ ��
127
+ ,
128
+ (3c)
129
+ 𝐶𝑁 𝑁 (𝑥) →
130
+ 𝑐2
131
+ 𝑁
132
+ 4𝜋2
133
+ 𝑚2
134
+ 𝑁
135
+ |𝑥|
136
+
137
+ 𝐾1(𝑚𝑁 |𝑥|) + /𝑥
138
+ |𝑥| 𝐾2(𝑚𝑁 |𝑥|)
139
+
140
+ ,
141
+ (3d)
142
+ 2
143
+
144
+ Hadronic observables from master-field simulations
145
+ Marco Cè
146
+ Table 1: Parameters of the master-field lattices used in this study (with 𝑎 ≈ 0.094 fm and 𝑚 𝜋 ≈ 270 MeV,
147
+ see also ref. [4]), together with information on the statistics used in the observable computation as explained
148
+ in section 3.
149
+ 𝐿/𝑎
150
+ 𝐿 [fm]
151
+ 𝑚 𝜋𝐿
152
+ 𝑛cnfg
153
+ 𝑏/𝑎
154
+ |𝐺|
155
+ 𝑛shift
156
+ 𝑏shift/𝑎
157
+ 𝑛point
158
+ A
159
+ 96
160
+ 9
161
+ 12.5
162
+ 5
163
+ 48
164
+ 8
165
+ 512
166
+ 12
167
+ 4096
168
+ B
169
+ 192
170
+ 18
171
+ 25
172
+ 2
173
+ 48
174
+ 128
175
+ 32
176
+ 24
177
+ 4096
178
+ where the subscript indicates the two-point function of either pseudoscalar densities 𝑃 = ¯𝑢𝛾5𝑑, axial
179
+ current 𝐴𝜇 = ¯𝑢𝛾𝜇𝛾5𝑑 or nucleon spinor 𝑁 = 𝜖𝑎𝑏𝑐(𝑢𝑇
180
+ 𝑎𝐶𝛾5𝑑𝑏)𝑢𝑐, as a function of the source-sink
181
+ separation 𝑥.
182
+ In eqs. (3), the asympotic behaviour for 𝑥 → ∞ of these correlators is given assuming the
183
+ symmetries of the continuum theory in an infinite volume. From position-space correlators one
184
+ can extract simple hadronic observables, including the masses 𝑚 𝜋 and 𝑚𝑁 and the decay constant
185
+ 𝑓𝜋 = 𝑐𝐴/𝑚 𝜋, as demonstrated in ref. [5].
186
+ Once computed on the lattice as discussed in the following section, these correlators as a
187
+ function of the four-dimensional source-sink separation 𝑥 include lattice discretization effects that
188
+ break the rotational symmetry and depend on the direction of 𝑥. In this study, we limit ourselves to
189
+ the radial correlators ˚𝐶(𝑟) introduced in ref. [5] that are averaged over 𝑆3(𝑟) = {𝑥 ∈ R4 : |𝑥| = 𝑟},
190
+ the 3-sphere of radius 𝑟, and by construction depend only on the radial coordinate 𝑟 = |𝑥|. While
191
+ ˚𝐶𝑃𝑃(𝑟) = 𝐶𝑃𝑃(𝑥), for the 𝐴𝑃-correlator 𝐶𝐴𝑃,𝜇(𝑥) we contract the open 𝜇 index with the only
192
+ available four-vector 𝑥𝜇 to obtain a scalar, ˚𝐶𝐴𝑃(𝑟) = 𝑥𝜇𝐶𝐴𝑃,𝜇(𝑥) → 𝑐𝐴𝑐𝑃
193
+ 4𝜋2 𝑚 𝜋𝐾2(𝑚 𝜋𝑟). In the case
194
+ of 𝐶𝐴𝐴,𝜇𝜈 there are two ways to obtain a scalar,
195
+ ˚𝐶 (1)
196
+ 𝐴𝐴(𝑟) = 𝛿𝜇𝜈𝐶𝐴𝐴,𝜇𝜈(𝑥),
197
+ ˚𝐶 (2)
198
+ 𝐴𝐴(𝑟) = 𝑥𝜇𝑥𝜈𝐶𝐴𝐴,𝜇𝜈(𝑥),
199
+ (4)
200
+ and similarly for the nucleon correlator that is a spinor, with /𝑥 = 𝛾𝜇𝑥𝜇,
201
+ ˚𝐶 (1)
202
+ 𝑁 𝑁 (𝑟) ≡ tr 𝐶𝑁 𝑁 (𝑥),
203
+ ˚𝐶 (2)
204
+ 𝑁 𝑁 (𝑟) ≡ tr /𝑥𝐶𝑁 𝑁 (𝑥).
205
+ (5)
206
+ On the lattice, an estimator of these radial correlators is given by
207
+ ˚𝐶(𝑟) =
208
+ 1
209
+ r4(𝑟2)
210
+ ∑︁
211
+ |𝑥 |=𝑟
212
+ 𝐶(𝑥)
213
+ (6)
214
+ where r4 is defined in ref. [5].
215
+ We note that the symmetry of 𝑆3(𝑟) is broken not only by 𝑎 ≠ 0 but also by the finite size of the
216
+ hypercubic box and by the fact that we choose antiperiodic (instead of periodic) boundary conditions
217
+ in one of the four dimensions for quarks. However, as we show in section 5 these boundary effects
218
+ are not visible at the current level of precision on the master-field lattices in table 1 considered here,
219
+ differently from what we observed on smaller volumes [5].
220
+ 3.
221
+ Grid of point sources estimator
222
+ The simplest way to compute the correlators introduced in section 2 numerically is to solve the
223
+ Dirac equation on a point source, that is, a source spinor that is supported on a single lattice point,
224
+ and subsequently perform the suitable contractions of spinor and space-time indeces. A consequence
225
+ 3
226
+
227
+ Hadronic observables from master-field simulations
228
+ Marco Cè
229
+ of this naive strategy applied on gauge-field configurations with a large volume is that the effort for
230
+ each correlator point source scales proportionally with the volume, which is clearly not optimal.
231
+ Indeed, most of the resources are spent in computing the correlator at a distance from the source of
232
+ multiple correlation lengths, which has an exponentially suppressed contribution to the physics and
233
+ in most of the cases is completely dominated by noise.
234
+ Instead, we would like to exploit stochastic locality to define estimators that scale efficiently
235
+ with the volume and are suitable for master-field applications. Taking as an example the radial
236
+ correlators ˚𝐶(𝑟) introduced in section 2, let us assume that we are interested in physics that can be
237
+ extracted from correlators up to a maximum radial source-sink separation 𝑟max. Ref. [1] sketches a
238
+ decomposition of the lattice in space-time domains, or blocks, that are physically large, such that all
239
+ the lattice points within an 𝑟max distance from a source point at the centre of each block are within
240
+ the same block. This implies a block size 𝑏 > 2𝑟max. Solving the Dirac equation in each block,
241
+ imposing Dirichlet boundary conditions at the block boundary of the gauge field, one can decouple
242
+ the computational cost of the estimator from the volume of the global lattice. However, this method
243
+ introduces boundary effects that can be large for sink points close to the boundaries [1, 7], see also
244
+ refs. [8, 9]. We leave the exploration of this direction for future work, and we focus here on a simpler
245
+ approach that does not require a dedicated correction computation.
246
+ We introduce a set of lattice points 𝐺 that are separated (on average) by a physical distance
247
+ constant in the volume, such that the number of points |𝐺| ∝ 𝑉, that is, it grows proportionally with
248
+ the volume. On these point we introduce stochastic sources that satisfy
249
+
250
+ 𝜂𝑖(𝑥)𝜂†
251
+ 𝑗(𝑦)
252
+
253
+ 𝜂 = 𝛿𝑖 𝑗𝛿𝑥𝑦𝐼
254
+ for 𝑥, 𝑦 ∈ 𝐺,
255
+ (7)
256
+ where 𝐼 is the identity matrix in spin and colour space. By contracting at the sink with stochastic
257
+ noise corresponding to each coordinate 𝑦 ∈ 𝐺 one obtains |𝐺| ∝ 𝑉 samples of the quark propagator,
258
+ one for each 𝑦 ∈ 𝐺, from a single global-lattice inversion that is 𝑂(𝑉) computationally. Each sample
259
+ has a spurious contribution of stochastic nature from source points 𝑥 ≠ 𝑦, which is suppressed
260
+ by averaging the quark propagator over a number of sources 𝑛src and does not contribute to the
261
+ expectation value. Mesonic two-point functions that contract two quark propagators require 𝑛src ≥ 2
262
+ to obtain an unbiased estimator, that in the case of the pseudoscalar-density two-point function reads
263
+ 𝐶𝐺
264
+ 𝑃𝑃(𝑥; 𝑦) =
265
+ 1
266
+ 𝑛src(𝑛src − 1)
267
+ ∑︁
268
+ 𝑖≠𝑗
269
+ Re
270
+
271
+ 𝜓†
272
+ 𝑖 (𝑥 + 𝑦)𝜓 𝑗(𝑥 + 𝑦)𝜂†
273
+ 𝑗(𝑦)𝜂𝑖(𝑦)
274
+
275
+ ,
276
+ (8)
277
+ where 𝜓𝑖(𝑥) = �
278
+ 𝑦 𝐷−1(𝑥; 𝑦)𝜂𝑖(𝑦) and the double sum over 𝑖 ≠ 𝑗 can be computed in 𝑂(𝑛src) cost.
279
+ In this approach, since |𝐺| ∝ 𝑉, efficient scaling of the solutions of the Dirac equation is
280
+ achieved. Moreover, 𝐺 implicitly realises a domain decomposition by labelling each lattice point
281
+ with the closest 𝑦 ∈ 𝐺.1 Eq. (8) is in principle valid for any 𝑥 and 𝑦, but if only (𝑥, 𝑦) pairs that are
282
+ in the same domain are considered then one can compute efficiently all the |𝐺| ∝ 𝑉 contributions
283
+ with a single 𝑂(𝑉) pass over the whole lattice. This realises the optimal volume scaling for the
284
+ contractions too. It also lowers the required 𝑛src since the “correct” source 𝑦 is always the closest to
285
+ the sink 𝑥 and spurious contributions are further suppressed by the longer source-sink separation.2
286
+ 1Up to points equidistant from two or more 𝑦 ∈ 𝐺 that require additional conditions to be assigned to a domain.
287
+ 2These spurious contributions are only stochastic and do not modify the expectation value, although we note that they
288
+ can have different quantum numbers and decay slower than the correlator being estimated.
289
+ 4
290
+
291
+ Hadronic observables from master-field simulations
292
+ Marco Cè
293
+ 𝑏
294
+ 𝑟max =
295
+
296
+ 2𝑏/2
297
+ 𝑟max =
298
+
299
+ 2𝑏/2
300
+ 𝑦 ∈ 𝐺
301
+ 𝑦 ∈ 𝐺
302
+ 𝑥
303
+ Figure 1: Sketch of the estimator with a grid of point sources over a two-dimensional window of the lattice.
304
+ The set 𝐺 of source points
305
+ ∈ 𝐺 is a regular grid with spacing 𝑏 and even point only. A mesonic two-point
306
+ function is evaluated at sink point 𝑥 that is in the domain defined by 𝑦 ∈ 𝐺 and within a distance 𝑟max from 𝑦.
307
+ One of the spurious contributions from the “wrong” source is shown in light grey.
308
+ Moreover, it implies 𝑟max = min𝑥,𝑦∈𝐺 |𝑥 − 𝑦|/2, that is, the minimum of the semidistance of points
309
+ in 𝐺. Therefore, 𝐺 has to be sparse enough for correlators at the relevant radial separations 𝑟 ≤ 𝑟max
310
+ to be accessible.
311
+ We study this setup on two sets of a few master fields whose parameters are given in table 1.
312
+ The master fields in both sets are hypercubic boxes with equal extent in each dimension denoted
313
+ by 𝐿, such that the volume is 𝑉 = 𝐿4. The 𝐿 = 192𝑎 master fields denoted by B (𝑛cnfg = 2) have
314
+ exactly 16 times, twice in each dimension, the volume of the ones with 𝐿 = 96𝑎 in set A (𝑛cnfg = 5)
315
+ and otherwise identical parameters, and we can thus define equivalent 𝐺s on both sets and study the
316
+ volume scaling. We employ U(1) noise that satisfies eq. (7). The simplest choice for 𝐺 is a regular
317
+ grid with spacing 𝑏, which matches the domain decomposition proposed in ref. [1], with 𝑏 = 48𝑎
318
+ being a suitable choice in our case. However, the definition of 𝐺 is more flexible. In this work, we
319
+ employ a grid with only even (or equivalently odd) points, which results in 𝑟max =
320
+
321
+ 2𝑏/2 ≃ 33.94𝑎
322
+ instead of 𝑏/2 = 24𝑎, at the cost of halving the number of points on the grid.3 The total number
323
+ of points is thus |𝐺| = (𝐿/𝑏)4/2 that evaluates to 8 and 128 for A and B respectively. We fix
324
+ 𝑛src = 2 and with the current precision we do not observe deviations from the expected behaviour,
325
+ especially at 𝑟 close to 𝑟max, that can be attributed to spurious contributions. Further optimisation
326
+ such as systematically and exactly removing the closer spurious contributions, e.g. with hierarchical
327
+ probing [11], are not explored here.
328
+ The statistics obtained with a single source, e.g. eight points on each master field in A, is limited
329
+ by the need of balancing the density of 𝐺 with a lower limit on the 𝑟max suitable to extract long-range
330
+ physics. To increase the statistics we simply propose to recompute eq. (8) on 𝑛shift sources, each
331
+ time shifting 𝐺 to have a distinct support. This is done four times for each direction in the case of A
332
+ and twice for each direction in B. An extra factor of two is obtained by pairing each even-only 𝐺
333
+ with the corresponding odd-only, leading to 𝑛shift = 512 and 32 for A and B respectively. Combined
334
+ with |𝐺|, the final result is the same number of source points 𝑛point = 4096 for both volumes, on
335
+ 3This results in a doubled |𝐺|𝑟4max/𝑉 density. Indeed, it corresponds to a 𝐷4 lattice (or equivalently 𝐹4 lattice) that
336
+ has the densest known packing of equal spheres in four dimensions [10].
337
+ 5
338
+
339
+ Hadronic observables from master-field simulations
340
+ Marco Cè
341
+ a regular grid with spacing 𝑏shift = 12𝑎 and 24𝑎 for A and B respectively. Ignoring that on the A
342
+ lattices source points are on average twice as close and thus potentially more correlated than on B,
343
+ in our setup we have same statistics for each gauge field configuration for both A and B. Crucially,
344
+ thanks to the optimal volume scaling of the stochastic grid correlator, this matching statistic has
345
+ been obtained at an equivalent computational cost.
346
+ 4.
347
+ Master-field errors
348
+ The estimator in section 3 applied to the radial correlator leads to a collection of up to 4096
349
+ correlators for each master-field configuration on a regular grid of source points with spacing
350
+ 𝑏shift = 𝐿/8. Applying stochastic locality, the expectation value
351
+ � ˚𝐶(𝑟)
352
+ � is given up to volume-
353
+ suppressed corrections by the translation average
354
+ � ˚𝐶(𝑟)
355
+
356
+ = ⟪ ˚𝐶(𝑟)⟫ + 𝑂
357
+
358
+ 𝑉−1/2�
359
+ = 1
360
+ 𝑉
361
+ ∑︁
362
+ 𝑦∈𝐺
363
+ ˚𝐶(𝑟; 𝑦) + 𝑂
364
+
365
+ 𝑉−1/2�
366
+ (9)
367
+ where the 𝑦 in ˚𝐶(𝑟; 𝑦) denotes the source point. The error of this estimator can be estimated applying
368
+ eq. (2) with O(𝑦) = ˚𝐶(𝑟; 𝑦)
369
+
370
+ [⟪ ˚𝐶(𝑟)⟫ −
371
+ � ˚𝐶(𝑟)
372
+
373
+ ]2�
374
+ = 1
375
+ 𝑉
376
+ ������
377
+ ∑︁
378
+ |𝑦|≤𝑅
379
+ ⟪ ˚𝐶(𝑟; 𝑦) ˚𝐶(𝑟; 0)⟫𝑐 + 𝑂
380
+
381
+ e−𝑚𝑅�
382
+ + 𝑂
383
+
384
+ 𝑉−1/2�������
385
+ ,
386
+ (10)
387
+ where again the sum over the source coordinates 𝑦 is performed over the grid of point sources.
388
+ Finding the optimal 𝑅 to truncate the sum in the r.h.s. has a clear analogy with the well-known Γ
389
+ method introduced by Wolff to deal with autocorrelation in Monte Carlo time and estimate an error
390
+ with less errors [12], and leads to a generalisation of the Madras–Sokal formula for the statistical
391
+ error of the error [13, 14]. This can be implemented in a resource efficient way by computing
392
+ the correlation between grid points with higher-dimensional fast Fourier transforms. The optimal
393
+ 𝑅 depends on the observable. In particular, since each value of the correlator radial source-sink
394
+ separation 𝑟 defines a distinct observable with different spacetime support, 𝑅 is a function of 𝑟.
395
+ Alternatively, one can apply a four-dimensional binning of the point sources in the grid into
396
+ blocks. For instance, blocks of size (24𝑎)4 bin 16 point sources on A and only one point source on
397
+ B according to the spacing 𝑏shift in table 1, while blocks of size (48𝑎)4 bin 256 and 16 point sources
398
+ respectively. We tested these two bin sizes and observed that this leads to a stable error estimate. In
399
+ the following, we show results obtained in the more conservative case, that is, with blocks of size
400
+ (48𝑎)4.
401
+ We note that master-field error estimation can be combined with standard methods based on
402
+ an ensemble of gauge field configurations, e.g. with a five-dimensional variant of the Γ method in
403
+ spacetime coordinates and Monte Carlo time. Explorations in this direction can be found in ref. [15].
404
+ 5.
405
+ Numerical results
406
+ We computed 𝑚 𝜋, 𝑚𝑁 and 𝑓𝜋 using position-space correlators on the sets of master fields
407
+ whose parameters are listed in table 1. The results for these hadronic observables are listed in table 2.
408
+ We employed the technique already studied in ref. [5] to extract the pion mass 𝑚 𝜋 from the
409
+ long-distance behaviour in eq. (3a) of the position-space correlator ˚𝐶𝑃𝑃(𝑟). In those proceedings
410
+ 6
411
+
412
+ Hadronic observables from master-field simulations
413
+ Marco Cè
414
+ Table 2: Numerical results for hadronic observable with errors estimated à la master field.
415
+ 𝐿/𝑎
416
+ 𝑎𝑚 𝜋
417
+ 𝑎𝑚𝑁
418
+ 𝑎 𝑓 bare
419
+ 𝜋
420
+ A
421
+ 96
422
+ 0.126 28(33)
423
+ 0.500(6)
424
+ 0.0890(3)
425
+ B
426
+ 192
427
+ 0.126 01(19)
428
+ 0.487(8)
429
+ 0.0885(4)
430
+ 5
431
+ 10
432
+ 15
433
+ 20
434
+ 25
435
+ 30
436
+ r/a
437
+ 0.08
438
+ 0.10
439
+ 0.12
440
+ 0.14
441
+ 0.16
442
+ 0.18
443
+ 0.20
444
+ ameff
445
+ covariant
446
+ one-state fit
447
+ two-state fit
448
+ 5
449
+ 10
450
+ 15
451
+ 20
452
+ 25
453
+ 30
454
+ r/a
455
+ 0.08
456
+ 0.10
457
+ 0.12
458
+ 0.14
459
+ 0.16
460
+ 0.18
461
+ 0.20
462
+ ameff
463
+ covariant
464
+ one-state fit
465
+ two-state fit
466
+ Figure 2: Effective mass of the ˚𝐶𝑃𝑃(𝑟) correlator as a function of 𝑟 for master fields in set A (left plot) and
467
+ set B (right plot). On top of the data points with master-field errors shown in blue, we show the results of a
468
+ one-state fit in a green band and of a two-states fit in a red band. The thickness of the bands is the statistical
469
+ error.
470
+ the technique was applied to correlators computed with point sources on an ensemble of gauge field
471
+ configurations with a (6 fm)3 space volume, performing a standard error estimation. Here we have a
472
+ larger volume that allows us to use the grid of point sources as described in section 3 and estimate
473
+ the error à la master field, see section 4. On top of the same number of samples 𝑛point = 4096 for
474
+ each configuration, we have 5 configurations in set A and 2 in set B. This means that we have a larger
475
+ statistics for the 𝐿 = 96𝑎 master fields from which we expect a ≈ 1.58 reduction of the error.
476
+ The effective mass4 of ˚𝐶𝑃𝑃(𝑟) is shown in the two plots in figure 2. For each set, two fits are
477
+ performed: a “one-state” fit having 𝑐𝑃 and 𝑚 𝜋 as free parameters, and a “two-states” one with an
478
+ added “excited state” term 𝑎1(𝑚1/𝑟)𝐾1(𝑚1/𝑟) with two extra free parameters 𝑎1 and 𝑚1 > 𝑚 𝜋. We
479
+ choose appropriate values for the smaller 𝑟 of the correlator data that enter the fit, with different
480
+ choices for one-state and two-states fits. Instead, all the data up to largest available 𝑟 = 𝑟max enter
481
+ the fit, since we do not observe any boundary effect that constrains us otherwise. The two fits on
482
+ each set give compatible results and the corresponding effective mass is shown in figure 2.
483
+ From the one-state fits we obtain the results in table 2, which show a good agreement between
484
+ the two sets. Contrary to the expectation based on 𝑛cnfg, the error is 40 % smaller on set B. A
485
+ possible explanation for this fact is the 𝑏shift = 12𝑎 of the samples of set A, halved with respect to set
486
+ B, which can lead to a reduced effective number of samples due to stronger correlations in space.
487
+ Similarly, we extract 𝑚𝑁 from the two contractions in eq. (5) of the position-space nucleon
488
+ correlator in eq. (3d) as done in ref. [5], but employing the techniques of sections 3 and 4. The results in
489
+ table 2 are from the one-state fits to ˚𝐶 (1)
490
+ 𝑁 𝑁 (𝑟) with the free parameters 𝑐𝑁 and 𝑚𝑁 , and are compatible
491
+ 4See eq. (10) in ref. [5] for the definition of the effective mass of the radial correlator.
492
+ 7
493
+
494
+ Hadronic observables from master-field simulations
495
+ Marco Cè
496
+ 5
497
+ 10
498
+ 15
499
+ 20
500
+ 25
501
+ 30
502
+ r/a
503
+ 0.3
504
+ 0.4
505
+ 0.5
506
+ 0.6
507
+ 0.7
508
+ 0.8
509
+ ameff
510
+ covariant, trNN
511
+ covariant, tr/xNN
512
+ one-state fit, trNN
513
+ one-state fit, tr/xNN
514
+ two-state fit, trNN
515
+ two-state fit, tr/xNN
516
+ 5
517
+ 10
518
+ 15
519
+ 20
520
+ 25
521
+ 30
522
+ r/a
523
+ 0.3
524
+ 0.4
525
+ 0.5
526
+ 0.6
527
+ 0.7
528
+ 0.8
529
+ ameff
530
+ covariant, trNN
531
+ covariant, tr/xNN
532
+ one-state fit, trNN
533
+ one-state fit, tr/xNN
534
+ two-state fit, trNN
535
+ two-state fit, tr/xNN
536
+ Figure 3: Effective mass of the ˚𝐶 (𝑖)
537
+ 𝑁 𝑁 (𝑟) correlators as a function of 𝑟 for master fields in set A (left plot) and
538
+ set B (right plot), where 𝑖 = 1 corresponds to the tr 𝑁𝑁 contraction and 𝑖 = 2 to the tr /𝑥𝑁𝑁 one. On top of the
539
+ data points with master-field errors shown in blue and orange for 𝑖 = 1 and 2 respectively, we show the results
540
+ of a one-state fit in green and brown bands and of a two-states fit in red and purple bands. The thickness of the
541
+ bands is the statistical error.
542
+ with the results of two-states fits with the replacement ˚𝐶𝑁 𝑁 (𝑟) → ˚𝐶𝑁 𝑁 (𝑟)[1+𝑎1(𝑚 𝜋/𝑟)𝐾1(𝑚 𝜋𝑟)]
543
+ where 𝑎1 is an extra free parameter and 𝑚 𝜋 is fixed. The fit to ˚𝐶 (2)
544
+ 𝑁 𝑁 (𝑟) shows similar results,
545
+ although with a slightly larger central value that can be attributed to different discretization effects.
546
+ The effective masses corresponding to data and fits are shown in figure 3. In the case of 𝑚𝑁 , we
547
+ observe a larger error on set B, compatible with the lower statistics and showing no indication of
548
+ correlation-in-space effects.
549
+ We also extract the pion decay constant 𝑓 bare
550
+ 𝜋
551
+ , where the bare indicates that we do not include the
552
+ axial-current renormalization factor, from a combined fit of the four correlators ˚𝐶𝑃𝑃, ˚𝐶𝐴𝑃, ˚𝐶 (1)
553
+ 𝐴𝐴 and
554
+ ˚𝐶 (2)
555
+ 𝐴𝐴. As fit function we employ the long-distance behaviours derived from eqs. 3, which depends
556
+ on the free parameters 𝑐𝑃, 𝑐𝐴 and 𝑚 𝜋. As shown from the plots of the ratio between data and fit
557
+ functions in figure 4, ˚𝐶𝐴𝑃 approaches the asymptotic behaviour at a smaller value of 𝑟, followed
558
+ by ˚𝐶𝑃𝑃 and ˚𝐶 (2)
559
+ 𝐴𝐴.
560
+ ˚𝐶 (1)
561
+ 𝐴𝐴 converges to the asymptotic behaviour at a much larger 𝑟, with the ratio
562
+ being initially negative and changing sign around 𝑟 ≈ 14𝑎. The values of 𝑚 𝜋 obtained from these
563
+ combined fits are consistent with the previous fits to only the ˚𝐶𝑃𝑃 correlators. The decay constant is
564
+ then given by 𝑓 bare
565
+ 𝜋
566
+ = 𝑐𝐴/𝑚 𝜋 and shown in table 2. Like in the case of 𝑚𝑁 , the values on set A and
567
+ B are compatible, with a slightly larger error for set B that is consistent with the lower number of
568
+ master field configurations.
569
+ 6.
570
+ Conclusions
571
+ We have shown that position-space correlators can be used to extract hadron masses and decay
572
+ constants with short-distance and cut-off effects under control. Crucially, the statistical error can
573
+ be estimated à la master field, obtaining an efficient scaling of the computational effort with the
574
+ increased volume.
575
+ In this work we studied sphere-averaged radial correlators, but potentially more information is
576
+ encoded in correlators as function of four-dimensional coordinates. This requires understanding
577
+ effects that break rotational symmetry at finite lattice spacing and is an interesting topic for further
578
+ studies.
579
+ 8
580
+
581
+ Hadronic observables from master-field simulations
582
+ Marco Cè
583
+ 0.020
584
+ 0.022
585
+ 0.024
586
+ 0.026
587
+ |cP|2
588
+ |cP|2 fit
589
+ ˚CPP
590
+ 0.0016
591
+ 0.0018
592
+ 0.0020
593
+ |cAc†
594
+ P|
595
+ |cAc†
596
+ P| fit
597
+ ˚CAP
598
+ 10
599
+ 20
600
+ 30
601
+ r/a
602
+ 0.00011
603
+ 0.00012
604
+ 0.00013
605
+ 0.00014
606
+ |cA|2
607
+ |cA|2 fit
608
+ ˚C(1)
609
+ AA
610
+ 10
611
+ 20
612
+ 30
613
+ r/a
614
+ 0.00011
615
+ 0.00012
616
+ 0.00013
617
+ 0.00014
618
+ |cA|2
619
+ |cA|2 fit
620
+ ˚C(2)
621
+ AA
622
+ 0.020
623
+ 0.022
624
+ 0.024
625
+ 0.026
626
+ |cP|2
627
+ |cP|2 fit
628
+ ˚CPP
629
+ 0.0016
630
+ 0.0018
631
+ 0.0020
632
+ |cAc†
633
+ P|
634
+ |cAc†
635
+ P| fit
636
+ ˚CAP
637
+ 10
638
+ 20
639
+ 30
640
+ r/a
641
+ 0.00011
642
+ 0.00012
643
+ 0.00013
644
+ 0.00014
645
+ |cA|2
646
+ |cA|2 fit
647
+ ˚C(1)
648
+ AA
649
+ 10
650
+ 20
651
+ 30
652
+ r/a
653
+ 0.00011
654
+ 0.00012
655
+ 0.00013
656
+ 0.00014
657
+ |cA|2
658
+ |cA|2 fit
659
+ ˚C(2)
660
+ AA
661
+ Figure 4: Plots of the ratio between correlator data and their fitted long-distance behaviours for master fields
662
+ in set A (top row) and set B (bottom row). The amplitude in the denominator is set to one, so that the actual
663
+ amplitude for each correlator is shown on the vertical axis. In each row, four plots are shown for ˚𝐶𝑃𝑃, ˚𝐶 (1)
664
+ 𝐴𝐴
665
+ (left column), ˚𝐶𝐴𝑃 and ˚𝐶 (2)
666
+ 𝐴𝐴 (right column), with the correlator data with master field errors shown in blue.
667
+ The amplitude parameters of the corresponding fit function, which are functions of 𝑐𝑃 and 𝑐𝐴, are shown in
668
+ an orange horizontal line with a pale orange error band.
669
+ Position-space methods find applications in computations of quantities that go beyond the
670
+ simple hadronic quantities considered here, such as for example the hadronic vacuum polarisation
671
+ contribution to the anomalous magnetic moment of the muon [16, 17], including the so-called
672
+ window contribution [18]. The estimators presented here provide a straightforward path to the
673
+ computation of this quantities in the master-field paradigm.
674
+ Acknowledgements: The research of MB is funded through the MUR program for young researchers “Rita
675
+ Levi Montalcini”. AF acknowledges support by the Ministry of Science and Technology Taiwan (MOST)
676
+ under grant 111-2112-M-A49-018-MY2. JRG acknowledges support from the Simons Foundation through the
677
+ Simons Bridge for Postdoctoral Fellowships scheme. MTH is supported by UKRI Future Leader Fellowship
678
+ MR/T019956/1 and in part by UK STFC grant ST/P000630/1. This work was performed using the DiRAC
679
+ Data Intensive service at Leicester, operated by the University of Leicester IT Services, which forms part
680
+ of the STFC DiRAC HPC Facility (www.dirac.ac.uk). The equipment was funded by BEIS capital
681
+ funding via STFC capital grants ST/K000373/1 and ST/R002363/1 and STFC DiRAC Operations grant
682
+ ST/R001014/1. DiRAC is part of the National e-Infrastructure. We acknowledge PRACE for awarding
683
+ us access to SuperMUC-NG at GCS@LRZ, Germany, where some computations were performed Many
684
+ 9
685
+
686
+ Hadronic observables from master-field simulations
687
+ Marco Cè
688
+ simulations were performed on a dedicated HPC cluster at CERN. We gratefully acknowledge the computer
689
+ resources and the technical support provided by these institutions.
690
+ References
691
+ [1] M. Lüscher, Stochastic locality and master-field simulations of very large lattices, EPJ Web
692
+ Conf. 175 (2018) 01002 [1707.09758].
693
+ [2] L. Giusti and M. Lüscher, Topological susceptibility at 𝑇 > 𝑇c from master-field simulations of
694
+ the SU(3) gauge theory, Eur. Phys. J. C 79 (2019) 207 [1812.02062].
695
+ [3] A. Francis, P. Fritzsch, M. Lüscher and A. Rago, Master-field simulations of 𝑂(𝑎)-improved
696
+ lattice QCD: Algorithms, stability and exactness, Comput. Phys. Commun. 255 (2020) 107355
697
+ [1911.04533].
698
+ [4] P. Fritzsch, J. Bulava, M. Cè, A. Francis, M. Lüscher and A. Rago, Master-field simulations of
699
+ QCD, PoS LATTICE2021 (2022) 465 [2111.11544].
700
+ [5] M. Cè, M. Bruno, J. Bulava, A. Francis, P. Fritzsch, J.R. Green et al., Approaching the
701
+ master-field: Hadronic observables in large volumes, PoS LATTICE2021 (2022) 383
702
+ [2110.15375].
703
+ [6] P. Fritzsch, Master-field simulations of QCD and the exponential clover action, PoS
704
+ LATTICE2022 247.
705
+ [7] M. Cè, L. Giusti and S. Schaefer, Domain decomposition, multilevel integration, and
706
+ exponential noise reduction in lattice QCD, Phys. Rev. D 93 (2016) 094507 [1601.04587].
707
+ [8] L. Giusti and M. Saccardi, Four-dimensional factorization of the fermion determinant in lattice
708
+ QCD, Phys. Lett. B 829 (2022) 137103 [2203.02247].
709
+ [9] M. Saccardi and L. Giusti, Four-dimensional domain decomposition for the factorization of the
710
+ fermion determinant, PoS LATTICE2022 (2022) 386 [2211.06902].
711
+ [10] J.H. Conway and N.J.A. Sloane, Sphere Packings, Lattices and Groups, Springer (1999),
712
+ 10.1007/978-1-4757-6568-7.
713
+ [11] A. Stathopoulos, J. Laeuchli and K. Orginos, Hierarchical probing for estimating the trace of
714
+ the matrix inverse on toroidal lattices, SIAM J. Sci. Comput. 35 (2013) S299 [1302.4018].
715
+ [12] U. Wolff, Monte Carlo errors with less errors, Comput. Phys. Commun. 156 (2004) 143
716
+ [hep-lat/0306017].
717
+ [13] N. Madras and A.D. Sokal, The pivot algorithm: A highly efficient Monte Carlo method for the
718
+ self-avoiding walk, J. Statist. Phys. 50 (1988) 109.
719
+ [14] M. Cè, M. Bruno, J. Bulava, A. Francis, P. Fritzsch, J.R. Green et al. in preparation.
720
+ [15] C. Lehner, The hadronic vacuum polarization (RBC/UKQCD), 2022.
721
+ https://indico.ph.ed.ac.uk/event/112/contributions/1660/.
722
+ [16] H.B. Meyer, Lorentz-covariant coordinate-space representation of the leading hadronic
723
+ contribution to the anomalous magnetic moment of the muon, Eur. Phys. J. C 77 (2017) 616
724
+ [1706.01139].
725
+ [17] M. Cè, A. Gérardin, K. Ottnad and H.B. Meyer, The leading hadronic contribution to the
726
+ running of the weinberg angle using covariant coordinate-space methods, PoS
727
+ LATTICE2018 (2018) 137 [1811.08669].
728
+ [18] E.-H. Chao, H.B. Meyer and J. Parrino, Coordinate-space calculation of the window
729
+ observable for the hadronic vacuum polarization contribution to (𝑔 − 2)𝜇, 2211.15581.
730
+ 10
731
+
Q9E4T4oBgHgl3EQflA2r/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,427 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf,len=426
2
+ page_content='Hadronic observables from master-field simulations Marco Cè,𝑎,∗ Mattia Bruno,𝑏 John Bulava,𝑐 Anthony Francis,𝑑 Patrick Fritzsch,𝑒 Jeremy R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
3
+ page_content=' Green,𝑐 Maxwell T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
4
+ page_content=' Hansen 𝑓 and Antonio Rago𝑔,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
5
+ page_content='ℎ 𝑎Albert Einstein Center for Fundamental Physics (AEC) and Institut für Theoretische Physik,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
6
+ page_content=' Universität Bern,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
7
+ page_content=' Sidlerstrasse 5,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
8
+ page_content=' 3012 Bern,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
9
+ page_content=' Switzerland 𝑏Dipartimento di Fisica “Giuseppe Occhialini”,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
10
+ page_content=' Università degli Studi di Milano-Bicocca and INFN - Sezione di Milano Bicocca,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
11
+ page_content=' Piazza della Scienza 3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
12
+ page_content=' 20126 Milan,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
13
+ page_content=' Italy 𝑐Deutsches Elektronen-Synchrotron DESY,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
14
+ page_content=' Platanenallee 6,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
15
+ page_content=' 15738 Zeuthen,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
16
+ page_content=' Germany 𝑑Institute of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
17
+ page_content=' National Yang Ming Chiao Tung University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
18
+ page_content=' Hsinchu,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
19
+ page_content=' Taiwan 30010 𝑒School of Mathematics and Hamilton Mathematics Institute,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
20
+ page_content=' Trinity College Dublin,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
21
+ page_content=' Dublin 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
22
+ page_content=' Ireland 𝑓 Higgs Centre for Theoretical Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
23
+ page_content=' School of Physics and Astronomy,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
24
+ page_content=' The University of Edinburgh,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
25
+ page_content=' Edinburgh EH9 3FD,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
26
+ page_content=' United Kingdom 𝑔IMADA and CP3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
27
+ page_content=' University of Southern Denmark,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
28
+ page_content=' Odense,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
29
+ page_content=' Denmark ℎDepartment of Theoretical Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
30
+ page_content=' CERN,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
31
+ page_content=' 1211 Geneva 23,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
32
+ page_content=' Switzerland E-mail: marcoce@itp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
33
+ page_content='unibe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
34
+ page_content='ch Substantial progress has been made recently in the generation of master-field ensembles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
35
+ page_content=' This has to be paired with efficient techniques to compute observables on gauge field configurations with a large volume.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
36
+ page_content=' Here we present the results of the computation of hadronic observables, including hadron masses and meson decay constants, on large-volume and master-field ensembles with physical volumes of up to (18 fm)4 and 𝑚 𝜋𝐿 up to 25, simulated using 𝑁f = 2 + 1 stabilized Wilson fermions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
37
+ page_content=' We obtain sub-percent determinations from single gauge configurations with the combined use of position-space techniques, volume averages and master-field error estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
38
+ page_content=' The 39th International Symposium on Lattice Field Theory, 8th-13th August, 2022, Rheinische Friedrich-Wilhelms-Universität Bonn, Bonn, Germany ∗Speaker © Copyright owned by the author(s) under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
39
+ page_content='0 International License (CC BY-NC-ND 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
40
+ page_content='0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
41
+ page_content=' https://pos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
42
+ page_content='sissa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
43
+ page_content='it/ arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
44
+ page_content='05156v1 [hep-lat] 12 Jan 2023 Hadronic observables from master-field simulations Marco Cè 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
45
+ page_content=' Introduction Gauge-field configurations in a lattice theory with a mass gap have the stochastic locality property, that is, gauge-invariant local fields at large physical separations are stochastically independent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
46
+ page_content=' The master-field paradigm introduced by Lüscher [1] proposes to use stochastic locality to obtain observable estimates from a single or at most a few representative gauge-field configurations on very large lattices, making use of the invariance under translations of the theory and of volume averages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
47
+ page_content=' As a first application of this paradigm, stochastic locality has been used to compute the topological susceptibility at 𝑇 > 𝑇𝑐 in master-field simulations of SU(3) Yang–Mills theory [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
48
+ page_content=' In a theory with fermions such as QCD, numerical simulations are performed after integrating out fermions exactly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
49
+ page_content=' Hadronic observables in QCD are expressed in terms of contractions of quark propagators whose locality is not manifest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
50
+ page_content=' Moreover, the sheer size of the lattices requires stabilising measures that have been studied in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
51
+ page_content=' [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
52
+ page_content=' These include a slight modification of the standard 𝑂(𝑎)-improved lattice Dirac operator, replacing the HMC with the stochastic molecular dynamics (SMD) algorithm, employing quadruple-precision lattice sums and uniform-norm stopping criteria for the Dirac equation solver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
53
+ page_content=' Recent progress in master-field simulations has been presented at the Lattice 2021 conference [4, 5] and at this conference [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
54
+ page_content=' In these proceedings we further develop the position-space techniques introduced in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
55
+ page_content=' [5], by presenting an estimator for position-space correlators that scales efficiently with the volume.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
56
+ page_content=' Estimation of observables on master fields is explained in details in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
57
+ page_content=' [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
58
+ page_content=' In summary,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
59
+ page_content=' the expectation value ⟨O(𝑥)⟩ of a local field O(𝑥) is obtained averaging over translations ⟪O(𝑥)⟫ = 1 𝑉 ∑︁ 𝑧 O(𝑥 + 𝑧),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
60
+ page_content=' ⟨O(𝑥)⟩ = ⟪O(𝑥)⟫ + 𝑂 � 𝑉−1/2� ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
61
+ page_content=' (1) with the variance of this estimator given by 𝜎2 ⟪O⟫(𝑥) = � [⟪O(𝑥)⟫ − ⟨O(𝑥)⟩]2� = 1 𝑉 ∑︁ 𝑦 ⟨O(𝑦)O(0)⟩𝑐 = 1 𝑉 ������ ∑︁ |𝑦|≤𝑅 ⟨O(𝑦)O(0)⟩𝑐 + 𝑂 � e−𝑚𝑅������� = 1 𝑉 ������ ∑︁ |𝑦|≤𝑅 ⟪O(𝑦)O(0)⟫𝑐 + 𝑂 � e−𝑚𝑅� + 𝑂 � 𝑉−1/2������� ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
62
+ page_content=' (2) where in the second line we first used the fact that the connected correlator of the local field O(𝑥) decays exponentially with spacetime separation,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
63
+ page_content=' and then we applied again translation averages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
64
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
65
+ page_content=' Position-space correlators In this work we focus on correlation functions in position space 𝐶𝑃𝑃(𝑥) → 𝑐2 𝑃 4𝜋2 𝑚 𝜋 |𝑥| 𝐾1(𝑚 𝜋|𝑥|),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
66
+ page_content=' (3a) 𝐶𝐴𝑃,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
67
+ page_content='𝜇(𝑥) → 𝑐𝐴𝑐𝑃 4𝜋2 𝑥𝜇 |𝑥| 𝑚 𝜋 |𝑥| 𝐾2(𝑚 𝜋|𝑥|),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
68
+ page_content=' (3b) 𝐶𝐴𝐴,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
69
+ page_content='𝜇𝜈(𝑥) → 𝑐2 𝐴 4𝜋2 � −𝛿𝜇𝜈 1 𝑥2 𝐾2(𝑚 𝜋|𝑥|) + 𝑥𝜇𝑥𝜈 𝑥2 �𝑚 𝜋 |𝑥| 𝐾1(𝑚 𝜋|𝑥|) + 4 𝑥2 𝐾2(𝑚 𝜋|𝑥|) �� ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
70
+ page_content=' (3c) 𝐶𝑁 𝑁 (𝑥) → 𝑐2 𝑁 4𝜋2 𝑚2 𝑁 |𝑥| � 𝐾1(𝑚𝑁 |𝑥|) + /𝑥 |𝑥| 𝐾2(𝑚𝑁 |𝑥|) � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
71
+ page_content=' (3d) 2 Hadronic observables from master-field simulations Marco Cè Table 1: Parameters of the master-field lattices used in this study (with 𝑎 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
72
+ page_content='094 fm and 𝑚 𝜋 ≈ 270 MeV, see also ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
73
+ page_content=' [4]), together with information on the statistics used in the observable computation as explained in section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
74
+ page_content=' 𝐿/𝑎 𝐿 [fm] 𝑚 𝜋𝐿 𝑛cnfg 𝑏/𝑎 |𝐺| 𝑛shift 𝑏shift/𝑎 𝑛point A 96 9 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
75
+ page_content='5 5 48 8 512 12 4096 B 192 18 25 2 48 128 32 24 4096 where the subscript indicates the two-point function of either pseudoscalar densities 𝑃 = ¯𝑢𝛾5𝑑, axial current 𝐴𝜇 = ¯𝑢𝛾𝜇𝛾5𝑑 or nucleon spinor 𝑁 = 𝜖𝑎𝑏𝑐(𝑢𝑇 𝑎𝐶𝛾5𝑑𝑏)𝑢𝑐, as a function of the source-sink separation 𝑥.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
76
+ page_content=' In eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
77
+ page_content=' (3), the asympotic behaviour for 𝑥 → ∞ of these correlators is given assuming the symmetries of the continuum theory in an infinite volume.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
78
+ page_content=' From position-space correlators one can extract simple hadronic observables, including the masses 𝑚 𝜋 and 𝑚𝑁 and the decay constant 𝑓𝜋 = 𝑐𝐴/𝑚 𝜋, as demonstrated in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
79
+ page_content=' [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
80
+ page_content=' Once computed on the lattice as discussed in the following section, these correlators as a function of the four-dimensional source-sink separation 𝑥 include lattice discretization effects that break the rotational symmetry and depend on the direction of 𝑥.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
81
+ page_content=' In this study, we limit ourselves to the radial correlators ˚𝐶(𝑟) introduced in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
82
+ page_content=' [5] that are averaged over 𝑆3(𝑟) = {𝑥 ∈ R4 : |𝑥| = 𝑟}, the 3-sphere of radius 𝑟, and by construction depend only on the radial coordinate 𝑟 = |𝑥|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
83
+ page_content=' While ˚𝐶𝑃𝑃(𝑟) = 𝐶𝑃𝑃(𝑥), for the 𝐴𝑃-correlator 𝐶𝐴𝑃,𝜇(𝑥) we contract the open 𝜇 index with the only available four-vector 𝑥𝜇 to obtain a scalar, ˚𝐶𝐴𝑃(𝑟) = 𝑥𝜇𝐶𝐴𝑃,𝜇(𝑥) → 𝑐𝐴𝑐𝑃 4𝜋2 𝑚 𝜋𝐾2(𝑚 𝜋𝑟).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
84
+ page_content=' In the case of 𝐶𝐴𝐴,𝜇𝜈 there are two ways to obtain a scalar, ˚𝐶 (1) 𝐴𝐴(𝑟) = 𝛿𝜇𝜈𝐶𝐴𝐴,𝜇𝜈(𝑥), ˚𝐶 (2) 𝐴𝐴(𝑟) = 𝑥𝜇𝑥𝜈𝐶𝐴𝐴,𝜇𝜈(𝑥), (4) and similarly for the nucleon correlator that is a spinor, with /𝑥 = 𝛾𝜇𝑥𝜇, ˚𝐶 (1) 𝑁 𝑁 (𝑟) ≡ tr 𝐶𝑁 𝑁 (𝑥), ˚𝐶 (2) 𝑁 𝑁 (𝑟) ≡ tr /𝑥𝐶𝑁 𝑁 (𝑥).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
85
+ page_content=' (5) On the lattice, an estimator of these radial correlators is given by ˚𝐶(𝑟) = 1 r4(𝑟2) ∑︁ |𝑥 |=𝑟 𝐶(𝑥) (6) where r4 is defined in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
86
+ page_content=' [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
87
+ page_content=' We note that the symmetry of 𝑆3(𝑟) is broken not only by 𝑎 ≠ 0 but also by the finite size of the hypercubic box and by the fact that we choose antiperiodic (instead of periodic) boundary conditions in one of the four dimensions for quarks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
88
+ page_content=' However, as we show in section 5 these boundary effects are not visible at the current level of precision on the master-field lattices in table 1 considered here, differently from what we observed on smaller volumes [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
89
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
90
+ page_content=' Grid of point sources estimator The simplest way to compute the correlators introduced in section 2 numerically is to solve the Dirac equation on a point source, that is, a source spinor that is supported on a single lattice point, and subsequently perform the suitable contractions of spinor and space-time indeces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
91
+ page_content=' A consequence 3 Hadronic observables from master-field simulations Marco Cè of this naive strategy applied on gauge-field configurations with a large volume is that the effort for each correlator point source scales proportionally with the volume, which is clearly not optimal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
92
+ page_content=' Indeed, most of the resources are spent in computing the correlator at a distance from the source of multiple correlation lengths, which has an exponentially suppressed contribution to the physics and in most of the cases is completely dominated by noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
93
+ page_content=' Instead, we would like to exploit stochastic locality to define estimators that scale efficiently with the volume and are suitable for master-field applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
94
+ page_content=' Taking as an example the radial correlators ˚𝐶(𝑟) introduced in section 2, let us assume that we are interested in physics that can be extracted from correlators up to a maximum radial source-sink separation 𝑟max.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
95
+ page_content=' Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
96
+ page_content=' [1] sketches a decomposition of the lattice in space-time domains, or blocks, that are physically large, such that all the lattice points within an 𝑟max distance from a source point at the centre of each block are within the same block.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
97
+ page_content=' This implies a block size 𝑏 > 2𝑟max.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
98
+ page_content=' Solving the Dirac equation in each block, imposing Dirichlet boundary conditions at the block boundary of the gauge field, one can decouple the computational cost of the estimator from the volume of the global lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
99
+ page_content=' However, this method introduces boundary effects that can be large for sink points close to the boundaries [1, 7], see also refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
100
+ page_content=' [8, 9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
101
+ page_content=' We leave the exploration of this direction for future work, and we focus here on a simpler approach that does not require a dedicated correction computation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
102
+ page_content=' We introduce a set of lattice points 𝐺 that are separated (on average) by a physical distance constant in the volume, such that the number of points |𝐺| ∝ 𝑉, that is, it grows proportionally with the volume.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
103
+ page_content=' On these point we introduce stochastic sources that satisfy � 𝜂𝑖(𝑥)𝜂† 𝑗(𝑦) � 𝜂 = 𝛿𝑖 𝑗𝛿𝑥𝑦𝐼 for 𝑥, 𝑦 ∈ 𝐺, (7) where 𝐼 is the identity matrix in spin and colour space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
104
+ page_content=' By contracting at the sink with stochastic noise corresponding to each coordinate 𝑦 ∈ 𝐺 one obtains |𝐺| ∝ 𝑉 samples of the quark propagator, one for each 𝑦 ∈ 𝐺, from a single global-lattice inversion that is 𝑂(𝑉) computationally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
105
+ page_content=' Each sample has a spurious contribution of stochastic nature from source points 𝑥 ≠ 𝑦, which is suppressed by averaging the quark propagator over a number of sources 𝑛src and does not contribute to the expectation value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
106
+ page_content=' Mesonic two-point functions that contract two quark propagators require 𝑛src ≥ 2 to obtain an unbiased estimator, that in the case of the pseudoscalar-density two-point function reads 𝐶𝐺 𝑃𝑃(𝑥;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
107
+ page_content=' 𝑦) = 1 𝑛src(𝑛src − 1) ∑︁ 𝑖≠𝑗 Re � 𝜓† 𝑖 (𝑥 + 𝑦)𝜓 𝑗(𝑥 + 𝑦)𝜂† 𝑗(𝑦)𝜂𝑖(𝑦) � , (8) where 𝜓𝑖(𝑥) = � 𝑦 𝐷−1(𝑥;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
108
+ page_content=' 𝑦)𝜂𝑖(𝑦) and the double sum over 𝑖 ≠ 𝑗 can be computed in 𝑂(𝑛src) cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
109
+ page_content=' In this approach, since |𝐺| ∝ 𝑉, efficient scaling of the solutions of the Dirac equation is achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
110
+ page_content=' Moreover, 𝐺 implicitly realises a domain decomposition by labelling each lattice point with the closest 𝑦 ∈ 𝐺.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
111
+ page_content='1 Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
112
+ page_content=' (8) is in principle valid for any 𝑥 and 𝑦, but if only (𝑥, 𝑦) pairs that are in the same domain are considered then one can compute efficiently all the |𝐺| ∝ 𝑉 contributions with a single 𝑂(𝑉) pass over the whole lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
113
+ page_content=' This realises the optimal volume scaling for the contractions too.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
114
+ page_content=' It also lowers the required 𝑛src since the “correct” source 𝑦 is always the closest to the sink 𝑥 and spurious contributions are further suppressed by the longer source-sink separation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
115
+ page_content='2 1Up to points equidistant from two or more 𝑦 ∈ 𝐺 that require additional conditions to be assigned to a domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
116
+ page_content=' 2These spurious contributions are only stochastic and do not modify the expectation value, although we note that they can have different quantum numbers and decay slower than the correlator being estimated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
117
+ page_content=' 4 Hadronic observables from master-field simulations Marco Cè 𝑏 𝑟max = √ 2𝑏/2 𝑟max = √ 2𝑏/2 𝑦 ∈ 𝐺 𝑦 ∈ 𝐺 𝑥 Figure 1: Sketch of the estimator with a grid of point sources over a two-dimensional window of the lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
118
+ page_content=' The set 𝐺 of source points ∈ 𝐺 is a regular grid with spacing 𝑏 and even point only.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
119
+ page_content=' A mesonic two-point function is evaluated at sink point 𝑥 that is in the domain defined by 𝑦 ∈ 𝐺 and within a distance 𝑟max from 𝑦.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
120
+ page_content=' One of the spurious contributions from the “wrong” source is shown in light grey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
121
+ page_content=' Moreover, it implies 𝑟max = min𝑥,𝑦∈𝐺 |𝑥 − 𝑦|/2, that is, the minimum of the semidistance of points in 𝐺.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
122
+ page_content=' Therefore, 𝐺 has to be sparse enough for correlators at the relevant radial separations 𝑟 ≤ 𝑟max to be accessible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
123
+ page_content=' We study this setup on two sets of a few master fields whose parameters are given in table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
124
+ page_content=' The master fields in both sets are hypercubic boxes with equal extent in each dimension denoted by 𝐿, such that the volume is 𝑉 = 𝐿4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
125
+ page_content=' The 𝐿 = 192𝑎 master fields denoted by B (𝑛cnfg = 2) have exactly 16 times, twice in each dimension, the volume of the ones with 𝐿 = 96𝑎 in set A (𝑛cnfg = 5) and otherwise identical parameters, and we can thus define equivalent 𝐺s on both sets and study the volume scaling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
126
+ page_content=' We employ U(1) noise that satisfies eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
127
+ page_content=' (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
128
+ page_content=' The simplest choice for 𝐺 is a regular grid with spacing 𝑏, which matches the domain decomposition proposed in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
129
+ page_content=' [1], with 𝑏 = 48𝑎 being a suitable choice in our case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
130
+ page_content=' However, the definition of 𝐺 is more flexible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
131
+ page_content=' In this work, we employ a grid with only even (or equivalently odd) points, which results in 𝑟max = √ 2𝑏/2 ≃ 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
132
+ page_content='94𝑎 instead of 𝑏/2 = 24𝑎, at the cost of halving the number of points on the grid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
133
+ page_content='3 The total number of points is thus |𝐺| = (𝐿/𝑏)4/2 that evaluates to 8 and 128 for A and B respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
134
+ page_content=' We fix 𝑛src = 2 and with the current precision we do not observe deviations from the expected behaviour, especially at 𝑟 close to 𝑟max, that can be attributed to spurious contributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
135
+ page_content=' Further optimisation such as systematically and exactly removing the closer spurious contributions, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
136
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
137
+ page_content=' with hierarchical probing [11], are not explored here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
138
+ page_content=' The statistics obtained with a single source, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
139
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
140
+ page_content=' eight points on each master field in A, is limited by the need of balancing the density of 𝐺 with a lower limit on the 𝑟max suitable to extract long-range physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
141
+ page_content=' To increase the statistics we simply propose to recompute eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
142
+ page_content=' (8) on 𝑛shift sources, each time shifting 𝐺 to have a distinct support.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
143
+ page_content=' This is done four times for each direction in the case of A and twice for each direction in B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
144
+ page_content=' An extra factor of two is obtained by pairing each even-only 𝐺 with the corresponding odd-only, leading to 𝑛shift = 512 and 32 for A and B respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
145
+ page_content=' Combined with |𝐺|, the final result is the same number of source points 𝑛point = 4096 for both volumes, on 3This results in a doubled |𝐺|𝑟4max/𝑉 density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
146
+ page_content=' Indeed, it corresponds to a 𝐷4 lattice (or equivalently 𝐹4 lattice) that has the densest known packing of equal spheres in four dimensions [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
147
+ page_content=' 5 Hadronic observables from master-field simulations Marco Cè a regular grid with spacing 𝑏shift = 12𝑎 and 24𝑎 for A and B respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
148
+ page_content=' Ignoring that on the A lattices source points are on average twice as close and thus potentially more correlated than on B, in our setup we have same statistics for each gauge field configuration for both A and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
149
+ page_content=' Crucially, thanks to the optimal volume scaling of the stochastic grid correlator, this matching statistic has been obtained at an equivalent computational cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
150
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
151
+ page_content=' Master-field errors The estimator in section 3 applied to the radial correlator leads to a collection of up to 4096 correlators for each master-field configuration on a regular grid of source points with spacing 𝑏shift = 𝐿/8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
152
+ page_content=' Applying stochastic locality, the expectation value � ˚𝐶(𝑟) � is given up to volume- suppressed corrections by the translation average � ˚𝐶(𝑟) � = ⟪ ˚𝐶(𝑟)⟫ + 𝑂 � 𝑉−1/2� = 1 𝑉 ∑︁ 𝑦∈𝐺 ˚𝐶(𝑟;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
153
+ page_content=' 𝑦) + 𝑂 � 𝑉−1/2� (9) where the 𝑦 in ˚𝐶(𝑟;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
154
+ page_content=' 𝑦) denotes the source point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
155
+ page_content=' The error of this estimator can be estimated applying eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
156
+ page_content=' (2) with O(𝑦) = ˚𝐶(𝑟;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
157
+ page_content=' 𝑦) � [⟪ ˚𝐶(𝑟)⟫ − � ˚𝐶(𝑟) � ]2� = 1 𝑉 ������ ∑︁ |𝑦|≤𝑅 ⟪ ˚𝐶(𝑟;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
158
+ page_content=' 𝑦) ˚𝐶(𝑟;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
159
+ page_content=' 0)⟫𝑐 + 𝑂 � e−𝑚𝑅� + 𝑂 � 𝑉−1/2������� , (10) where again the sum over the source coordinates 𝑦 is performed over the grid of point sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
160
+ page_content=' Finding the optimal 𝑅 to truncate the sum in the r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
161
+ page_content='h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
162
+ page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
163
+ page_content=' has a clear analogy with the well-known Γ method introduced by Wolff to deal with autocorrelation in Monte Carlo time and estimate an error with less errors [12], and leads to a generalisation of the Madras–Sokal formula for the statistical error of the error [13, 14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
164
+ page_content=' This can be implemented in a resource efficient way by computing the correlation between grid points with higher-dimensional fast Fourier transforms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
165
+ page_content=' The optimal 𝑅 depends on the observable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
166
+ page_content=' In particular, since each value of the correlator radial source-sink separation 𝑟 defines a distinct observable with different spacetime support, 𝑅 is a function of 𝑟.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
167
+ page_content=' Alternatively, one can apply a four-dimensional binning of the point sources in the grid into blocks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
168
+ page_content=' For instance, blocks of size (24𝑎)4 bin 16 point sources on A and only one point source on B according to the spacing 𝑏shift in table 1, while blocks of size (48𝑎)4 bin 256 and 16 point sources respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
169
+ page_content=' We tested these two bin sizes and observed that this leads to a stable error estimate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
170
+ page_content=' In the following, we show results obtained in the more conservative case, that is, with blocks of size (48𝑎)4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
171
+ page_content=' We note that master-field error estimation can be combined with standard methods based on an ensemble of gauge field configurations, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
172
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
173
+ page_content=' with a five-dimensional variant of the Γ method in spacetime coordinates and Monte Carlo time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
174
+ page_content=' Explorations in this direction can be found in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
175
+ page_content=' [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
176
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
177
+ page_content=' Numerical results We computed 𝑚 𝜋, 𝑚𝑁 and 𝑓𝜋 using position-space correlators on the sets of master fields whose parameters are listed in table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
178
+ page_content=' The results for these hadronic observables are listed in table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
179
+ page_content=' We employed the technique already studied in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
180
+ page_content=' [5] to extract the pion mass 𝑚 𝜋 from the long-distance behaviour in eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
181
+ page_content=' (3a) of the position-space correlator ˚𝐶𝑃𝑃(𝑟).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
182
+ page_content=' In those proceedings 6 Hadronic observables from master-field simulations Marco Cè Table 2: Numerical results for hadronic observable with errors estimated à la master field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
183
+ page_content=' 𝐿/𝑎 𝑎𝑚 𝜋 𝑎𝑚𝑁 𝑎 𝑓 bare 𝜋 A 96 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
184
+ page_content='126 28(33) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
185
+ page_content='500(6) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
186
+ page_content='0890(3) B 192 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
187
+ page_content='126 01(19) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
188
+ page_content='487(8) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
189
+ page_content='0885(4) 5 10 15 20 25 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
190
+ page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
191
+ page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
192
+ page_content='12 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
193
+ page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
194
+ page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
195
+ page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
196
+ page_content='20 ameff covariant one-state fit two-state fit 5 10 15 20 25 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
197
+ page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
198
+ page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
199
+ page_content='12 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
200
+ page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
201
+ page_content='16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
202
+ page_content='18 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
203
+ page_content='20 ameff covariant one-state fit two-state fit Figure 2: Effective mass of the ˚𝐶𝑃𝑃(𝑟) correlator as a function of 𝑟 for master fields in set A (left plot) and set B (right plot).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
204
+ page_content=' On top of the data points with master-field errors shown in blue, we show the results of a one-state fit in a green band and of a two-states fit in a red band.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
205
+ page_content=' The thickness of the bands is the statistical error.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
206
+ page_content=' the technique was applied to correlators computed with point sources on an ensemble of gauge field configurations with a (6 fm)3 space volume, performing a standard error estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
207
+ page_content=' Here we have a larger volume that allows us to use the grid of point sources as described in section 3 and estimate the error à la master field, see section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
208
+ page_content=' On top of the same number of samples 𝑛point = 4096 for each configuration, we have 5 configurations in set A and 2 in set B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
209
+ page_content=' This means that we have a larger statistics for the 𝐿 = 96𝑎 master fields from which we expect a ≈ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
210
+ page_content='58 reduction of the error.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
211
+ page_content=' The effective mass4 of ˚𝐶𝑃𝑃(𝑟) is shown in the two plots in figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
212
+ page_content=' For each set, two fits are performed: a “one-state” fit having 𝑐𝑃 and 𝑚 𝜋 as free parameters, and a “two-states” one with an added “excited state” term 𝑎1(𝑚1/𝑟)𝐾1(𝑚1/𝑟) with two extra free parameters 𝑎1 and 𝑚1 > 𝑚 𝜋.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
213
+ page_content=' We choose appropriate values for the smaller 𝑟 of the correlator data that enter the fit, with different choices for one-state and two-states fits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
214
+ page_content=' Instead, all the data up to largest available 𝑟 = 𝑟max enter the fit, since we do not observe any boundary effect that constrains us otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
215
+ page_content=' The two fits on each set give compatible results and the corresponding effective mass is shown in figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
216
+ page_content=' From the one-state fits we obtain the results in table 2, which show a good agreement between the two sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
217
+ page_content=' Contrary to the expectation based on 𝑛cnfg, the error is 40 % smaller on set B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
218
+ page_content=' A possible explanation for this fact is the 𝑏shift = 12𝑎 of the samples of set A, halved with respect to set B, which can lead to a reduced effective number of samples due to stronger correlations in space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
219
+ page_content=' Similarly, we extract 𝑚𝑁 from the two contractions in eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
220
+ page_content=' (5) of the position-space nucleon correlator in eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
221
+ page_content=' (3d) as done in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
222
+ page_content=' [5], but employing the techniques of sections 3 and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
223
+ page_content=' The results in table 2 are from the one-state fits to ˚𝐶 (1) 𝑁 𝑁 (𝑟) with the free parameters 𝑐𝑁 and 𝑚𝑁 , and are compatible 4See eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
224
+ page_content=' (10) in ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
225
+ page_content=' [5] for the definition of the effective mass of the radial correlator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
226
+ page_content=' 7 Hadronic observables from master-field simulations Marco Cè 5 10 15 20 25 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
227
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
228
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
229
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
230
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
231
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
232
+ page_content='8 ameff covariant, trNN covariant, tr/xNN one-state fit, trNN one-state fit, tr/xNN two-state fit, trNN two-state fit, tr/xNN 5 10 15 20 25 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
233
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
234
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
235
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
236
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
237
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
238
+ page_content='8 ameff covariant, trNN covariant, tr/xNN one-state fit, trNN one-state fit, tr/xNN two-state fit, trNN two-state fit, tr/xNN Figure 3: Effective mass of the ˚𝐶 (𝑖) 𝑁 𝑁 (𝑟) correlators as a function of 𝑟 for master fields in set A (left plot) and set B (right plot), where 𝑖 = 1 corresponds to the tr 𝑁𝑁 contraction and 𝑖 = 2 to the tr /𝑥𝑁𝑁 one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
239
+ page_content=' On top of the data points with master-field errors shown in blue and orange for 𝑖 = 1 and 2 respectively, we show the results of a one-state fit in green and brown bands and of a two-states fit in red and purple bands.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
240
+ page_content=' The thickness of the bands is the statistical error.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
241
+ page_content=' with the results of two-states fits with the replacement ˚𝐶𝑁 𝑁 (𝑟) → ˚𝐶𝑁 𝑁 (𝑟)[1+𝑎1(𝑚 𝜋/𝑟)𝐾1(𝑚 𝜋𝑟)] where 𝑎1 is an extra free parameter and 𝑚 𝜋 is fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
242
+ page_content=' The fit to ˚𝐶 (2) 𝑁 𝑁 (𝑟) shows similar results, although with a slightly larger central value that can be attributed to different discretization effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
243
+ page_content=' The effective masses corresponding to data and fits are shown in figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
244
+ page_content=' In the case of 𝑚𝑁 , we observe a larger error on set B, compatible with the lower statistics and showing no indication of correlation-in-space effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
245
+ page_content=' We also extract the pion decay constant 𝑓 bare 𝜋 , where the bare indicates that we do not include the axial-current renormalization factor, from a combined fit of the four correlators ˚𝐶𝑃𝑃, ˚𝐶𝐴𝑃, ˚𝐶 (1) 𝐴𝐴 and ˚𝐶 (2) 𝐴𝐴.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
246
+ page_content=' As fit function we employ the long-distance behaviours derived from eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
247
+ page_content=' 3, which depends on the free parameters 𝑐𝑃, 𝑐𝐴 and 𝑚 𝜋.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
248
+ page_content=' As shown from the plots of the ratio between data and fit functions in figure 4, ˚𝐶𝐴𝑃 approaches the asymptotic behaviour at a smaller value of 𝑟, followed by ˚𝐶𝑃𝑃 and ˚𝐶 (2) 𝐴𝐴.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
249
+ page_content=' ˚𝐶 (1) 𝐴𝐴 converges to the asymptotic behaviour at a much larger 𝑟, with the ratio being initially negative and changing sign around 𝑟 ≈ 14𝑎.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
250
+ page_content=' The values of 𝑚 𝜋 obtained from these combined fits are consistent with the previous fits to only the ˚𝐶𝑃𝑃 correlators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
251
+ page_content=' The decay constant is then given by 𝑓 bare 𝜋 = 𝑐𝐴/𝑚 𝜋 and shown in table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
252
+ page_content=' Like in the case of 𝑚𝑁 , the values on set A and B are compatible, with a slightly larger error for set B that is consistent with the lower number of master field configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
253
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
254
+ page_content=' Conclusions We have shown that position-space correlators can be used to extract hadron masses and decay constants with short-distance and cut-off effects under control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
255
+ page_content=' Crucially, the statistical error can be estimated à la master field, obtaining an efficient scaling of the computational effort with the increased volume.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
256
+ page_content=' In this work we studied sphere-averaged radial correlators, but potentially more information is encoded in correlators as function of four-dimensional coordinates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
257
+ page_content=' This requires understanding effects that break rotational symmetry at finite lattice spacing and is an interesting topic for further studies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
258
+ page_content=' 8 Hadronic observables from master-field simulations Marco Cè 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
259
+ page_content='020 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
260
+ page_content='022 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
261
+ page_content='024 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
262
+ page_content='026 |cP|2 |cP|2 fit ˚CPP 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
263
+ page_content='0016 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
264
+ page_content='0018 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
265
+ page_content='0020 |cAc† P| |cAc† P| fit ˚CAP 10 20 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
266
+ page_content='00011 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
267
+ page_content='00012 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
268
+ page_content='00013 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
269
+ page_content='00014 |cA|2 |cA|2 fit ˚C(1) AA 10 20 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
270
+ page_content='00011 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
271
+ page_content='00012 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
272
+ page_content='00013 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
273
+ page_content='00014 |cA|2 |cA|2 fit ˚C(2) AA 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
274
+ page_content='020 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
275
+ page_content='022 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
276
+ page_content='024 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
277
+ page_content='026 |cP|2 |cP|2 fit ˚CPP 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
278
+ page_content='0016 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
279
+ page_content='0018 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
280
+ page_content='0020 |cAc† P| |cAc† P| fit ˚CAP 10 20 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
281
+ page_content='00011 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
282
+ page_content='00012 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
283
+ page_content='00013 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
284
+ page_content='00014 |cA|2 |cA|2 fit ˚C(1) AA 10 20 30 r/a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
285
+ page_content='00011 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
286
+ page_content='00012 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
287
+ page_content='00013 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
288
+ page_content='00014 |cA|2 |cA|2 fit ˚C(2) AA Figure 4: Plots of the ratio between correlator data and their fitted long-distance behaviours for master fields in set A (top row) and set B (bottom row).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
289
+ page_content=' The amplitude in the denominator is set to one, so that the actual amplitude for each correlator is shown on the vertical axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
290
+ page_content=' In each row, four plots are shown for ˚𝐶𝑃𝑃, ˚𝐶 (1) 𝐴𝐴 (left column), ˚𝐶𝐴𝑃 and ˚𝐶 (2) 𝐴𝐴 (right column), with the correlator data with master field errors shown in blue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
291
+ page_content=' The amplitude parameters of the corresponding fit function, which are functions of 𝑐𝑃 and 𝑐𝐴, are shown in an orange horizontal line with a pale orange error band.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
292
+ page_content=' Position-space methods find applications in computations of quantities that go beyond the simple hadronic quantities considered here, such as for example the hadronic vacuum polarisation contribution to the anomalous magnetic moment of the muon [16, 17], including the so-called window contribution [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
293
+ page_content=' The estimators presented here provide a straightforward path to the computation of this quantities in the master-field paradigm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
294
+ page_content=' Acknowledgements: The research of MB is funded through the MUR program for young researchers “Rita Levi Montalcini”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
295
+ page_content=' AF acknowledges support by the Ministry of Science and Technology Taiwan (MOST) under grant 111-2112-M-A49-018-MY2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
296
+ page_content=' JRG acknowledges support from the Simons Foundation through the Simons Bridge for Postdoctoral Fellowships scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
297
+ page_content=' MTH is supported by UKRI Future Leader Fellowship MR/T019956/1 and in part by UK STFC grant ST/P000630/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
298
+ page_content=' This work was performed using the DiRAC Data Intensive service at Leicester, operated by the University of Leicester IT Services, which forms part of the STFC DiRAC HPC Facility (www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
299
+ page_content='dirac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
300
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
301
+ page_content='uk).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
302
+ page_content=' The equipment was funded by BEIS capital funding via STFC capital grants ST/K000373/1 and ST/R002363/1 and STFC DiRAC Operations grant ST/R001014/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
303
+ page_content=' DiRAC is part of the National e-Infrastructure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
304
+ page_content=' We acknowledge PRACE for awarding us access to SuperMUC-NG at GCS@LRZ, Germany, where some computations were performed Many 9 Hadronic observables from master-field simulations Marco Cè simulations were performed on a dedicated HPC cluster at CERN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
305
+ page_content=' We gratefully acknowledge the computer resources and the technical support provided by these institutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
306
+ page_content=' References [1] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
307
+ page_content=' Lüscher, Stochastic locality and master-field simulations of very large lattices, EPJ Web Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
308
+ page_content=' 175 (2018) 01002 [1707.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
309
+ page_content='09758].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
310
+ page_content=' [2] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
311
+ page_content=' Giusti and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
312
+ page_content=' Lüscher, Topological susceptibility at 𝑇 > 𝑇c from master-field simulations of the SU(3) gauge theory, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
313
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
314
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
315
+ page_content=' C 79 (2019) 207 [1812.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
316
+ page_content='02062].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
317
+ page_content=' [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
318
+ page_content=' Francis, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
319
+ page_content=' Fritzsch, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
320
+ page_content=' Lüscher and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
321
+ page_content=' Rago, Master-field simulations of 𝑂(𝑎)-improved lattice QCD: Algorithms, stability and exactness, Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
322
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
323
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
324
+ page_content=' 255 (2020) 107355 [1911.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
325
+ page_content='04533].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
326
+ page_content=' [4] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
327
+ page_content=' Fritzsch, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
328
+ page_content=' Bulava, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
329
+ page_content=' Cè, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
330
+ page_content=' Francis, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
331
+ page_content=' Lüscher and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
332
+ page_content=' Rago, Master-field simulations of QCD, PoS LATTICE2021 (2022) 465 [2111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
333
+ page_content='11544].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
334
+ page_content=' [5] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
335
+ page_content=' Cè, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
336
+ page_content=' Bruno, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
337
+ page_content=' Bulava, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
338
+ page_content=' Francis, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
339
+ page_content=' Fritzsch, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
340
+ page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
341
+ page_content=' Green et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
342
+ page_content=', Approaching the master-field: Hadronic observables in large volumes, PoS LATTICE2021 (2022) 383 [2110.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
343
+ page_content='15375].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
344
+ page_content=' [6] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
345
+ page_content=' Fritzsch, Master-field simulations of QCD and the exponential clover action, PoS LATTICE2022 247.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
346
+ page_content=' [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
347
+ page_content=' Cè, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
348
+ page_content=' Giusti and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
349
+ page_content=' Schaefer, Domain decomposition, multilevel integration, and exponential noise reduction in lattice QCD, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
350
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
351
+ page_content=' D 93 (2016) 094507 [1601.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
352
+ page_content='04587].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
353
+ page_content=' [8] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
354
+ page_content=' Giusti and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
355
+ page_content=' Saccardi, Four-dimensional factorization of the fermion determinant in lattice QCD, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
356
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
357
+ page_content=' B 829 (2022) 137103 [2203.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
358
+ page_content='02247].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
359
+ page_content=' [9] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
360
+ page_content=' Saccardi and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
361
+ page_content=' Giusti, Four-dimensional domain decomposition for the factorization of the fermion determinant, PoS LATTICE2022 (2022) 386 [2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
362
+ page_content='06902].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
363
+ page_content=' [10] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
364
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
365
+ page_content=' Conway and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
366
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
367
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
368
+ page_content=' Sloane, Sphere Packings, Lattices and Groups, Springer (1999), 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
369
+ page_content='1007/978-1-4757-6568-7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
370
+ page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
371
+ page_content=' Stathopoulos, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
372
+ page_content=' Laeuchli and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
373
+ page_content=' Orginos, Hierarchical probing for estimating the trace of the matrix inverse on toroidal lattices, SIAM J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
374
+ page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
375
+ page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
376
+ page_content=' 35 (2013) S299 [1302.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
377
+ page_content='4018].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
378
+ page_content=' [12] U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
379
+ page_content=' Wolff, Monte Carlo errors with less errors, Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
380
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
381
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
382
+ page_content=' 156 (2004) 143 [hep-lat/0306017].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
383
+ page_content=' [13] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
384
+ page_content=' Madras and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
385
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
386
+ page_content=' Sokal, The pivot algorithm: A highly efficient Monte Carlo method for the self-avoiding walk, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
387
+ page_content=' Statist.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
388
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
389
+ page_content=' 50 (1988) 109.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
390
+ page_content=' [14] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
391
+ page_content=' Cè, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
392
+ page_content=' Bruno, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
393
+ page_content=' Bulava, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
394
+ page_content=' Francis, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
395
+ page_content=' Fritzsch, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
396
+ page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
397
+ page_content=' Green et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
398
+ page_content=' in preparation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
399
+ page_content=' [15] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
400
+ page_content=' Lehner, The hadronic vacuum polarization (RBC/UKQCD), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
401
+ page_content=' https://indico.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
402
+ page_content='ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
403
+ page_content='ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
404
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
405
+ page_content='uk/event/112/contributions/1660/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
406
+ page_content=' [16] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
407
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
408
+ page_content=' Meyer, Lorentz-covariant coordinate-space representation of the leading hadronic contribution to the anomalous magnetic moment of the muon, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
409
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
410
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
411
+ page_content=' C 77 (2017) 616 [1706.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
412
+ page_content='01139].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
413
+ page_content=' [17] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
414
+ page_content=' Cè, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
415
+ page_content=' Gérardin, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
416
+ page_content=' Ottnad and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
417
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
418
+ page_content=' Meyer, The leading hadronic contribution to the running of the weinberg angle using covariant coordinate-space methods, PoS LATTICE2018 (2018) 137 [1811.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
419
+ page_content='08669].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
420
+ page_content=' [18] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
421
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
422
+ page_content=' Chao, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
423
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
424
+ page_content=' Meyer and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
425
+ page_content=' Parrino, Coordinate-space calculation of the window observable for the hadronic vacuum polarization contribution to (𝑔 − 2)𝜇, 2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
426
+ page_content='15581.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
427
+ page_content=' 10' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/Q9E4T4oBgHgl3EQflA2r/content/2301.05156v1.pdf'}
SNE3T4oBgHgl3EQfDglb/content/tmp_files/2301.04287v1.pdf.txt ADDED
@@ -0,0 +1,1844 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04287v1 [math.NT] 11 Jan 2023
2
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
3
+ XIN LIN AND DAQING WAN
4
+ ABSTRACT. The classical n-variable Kloosterman sums over finite fields are well understood by
5
+ Deligne’s theorem from complex point of view and by Sperber’s theorem from p-adic point of view.
6
+ In this paper, we study the complex and p-adic estimates of inverted n-variable Kloosterman sums,
7
+ addressing a question of N. Katz (1995). We shall give two complex estimates. The first one is
8
+ elementary based on Gauss sums. The second estimate is deeper, depending on the cohomological
9
+ results of Adolphson-Sperber, Denef-Loeser and Fu for twisted toric exponential sums. This deeper
10
+ result assumes that the characteristic p does not divide n + 1. Combining with Dwork’s p-adic
11
+ theory, we also determine the exact p-adic valuations for zeros and poles of the L-function associated
12
+ to inverted n-variable Kloosterman sums in the case p ≡ 1 mod (n + 1). As we shall see, the
13
+ inverted n-variable Kloosterman sum is more complicated than the classical n-variable Kloosterman
14
+ sum in all aspects in the sense that our understanding is less complete, partly because the Hodge
15
+ numbers are now mostly 2 instead of 1.
16
+ 1. INTRODUCTION
17
+ Let Fq be the finite field of q elements with characteristic p. Let ψ : Fq → C∗ be a nontrivial
18
+ additive character and let χ1, . . . , χm : F∗
19
+ q → C∗ be multiplicative characters. A classical problem
20
+ in number theory is to give a good estimate for the mixed character sum
21
+
22
+ xi∈F∗q
23
+ χ1(f1) · · · χm(fm)ψ(f),
24
+ (1.1)
25
+ where f, f1, . . . , fm ∈ Fq
26
+
27
+ x±1
28
+ 1 , . . . , x±1
29
+ n
30
+
31
+ are Laurent polynomials. Reducing m if necessary, we
32
+ may assume that all the χi’s are non-trivial. Using the Gauss sum
33
+ G(χ) =
34
+
35
+ x∈F∗q
36
+ χ(x)ψ(x),
37
+ one obtains the well known relation
38
+
39
+ xi,yj∈F∗q
40
+ χ1(y1) · · · χm(ym)ψ (f + y1f1 + · · · + ymfm)
41
+ = G(χ1) · · · G(χm)
42
+
43
+ xi∈F∗q
44
+ χ1(f1) · · · χm(fm)ψ(f).
45
+ As the Gauss sums are well-understood, the study of (1.1) is reduced to the study of the following
46
+ type of twisted toric exponential sum
47
+
48
+ xi∈F∗q
49
+ χ1(x1) · · · χn(xn)ψ (f(x1, · · · , xn)) ,
50
+ (1.2)
51
+ where some of the χi’s may be trivial. This type of twisted toric exponential sum has been studied
52
+ extensively in the literature, most notably by Adolphson-Sperber [AS87a, AS89, AS90, AS93] via
53
+ Dwork’s p-adic cohomology, and by Denef-Loeser [DL91] and Fu [Fu09,Fu16] via Grothendieck’s
54
+ ℓ-adic cohomology. For the complex estimate, both approaches depend on Deligne’s theorem on
55
+ the Weil conjectures. A sharp estimate is obtained when f is non-degenerate with respect to its
56
+ Newton polyhedron ∆(f). For arbitrary f, the sum is still far from well understood.
57
+ 2020 Mathematics Subject Classification. 11T23, 11L05, 11L07, 11S40.
58
+ Key words and phrases. Inverted Kloosterman sums, Exponential sums, L-function, Finite field.
59
+ 1
60
+
61
+ 2
62
+ XIN LIN AND DAQING WAN
63
+ An important example of toric exponential sums is the classical n-variable Kloosterman sum,
64
+ where χ1 = · · · = χn = 1 and
65
+ f(x1, · · · , xn) = x1 + · · · + xn +
66
+ b
67
+ x1 · · · xn
68
+ , b ∈ F∗
69
+ q.
70
+ In this case, the complex weights were determined by Deligne’s well known theorem, and the p-
71
+ adic slopes were determined by Sperber’s theorem [Spe80]. It should be noted that for twisted
72
+ n-variable Kloosterman sum (when some of the χi’s are non-trivial), the p-adic slopes are not
73
+ completely determined in general, except in the case n = 1 for which Adolphson-Sperber [AS87b]
74
+ obtained the generic p-adic slopes. If we invert the above Laurent polynomial and consider the
75
+ following rational function
76
+ f(x1, · · · , xn) =
77
+ 1
78
+ x1 + · · · + xn +
79
+ b
80
+ x1···xn
81
+ , b ∈ F∗
82
+ q,
83
+ which is no longer a Laurent polynomial, we are led to the so-called inverted Kloosterman sum.
84
+ The study of such sums goes back to N. Katz [Kat95].
85
+ More precisely, in this paper, we study the following twisted inverted n-variable Kloosterman
86
+ sum defined by
87
+ Sn(χ, b) =
88
+
89
+ x1···xn+1=b, xi∈F∗q
90
+ x1+···+xn+1̸=0
91
+ χ1(x1) · · · χn+1(xn+1)ψ
92
+
93
+ 1
94
+ x1 + · · · + xn+1
95
+
96
+ =
97
+
98
+ x1+···+xn+
99
+ b
100
+ x1···xn ̸=0
101
+ xi∈F∗q
102
+ χ1(x1) · · · χn(xn)χn+1
103
+
104
+ b
105
+ x1 · · · xn
106
+
107
+ ψ
108
+
109
+ 1
110
+ x1 + · · · + xn +
111
+ b
112
+ x1···xn
113
+
114
+ ,
115
+ where b ∈ F∗
116
+ q and n ≥ 1. When n = 1, Katz [Kat95] obtained a sharp upper bound for S1(χ, b).
117
+ This result along with the papers of Angel [Ang96] and Evans [Eva95] proves that finite upper
118
+ half plane graphs are Ramanujan in characteristic 2. In [Kat95], Katz raised the question: what
119
+ can be said for Sn(χ, b) when n ≥ 1? The aim of this paper is to study these inverted n-variable
120
+ Kloosterman sums from both complex and p-adic point of views. As we shall see, this class of sums
121
+ is very interesting as various new features and additional difficulties arise.
122
+ Remark. The exact sum introduced in [Kat95] is the following related sum,
123
+ Tn(χ, b) =
124
+
125
+ x1···xn+1=1
126
+ x1+···+xn+1̸=0
127
+ χ1(x1) · · · χn+1(xn+1)ψ
128
+
129
+ b
130
+ x1 + · · · + xn+1
131
+
132
+ .
133
+ Upon the change of variables xi → bxi, one sees that
134
+ Tn(χ, b) = Sn(χ,
135
+ 1
136
+ bn+1 )χ1 · · · χn+1(b).
137
+ Thus, the two families of sums Sn(χ, b) and Tn(χ, b) are essentially equivalent. We work with
138
+ Sn(χ, b) as it is the closer inverted analogue of the classical Kloosterman sum.
139
+ For complex estimate of Sn(χ, b), the best one can hope for would be a square root cancellation
140
+ in the sum Sn(χ, b), i.e.
141
+ Sn(χ, b) = On(q
142
+ n
143
+ 2 ).
144
+ As we shall see, this is not true for n > 2 when χ1 = · · · = χn+1, in which case, Sn(χ, b) has the
145
+ main term −qn−1χ1(b) whose exponent n − 1 is larger than the exponent n/2.
146
+ We shall give two different estimates for Sn(χ, b). The first estimate is based on an elementary
147
+ method via Gauss sums which already shows the new feature of a non-trivial main term when
148
+ χ1 = · · · = χn+1. We obtain the following simple estimate for Sn(χ, b).
149
+
150
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
151
+ 3
152
+ Theorem 1.1. Notations as above. If χ1 = · · · = χn+1, we have
153
+ ����Sn(χ, b) + (q − 1)n
154
+ q
155
+ χ1(b)
156
+ ���� ≤ q
157
+ n+1
158
+ 2 .
159
+ If χi ̸= χj for some i ̸= j, we have
160
+ |Sn(χ, b)| ≤ q
161
+ n+1
162
+ 2 .
163
+ For large q, the error term q(n+1)/2 is not the optimal square root cancellation yet. To obtain the
164
+ deeper square root cancellation with error term On(qn/2), we reduce Sn(χ, b) to a certain twisted
165
+ toric exponential sum S∗
166
+ k(χ, f) which can be handled by the results of Adolphson-Sperber, Denef-
167
+ Loeser and Fu. We check that the related Laurent polynomial f is non-degenerate if p does not
168
+ divide n + 1. This gives our second estimate.
169
+ Theorem 1.2. Notations as above. Suppose p ∤ (n + 1). If χ1 = · · · = χn+1, we have
170
+ |Sn(χ, b) + (q − 1)n − (−1)n
171
+ q
172
+ χ1(b)| ≤ (2n + 1)q
173
+ n
174
+ 2 .
175
+ If χi ̸= χj for some i ̸= j, we have
176
+ |Sn(χ, b)| ≤ 2(n + 1)q
177
+ n
178
+ 2 .
179
+ It is clear that the estimate in Theorem 1.2 is better than the estimate in Theorem 1.1 if q >
180
+ 4(n + 1)2. It is expected that Theorem 1.2 (with possibly a better constant) remains true when p
181
+ divides n + 1. But in this singular case, the above toric sum results do not apply and one would
182
+ need a different approach.
183
+ For p-adic slopes, we focus on the simpler untwisted case. When χ1 = · · · = χn+1, we study
184
+ the p-adic valuations for the reciprocal roots and poles of the generating L-function of the inverted
185
+ n-variable Kloosterman sum. We show that the Newton polygon agrees with the Hodge polygon
186
+ if and only if p ≡ 1 mod n + 1. As a consequence, this completely determines the p-adic slope
187
+ sequence when p ≡ 1 mod n + 1. This is described more precisely below.
188
+ Our approach is to reduce the generating L-function to a certain untwisted toric L-function. To
189
+ construct the relationship between the two L-functions, we need to consider the inverted Klooster-
190
+ man sum defined over every finite extension Fqk. Suppose χ1 = · · · = χn+1, the inverted n-variable
191
+ Kloosterman sum over Fqk is defined by
192
+ Sk,n(b) =
193
+
194
+ x1+···+xn+
195
+ b
196
+ x1···xn ̸=0
197
+ xi∈F∗
198
+ qk
199
+ ψ
200
+
201
+ Trk
202
+
203
+ 1
204
+ x1 + · · · + xn +
205
+ b
206
+ x1···xn
207
+ ��
208
+ ,
209
+ where b ∈ F∗
210
+ q and Trk : Fqk → Fq is the trace map. The generating L-function of Sk,n(b) is defined
211
+ by
212
+ Ln(b, T) = exp
213
+ � ∞
214
+
215
+ k=1
216
+ Sk,n(b)T k
217
+ k
218
+
219
+ .
220
+ Applying some systematic results available for the related toric L-function, we obtain the complex
221
+ and p-adic absolute values for all the reciprocal roots and poles of Ln(b, T) under given restrictions
222
+ on p.
223
+ Theorem 1.3. Suppose p ∤ (n + 1). The L-function is a rational function of the following form:
224
+ Ln(b, T)(−1)n+1 = (1 − T)(n+1)
225
+ n
226
+
227
+ j=2
228
+
229
+ 1 − qj−1T
230
+ �(n
231
+ j)(−1)j−1 2n
232
+
233
+ i=1
234
+ (1 − αiT).
235
+ As complex numbers, the reciprocal roots αi satisfy |αi| = q
236
+ n
237
+ 2 for all 1 ≤ i ≤ 2n.
238
+
239
+ 4
240
+ XIN LIN AND DAQING WAN
241
+ If p ≡ 1 mod (n + 1), viewing the αi’s as p-adic numbers, the slope sequence {vq(αi)}2n
242
+ i=1 in
243
+ increasing order is given by
244
+ {0, 1, 1, 2, 2, . . . , n − 1, n − 1, n}.
245
+ Our results show that for the inverted n-variable Kloosterman sum, if p does not divide n + 1,
246
+ the primitive middle cohomology has dimension 2n, pure of weight n and with Hodge numbers
247
+ {1, 2, 2, · · · , 2, 1}. This is in contrast to the classical n-variable Kloosterman sum, where the middle
248
+ cohomology has dimension n + 1, pure of weight n and with Hodge numbers {1, 1, 1, · · · , 1, 1}.
249
+ The larger Hodge numbers suggest that new features and additional difficulties would likely arise
250
+ in studying inverted n-variable Kloosterman sums.
251
+ As a corollary of the first part in Theorem 1.3, we get a slightly better bound for Sk,n(b).
252
+ Corollary 1.4. If p ∤ (n + 1), for all integers k ≥ 1, we have
253
+ |Sk,n(b) + (qk − 1)n − (−1)n(qk + 1)
254
+ qk
255
+ | ≤ 2nq
256
+ nk
257
+ 2 .
258
+ When k = 1, the exponential sum Sk,n(b) reduces to Sn(χ, b) with χ1 = · · · = χn+1. Explicitly,
259
+ the estimate in Corollary 1.4 is better than the estimate in the first case of Theorem 1.2. We remark
260
+ that the condition p ≡ 1 mod (n + 1) in the second part of Theorem 1.3 is necessary and sufficient
261
+ for the same conclusion to hold. Thus, if p ̸≡ 1 mod (n + 1), the slope sequence will be strictly
262
+ different, but we do not know the exact slope sequence in this case.
263
+ The rest of this paper is organized as follows. In section 2, we review some technical methods
264
+ including Adolphson-Sperber’s theorems and Dwork’s theory on toric exponentials sums. In section
265
+ 3, we use these methods to prove the main results.
266
+ We end the introduction by mentioning several recent references [FW21] [Li21] [YZ22] [CL22]
267
+ [LC22] which applied some of the related toric techniques in treating different classes of non-toric
268
+ n variable exponential sums arising from analytic number theory.
269
+ 2. PRELIMINARIES ON TORIC EXPONENTIAL SUMS
270
+ 2.1. Rationality of the toric L-function. Let f ∈ Fq
271
+
272
+ x±1
273
+ 1 , . . . , x±1
274
+ n
275
+
276
+ be a Laurent polynomial and
277
+ its associated twisted toric exponential sum is defined to be
278
+ S∗
279
+ k(χ, f) =
280
+
281
+ xi∈F∗
282
+ qk
283
+ χ1(Nk(x1)) · · · χn(Nk(xn))ψ(Trk(f)),
284
+ (2.1)
285
+ where Trk : Fqk → Fq is the trace map, Nk : Fqk → Fq is the norm map, χ1, . . . , χn : F∗
286
+ q → C∗ are
287
+ multiplicative characters and ψ : Fq → C∗ is a nontrivial additive character. A classical problem in
288
+ number theory is to estimate the absolute values of S∗
289
+ k(χ, f).
290
+ A well known theorem of Dwork-Bombieri-Grothendieck [Dwo60,Bom66,Gro68] says that the
291
+ generating L-function of S∗
292
+ k(χ, f) is a rational function:
293
+ L∗(χ, f, T) = exp
294
+ � ∞
295
+
296
+ k=1
297
+ S∗
298
+ k(χ, f)T k
299
+ k
300
+
301
+ =
302
+ �d1
303
+ i=1(1 − αiT)
304
+ �d2
305
+ j=1(1 − βjT)
306
+ ,
307
+ where all the reciprocal zeros and poles are non-zero algebraic integers. In particular, when all of χi
308
+ are trivial characters, the untwisted toric exponential sum and the associated L-function are denoted
309
+ by S∗
310
+ k(f) and L∗(f, T) respectively.
311
+ Through logarithmic derivatives, we have
312
+ S∗
313
+ k(χ, f) =
314
+ d2
315
+
316
+ j=1
317
+ βk
318
+ j −
319
+ d1
320
+
321
+ i=1
322
+ αk
323
+ i ,
324
+ k ∈ Z≥1.
325
+ (2.2)
326
+ Thus, the estimate of S∗
327
+ k(χ, f) is reduced to understanding all the absolute values of the reciprocal
328
+ zeros αi and poles βj. Deligne’s theorem on Riemann hypothesis [Del80] describes the bounds for
329
+
330
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
331
+ 5
332
+ all the absolute values of αi and βj in general. The complex absolute values of reciprocal zeros and
333
+ poles satisfy
334
+ |αi| = qui/2, |βj| = qvj/2, ui ∈ Z ∩ [0, 2n], vj ∈ Z ∩ [0, 2n].
335
+ For non-archimedean absolute values, Deligne proved that |αi|ℓ = |βj|ℓ = 1 when ℓ is a prime and
336
+ ℓ ̸= p. For p-adic absolute values, one has
337
+ |αi|p = q−ri, |βj|p = q−sj, ri ∈ Q ∩ [0, n], sj ∈ Q ∩ [0, n].
338
+ The integer ui (resp. vj) is called the weight of αi (resp. βj) and the rational number ri (resp. sj)
339
+ is called the slope of αi (resp. βj).
340
+ In the past few decades, there has been tremendous interest in determining the weights and slopes
341
+ of the generating L-functions. Without any further condition on the Laurent polynomial f, it is even
342
+ hard to determine the number of reciprocal roots and poles. Most of the existing work about the
343
+ weights and slopes relies on a suitable smoothness condition. For toric exponential sums, this
344
+ usually means the non-degenerate condition, see below for the precise definition.
345
+ Let
346
+ (2.3)
347
+ f(x1, . . . xn) =
348
+ J
349
+
350
+ j=1
351
+ ajxVj
352
+ be a Laurent polynomial with aj ∈ F∗
353
+ q and Vj = (v1j, . . . , vnj) ∈ Zn (1 ≤ j ≤ J). The Newton
354
+ polyhedron of f, ∆(f), is defined to be the convex closure in Rn generated by the origin and the
355
+ lattice points Vj (1 ≤ j ≤ J). For δ ⊂ ∆(f), let the Laurent polynomial
356
+ f δ =
357
+
358
+ Vj∈δ
359
+ ajxVj
360
+ be the restriction of f to δ.
361
+ Definition 2.1 (non-degenerate). A Laurent polynomial f is called non-degenerate if for each closed
362
+ face δ of ∆(f) of arbitrary dimension which doesn’t contain the origin, the partial derivatives
363
+ �∂f δ
364
+ ∂x1
365
+ , . . . , ∂f δ
366
+ ∂xn
367
+
368
+ have no common zeros with x1 . . . xn ̸= 0 over the algebraic closure of Fq.
369
+ When f is non-degenerate, Adolphson-Sperber [AS89] proved that the untwisted toric L-function
370
+ L∗(f, T)(−1)n−1 is a polynomial and improved the bound for weight.
371
+ Theorem 2.2 ( [AS89]). For any non-degenerate f ∈ Fq[x±1
372
+ 1 , . . . , x±1
373
+ n ], the associated L-function
374
+ L∗(f, T)(−1)n−1 is a polynomial of degree n! Vol(∆(f)). Namely,
375
+ L∗(f, T)(−1)n−1 =
376
+ n! Vol(∆(f))
377
+
378
+ i=1
379
+ (1 − αiT), αi ̸= 0.
380
+ For any multiplicative characters χi (nontrivial or trivial), the degree and weights of the twisted
381
+ toric L-function are studied and completed by Adolphson-Sperber [AS91, AS93], [DL91]and Fu
382
+ [Fu09] under the non-degeneracy assumption. These results lead to the following bound for the
383
+ twisted toric exponential sum.
384
+ Theorem 2.3 ( [DL91] [AS93] [Fu09]). Let f ∈ Fq
385
+
386
+ x±1
387
+ 1 , . . . , x±1
388
+ n
389
+
390
+ be a Laurent polynomial with
391
+ ∆ = ∆(f). If f is non-degenerate, one has
392
+ |S∗
393
+ k(χ1, . . . , χn, f)| ≤ n! Vol(∆)q
394
+ nk
395
+ 2 .
396
+ For the slopes of the L-function, the situation is somewhat simpler in the untwisted case, oth-
397
+ erwise, even the description of Adolphson-Sperber’s “Hodge lower bound" is a little cumbersome.
398
+ Thus, the definitions and theories discussed in the following subsections focus on the untwisted
399
+ L-function.
400
+
401
+ 6
402
+ XIN LIN AND DAQING WAN
403
+ 2.2. Newton polygon and Hodge polygon. To determine the q-adic slopes of its reciprocal roots,
404
+ we introduce the q-adic Newton polygon.
405
+ Definition 2.4 (Newton polygon). Let L(T) = �n
406
+ i=0 aiT i ∈ 1+TQp[T], where Qp is the algebraic
407
+ closure of Qp. The q-adic Newton polygon of L(T) is defined to be the lower convex closure of the
408
+ set of points {(k, ordq(ak)) |k = 0, 1, . . . , n} in R2.
409
+ Lemma 2.5 ( [Kob84]). Notations as above. Let L(T) = (1−α1T) . . . (1−αnT) be the factoriza-
410
+ tion of L(T) in terms of reciprocal roots αi ∈ Qp. Let λi = ordq αi. If λ is the slope of the q-adic
411
+ Newton polygon of L(T) with horizontal length l, then precisely l of the λi are equal to λ.
412
+ The q-adic Newton polygon of L∗(f, T)(−1)n−1 is denoted as NP(f). Lemma 2.5 relates NP(f)
413
+ to the q-adic valuation of reciprocal roots of toric L-functions. The definition of NP(f) relies on
414
+ the coefficients of L-function, which makes it hard to compute directly. When f is non-degenerate,
415
+ Adolphson and Sperber proved that L∗(f, T)(−1)n−1 is a polynomial and NP(f) has a topological
416
+ lower bound called Hodge polygon, which is easier to determine. Thus, we shall compute Hodge
417
+ polygon and consider when the Newton polygon coincides with this lower bound.
418
+ Let ∆ be an n-dimensional integral polytope containing the origin in Rn. For u ∈ Rn, the
419
+ weight function w(u) represents the smallest non-negative real number c such that u ∈ c∆. Denote
420
+ w(u) = ∞ if such c doesn’t exist. Assume δ is a co-dimension 1 face of ∆ not containing the
421
+ origin. Let D(δ) be the least common multiple of the denominators of the coefficients in the linear
422
+ equation defining δ, normalized to have constant term 1. We define the denominator of ∆ to be the
423
+ least common multiple of all such D(δ) given by:
424
+ D = D(∆) = lcmδD(δ),
425
+ where δ runs over all the co-dimension 1 faces of ∆ that don’t contain the origin. It’s easy to check
426
+ w(Zn) ⊆
427
+ 1
428
+ D(∆)Z≥0 ∪ {+∞}.
429
+ For a non-negative integer k, let
430
+ (2.4)
431
+ W∆(k) = #
432
+
433
+ u ∈ Zn|w(u) = k
434
+ D
435
+
436
+ be the number of lattice points in Zn with weight k/D. Its generating function is known to be a
437
+ rational function of the following form
438
+
439
+
440
+ k=0
441
+ W∆(k)tk/D =
442
+ �nD
443
+ k=0 H∆(k)tk/D
444
+ (1 − t)n
445
+ .
446
+ This leads to
447
+ Definition 2.6 (Hodge number). Let ∆ be an n-dimensional integral polytope containing the origin
448
+ in Rn. For a non-negative integer k, the k-th Hodge number of ∆ is defined to be
449
+ H∆(k) =
450
+ n
451
+
452
+ i=0
453
+ (−1)i
454
+ �n
455
+ i
456
+
457
+ W∆(k − iD).
458
+ (2.5)
459
+ It is known that
460
+ H∆(k) = 0,
461
+ if
462
+ k > nD.
463
+ Based on the Hodge numbers, we define the Hodge polygon of a given polyhedron ∆ ∈ Rn as
464
+ follows.
465
+ Definition 2.7 (Hodge polygon). The Hodge polygon HP(∆) of ∆ is the lower convex polygon in
466
+ R2 with vertices (0,0) and
467
+ Qk =
468
+
469
+ k
470
+
471
+ m=0
472
+ H∆(m), 1
473
+ D
474
+ k
475
+
476
+ m=0
477
+ mH∆(m)
478
+
479
+ ,
480
+ k = 0, 1, . . . , nD,
481
+
482
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
483
+ 7
484
+ where H∆(k) is the k-th Hodge number of ∆, k = 0, 1, . . . , nD.
485
+ That is, HP(∆) is a polygon starting from origin (0,0) with a slope k/D side of horizontal length
486
+ H∆(k) for k = 0, 1, . . . , nD. The vertex Qk is called a break point if H∆(k + 1) ̸= 0 where
487
+ k = 1, 2, . . . , nD − 1.
488
+ Note that the horizontal length H∆(k) is the number of lattice points of weight k/D in a certain
489
+ fundamental domain corresponding to a basis of the p-adic cohomology space used to compute
490
+ the L-function. By a theorem of Adolphson-Sperber, the Hodge polygon is a lower bound of the
491
+ corresponding Newton polygon.
492
+ Theorem 2.8 ( [AS89]). For every prime p and non-degenerate Laurent polynomial f with ∆(f) =
493
+ ∆ ⊂ Rn, we have
494
+ NP(f) ≥ HP(∆),
495
+ where NP(f) is the q-adic Newton polygon of L∗(f, T)(−1)n−1. Furthermore, the endpoints of
496
+ NP(f) and NP(∆) coincide.
497
+ Definition 2.9 (ordinary). A Laurent polynomial f is called ordinary if NP(f) = HP(∆).
498
+ It is clear that the ordinary property of a Laurent polynomial depends on its Newton polyhedron
499
+ ∆ and on the coefficients of f(x). Applying the facial decomposition theorem [Wan93], we reduce
500
+ the ordinary property of f to its smaller pieces which are easier to deal with.
501
+ Theorem 2.10 (Facial decomposition theorem [Wan93]). Let f be a non-degenerate Laurent poly-
502
+ nomial over Fq. Assume ∆ = ∆(f) is n-dimensional and δ1, . . . , δh are all the co-dimension 1
503
+ faces of ∆ which don’t contain the origin. Let f δi denote the restriction of f to δi. Then f is
504
+ ordinary if and only if f δi is ordinary for 1 ≤ i ≤ h.
505
+ 2.3. Boundary decomposition theorems. Before describing the boundary decomposition, we ex-
506
+ press the L-function in terms of the Fredholm determinant of an infinite Frobenius matrix via
507
+ Dwork’s trace formula.
508
+ 2.3.1. Dwork’s trace formula. Let Qp be the field of p-adic numbers and Ω be the completion of
509
+ Qp. A fixed primitive p-th root of unity in Ω is denoted as ζp. Let π be the element of Qp(ζp)
510
+ satisfies
511
+
512
+
513
+ m=0
514
+ πpm
515
+ pm = 0, π ≡ ζp − 1
516
+ mod (ζp − 1)2,
517
+ and
518
+ ordp π =
519
+ 1
520
+ p − 1.
521
+ Then, π is a uniformizer of Qp(π) and thus Qp(π) = Qp(ζp). Let Ep(t) be the Artin-Hasse
522
+ exponential series,
523
+ Ep(t) = exp
524
+ � ∞
525
+
526
+ m=0
527
+ tpm
528
+ pm
529
+
530
+ =
531
+
532
+
533
+ m=0
534
+ λmtm ∈ Zp[[x]].
535
+ In Dwork’s terminology, a splitting function θ(t) is defined to be
536
+ θ(t) = Ep(πt) =
537
+
538
+
539
+ m=0
540
+ λmπmtm.
541
+ A Laurent polynomial f ∈ Fq[x±1
542
+ 1 , . . . , x±1
543
+ n ] is written as
544
+ f =
545
+ J
546
+
547
+ j=1
548
+ ¯ajxVj,
549
+ where Vj ∈ Zn and ¯aj ∈ F∗
550
+ q. Let aj be the Teichmüller lifting of ¯aj in Ω satisfying aq
551
+ j = aj. Let
552
+ F(f, x) =
553
+ J
554
+
555
+ j=1
556
+ θ(ajxVj) =
557
+
558
+ r∈Zn
559
+ Fr(f)xr.
560
+
561
+ 8
562
+ XIN LIN AND DAQING WAN
563
+ The coefficients are given by
564
+ Fr(f) =
565
+
566
+ u
567
+ (
568
+ J
569
+
570
+ j=1
571
+ λujauj
572
+ j )πu1+···+uJ,
573
+ r ∈ Zn,
574
+ where the sum is over all the solutions of the following linear system
575
+ J
576
+
577
+ j=1
578
+ ujVj = r
579
+ with
580
+ uj ∈ Z≥0,
581
+ and λm is m-th coefficient of the Artin-Hasse exponential series Ep(t).
582
+ Assume ∆ = ∆(f). Let L(∆) = Zn ∩ C(∆) be the set of lattice points in the closed cone
583
+ generated by origin and ∆. For a given point r ∈ Rn, define the weight function to be
584
+ w(r) := inf
585
+ ⃗u
586
+
587
+
588
+
589
+ J
590
+
591
+ j=1
592
+ uj|
593
+ J
594
+
595
+ j=1
596
+ ujVj = r,
597
+ uj ∈ R≥0
598
+
599
+
600
+  .
601
+ The infinite semilinear Frobenius matrix A1(f) is the following matrix whose rows and columns
602
+ are indexed by the lattice points in L(∆) with respect to the weights:
603
+ A1(f) = (ar,s(f)) = (Fps−r(f)πw(r)−w(s)),
604
+ where r, s ∈ L(∆). The infinite linear Frobenius matrix Aa(f) is defined to be
605
+ Aa(f) = A1(f)Aτ
606
+ 1(f) · · · Aτ a−1
607
+ 1
608
+ (f),
609
+ where τ is the absolute Frobenius automorphism.
610
+ Dwork’s trace formula can be expressed in terms of the matrix Aa(f) as follows, see [Wan04]
611
+ Theorem 2.11. We have
612
+ (2.6)
613
+ L∗(f, T)(−1)n−1 =
614
+ n
615
+
616
+ i=0
617
+ det(I − TqiAa(f))(−1)i(n
618
+ i).
619
+ Equivalently,
620
+ (2.7)
621
+ det(I − TAa(f)) =
622
+
623
+
624
+ i=0
625
+
626
+ L∗(f, qiT)(−1)n−1�(n+i−1
627
+ i
628
+ ) .
629
+ Now it suffices to understand the determinant det(I−TAa(f)). Based on the fact that ordp Fr(f) ≥
630
+ w(r)
631
+ p−1 , we have the following estimate
632
+ ordp(ar,s(f)) ≥ w(ps − r) + w(r) − w(s)
633
+ p − 1
634
+ ≥ w(s).
635
+ Let ξ be an element in Ω satisfying ξD = πp−1. Then A1(f) can be written in a block form,
636
+ A1(f) =
637
+
638
+
639
+
640
+
641
+
642
+
643
+
644
+
645
+ A00
646
+ ξA01
647
+ · · ·
648
+ ξiA0i
649
+ · · ·
650
+ A10
651
+ ξA11
652
+ · · ·
653
+ ξiA1i
654
+ · · ·
655
+ ...
656
+ ...
657
+ ...
658
+ ...
659
+ Ai0
660
+ ξAi1
661
+ · · ·
662
+ ξiAii
663
+ · · ·
664
+ ...
665
+ ...
666
+ ...
667
+ ...
668
+
669
+
670
+
671
+
672
+
673
+
674
+
675
+
676
+ ,
677
+ where the block Aii is a p-adic integral W∆(i)×W∆(i) matrix. This implies that the q-adic Newton
678
+ polygon of det(I −TA1(f)) has a natural lower bound which can be identified with the chain level
679
+ version of the Hodge polygon.
680
+
681
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
682
+ 9
683
+ Definition 2.12. Let P(∆) be the polygon in R2 with vertices (0, 0) and
684
+ Pk =
685
+
686
+ k
687
+
688
+ m=0
689
+ W∆(m), 1
690
+ D
691
+ k
692
+
693
+ m=0
694
+ mW∆(m)
695
+
696
+ ,
697
+ k = 0, 1, 2, . . .
698
+ The chain level version of Adolphson-Sperber’s lower bound and the ordinary property are as
699
+ follows.
700
+ Proposition 2.13 ( [AS87a]). The q-adic Newton polygon of det(I − TAa(f)) lies above P(∆).
701
+ Proposition 2.14 ( [Wan04]). Notations as above. Assume f is non-degenerate with ∆ = ∆(f).
702
+ Then NP(f) = HP(∆) if and only if the q-adic Newton polygon of det(I − TAa(f)) coincides
703
+ with its lower bound P(∆).
704
+ 2.3.2. Boundary decomposition. Let f ∈ Fq[x±1
705
+ 1 , . . . , x±1
706
+ n ] with ∆ = ∆(f), where ∆ is an n-
707
+ dimensional integral convex polyhedron in Rn containing the origin. Let C(∆) be the cone gener-
708
+ ated by ∆ in Rn.
709
+ Definition 2.15. The boundary decomposition
710
+ B(∆) = { the interior of a closed face in C(∆) containing the origin}
711
+ is the unique interior decomposition of C(∆) into a disjoint union of relatively open cones.
712
+ If the origin is a vertex of ∆, then it is the unique 0-dimensional open cone in B(∆). Recall that
713
+ A1(f) = (ar,s(f)) is the infinite semilinear Frobenius matrix whose rows and columns are indexed
714
+ by the lattice points in L(∆). For Σ ∈ B(∆), we define A1(Σ, f) to be the submatrix of A1(f)
715
+ with r, s ∈ Σ. Let f Σ be the restriction of f to the closure of Σ. Then A1(Σ, f Σ) denotes the
716
+ submatrix of A1(f Σ) with r, s ∈ Σ.
717
+ Let B(∆) = {Σ0, . . . , Σh} such that dim(Σi) ≤ dim(Σi+1), i = 0, . . . , h − 1. Define Bij =
718
+ (ar,s(f)) with r ∈ Σi and s ∈ Σj (0 ≤ i, j ≤ h). After a permutation of basis vectors, the infinite
719
+ semilinear Frobenius matrix can be written as
720
+ (2.8)
721
+ A1(f) =
722
+
723
+
724
+
725
+
726
+
727
+ B00
728
+ B01
729
+ · · ·
730
+ B0h
731
+ B10
732
+ B11
733
+ · · ·
734
+ B1h
735
+ ...
736
+ ...
737
+ ...
738
+ ...
739
+ Bh0
740
+ Bh1
741
+ · · ·
742
+ Bhh
743
+
744
+
745
+
746
+
747
+  ,
748
+ where Bij = 0 for i > j. Then det(I −TA1(f)) = �h
749
+ i=0 det(I −TBii) and we have the boundary
750
+ decomposition theorem.
751
+ Theorem 2.16 (Boundary decomposition [Wan93]). Let f ∈ Fq[x±1
752
+ 1 , . . . , x±1
753
+ n ] with ∆ = ∆(f).
754
+ Then we have the following factorization
755
+ det(I − TA1(f)) =
756
+
757
+ Σ∈B(∆)
758
+ det
759
+
760
+ I − TA1(Σ, f Σ)
761
+
762
+ .
763
+ 2.4. Diagonal local theory. In this subsection, we introduce some non-degenerate and ordinary
764
+ criteria when the Laurent polynomial is diagonal.
765
+ Definition 2.17. A Laurent polynomial f ∈ Fq[x±1
766
+ 1 , . . . , x±1
767
+ n ] is called diagonal if f has exactly n
768
+ non-constant terms and ∆(f) is an n-dimensional simplex in Rn.
769
+ Let f be a diagonal Laurent polynomial over Fq. Write
770
+ f(x1, x2, . . . xn) =
771
+ n
772
+
773
+ j=1
774
+ ajxVj,
775
+ where aj ∈ F∗
776
+ q and Vj = (v1j, . . . , vnj) ∈ Zn for 1 ≤ j ≤ n. Let ∆ = ∆(f). The vertex matrix of
777
+ ∆ is defined to be
778
+ M(∆) = (V1, . . . , Vn),
779
+
780
+ 10
781
+ XIN LIN AND DAQING WAN
782
+ where the i-th column is the i-th exponent of f. Since f is diagonal, M(∆) is invertible.
783
+ Proposition 2.18. Suppose f ∈ Fq[x±1
784
+ 1 , . . . , x±1
785
+ n ] is diagonal with ∆ = ∆(f). Then f is non-
786
+ degenerate if and only if p is relatively prime to det(M(∆)).
787
+ Let S(∆) be the solution set of the following linear system
788
+ M(∆)
789
+
790
+
791
+
792
+
793
+
794
+ r1
795
+ r2
796
+ ...
797
+ rn
798
+
799
+
800
+
801
+
802
+  ≡ 0 (mod1),
803
+ ri ∈ Q ∩ [0, 1).
804
+ It’s easy to prove that S(∆) is an abelian group and its order is given by
805
+ |det M(∆)| = n! Vol(∆).
806
+ (2.9)
807
+ Let Sp(∆) denote the prime to p part of S(∆). It is an abelian subgroup of order equal to the
808
+ prime to p factor of det M(∆). In particular, Sp(∆) = S(∆) if p is relatively prime to det M(∆).
809
+ By the Stickelberger theorem for Gauss sums, we have the following ordinary criterion for a non-
810
+ degenerate Laurent polynomial [Wan04].
811
+ Proposition 2.19. A diagonal Laurent polynomial f is ordinary at p if and only if the norm function
812
+ |r| = r1 + · · · + rn on Sp(∆) is stable under the p-action: That is, for each r ∈ Sp(∆), we have
813
+ |r| = |{pr}|, where {pr} is the class of pr in Sp(∆).
814
+ 3. PROOF OF THE MAIN THEOREMS
815
+ We prove the main theorems in this section.
816
+ 3.1. Proof of Theorem 1.1. Recall that for integer n ≥ 1, the twisted inverted n-variable Kloost-
817
+ erman sum is defined to be
818
+ Sn(χ, b) =
819
+
820
+ x1···xn+1=b
821
+ x1+···+xn+1̸=0
822
+ χ1(x1) · · · χn+1(xn+1)ψ
823
+
824
+ 1
825
+ x1 + · · · + xn+1
826
+
827
+ ,
828
+ where b ∈ F∗
829
+ q, ψ : Fq → C∗ is a nontrivial additive character and χ1, . . . , χn+1 : F∗
830
+ q → C∗ are
831
+ multiplicative characters. Let χ : F∗
832
+ q → C∗ denote a multiplicative character. By the orthogonality
833
+ of characters, we have
834
+ Sn(χ, b) =
835
+ 1
836
+ q(q − 1)
837
+
838
+ λ,xi∈F∗q
839
+
840
+ u∈Fq
841
+ ψ (u (x1 + · · · + xn+1 − λ)) χ1(x1) · · · χn+1(xn+1)
842
+ × ψ
843
+ �1
844
+ λ
845
+ � �
846
+ χ
847
+ χ
848
+ �x1 · · · χn+1
849
+ b
850
+
851
+ =
852
+ 1
853
+ q(q − 1)
854
+
855
+ λ∈F∗q
856
+
857
+ xi∈F∗q
858
+ χ1(x1) · · · χn+1(xn+1)ψ
859
+ � 1
860
+ λ
861
+ � �
862
+ χ
863
+ χ
864
+ �x1 · · · χn+1
865
+ b
866
+
867
+ +
868
+ 1
869
+ q(q − 1)
870
+
871
+ λ∈F∗q
872
+
873
+ xi∈F∗q
874
+
875
+ u∈F∗q
876
+ ψ (u (x1 + · · · + xn+1 − λ))
877
+ × χ1(x1) · · · χn+1(xn+1)ψ
878
+ � 1
879
+ λ
880
+ � �
881
+ χ
882
+ χ
883
+ �x1 · · · χn+1
884
+ b
885
+
886
+ =S1 + S2.
887
+ (3.1)
888
+ Then
889
+ S1 =
890
+ 1
891
+ q(q − 1)
892
+
893
+ λ∈F∗q
894
+ ψ
895
+ �1
896
+ λ
897
+ � �
898
+ χ
899
+ χ−1(b)
900
+
901
+ xi∈F∗q
902
+ (χχ1) (x1) · · · (χχn+1) (xn+1)
903
+
904
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
905
+ 11
906
+ =
907
+ 1
908
+ q(q − 1)
909
+
910
+ λ∈F∗q
911
+ ψ
912
+ �1
913
+ λ
914
+ � �
915
+ χ
916
+ χ−1(b)
917
+ n+1
918
+
919
+ i=1
920
+
921
+  �
922
+ xi∈F∗q
923
+ (χχi) (xi)
924
+
925
+
926
+ =
927
+
928
+
929
+
930
+ −(q − 1)n
931
+ q
932
+ χ1(b),
933
+ if χ1 = · · · = χn+1,
934
+ 0,
935
+ otherwise.
936
+ (3.2)
937
+ If χ is trivial, the Gauss sum G(χ) = −1. If χ is non-trivial, |G(χ)| = √q. Then
938
+ S2 =
939
+ 1
940
+ q(q − 1)
941
+
942
+ λ,u∈F∗q
943
+
944
+ χ
945
+ χ−1(b)
946
+
947
+ xi∈F∗q
948
+ (χχ1) (x1)ψ(ux1) · · · (χχn+1) (xn+1)ψ(uxn+1)
949
+ × ψ(−uλ)ψ
950
+ � 1
951
+ λ
952
+
953
+ =
954
+ 1
955
+ q(q − 1)
956
+
957
+ λ,u∈F∗q
958
+
959
+ χ
960
+ χ−1(b)χn+1χ1 · · · χn+1(u)ψ(−uλ)ψ
961
+ �1
962
+ λ
963
+
964
+ G(χχ1) · · · G(χχn+1)
965
+ =
966
+ 1
967
+ q(q − 1)
968
+
969
+ χ
970
+ χ−1(b)
971
+
972
+  �
973
+ λ∈F∗q
974
+ χn+1χ1 · · · χn+1
975
+
976
+ − 1
977
+ λ
978
+
979
+ ψ
980
+ � 1
981
+ λ
982
+ �
983
+  G(χn+1χ1 · · · χn+1)
984
+ × G(χχ1) · · · G(χχn+1)
985
+ =
986
+ 1
987
+ q(q − 1)
988
+
989
+ χ
990
+ χ−1(b)χn+1χ1 · · · χn+1(−1)G(χn+1χ1 · · · χn+1)G(χn+1χ1 · · · χn+1)
991
+ × G(χχ1) · · · G(χχn+1).
992
+ (3.3)
993
+ Since |G(χ)| ≤ √q, it follows that |S2| ≤ q
994
+ n+1
995
+ 2 . Combining (3.1) and (3.2), we can deduce the
996
+ following bounds.
997
+ ����Sn(χ, b) + (q − 1)n
998
+ q
999
+ χ1(b)
1000
+ ���� ≤ q
1001
+ n+1
1002
+ 2 ,
1003
+ if χ1 = · · · = χn+1,
1004
+ and
1005
+ |Sn(χ, b)| ≤ q
1006
+ n+1
1007
+ 2 ,
1008
+ if χi ̸= χj for some i ̸= j.
1009
+ This proves Theorem 1.1.
1010
+ 3.2. Proof of Theorem 1.2. The twisted inverted Kloosterman sum Sn(χ, b) has the expression
1011
+ Sn(χ, b) =
1012
+
1013
+ x1+···+xn+
1014
+ b
1015
+ x1···xn ̸=0
1016
+ xi∈F∗q
1017
+ χ1(x1) · · · χn(xn)χn+1
1018
+
1019
+ b
1020
+ x1 · · · xn
1021
+
1022
+ × ψ
1023
+
1024
+ 1
1025
+ x1 + · · · + xn +
1026
+ b
1027
+ x1···xn
1028
+
1029
+ =
1030
+
1031
+ z
1032
+
1033
+ x1+···+xn+
1034
+ b
1035
+ x1···xn
1036
+
1037
+ =1
1038
+ z, xi∈F∗q
1039
+ χn+1(b) (χ1χn+1)(x1) · · · (χnχn+1)(xn)ψ (z)
1040
+ = 1
1041
+ q
1042
+
1043
+ z, xi∈F∗q
1044
+ y∈Fq
1045
+ χn+1(b) (χ1χn+1)(x1) · · · (χnχn+1)(xn)
1046
+ × ψ
1047
+
1048
+ z + y
1049
+
1050
+ 1 − z
1051
+
1052
+ x1 + · · · + xn +
1053
+ b
1054
+ x1 · · · xn
1055
+ ���
1056
+
1057
+ 12
1058
+ XIN LIN AND DAQING WAN
1059
+ = χn+1(b)
1060
+ q
1061
+
1062
+  �
1063
+ z, xi∈F∗q
1064
+ (χ1χn+1)(x1) · · · (χnχn+1)(xn)ψ (z) + En(χ, b)
1065
+
1066
+
1067
+ =
1068
+
1069
+
1070
+
1071
+
1072
+
1073
+ −(q − 1)n
1074
+ q
1075
+ χ1(b) + 1
1076
+ qχ1(b)En(χ, b),
1077
+ if χ1 = · · · = χn+1,
1078
+ 1
1079
+ qχn+1(b)En(χ, b),
1080
+ if χi ̸= χj for some i ̸= j,
1081
+ (3.4)
1082
+ where
1083
+ En(χ, b) =
1084
+
1085
+ y,z,xi∈F∗q
1086
+ (χ1χn+1)(x1) · · · (χnχn+1)(xn)
1087
+ × ψ
1088
+
1089
+ z + y
1090
+
1091
+ 1 − z
1092
+
1093
+ x1 + · · · + xn +
1094
+ b
1095
+ x1 · · · xn
1096
+ ���
1097
+ .
1098
+ In order to prove Theorem 1.2, it suffices to estimate En(χ, b).
1099
+ Let f ∈ Fq[x±1
1100
+ 1 , . . . , x±1
1101
+ n+2] be the Laurent polynomial defined by
1102
+ f(x1, · · · , xn+2) = xn+1
1103
+
1104
+ 1 − xn+2
1105
+
1106
+ x1 + · · · + xn +
1107
+ b
1108
+ x1 · · · xn
1109
+ ��
1110
+ + xn+2.
1111
+ As defined in (2.1), En(χ, b) is the twisted toric exponential sum associated to f. Let ∆ = ∆(f)
1112
+ denote the Newton polyhedron corresponding to f. Clearly, dim ∆ = n + 2 and ∆ has n + 4
1113
+ vertices in Rn+2: V0 = (0, · · · , 0)(the origin), V1 = (1, 0, · · · , 0, 1, 1), V2 = (0, 1, · · · , 0, 1, 1),
1114
+ . . . , Vn = (0, 0, · · · , 1, 1, 1), Vn+1 = (−1, · · · , −1, 1, 1), Vn+2 = (0, · · · , 0, 1, 0) and Vn+3 =
1115
+ (0, · · · , 0, 0, 1). Furthermore, ∆ has exactly 2 co-dimension 1 faces not containing the origin.
1116
+ Explicitly, they are
1117
+ δ1 : xn+1 = 1
1118
+ and
1119
+ δ2 : xn+2 = 1.
1120
+ Vertices V1, . . . , Vn+2 determine the face δ1 and vertices V1, . . . , Vn+1, Vn+3 determine the face δ2.
1121
+ Let M(δi) be the vertex matrix of δi, we have
1122
+ M(δ1) =
1123
+
1124
+
1125
+
1126
+
1127
+
1128
+
1129
+
1130
+
1131
+
1132
+ 1
1133
+ 0
1134
+ · · ·
1135
+ 0
1136
+ −1
1137
+ 0
1138
+ 0
1139
+ 1
1140
+ · · ·
1141
+ 0
1142
+ −1
1143
+ 0
1144
+ ...
1145
+ ...
1146
+ ...
1147
+ ...
1148
+ ...
1149
+ ...
1150
+ 0
1151
+ 0
1152
+ · · ·
1153
+ 1
1154
+ −1
1155
+ 0
1156
+ 1
1157
+ 1
1158
+ · · ·
1159
+ 1
1160
+ 1
1161
+ 1
1162
+ 1
1163
+ 1
1164
+ · · ·
1165
+ 1
1166
+ 1
1167
+ 0
1168
+
1169
+
1170
+
1171
+
1172
+
1173
+
1174
+
1175
+
1176
+
1177
+ ,
1178
+ M(δ2) =
1179
+
1180
+
1181
+
1182
+
1183
+
1184
+
1185
+
1186
+
1187
+
1188
+ 1
1189
+ 0
1190
+ · · ·
1191
+ 0
1192
+ −1
1193
+ 0
1194
+ 0
1195
+ 1
1196
+ · · ·
1197
+ 0
1198
+ −1
1199
+ 0
1200
+ ...
1201
+ ...
1202
+ ...
1203
+ ...
1204
+ ...
1205
+ ...
1206
+ 0
1207
+ 0
1208
+ · · ·
1209
+ 1
1210
+ −1
1211
+ 0
1212
+ 1
1213
+ 1
1214
+ · · ·
1215
+ 1
1216
+ 1
1217
+ 0
1218
+ 1
1219
+ 1
1220
+ · · ·
1221
+ 1
1222
+ 1
1223
+ 1
1224
+
1225
+
1226
+
1227
+
1228
+
1229
+
1230
+
1231
+
1232
+
1233
+ .
1234
+ (3.5)
1235
+ Explicitly, each f δi is diagonal for i = 1, 2. The restriction of f to δi is defined by
1236
+ f δi =
1237
+
1238
+ Vj∈δi
1239
+ ajxVj.
1240
+ Proposition 3.1.
1241
+ (i). The denominator D = 1.
1242
+ (ii). f is non-degenerate if and only if p ∤ (n + 1).
1243
+ (iii). Vol(∆) = 2n + 2
1244
+ (n + 2)!.
1245
+ Proof. The denominator D = 1 can be deduced immediately from the equation of δi. Since δ1 and
1246
+ δ2 are the co-dimension 1 faces of ∆(f) not containing the origin, it suffices to prove f δ1 and f δ2
1247
+ are non-degenerate. By Proposition 2.18, f δi is non-degenerate if and only if p is relatively prime
1248
+ to det(M(δi)). By formula (3.5),
1249
+ det(M(δ1)) = −(n + 1)
1250
+ and
1251
+ det(M(δ2)) = n + 1.
1252
+ (3.6)
1253
+ This proves (ii).
1254
+
1255
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
1256
+ 13
1257
+ V0
1258
+ V1
1259
+ V2
1260
+ V3
1261
+ V4
1262
+ FIGURE 1. ∆ for n = 1
1263
+ Let ∆i be the polytope generated by δi and the origin. The facial decomposition of ∆ implies
1264
+ that
1265
+ Vol(∆) = Vol(∆1) + Vol(∆2).
1266
+ By formula (2.9) and (3.6), we obtain (iii).
1267
+
1268
+ Combining Theorem 2.3 with Proposition 3.1, if p ∤ (n + 1), we have
1269
+ |En(χ, b)| ≤ (n + 2)! Vol(∆) · q
1270
+ n+2
1271
+ 2
1272
+ = 2(n + 1)q
1273
+ n+2
1274
+ 2 ,
1275
+ (3.7)
1276
+ where p is the characteristic of Fq. Putting (3.4) and (3.7) together, we then obtain the following
1277
+ bounds when p ∤ (n + 1).
1278
+ |Sn(χ, b) + (q − 1)n
1279
+ q
1280
+ χ1(b)| ≤ 2(n + 1)q
1281
+ n
1282
+ 2 ,
1283
+ if χ1 = · · · = χn+1,
1284
+ and
1285
+ |Sn(χ, b)| ≤ 2(n + 1)q
1286
+ n
1287
+ 2 ,
1288
+ if χi ̸= χj for some i ̸= j.
1289
+ In the case χ1 = · · · = χn+1, the twisted sum En(χ, b) becomes the following untwisted toric
1290
+ exponential sum
1291
+ En(χ, b) =
1292
+
1293
+ y,z,xi∈F∗q
1294
+ ψ
1295
+
1296
+ z + y
1297
+
1298
+ 1 − z
1299
+
1300
+ x1 + · · · + xn +
1301
+ b
1302
+ x1 · · · xn
1303
+ ���
1304
+ .
1305
+ Since the origin is a vertex of ∆ and the polynomial inside the additive character has no constant
1306
+ term, 1 is a trivial eigenvalue of the middle dimensional cohomology. Removing this trivial eigen-
1307
+ value from the error term, one gets
1308
+ |En(χ, b) − (−1)n+2| ≤ (2n + 1)q
1309
+ n
1310
+ 2 ,
1311
+ if χ1 = · · · = χn+1,
1312
+ and hence the slightly sharper estimate
1313
+ |Sn(χ, b) + (q − 1)n + (−1)n+1
1314
+ q
1315
+ χ1(b)| ≤ (2n + 1)q
1316
+ n
1317
+ 2 ,
1318
+ if χ1 = · · · = χn+1.
1319
+ This proves Theorem 1.2.
1320
+ 3.3. Proof of Theorem 1.3. Similar to formula (3.4), we relate the untwisted inverted Kloosterman
1321
+ sum Sk,n(b) to toric exponential sum S∗
1322
+ k(f).
1323
+ Sk,n(b) =
1324
+
1325
+ x1+···+xn+
1326
+ b
1327
+ x1···xn ̸=0
1328
+ xi∈F∗
1329
+ qk
1330
+ ψ
1331
+
1332
+ Trk
1333
+
1334
+ 1
1335
+ x1 + · · · + xn +
1336
+ b
1337
+ x1···xn
1338
+ ��
1339
+
1340
+ 14
1341
+ XIN LIN AND DAQING WAN
1342
+ =
1343
+
1344
+ z
1345
+
1346
+ x1+···+xn+
1347
+ b
1348
+ x1···xn
1349
+
1350
+ =1
1351
+ z, xi∈F∗
1352
+ qk
1353
+ ψ (Trk (z))
1354
+ = 1
1355
+ qk
1356
+
1357
+ z, xi∈F∗
1358
+ qk
1359
+ y∈Fqk
1360
+ ψ
1361
+
1362
+ Trk
1363
+
1364
+ z + y
1365
+
1366
+ 1 − z
1367
+
1368
+ x1 + · · · + xn +
1369
+ b
1370
+ x1 · · · xn
1371
+ ����
1372
+ = −(qk − 1)n
1373
+ qk
1374
+ + 1
1375
+ qk S∗
1376
+ k(f).
1377
+ (3.8)
1378
+ where f is the Laurent polynomial given by
1379
+ f(x1, · · · , xn+2) = xn+1
1380
+
1381
+ 1 − xn+2
1382
+
1383
+ x1 + · · · + xn +
1384
+ b
1385
+ x1 · · · xn
1386
+ ��
1387
+ + xn+2
1388
+ and
1389
+ S∗
1390
+ k(f) =
1391
+
1392
+ xi∈F∗
1393
+ qk
1394
+ ψ
1395
+
1396
+ Trk
1397
+
1398
+ xn+2 + xn+1
1399
+
1400
+ 1 − xn+2
1401
+
1402
+ x1 + · · · + xn +
1403
+ b
1404
+ x1 · · · xn
1405
+ ����
1406
+ .
1407
+ The L-functions associated to Sk,n(b) and S∗
1408
+ k(f) are defined as
1409
+ Ln(b, T) = exp
1410
+ � ∞
1411
+
1412
+ k=1
1413
+ Sk,n(b)T k
1414
+ k
1415
+
1416
+ and
1417
+ L∗(f, T) = exp
1418
+ � ∞
1419
+
1420
+ k=1
1421
+ S∗
1422
+ k(f)T k
1423
+ k
1424
+
1425
+ .
1426
+ It follows from formula (3.8) that
1427
+ Ln(b, T) = exp
1428
+ � ∞
1429
+
1430
+ k=1
1431
+
1432
+
1433
+ qk − 1
1434
+ �n · T k
1435
+ qk · k
1436
+
1437
+ L∗ (f, T/q)
1438
+ =
1439
+ n
1440
+
1441
+ i=0
1442
+ exp
1443
+
1444
+ (−1)n−i+1
1445
+ �n
1446
+ i
1447
+ � ∞
1448
+
1449
+ k=1
1450
+
1451
+ qi−1T
1452
+ �k
1453
+ k
1454
+
1455
+ L∗ (f, T/q)
1456
+ = L∗ (f, T/q)
1457
+ n
1458
+
1459
+ i=0
1460
+
1461
+ 1
1462
+ 1 − qi−1T
1463
+ �(−1)n−i+1(n
1464
+ i)
1465
+ .
1466
+ (3.9)
1467
+ The main purpose of this subsection is to determine the slopes and weights of Ln(b, T). Based
1468
+ on formula (3.9), it suffices to consider L∗(f, T) instead. Let ∆ = ∆(f) denote the Newton
1469
+ polyhedron corresponding to f. Some of the geometric properties about ∆ have been discussed in
1470
+ subsection 3.2. In Proposition 3.1, we proved that f is non-degenerate if and only if p ∤ (n + 1). In
1471
+ this case, the L-function L∗(f, T)(−1)n+1 is a polynomial of degree 2n+2. To determine the slopes
1472
+ of the reciprocal roots of L∗(f, T)(−1)n+1, we shall compute the Hodge polygon and consider when
1473
+ it coincides with the Newton polygon.
1474
+ Proposition 3.2. The Laurent polynomial f is ordinary if and only if p ≡ 1 mod (n + 1).
1475
+ Proof. By facial decomposition theorem, it suffices to consider f δi for i = 1, 2. Let S(δi) be the
1476
+ solution set of the following linear system
1477
+ M(δi)
1478
+
1479
+
1480
+
1481
+
1482
+
1483
+ r1
1484
+ r2
1485
+ ...
1486
+ rn+2
1487
+
1488
+
1489
+
1490
+
1491
+  = u ∈ Zn+2,
1492
+ where rj ∈ Q ∩ [0, 1).
1493
+ (3.10)
1494
+
1495
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
1496
+ 15
1497
+ For i = 1 and a given point u = (x1, . . . , xn+2)T , linear system (3.10) equals to
1498
+
1499
+
1500
+
1501
+
1502
+
1503
+
1504
+
1505
+
1506
+
1507
+
1508
+
1509
+
1510
+
1511
+
1512
+
1513
+
1514
+
1515
+
1516
+
1517
+ x1 = r1 − rn+1,
1518
+ x2 = r2 − rn+1,
1519
+ · · ·
1520
+ xn = rn − rn+1,
1521
+ xn+1 = r1 + · · · + rn+2,
1522
+ xn+2 = r1 + · · · + rn+1,
1523
+ where rj ∈ Q ∩ [0, 1).
1524
+ (3.11)
1525
+ Note that xj ∈ Z, where 1 ≤ j ≤ n + 2. For any r = (r1, . . . , rn+2)T ∈ S(δ1), we have
1526
+ r1 = · · · = rn = rn+1 ∈
1527
+ Z
1528
+ n + 1
1529
+ and
1530
+ rn+2 = 0.
1531
+ Let Sp(δi) denote the prime to p part of S(δi). In particular, Sp(δi) = S(δi) if p ∤ det(M(δi)).
1532
+ Suppose p ∤ (n + 1), the norm function |r| and |{pr}| are given by
1533
+ |r| = (n + 1)r1
1534
+ and
1535
+ |{pr}| = (n + 1){pr1}.
1536
+ Then |r| on Sp(δ1) is stable under the p-action if and only if p ≡ 1 mod (n + 1). To see this, it
1537
+ suffices to consider the unique point r = (
1538
+ 1
1539
+ n+1, · · · ,
1540
+ 1
1541
+ n+1, 0) with norm 1. This condition holds for
1542
+ Sp(δ2) through a similar proof. By Proposition 2.19, we obtain Proposition 3.2.
1543
+
1544
+ Theorem 3.3. The n + 2 Hodge numbers of ∆ are {1, 2, 2, · · · , 2, 1}. Namely,
1545
+ H∆(0) = 1, H∆(1) = · · · = H∆(n) = 2, H∆(n + 1) = 1.
1546
+ Proof. Let ∆i be the polytope generated by the origin and δi. Let u = (x1, . . . , xn+2)T ∈ C(∆i)
1547
+ be a lattice point with the weight w(u) = k, where 0 ≤ k ≤ n + 2. For i = 1, 2, consider the linear
1548
+ system (3.10). Since f δi is diagonal, system (3.10) has a unique solution r = (r1, . . . , rn+2)T for a
1549
+ fixed point u ∈ C(∆i). In this case, the weight is given by
1550
+ w(u) = r1 + · · · + rn+2 = |r|.
1551
+ When i = 1, the linear equations (3.11) has exact one solution u = (0, . . . , 0, k, k)T . Since
1552
+ xn+2 = �n+1
1553
+ j=1 rj = k and 0 ≤ rj < 1, we get the restriction 0 ≤ k < n + 1. The Hodge number
1554
+ H∆1(k) counts the number of lattice points u of weight k/D in a fundamental domain: That is,
1555
+ H∆1(k) =
1556
+
1557
+ 1,
1558
+ for 0 ≤ k < n + 1,
1559
+ 0,
1560
+ for k ≥ n + 1.
1561
+ The generating function of H∆1(k) is
1562
+ H1(x) = 1 + x + · · · + xn.
1563
+ By formula (2.5), we get the generating function of W∆1(k) as follow.
1564
+ W1(x) =
1565
+
1566
+
1567
+ k=0
1568
+ W∆1(k)xk =
1569
+ H1(x)
1570
+ (1 − x)n+2 = 1 − xn+1
1571
+ (1 − x)n+3 .
1572
+ Let H2(x) and W2(x) be the generating function of H∆2(k) and W∆2(k), respectively. Similarly,
1573
+ we can prove H2(x) = H1(x) and W2(x) = W1(x). The polytope ∆1
1574
+ � ∆2 is determined by
1575
+ V1, . . . , Vn+1, whose generating function is given by
1576
+ W3(x) =
1577
+
1578
+
1579
+ k=0
1580
+ W∆1
1581
+ � ∆2(k)xk = 1 − xn+1
1582
+ (1 − x)n+2 .
1583
+ By facial decomposition, we have
1584
+ W∆(k) = W∆1(k) + W∆2(k) − W∆1
1585
+ � ∆2(k),
1586
+ (3.12)
1587
+
1588
+ 16
1589
+ XIN LIN AND DAQING WAN
1590
+ which implies
1591
+ W(x) =
1592
+
1593
+
1594
+ k=0
1595
+ W∆(k)xk = W1(x) + W2(x) − W3(x) = 1 + 2x + · · · + 2xn + xn+1
1596
+ (1 − x)n+2
1597
+ .
1598
+ This gives the Hodge numbers of ∆ via formula (2.5), that is,
1599
+ H∆(0) = 1, H∆(1) = · · · = H∆(n) = 2, H∆(n + 1) = 1.
1600
+
1601
+ When f is ordinary, the slopes of L∗(f, T)(−1)n+1 can be deduced from Theorem 3.3.
1602
+ Theorem 3.4. If p ≡ 1 mod (n + 1), the slope sequence of L∗(f, T)(−1)n+1 is given by
1603
+ {0, 1, 1, 2, 2, . . . , n, n, n + 1}.
1604
+ Proof. This theorem follows from Lemma 2.5, Proposition 3.2 and Theorem 3.3.
1605
+
1606
+ Note that the converse of this theorem is also true, as Proposition 3.2 shows that the condition
1607
+ p ≡ 1 mod (n + 1) is a necessary and sufficient condition for f to be ordinary.
1608
+ Now we are ready to consider the weights for the reciprocal roots of L∗(f, T)(−1)n+1.
1609
+ Theorem 3.5. Suppose p ∤ (n + 1). We have
1610
+ L∗(f, T)(−1)n+1 = (1 − T)(1 − qT)
1611
+ 2n
1612
+
1613
+ i=1
1614
+ (1 − βiT).
1615
+ For each 1 ≤ i ≤ 2n, the reciprocal root βi satisfies |βi| = q
1616
+ n+2
1617
+ 2 .
1618
+ Proof. Since the origin is a vertex of ∆, we decompose the cone C(∆) via boundary decomposition
1619
+ B(∆). Let N(i) be the number of i-dimensional face Σi of C(∆), where 0 ≤ i ≤ dim∆. For
1620
+ Newton polyhedron ∆ = ∆(f), we have N(0) = 1 and N(1) = n + 3. Note that Σi is an
1621
+ open cone and Σi ∈ B(∆). Let Σi be the closure of Σi. For simplicity, we denote the Fredholm
1622
+ determinants as
1623
+ D(T) = det (I − TA1(f)) ,
1624
+ D◦
1625
+ i (T) = det
1626
+
1627
+ I − TA1(Σi, f Σi)
1628
+
1629
+ ,
1630
+ Di(T) = det
1631
+
1632
+ I − TA1(Σi, f Σi)
1633
+
1634
+ .
1635
+ The unique 0-dimensional cone Σ0 is the origin and D0(T) = D◦
1636
+ 0(T) = 1 − T. When i = 1, each
1637
+ f Σ1 can be normalized to x by variable substitution. That is,
1638
+ L∗(f Σ1, T) = exp
1639
+ � ∞
1640
+
1641
+ k=1
1642
+ −T k
1643
+ k
1644
+
1645
+ = 1 − T.
1646
+ By formula (2.7), we have
1647
+ D1(T) =
1648
+
1649
+
1650
+ i=0
1651
+
1652
+ L∗ �
1653
+ f Σ1, qiT
1654
+ ��(i
1655
+ i)
1656
+ = (1 − T) (1 − qT)
1657
+
1658
+ 1 − q2T
1659
+
1660
+ · · · .
1661
+ Since the only boundary of Σ1 are Σ1 and Σ0, we get D◦
1662
+ 1(T) after eliminating D◦
1663
+ 0(T), i.e.,
1664
+ D◦
1665
+ 1(T) = D1(T)
1666
+ D◦
1667
+ 0(T) = (1 − qT)
1668
+
1669
+ 1 − q2T
1670
+ � ∞
1671
+
1672
+ i=3
1673
+
1674
+ 1 − qiT
1675
+
1676
+ .
1677
+ Theorem 2.16 shows that D(T) can be expressed as a product of D◦
1678
+ i (T) as follow.
1679
+ D(T) =
1680
+ n+2
1681
+
1682
+ i=1
1683
+ N(i)
1684
+
1685
+ j=1
1686
+ D◦
1687
+ i (T) = (1 − T)(1 − qT)n+3 · · · ,
1688
+
1689
+ ON INVERTED KLOOSTERMAN SUMS OVER FINITE FIELDS
1690
+ 17
1691
+ Note that L∗(f, T)(−1)n+1 is a polynomial of degree 2(n + 1) if f is non-degenerate. Combining
1692
+ formula (2.6), we obtain
1693
+ L∗(f, T)(−1)n+1 =
1694
+ D(T)D(q2T)(n+2
1695
+ 2 ) · · ·
1696
+ D(qT)n+2D(q3T)(n+2
1697
+ 3 ) · · ·
1698
+ = (1 − T)(1 − qT)
1699
+ 2n
1700
+
1701
+ i=1
1702
+ (1 − βiT),
1703
+ where |βi| = q
1704
+ wi
1705
+ 2 ≤ q
1706
+ n+2
1707
+ 2 . That is, wi ≤ n + 2.
1708
+ If βi is a reciprocal root of L∗(f, T)(−1)n+1, the conjugate βi is a reciprocal root of the conjugate
1709
+ L-function
1710
+ L∗(f, T)
1711
+ (−1)n+1
1712
+ = L∗(−f, T)(−1)n+1.
1713
+ By Theorem 2.8, the Newton polygon and Hodge polygon coincide at the end points. Applying this
1714
+ to the product L∗(f, T)(−1)n+1L∗(f, T)
1715
+ (−1)n+1
1716
+ , we deduce that
1717
+ 2(n+1)2 = 2(
1718
+ n
1719
+
1720
+ i=1
1721
+ 2i+n+1) = ordq(1·q2 ·
1722
+ 2n
1723
+
1724
+ i=1
1725
+ βiβi) = 2+
1726
+ 2n
1727
+
1728
+ i=1
1729
+ wi ≤ 2+2n(n+2) = 2(n+1)2.
1730
+ It follows that the inequality must be an equality, that is, all wi = n + 2.
1731
+
1732
+ Formula (3.9) relates L∗(f, T) to Ln(b, T). The valuations for the reciprocal roots and poles of
1733
+ Ln(b, T) follow from Theorem 3.4 and 3.5.
1734
+ Theorem 3.6. Suppose p ∤ (n + 1). We have
1735
+ Ln(b, T)(−1)n+1 = (1 − T)(n+1)
1736
+ n
1737
+
1738
+ j=2
1739
+
1740
+ 1 − qj−1T
1741
+ �(n
1742
+ j)(−1)j−1 2n
1743
+
1744
+ i=1
1745
+ (1 − αiT).
1746
+ For each 1 ≤ i ≤ 2n, the reciprocal root αi satisfies |αi| = q
1747
+ n
1748
+ 2 . If p ≡ 1 mod (n + 1), the slope
1749
+ sequence of the αi’s is given by {0, 1, 1, 2, 2, . . . , n − 1, n − 1, n}.
1750
+ Based on weights of toric L-function, we get the following slightly more precise upper bound for
1751
+ its associated exponential sum.
1752
+ Corollary 3.7. If p ∤ (n + 1), we have
1753
+ |Sk,n(b) + (qk − 1)n − (−1)n(qk + 1)
1754
+ qk
1755
+ | ≤ 2nq
1756
+ nk
1757
+ 2 .
1758
+ Proof. Theorem 3.5 implies that
1759
+ |S∗
1760
+ k(f) − (−1)n(qk + 1)| ≤ 2nq
1761
+ (n+2)k
1762
+ 2
1763
+ .
1764
+ Combining formula (3.8), we get the bound for Sk,n(b).
1765
+
1766
+ Remark. We finish this paper with two open problems on the estimates of inverted Kloosterman
1767
+ sums. If n + 1 is divisible by p, the related Laurent polynomial f is degenerate and thus the results
1768
+ for toric exponential sums are not tenable. In this case, it is an open problem to determine the
1769
+ optimal square root cancellation for Sn(χ, b) in general. The case n = 1 with p = 2 is already
1770
+ handled in [Kat95]. The second question concerns the q-adic slope sequence. If p is not equivalent
1771
+ to 1 modulo n + 1, the Newton polygon corresponding to f is strictly above its Hodge polygon.
1772
+ Under this assumption, can one still obtain the explicit q-adic slope sequence?
1773
+ REFERENCES
1774
+ [Ang96] Jeff Angel, Finite upper half planes over finite fields, Finite Fields Appl. 2 (1996), no. 1, 62–86. MR 1371720
1775
+ [AS87a] Alan Adolphson and Steven Sperber, Newton polyhedra and the degree of the L-function associated to an
1776
+ exponential sum, Invent. Math. 88 (1987), no. 3, 555–569. MR 884800
1777
+ [AS87b]
1778
+ , Twisted Kloosterman sums and p-adic Bessel functions. II. Newton polygons and analytic continua-
1779
+ tion, Amer. J. Math. 109 (1987), no. 4, 723–764. MR 900037
1780
+ [AS89]
1781
+ , Exponential Sums and Newton Polyhedra: Cohomology and Estimates, Ann. Math. 130 (1989), no. 2,
1782
+ 367–406. MR 1014928
1783
+
1784
+ 18
1785
+ XIN LIN AND DAQING WAN
1786
+ [AS90]
1787
+ , Exponential sums on (Gm)n, Invent. Math. 101 (1990), no. 1, 63–79. MR 1055711
1788
+ [AS91]
1789
+ , On twisted exponential sums, Math. Ann. 290 (1991), no. 4, 713–726. MR 1119948
1790
+ [AS93]
1791
+ , Twisted exponential sums and Newton polyhedra, J. Reine Angew. Math. 443 (1993), 151–177.
1792
+ MR 1241131
1793
+ [Bom66] Enrico Bombieri, On exponential sums in finite fields, Les Tendances Géom. En Algèbre et Théorie Des Nom-
1794
+ bres, Éditions du Centre National de la Recherche Scientifique (CNRS), Paris, 1966, pp. 37–41. MR 0204413
1795
+ [CL22]
1796
+ Chao Chen and Xin Lin, L-functions of certain exponential sums over finite fields, Math. Z. 300 (2022), no. 2,
1797
+ 1851–1871. MR 4363799
1798
+ [Del80]
1799
+ Pierre Deligne, La conjecture de Weil. II, Inst. Hautes Études Sci. Publ. Math. (1980), no. 52, 137–252.
1800
+ MR 601520
1801
+ [DL91]
1802
+ J. Denef and F. Loeser, Weights of exponential sums, intersection cohomology, and Newton polyhedra, Invent.
1803
+ Math. 106 (1991), no. 1, 275–294. MR 1128216
1804
+ [Dwo60] Bernard Dwork, On the rationality of the zeta function of an algebraic variety, Amer. J. Math. 82 (1960),
1805
+ 631–648. MR 140494
1806
+ [Eva95] Ronald Evans, Spherical functions for finite upper half planes with characteristic 2, Finite Fields Appl. 1
1807
+ (1995), no. 3, 376–394. MR 1341954
1808
+ [Fu09]
1809
+ Lei Fu, Weights of twisted exponential sums, Math. Z. 262 (2009), no. 2, 449–472. MR 2504886
1810
+ [Fu16]
1811
+ , ℓ-adic GKZ hypergeometric sheaves and exponential sums, Adv. Math. 298 (2016), 51–88.
1812
+ MR 3505737
1813
+ [FW21]
1814
+ Lei Fu and Daqing Wan, On Katz’s (A, B)-exponential sums, Q. J. Math. 72 (2021), no. 3, 773–793.
1815
+ MR 4310299
1816
+ [Gro68] Alexander Grothendieck, Formule de Lefschetz et rationalité des fonctions L [see 1608788], Dix Exposés Sur
1817
+ La Cohomologie Des Schémas, Adv. Stud. Pure Math., vol. 3, North-Holland, Amsterdam, 1968, pp. 31–45.
1818
+ MR 3202554
1819
+ [Kat95]
1820
+ Nicholas M. Katz, A note on exponential sums, Finite Fields Appl. 1 (1995), no. 3, 395–398. MR 1341955
1821
+ [Kob84] Neal Koblitz, p-adic numbers, p-adic analysis, and zeta-functions, second ed., Graduate Texts in Mathematics,
1822
+ vol. 58, Springer-Verlag, New York, 1984. MR 754003
1823
+ [LC22]
1824
+ Xin Lin and Chao Chen, L-functions of certain exponential sums over finite fields II, J. Number Theory 241
1825
+ (2022), 198–220. MR 4472439
1826
+ [Li21]
1827
+ Jiyou Li, Newton polygons of L-functions associated to Deligne polynomials, Finite Fields Appl. 75 (2021),
1828
+ Paper No. 101880, 10. MR 4272552
1829
+ [Spe80]
1830
+ Steven Sperber, Congruence properties of the hyper-Kloosterman sum, Compositio Math. 40 (1980), no. 1,
1831
+ 3–33. MR 558257
1832
+ [Wan93] Daqing Wan, Newton polygons of zeta functions and L functions, Ann. Math. 137 (1993), 249–293.
1833
+ MR 1207208
1834
+ [Wan04]
1835
+ , Variation of p-adic Newton polygons for L-functions of exponential sums, Asian J. Math. 8 (2004),
1836
+ no. 3, 427–472. MR 2129244
1837
+ [YZ22]
1838
+ Liping Yang and Hao Zhang, Generic Newton polygons for L-functions of (A, B)-exponential sums, Finite
1839
+ Fields Appl. 78 (2022), Paper No. 101980, 20. MR 4349885
1840
+ DEPARTMENT OF MATHEMATICS, SHANGHAI MARITIME UNIVERSITY, SHANGHAI 201306, PR CHINA.
1841
+ Email address: xlin1126@hotmail.com
1842
+ DEPARTMENT OF MATHEMATICS, UNIVERSITY OF CALIFORNIA, IRVINE, CA 92697-3875 USA.
1843
+ Email address: dwan@math.uci.edu
1844
+
SNE3T4oBgHgl3EQfDglb/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
XNFJT4oBgHgl3EQf5S05/content/tmp_files/2301.11669v1.pdf.txt ADDED
@@ -0,0 +1,3568 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Predator Extinction arose from Chaos of the Prey: the Chaotic
2
+ Behavior of a Homomorphic Two-Dimensional Logistic Map in the
3
+ Form of Lotka-Volterra Equations
4
+ Wei Shan Lee∗, Hou Fai Chan, Ka Ian Im, Kuan Ieong Chan, and U Hin Cheang
5
+ Pui Ching Middle School Macau
6
+ Macao Special Administrative Region, People’s Republic of China.
7
+ Abstract
8
+ A two-dimensional homomorphic logistic map that preserves features of Lotka-Volterra Equations
9
+ was proposed.
10
+ In order to examine the Lotka-Volterra chaos, in addition to ordinary iteration plots
11
+ of population, Lyapunov exponents either calculated directly from eigenvalues of Jacobian of the 2D
12
+ logistic mapping, or from time-series algorithms of both Rosenstein and Eckmann et al. were calculated,
13
+ among which discrepancies were compared. Bifurcation diagrams may be divided into five categories
14
+ depending on different topological shapes, among which flip bifurcation and Neimark-Sacker bifurcation
15
+ were observed, the latter showing closed orbits around limit circles in the phase portrait and phase space
16
+ diagram. Our model restored the 1D logistic map of the prey at the absence of the predator, as well as the
17
+ normal competing behavior between two species when the initial population of the two is equal. In spite
18
+ of the possibility for two species going into chaos simultaneously, it is also possible that with the same
19
+ inter-species parameters as normal but with predator population 10 times more than that of the prey,
20
+ under certain growth rate the latter becomes chaotic, and former dramatically reduces to zero, referring
21
+ to total annihilation of the predator species. Interpreting humans as the predator and natural resources
22
+ as the prey in the ecological system, the aforementioned conclusion may imply that not only excessive
23
+ consumption of the natural resources, but its chaotic state triggered by overpopulation of humans may
24
+ also backfire in a manner of total extinction on human species. Fortunately, a little chance may exist for
25
+ survival of human race, as isolated fixed points in bifurcation diagram of the predator reveals.
26
+ Keywords Chaos, Neimark-Sacker Bifurcation, Logistic Map, Lyapunov Exponents, Lotka-Volterra Equa-
27
+ tions, Extinction of Species
28
+ 1
29
+ Introduction
30
+ Understanding interactions between human beings and natural resources plays an important role in estab-
31
+ lishing sustainable economy and society. Relationships of these two may be studied by the prey and predator
32
+ model after we realize that humans beings may be regarded as the predator while natural resources may be
33
+ thought of as the prey[1]. Afterwards, researches on the prey-predator models may be implemented to this
34
+ field instinctively[2]-[3].
35
+ Generally speaking, there are two main approaches of studies in the literature to this prey and predator
36
+ model. The first is to study differential equations, while the other is to study the iterations in difference
37
+ equations, whose forms may be inspired by directly applying the forward Euler’s Scheme to acquire coun-
38
+ terpart of the former[4]-[10]. The discrete model could be more promising than the continuous one, because
39
+ it has more abundant dynamic characteristics in chaotic behaviors[8], whereas it would be more difficult for
40
+ solutions to continuous models to reach chaos in low dimensional cases. Taking some examples about the first
41
+ approach, studies[11]-[12] have performed on chaos of Lotka-Volterra differential equations with dimensions
42
+ higher than three, and researchers[13] claimed that it is impossible to reach chaos for two species in the
43
+ form of differential Lotka-Volterra Equations, whose general solutions were obtained in sinusoidal forms by
44
+ Evans and Findley[14]. Additionally, based on the Lotka-Volterra model, Dunbar[15] confirmed the existence
45
+ ∗email: wslee@g.puiching.edu.mo
46
+ 1
47
+ arXiv:2301.11669v1 [nlin.CD] 27 Jan 2023
48
+
49
+ of traveling wave solutions for two reaction diffusion systems. Besides that, Das and Gupta[16] proposed
50
+ solutions to the fractional-order time derivative Lotka-Volterra equations using an analytical approach for
51
+ nonlinear problems known as the homotopy perturbation method (HPM).
52
+ On the other hand, there are also several studies on the discrete difference equations.
53
+ For instance,
54
+ Bessoir and Wolf [17] made pioneering contributions to the application of 1D logistic equation on biological
55
+ and ecological studies. The same equation was also used to interpret, analyze and predict data according to
56
+ the COVID-19 by many researchers[18]. Mareno and English[19] implemented the 1D logistic equation to
57
+ the coupled 2D logistic one, and demonstrated that for large growth rate the system underwent a Neimark-
58
+ Sacker bifurcation. Li et al.[20] imposed an equal individual effect intensity, corresponding to equal growth
59
+ rate in the 1D logistic map, on the two oligopolists in the homomorphic Kopel model and observed three
60
+ different kinds of bifurcation. Furthermore, Elhadi and Sprott[21] proposed a two-dimensional mapping, one
61
+ of which is the ordinary 1D logistic map while the other consists of a perturbation term of the former and is
62
+ also modulated by the first. Shilnikov and Rulkov[22] studied chaos behaviors in two-dimensional difference
63
+ equations that reproduced spike-bursting activities in biological neurons, improving further on the previous
64
+ research based on the three-dimensional system of ODEs. In spite of applying the forward Euler’s Scheme to
65
+ acquire the difference equation, researchers also made use of exponential forms corresponding to solutions on
66
+ the differential equations. For example, Ishaque et al.[23] studied a three dimensional predator-prey-parasite
67
+ model with an exponential form describing interactions among healthy or infected Tilapia fish as the prey, and
68
+ Pelican birds as the predator. Tassaddiq et al.[24] worked on discrete-time exponential difference equation
69
+ of Leslie-Gower predator-prey model together with a Holling type III functional response, and indicated
70
+ the advantage on this type of discretization method. Previous study[25] suggested a heteromorphic term
71
+ describing the decreasing effects on the predator that was only linear to the population of that species,
72
+ contrary to the corresponding quadratic term in the prey. Hassell et al[26] applied the predator-prey model
73
+ to insect parasitoids and anthropods, and found out that local movements of the two species may cause
74
+ extermination of the entire ecological system with chaos, and it is difficult to maintain population stability
75
+ for large growth rate of anthropods. Besides, researchers[27] also pointed out that human misbehavior may
76
+ be the reason for an ecological system to go into chaotic states.
77
+ However, there is no convincing reason for the prey and the predator to have different forms in the
78
+ difference equations.
79
+ Intuition in mathematical symmetry naturally came to our mind that a successful
80
+ predator-prey difference model should resemble the symmetry structure as in Lotka-Volterra differential
81
+ equations. Moreover, solutions to Lotka-Volterra Equations in sinusoidal forms cannot explain extinction of
82
+ species.
83
+ We proposed homomorphic two-dimensional logistic maps that preserve both forms of Lotka-Volterra
84
+ Equations and the 1D logistic equation. In our model, we conjectured a quadractic form in both corresponding
85
+ terms of the prey and the predator, treating both species on the equal stance. Structures of Bifurcation
86
+ diagrams showed that there could be six different categories in our dynamic system. For each categories, we
87
+ examined population iterations, phase portraits, phase space diagrams, and topological types of fixed points.
88
+ Lyapunov exponents either calcaulted from eigenvalues of Jacobian of the 2D mapping or from time-series
89
+ algorithms either Rosenstein[28] or Eckmann et al.[29] were also calculated. Comparisons among those results
90
+ were also discussed.
91
+ The advantages of our model include the following.
92
+ First, we may be able to establish a standard
93
+ bifurcation diagram of 1D logistic map about the prey with nonzero initial predator population, growth rates
94
+ in both species, and predation parameters. Second, our model may also describe the normal behavior of rise
95
+ and fall on the population of the two species when interacting with each other. Third, besides simultaneous
96
+ chaos in both species, the main discovery in our research was that the predator may go extinct under the
97
+ circumstance of chaos in the prey that the predator overpopulation should be blamed.
98
+ 2
99
+ Theorems
100
+ We first review the one-dimensional logistic equation and the two-dimensional Lotka-Volterra Equations,
101
+ comparing the similarity and difference between the two sets of equations, which inspires us on the idea
102
+ to establish two-dimensional logistic equations that maintain important features about both of the above
103
+ equations.
104
+ 2
105
+
106
+ 2.1
107
+ Review on the 1D logistic equation and Litka-Volterra Equations
108
+ To begin with, the one-dimensional logistic equation may be written as
109
+ xn+1 = µ0xn(1 − xn),
110
+ (1)
111
+ where µ0 denotes to the growth rate.
112
+ On the other hand, the two-dimensional Lotka-Volterra Equations[30], [31] describe interactions between
113
+ the prey and predator in an environment where there is sufficient food supply for the prey, whose only natural
114
+ enemy is the predator. The formula may be written as follows:
115
+
116
+
117
+
118
+
119
+
120
+
121
+
122
+ dx
123
+ dt = µ0x − µ1xy;
124
+ dy
125
+ dt = −ν0y + ν1xy,
126
+ (2a)
127
+ (2b)
128
+ where µ0, µ1, ν0, and ν1 are all positive inter-species parameters. x denotes population of the prey while
129
+ y, population of the predator, both being positive real numbers. µ0 and ν1 are, respectively, growth rate
130
+ of the prey and the predator. While µ1 refers to the parameter for predation to occur upon the prey at
131
+ the presence of predator, ν0 refers to all effects that decrease population of the predator, which may include
132
+ disease, death, or emigration[32]. With forward Euler’s scheme, one may immediately write the difference
133
+ version of Eq.(2) as follows
134
+ �xn+1 − xn = µ0xn − µ1xnyn;
135
+ yn+1 − yn = −ν0yn + ν1xnyn.
136
+ (3a)
137
+ (3b)
138
+ However, there is an obvious drawback about the above simultaneous equations: it does not preserve the
139
+ feature of 1D logistic equation, because the first term on the right hand side is either linear to xn or yn,
140
+ whereas the right hand side in Eq.(1) is quadratic to xn.
141
+ We now discuss our idea on establishing the two-dimensional map that resembles interaction terms of the
142
+ prey and the predator as in Lotka-Volterra. First, we may rewrite the linear term of x on the right hand side
143
+ of Eq.(2a) into quadratic, which looks like µ0x(1 − x), together with the homomorphic corresponding term
144
+ in Eq.(2b) as ν0y(1 − y). Thus, the modified Lotka-Volterra Equations[33] are
145
+
146
+
147
+
148
+
149
+
150
+
151
+
152
+ dx
153
+ dt = µ0x(1 − x) − µ1xy;
154
+ dy
155
+ dt = −ν0y(1 − y) + ν1xy,
156
+ (4a)
157
+ (4b)
158
+ whose resemblance in the form of difference equations are, therefore,
159
+ �xn+1 − xn = µ0xn(1 − xn) − µ1xnyn;
160
+ yn+1 − yn = −ν0yn(1 − yn) + ν1xnyn.
161
+ (5a)
162
+ (5b)
163
+ Even though it seems more reasonable to direct resemblance of Lotka-Volterra Equations, Eq.(5) fails to
164
+ restore Eq.(1) when parameters other than µ0 are all set to be zero. Fortunately, we may modify this by
165
+ dropping xn and yn terms on the left hand side of the above equations
166
+ �xn+1 = µ0xn(1 − xn) − µ1xnyn;
167
+ yn+1 = −ν0yn(1 − yn) + ν1xnyn,
168
+ (6a)
169
+ (6b)
170
+ which is the desired form. We divided into two cases to study further about properties of Eq.(5) and Eq.(6)
171
+ in Sec. 2.3 and Sec. 2.4. But before that, in next subsection we first discuss a very important lemma that
172
+ allows us to study stability behaviors of fixed points.
173
+ 3
174
+
175
+ 2.2
176
+ Stability of fixed points
177
+ Suppose a mapping of two-dimensional iterations xn+1 and yn+1 are written as xn+1 = f(x, y) and yn+1 =
178
+ g(x, y). The Jacobian is, therefore,
179
+
180
+
181
+
182
+
183
+
184
+
185
+
186
+
187
+
188
+
189
+
190
+ J = ∂(f, g)
191
+ ∂(x, y)
192
+ =
193
+ � ∂f
194
+ ∂x
195
+ ∂f
196
+ ∂y
197
+ ∂g
198
+ ∂x
199
+ ∂g
200
+ ∂y
201
+
202
+ ,
203
+ (7a)
204
+ (7b)
205
+ whose eigenvalus are ω0 and ω1. It is well known[6], [8] that a fixed point may be divided into the following
206
+ four topological types based on their stability behaviors. First, it could be a sink and locally asymptotic
207
+ stable if eigenvalues of Eq.(7) satisfy |ω0| < 1 and |ω1| < 1. Second, it could be a source and locally unstable
208
+ if eigenvalues satisfy |ω0| > 1 and |ω1| > 1. Third, a fixed point could be a saddle if one of the absolute
209
+ values of the eigenvalues is greater than 1 while the other is smaller than 1. At last, a fixed point could be
210
+ non-hyperbolic if one of the absolute values of the eigenvalues is equal to 1. The stability of a non-hyperbolic
211
+ fixed point is fragile[34], which means that its stability is easily influenced by the small nonlinear terms.
212
+ Instead of calculating the range of eigenvalues directly, most of the time it is more convenient to work with
213
+ the quadratic formula consisting of eigenvalues ω0 and ω1, namely, Ω(ω) = ω2 −Tr(J)ω +det(J), where Tr(J)
214
+ and det(J) are trace and determinant of Jacobian in Eq.(7), respectively, and there could be a correspondence
215
+ on the stability behavior around a fixed point between the roots of the quadratic formual, ω0 and ω1, which
216
+ are also eigenvalues of Jacobian, through the following Lemma
217
+ Lemma 1. Let Ω(ω) = ω2 − Tr(J)ω + det(J), be a quadratic formula where where Tr(J) and det(J) are trace
218
+ and determinant of Jacobian in Eq.(7), respectively. Then
219
+ 1. If Ω(1) > 0, then
220
+ (a) |ω0| < 1 and |ω1| < 1 and hence the fixed point is a sink if and only if Ω(−1) > 0 and det(J) < 1;
221
+ (b) |ω0| > 1 and |ω1| > 1 and hence the fixed point is a source if and only if Ω(−1) > 0 and det(J) > 1;
222
+ (c) One of |ω0| and |ω1| is smaller than 1 while the other greater than 1 and hence the fixed point is
223
+ a saddle if and only if Ω(−1) < 0;
224
+ (d) Either |ω0| or |ω1| is equal to 1 and hence the fixed point is a non-hyperbolic whenever
225
+ i. ω0 = −1 and ω1 ̸= −1 if and only if Ω(−1) = 0 and Tr(J) ̸= 2.
226
+ ii. ω0 and ω1 are a pair of complex conjugates and |ω0| = |ω1| = 1 if and only if |Tr(J)| < 2 and
227
+ det(J) = 1.
228
+ iii. ω0 = ω1 = −1 if and only if Ω(−1) = 0 and Tr(J) = 2.
229
+ 2. If Ω(1) = 0, then either |ω0| or |ω1| has to be equal to 1. Therefore the fixed point is a non-hyperbolic.
230
+ Absolute value of the other root is greater than, equal to, or smaller than 1 if and only if, correspondingly,
231
+ absolute value of det(J) is greater than, equal to, or smaller than 1.
232
+ 3. If Ω(1) < 0, then either |ω0| or |ω1| has to be real and greater than 1. Therefore, the fixed point is a
233
+ saddle. Further,
234
+ (a) the other root is smaller or equal to −1 if and only if, correspondingly, Ω(−1) < −1 or Ω(−1) = −1.
235
+ (b) absolute value of the other root is smaller than 1 if and only if Ω(−1) > 0.
236
+ 1 makes it easier for us to study analytically the stability of fixed points.
237
+ 2.3
238
+ Properties of Eq.(5)
239
+ Setting up xn+1 = f(x, y) and yn+1 = g(x, y), the two-dimensional logistic equations in Eq.(5) have the
240
+ mappings
241
+ �f(x, y) = µ0x(1 − x) − µ1xy + x;
242
+ g(x, y) = −ν0y(1 − y) + ν1xy + y.
243
+ (8a)
244
+ (8b)
245
+ 4
246
+
247
+ Eq.(8) has Jacobian, as indicated in Eq.(7),
248
+ J =
249
+ �µ0(1 − 2x) − µ1y + 1
250
+ −µ1x
251
+ ν1y
252
+ ν0(−1 + 2y) + ν1x + 1
253
+
254
+ ,
255
+ (9)
256
+ with eigenvalues ω0 and ω1 being, respectively,
257
+
258
+
259
+
260
+
261
+
262
+
263
+
264
+ ω0 = −µ0x + ν0y + 1 + 1
265
+ 2(xν1 − yµ1) + 1
266
+ 2(µ0 − ν0) + ω
267
+ 2
268
+ ω1 = −µ0x + ν0y + 1 + 1
269
+ 2(xν1 − yµ1) + 1
270
+ 2(µ0 − ν0) − ω
271
+ 2
272
+ (10a)
273
+ (10b)
274
+ where
275
+ ω =
276
+
277
+ 4(ν0 + µ1
278
+ 2 )2y2 +
279
+ ��
280
+ (4µ0 − 2ν1)µ1 + 8ν0(µ0 + ν1
281
+ 2 )
282
+
283
+ x − 4(ν0 + µ0)(ν0 + µ1
284
+ 2 )
285
+
286
+ y
287
+ (11)
288
+ + 4
289
+
290
+ (µ0 + ν1
291
+ 2 )x − µ0
292
+ 2 − ν0
293
+ 2
294
+ �2� 1
295
+ 2
296
+ Further, fixed points, at which pairs of x and y stay still irrespective of time-series iterations[34], are those
297
+ pairs of points (x∗, y∗) such that
298
+ �x∗ = µ0x∗(1 − x∗) − µ1x∗y∗ + x∗
299
+ y∗ = ν0y∗(1 − y∗) − ν1x∗y∗ + y∗,
300
+ (12a)
301
+ (12b)
302
+ from which four pairs of fixed points (x∗, y∗) may be derived as
303
+
304
+
305
+
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+ E0 = (0, 0)
319
+ E1 = (0, 1)
320
+ E2 = (1, 0)
321
+ E3 =
322
+ � ν0(µ1 − µ0)
323
+ −µ0ν0 + µ1ν1
324
+ ,
325
+ µ0(ν1 − ν0)
326
+ −µ0ν0 + µ1ν1
327
+
328
+ ,
329
+ (13a)
330
+ (13b)
331
+ (13c)
332
+ (13d)
333
+ provided that the denominator in Eq.(13d) is not zero. On the contrary, however, when µ0ν0 = µ1ν1, Eq.(5)
334
+ has fixed points E0, E1,and E2.
335
+ Keeping Lamma 1 in Sec. 2.2 in mind, we may be able to examine the topological type of each fixed
336
+ point in Eq.(13) as in Theorem 1:
337
+ Theorem 1. The topological types of fixed points in Eq.(13) are
338
+ 1. For E0 = (0, 0),
339
+
340
+
341
+
342
+
343
+
344
+
345
+
346
+
347
+
348
+ Ω(1) = −µ0ν0
349
+ Ω(−1) = (2 + µ0)(2 − ν0)
350
+ det(J) = (1 + µ0)(1 − ν0)
351
+ Tr(J) = 2 + µ0 − ν0.
352
+ Because Ω(1) < 0, therefore, E0 is always a saddle.
353
+ 2. For E1 = (0, 1),
354
+
355
+
356
+
357
+
358
+
359
+
360
+
361
+
362
+
363
+ Ω(1) = ν0(µ0 − µ1)
364
+ Ω(−1) = (2 + ν0)(2 + µ0 − µ1)
365
+ det(J) = (1 + ν0)(1 + µ0 − µ1)
366
+ Tr(J) = 2 + µ0 − µ1 + ν0.
367
+ In this case,
368
+ 5
369
+
370
+ (a) E1 cannot be a sink;
371
+ (b) if µ0 > µ1, then E1 is a source;
372
+ (c) if µ0 < µ1, then E1 is a saddle.
373
+ (d) if µ0 = µ1, then E1 is a non-hyperbole;
374
+ 3. For E2 = (1, 0),
375
+
376
+
377
+
378
+
379
+
380
+
381
+
382
+
383
+
384
+ Ω(1) = −µ0(ν1 − ν0)
385
+ Ω(−1) = (2 − µ0)(2 + ν1 − ν0)
386
+ det(J) = (1 − µ0)(1 + ν1 − ν0)
387
+ Tr(J) = 2 − µ0 + (ν1 − ν0).
388
+ In this case,
389
+ (a) if µ0 < 2 and ν1 < ν0 < ν1 + 1 and ν1 < ν0, or µ0 < 2 and ν0 = ν1 + 1, or µ0 < 2 and
390
+ ν1 + 1 < ν0 < ν1 + 2, then E2 is a sink;
391
+ (b) if µ0 > 2 and ν0 > ν1 + 2, then E2 is a source;
392
+ (c) if µ0 > 2 and ν1 < ν0 < ν1 + 2, or µ0 < 2 and ν0 > ν1 + 2, or ν1 > ν0, then E2 is a saddle;
393
+ (d) if ν1 = ν0, then E2 is a non-hyperbole.
394
+ 4. For E3 =
395
+
396
+ ν0(µ1−µ0)
397
+ −µ0ν0+µ1ν1 ,
398
+ µ0(ν1−ν0)
399
+ −µ0ν0+µ1ν1
400
+
401
+ ,
402
+
403
+
404
+
405
+
406
+
407
+
408
+
409
+
410
+
411
+
412
+
413
+
414
+
415
+
416
+
417
+
418
+
419
+
420
+
421
+
422
+
423
+
424
+
425
+
426
+
427
+
428
+
429
+ Ω(1) = −µ0ν0(ν0 − ν1)(µ0 − µ1)
430
+ µ0ν0 − µ1ν1
431
+ Ω(−1) = −ν0(ν0 − ν1 + 2)µ2
432
+ 0 + ν0(µ1 + 2)(ν0 − ν1 + 2)µ0 − 4µ1ν1
433
+ µ0ν0 − µ1ν1
434
+ det(J) = −ν0(ν0 − ν1 + 1)µ2
435
+ 0 + ν0(µ1 + 1)(ν0 − ν1 + 1)µ0 − µ1ν1
436
+ µ0ν0 − µ1ν1
437
+ Tr(J) = −µ2
438
+ 0ν0 + ν0(ν0 + µ1 − ν1 + 2)µ0 − 2µ1ν1
439
+ µ0ν0 − µ1ν1
440
+ .
441
+ In this case,
442
+ (a) if µ0 < µ1 and µ2
443
+ 0ν0 < µ2
444
+ 1ν1, or µ0 > µ1 and µ2
445
+ 0ν0 > µ2
446
+ 1ν1, then it is a saddle;
447
+ (b) if µ2
448
+ 0/µ2
449
+ 1 = ν1/ν0, we have a non-hyperbole in the interior region.
450
+ In order to plot bifurcation diagrams, we further assume that µ1 = αµ0, ν0 = βµ0, and ν1 = γµ0, where
451
+ α, β, and γ are parameters. In this case the original µ1, ν0, and ν1 vary with µ0. Under this circumstance,
452
+ the nontrivial fixed points E3 becomes
453
+ E3 =
454
+ �β(α − 1)
455
+ αγ − β , γ − β
456
+ αγ − β
457
+
458
+ ,
459
+ which is independent of the growth rate parameter µ0. Eigenvalues of Jacobian at E3 in Eq.(9) is
460
+
461
+
462
+
463
+
464
+
465
+
466
+
467
+
468
+
469
+ ω0 =
470
+ 1
471
+ 2αγ − 2β
472
+
473
+ Ξ0 + αγ − β
474
+ |αγ − β|Ξ1
475
+
476
+ ω1 =
477
+ 1
478
+ 2αγ − 2β
479
+
480
+ Ξ0 − αγ − β
481
+ |αγ − β|Ξ1
482
+
483
+ ,
484
+ (18a)
485
+ (18b)
486
+ where
487
+
488
+
489
+
490
+
491
+
492
+
493
+
494
+
495
+
496
+ Ξ0 = 2αγ − β2µ0 −
497
+
498
+ 2 + (α − γ − 1)µ0
499
+
500
+ β
501
+ Ξ1 = µ0
502
+
503
+ β
504
+
505
+ (4βγ − 4γ2 + β)α2 − (2β2 + 2βγ − 4γ2 + 2β)α + β(β − γ + 1)2
506
+ �� 1
507
+ 2
508
+ (19a)
509
+ (19b)
510
+ 6
511
+
512
+ 2.4
513
+ Properties of Eq.(6)
514
+ Similar to Eq.(8), the two-dimensional logistic equations in Eq.(6) have the mappings
515
+ �f(x, y) = µ0x(1 − x) − µ1xy;
516
+ g(x, y) = −ν0y(1 − y) + ν1xy.
517
+ (20a)
518
+ (20b)
519
+ Eq.(20) has Jacobian that is slightly different from Eq.(9)
520
+ J =
521
+ �µ0(1 − 2x) − µ1y
522
+ −µ1x
523
+ ν1y
524
+ ν0(−1 + 2y) + ν1x
525
+
526
+ ,
527
+ (21)
528
+ with eigenvalues ω0 and ω1 being, respectively,
529
+
530
+
531
+
532
+
533
+
534
+
535
+
536
+ ω0 = −µ0x + ν0y + 1
537
+ 2(xν1 − yµ1) + 1
538
+ 2(µ0 − ν0) + ω
539
+ 2
540
+ ω1 = −µ0x + ν0y + 1
541
+ 2(xν1 − yµ1) + 1
542
+ 2(µ0 − ν0) − ω
543
+ 2
544
+ (22a)
545
+ (22b)
546
+ where ω is the same as in Eq.(11). Fixed points for Eq.(6) are
547
+
548
+
549
+
550
+
551
+
552
+
553
+
554
+
555
+
556
+
557
+
558
+
559
+
560
+
561
+
562
+
563
+
564
+
565
+
566
+
567
+
568
+
569
+
570
+ E′
571
+ 0 = (0, 0)
572
+ E′
573
+ 1 = (0, 1 + 1
574
+ ν0
575
+ )
576
+ E′
577
+ 2 = (1 − 1
578
+ µ0
579
+ , 0)
580
+ E′
581
+ 3 =
582
+ �−µ0ν0 + µ1ν0 + µ1 + ν0
583
+ −µ0ν0 + µ1ν1
584
+ , −µ0ν0 + µ0ν1 − µ0 − ν1
585
+ −µ0ν0 + µ1ν1
586
+
587
+ (23a)
588
+ (23b)
589
+ (23c)
590
+ (23d)
591
+ However, when µ0ν0 = µ1ν1, Eq.(6) has fixed points E′
592
+ 0, E′
593
+ 1, and E′
594
+ 2.
595
+ We may also make use of Lamma 1 in Sec. 2.2 to examine the topological type of each fixed point in
596
+ Eq.(6) as in Theorem 2:
597
+ Theorem 2. The topological types of fixed points in Eq.(23) are
598
+ 1. For E′
599
+ 0 = (0, 0),
600
+
601
+
602
+
603
+
604
+
605
+
606
+
607
+
608
+
609
+ Ω(1) = −(µ0 − 1)(ν0 + 1)
610
+ Ω(−1) = −(µ0 + 1)(ν0 − 1)
611
+ det(J) = −µ0ν0
612
+ Tr(J) = µ0 − ν0.
613
+ In this case,
614
+ (a) if µ0 < 1 and ν0 < 1, then E′
615
+ 0 is a sink.
616
+ (b) E′
617
+ 0 cannot be a source.
618
+ (c) if µ0 > 1, then E′
619
+ 0 is a saddle.
620
+ (d) if µ0 = 1, then E′
621
+ 0 is a non-hyperbole.
622
+ 2. For E′
623
+ 1 = (0, 1 + 1
624
+ ν0 ),
625
+
626
+
627
+
628
+
629
+
630
+
631
+
632
+
633
+
634
+
635
+
636
+
637
+
638
+
639
+
640
+
641
+
642
+
643
+
644
+
645
+
646
+
647
+
648
+
649
+
650
+
651
+
652
+ Ω(1) = (ν0 + 1)((µ0 − µ1 − 1)ν0 − µ1)
653
+ ν0
654
+ Ω(−1) = (ν0 + 3)((µ0 − µ1 + 1)ν0 − µ1)
655
+ ν0
656
+ det(J) = (ν0 + 2)((µ0 − µ1)ν0 − µ1)
657
+ ν0
658
+ Tr(J) = ν2
659
+ 0 + (µ0 − µ1 + 2)ν0 − µ1
660
+ ν0
661
+ .
662
+ In this case,
663
+ 7
664
+
665
+ (a) E′
666
+ 1 cannot be a sink.
667
+ (b) if µ0 > µ1ν0+µ1+ν0
668
+ ν0
669
+ , then E′
670
+ 1 is a source.
671
+ (c) if µ0 < µ1ν0+µ1+ν0
672
+ ν0
673
+ , then E′
674
+ 1 is a saddle.
675
+ (d) if µ0 = µ1ν0+µ1+ν0
676
+ ν0
677
+ , then E′
678
+ 1 is a non-hyperbole.
679
+ 3. For E′
680
+ 2 = (1 −
681
+ 1
682
+ µ0 , 0),
683
+
684
+
685
+
686
+
687
+
688
+
689
+
690
+
691
+
692
+
693
+
694
+
695
+
696
+
697
+
698
+
699
+
700
+
701
+
702
+
703
+
704
+
705
+
706
+
707
+
708
+
709
+
710
+ Ω(1) = (µ0 − 1)((ν0 − ν1 + 1)µ0 + ν1)
711
+ µ0
712
+ Ω(−1) = (µ0 − 3)((ν0 − ν1 − 1)µ0 + ν1)
713
+ µ0
714
+ det(J) = (µ0 − 2)((ν0 − ν1)µ0 + ν1)
715
+ µ0
716
+ Tr(J) = −µ2
717
+ 0 + (ν0 − ν1 − 2)µ0 + ν1
718
+ µ0
719
+ .
720
+ In this case,
721
+ (a) if 1 < µ0 < 2 and ν1µ0−µ0−ν1
722
+ µ0
723
+ < ν0 < ν1µ0+µ0−ν1
724
+ µ0
725
+ or µ0 = 2 and ν1
726
+ 2 − 1 < ν0 < ν1
727
+ 2 + 1 with ν1 > 2,
728
+ or 2 < µ0 < 3 and ν1µ0−µ0−ν1
729
+ µ0
730
+ < ν0 < ν1µ0+µ0−ν1
731
+ µ0
732
+ , then E′
733
+ 2 is a sink;
734
+ (b) if 0 < µ0 < 1 and ν0 < ν1µ0−µ0−ν1
735
+ µ0
736
+ , or µ0 > 3 and ν0 > ν1µ0+µ0−ν1
737
+ µ0
738
+ , then E′
739
+ 2 is a source;
740
+ (c) if 1 < µ0 < 3 and ν0 > ν1µ0+µ0−ν1
741
+ µ0
742
+ , or µ0 > 3 and ν1µ0−µ0−ν1
743
+ µ0
744
+ < ν0 < ν1µ0+µ0−ν1
745
+ µ0
746
+ , or 0 < µ0 < 1
747
+ and ν0 > ν1µ0−µ0−ν1
748
+ µ0
749
+ , or 1 < µ0 and ν0 < ν1µ0−µ0−ν1
750
+ µ0
751
+ , then E′
752
+ 2 is a saddle;
753
+ (d) if µ1 = 1 or ν0 = ν1µ0−µ0−ν1
754
+ µ0
755
+ , then E′
756
+ 2 is a non-hyperbole.
757
+ 4. For E′
758
+ 3 =
759
+
760
+ ν0(µ1−µ0)
761
+ −µ0ν0+µ1ν1 ,
762
+ µ0(ν1−ν0)
763
+ −µ0ν0+µ1ν1
764
+
765
+ ,
766
+
767
+
768
+
769
+
770
+
771
+
772
+
773
+
774
+
775
+
776
+
777
+
778
+
779
+
780
+
781
+
782
+
783
+
784
+
785
+
786
+
787
+
788
+
789
+
790
+
791
+
792
+
793
+ Ω(1) = −µ0ν0(ν0 − ν1)(µ0 − µ1)
794
+ µ0ν0 − µ1ν1
795
+ Ω(−1) = −ν0(ν0 − ν1 + 2)µ2
796
+ 0 + ν0(µ1 + 2)(ν0 − ν1 + 2)µ0 − 4µ1ν1
797
+ µ0ν0 − µ1ν1
798
+ det(J) = −ν0(ν0 − ν1 + 1)µ2
799
+ 0 + ν0(µ1 + 1)(ν0 − ν1 + 1)µ0 − µ1ν1
800
+ µ0ν0 − µ1ν1
801
+ Tr(J) = −µ2
802
+ 0ν0 + ν0(ν0 + µ1 − ν1 + 2)µ0 − 2µ1ν1
803
+ µ0ν0 − µ1ν1
804
+ .
805
+ In this case,
806
+ (a) if µ0 < µ1 and µ2
807
+ 0ν0 < µ2
808
+ 1ν1, or µ0 > µ1 and µ2
809
+ 0ν0 > µ2
810
+ 1ν1, then it is a saddle;
811
+ (b) if µ2
812
+ 0/µ2
813
+ 1 = ν1/ν0, we have a non-hyperbole in the interior region.
814
+ In terms of α, β, and γ, E′
815
+ 3 in Eq.(23d) is E′
816
+ 3 =
817
+
818
+ αβµ0−βµ0+α+β
819
+ µ0(αγ−β)
820
+ , −βµ0+γµ0−γ−1
821
+ µ0(αγ−β)
822
+
823
+ , at which the eigenvalues
824
+ of Jacobian in Eq.(21) is
825
+
826
+
827
+
828
+
829
+
830
+
831
+
832
+
833
+
834
+ ω0 =
835
+ 1
836
+ 2αγ − 2β
837
+
838
+ Ξ′
839
+ 0 + αγ − β
840
+ |αγ − β|Ξ′
841
+ 1
842
+
843
+ ω1 =
844
+ 1
845
+ 2αγ − 2β
846
+
847
+ Ξ′
848
+ 0 − αγ − β
849
+ |αγ − β|Ξ′
850
+ 1
851
+
852
+ ,
853
+ (28a)
854
+ (28b)
855
+ 8
856
+
857
+ where
858
+
859
+
860
+
861
+
862
+
863
+
864
+
865
+
866
+
867
+
868
+
869
+
870
+
871
+
872
+
873
+
874
+
875
+
876
+
877
+
878
+
879
+
880
+
881
+
882
+
883
+
884
+
885
+ Ξ′
886
+ 0 = (2γ − 1)α − β2µ0 −
887
+
888
+ αµ0 + (−µ0 + 1)γ − µ0 + 4
889
+
890
+ β
891
+ Ξ′
892
+ 1 =
893
+
894
+ (µ0 − 1)
895
+
896
+ (−4βµ0 − 4) α2 + 4β (µ0 − 1) α + β2 (µ0 − 1)
897
+
898
+ γ2
899
+ +
900
+
901
+ 4 (βµ0 + 1)2 α2 − 2β (µ0 − 1) (βµ0 + 1) α − 2β2µ0 (µ0 − 1) (β + 1)
902
+
903
+ γ
904
+ +
905
+
906
+ (βµ0 + 1) α − βµ0 (β + 1)
907
+ �2
908
+ � 1
909
+ 2
910
+ (29a)
911
+ (29b)
912
+ (29c)
913
+ Eq.(28) shows that whenever Ξ′ 2
914
+ 1
915
+ is negative, ω0 and ω1 are complex conjugates. Unlike the previous case,
916
+ fixed points E′
917
+ 1, E′
918
+ 2, and E′
919
+ 3 now are dependent on the growth rate µ0.
920
+ 2.5
921
+ Lyapunov exponents
922
+ In addition, the chaotic behavior may be better examined by introducing Lyapunov exponents, which are
923
+ defined as, base 2 being chosen to conform to Wolf et al[35],
924
+
925
+
926
+
927
+
928
+
929
+
930
+
931
+ λx ≡ log2 |w0| = ln |w0|
932
+ ln 2
933
+ λy ≡ log2 |w1| = ln |w1|
934
+ ln 2 .
935
+ (30a)
936
+ (30b)
937
+ The positive value of λx or λy, together with the negative value of total sum of the Lyapunov exponent,
938
+ either � λx < 0 or � λy < 0, are strong inference of chaos for the prey or the predator[36]. For comparison,
939
+ Lyapunov exponents of time series data of prey and predator populations were also calculated by both
940
+ algorithms of Rosenstein[28] and Eckmann et al.[29] with the package of NOnLinear measures for Dynamical
941
+ Systems (nolds)[37]. For Rosenstein algorithm, embedding dimension for delay embedding was emb dim = 10,
942
+ and the step size between time series data points was set to τ = 1 second. While number of data points
943
+ (trajectory len) was set to 20 and was used for the distance trajectories between two neighboring points,
944
+ the mean period of time series data, obtained from the fast Fourier transform, was used as the minimal
945
+ temporal separation(min tsep) between two neighbors.
946
+ Search of the suitable lag was terminated when
947
+ number of potential neighbors for a vector was found to be smaller than minimal neighbors, which was set
948
+ as min neighbors = 20. At last, the RANSAC-fitting was used for the line fitting. As for the algorithm
949
+ proposed by Eckmann et al., the matrix dimension was set to 2, and embedding dimension was also set to
950
+ 10 as in Rosenstein algorithm. Moreover, τ = 1 s, the minimal number of neighbors (min nb) was 4, and
951
+ min tsep = 0 were used in the algorithm.
952
+ There are at least four disadvantages for the above algorithms, as mentioned by Escot and Galan[36]: lack
953
+ of the ability to estimate full Lyapunov spectrum, not resilient to noise in time-series data, poor detection
954
+ performance in nonlinearity with an adequate sample size, and no theoretical derivations for the algorithms
955
+ about their consistency and asymptotic distributions, making it impossible to statistical inferences respect
956
+ to chaos.
957
+ 3
958
+ Results and Discussions
959
+ In the present study, we focused only on drawings of equations in Sec. 2.4. We observed that there could be
960
+ five different bifurcation diagrams with various kinds of combinations of parameters. The first category is
961
+ Normal, referring to the normal competitive behavior on the increasing and decreasing on numbers about
962
+ species between the prey and the predator. The second category is Standard, referring to the standard
963
+ bifurcation diagram as shown in the well-known 1D logistic equation in the prey at the absence of the
964
+ predator. The third category is named as Paraclete, referring to overlapping structure in the bifurcation
965
+ diagram of the prey.
966
+ The fourth category is Extinction, connoting to extinction of the predator when
967
+ the prey becomes chaotic. The last category is Vorticella Strange, meaning that the bifurcation diagram
968
+ resembles the shape of a vorticella but with more complex inner structures before the two species become
969
+ chaotic at the same time. Categories and parameters were summarized in Table 1. initX and initY indicate
970
+ 9
971
+
972
+ initial values of the prey and the predator, respectively. Special attention should be paid to the cases of
973
+ Normal and Extinction, where the inter-species parameters are deliberately made the same but the initial
974
+ population were different: for Normal, the two species have the same initial population whereas for Extinction,
975
+ the predator has 10 times more population than the prey. The discrepancy on initial population in these two
976
+ cases shows completely different evolution consequences.
977
+ In the following figures, discussions on Lyapounov exponents, Equation, Rosenstein, Eckmann X, and
978
+ Eckmann Y in the legend of λx and λy refer to calculations directly from Eq.(30), from time-series algorithm
979
+ of Rosenstein, Eckmann et al of the prey, and Eckmann et al of the predator, respectively. Codes, together
980
+ with animations on population iterations, phase portraits and phase diagrams under different growth rates,
981
+ may be retrieved via Ref([38]).
982
+ initX
983
+ initY
984
+ α
985
+ β
986
+ γ
987
+ Normal
988
+ 0.200
989
+ 0.200
990
+ 1.000
991
+ 0.001
992
+ 0.500
993
+ Standard
994
+ 0.100
995
+ 0.500
996
+ 1.000
997
+ 0.100
998
+ 0.500
999
+ Paraclete
1000
+ 0.010
1001
+ 0.100
1002
+ 5.000
1003
+ 0.010
1004
+ 0.900
1005
+ Extinction
1006
+ 0.010
1007
+ 0.100
1008
+ 1.000
1009
+ 0.001
1010
+ 0.500
1011
+ Vorticella Strange
1012
+ 0.100
1013
+ 0.500
1014
+ 0.875
1015
+ 0.018
1016
+ 1.000
1017
+ Table 1: Parameters used for equations in Sec. 2.4.
1018
+ 3.1
1019
+ Normal
1020
+ Our dynamical system may describe normal competitiveness between two species. Under the circumstance
1021
+ of equal initial population, Figure 1a shows steadily increasing population of x at the absence of the predator
1022
+ when µ0 < 3.0. At the appearance of y after µ0 > 3.0, the prey gradually diminishes with more number of
1023
+ the predator.
1024
+ Figure 1b ensures that under this scenario there is no chaos, for the Lyapunou exponents calculated by
1025
+ every algorithm are negative. However, results are different from algorithms. First for λx, there is a trench
1026
+ around µ0 = 2 by Equation, whereas all other algorithms fail to reproduce. Rosenstein, Eckmann X, and
1027
+ Eckmann Y only reproduced shallow dip around 1.5 < µ0 < 2.5. In addition, We observe that Rosenstein
1028
+ and Eckmann X have quite similar results in the whole range of µ0, except that Rosenstein has a slightly
1029
+ higher value. Furthermore, Eckmann X and Eckmann Y have almost identical values when µ0 > 1.66, but
1030
+ Eckmann Y digresses a lot from the other three curves at low growth rate below µ0 = 1.66. As for λy, all
1031
+ algorithms show close spectrum µ0 > 1.692, with larger values for Rosenstein. The four algorithms divide
1032
+ into two groups of results below µ0 = 1.692, with Rosenstein and Eckmann X showing an increasing tail that
1033
+ is different from the other two algorithms showing curves of dropping.
1034
+ 3.2
1035
+ Standard
1036
+ Figure 2a shows bifurcation diagram and Lyapunov exponents of Standard. Our model shows that even
1037
+ with nonzero initial population and nonzero inter-species relationships of α, β, and γ, we may still acquire
1038
+ flip bifurcation for 1D logistic equation[39] for the prey at the absence of the predator. A flip bifurcation
1039
+ is a counterpart in discrete dynamic system to describe the concept of periodic doubling in the continuous
1040
+ dynamic system[40].
1041
+ Figure 2b shows the Lyapunov exponents. Rosenstein algorithm did not show results in in this case,
1042
+ because singular value decomposition did not converge when doing linear least squares, meaning that positive
1043
+ or negative infinity appeared when we tried to deal with pseudo-inverse matrix. Eckmann Y cannot work,
1044
+ either, for y = 0 in the whole range. We may see that for overall trend of λx, both algorithms have λx < 0
1045
+ for µ0 < 3.0, whereas λx has both positive and negative values for µ0 > 3.5.
1046
+ It is widely accepted[41]
1047
+ that values of Lyapunov exponents occur interchangeably between positive and negative infer chaos, which
1048
+ is consistent with the shaded area in Figure 2a. Another inconsistency occurs with 3.0 < µ0 < 3.5 with
1049
+ λx > 0 for Equation but λx < 0 for Eckmann X, where x exhibits a flip bifurcation from 2-cycle into 4-cycle.
1050
+ Nevertheless, this inconsistency may not be a problem for us to distinguish chaos from happening. There is
1051
+ 10
1052
+
1053
+ (a)
1054
+ (b)
1055
+ Figure 1: Competitive behavior and Lyapunov exponents of Normal.
1056
+ 11
1057
+
1058
+ 0.6
1059
+ 0.5
1060
+ 0.4
1061
+ 0.2
1062
+ 0.1
1063
+ 0.0
1064
+ 1.0
1065
+ 1.5
1066
+ 2.0
1067
+ 2.5
1068
+ 3.0
1069
+ 3.5
1070
+ 4.0
1071
+ Logistic Map
1072
+ 0.25
1073
+ 0.20
1074
+ 0.15 -
1075
+ y
1076
+ 0.10
1077
+ 0.05
1078
+ 000
1079
+ 1.0
1080
+ 1.5
1081
+ 2.0
1082
+ 2.5
1083
+ 3.0
1084
+ 3.5
1085
+ 4.0
1086
+ μoLyapunov Exponents
1087
+ 0
1088
+ 入x
1089
+ -4
1090
+ -6 -
1091
+ Equation
1092
+ ......
1093
+ Rosenstein
1094
+ Eckmann X
1095
+ Eckmann Y
1096
+ -8
1097
+ 1.0
1098
+ 1.5
1099
+ 2.0
1100
+ 2.5
1101
+ 3.0
1102
+ 3.5
1103
+ 4.0
1104
+ -0
1105
+ -2
1106
+ -4 -
1107
+ g-
1108
+ -8 +
1109
+ -10 -
1110
+ Equation
1111
+ Rosenstein
1112
+ Eckmann X
1113
+ -12
1114
+ EckmannY
1115
+ 1.0
1116
+ 1.5
1117
+ 2.0
1118
+ 2.5
1119
+ 3.0
1120
+ 3.5
1121
+ 4.0
1122
+ μoa break around µ0 = 2 for Eckmann X in both λx and λy, at which Equation shows a deep trench in λx.
1123
+ Also, near µ0 ≈ 1.245, Equation shows a smaller trench while Eckmann X produces a rising tail.
1124
+ Figure 3 studies the population in the course of time (iteration) at µ0 equal to 2.700 (1-cycle), 3.000
1125
+ (2-cycle where the flip bifurcation occurs) and 3.500 (4-cycle), 3.700 (at which the system goes into chaos),
1126
+ 3.845 (the system going back to more stable 3-cycle), and 3.945 (where the system returns to chaos again)
1127
+ in the successive order. Zero predator population is obtained throughout course of time.
1128
+ Figure 4 studies topological types of fixed points. Plots of imaginary or real part of eigenvalues in Eq.(22)
1129
+ were evaluated at the fixed points E′
1130
+ 1 in Eq.(23b) (as shown in the upper row), E′
1131
+ 2 in Eq.(23c) (as shown
1132
+ in the middle row), and E′
1133
+ 3 in Eq.(23d) (as shown in the bottom row). Color-bar at the right-hand side
1134
+ stands for various growth rate µ0, while circles with four different sizes in the legend represent, from the
1135
+ smallest to the biggest, topological types of sink, source, saddle, and non-hyperbole. We may see that ω0
1136
+ and ω1 at the fixed points E′
1137
+ 1 were pure real numbers with absolute values greater than 1, making the fixed
1138
+ point a source for all µ0. While ω0 and ω1 at the fixed points E′
1139
+ 2 were also pure real numbers, the absolute
1140
+ values vary across 1, making the fixed point E′
1141
+ 2 topological types of sink, source, and saddle, with possible
1142
+ non-hyperboles occurring at either low µ0 = 1 or high µ0 = 3.75 if we apply Theorem 2.3(d).
1143
+ Figure 5 shows absolute values of eigenvalues ω0 and ω1 on fixed points E′
1144
+ 1, E′
1145
+ 2 and E′
1146
+ 3. Topological types
1147
+ of fixed points may be double-checked more straightforwardly with the figure. The first column shows that
1148
+ E′
1149
+ 1 is a source because ω0 and ω1 are always greater than 1. The second column demonstrates that E′
1150
+ 2 are
1151
+ a sink when µ0 < 2.141, and when 2.141 < µ0 < 3, E′
1152
+ 2 is a saddle. Non-hyperboles can also be examined
1153
+ at µ0 = 1 for E′
1154
+ 2, at µ0 = 3 for E′
1155
+ 2 (in both cases ω0 = 1 and ω1 ̸= 1), and at µ0 = 3.75 for E′
1156
+ 2 and E′
1157
+ 3 (in
1158
+ which ω0 ̸= 1 and ω1 = 1). That µ0 = 3.75 is located in chaos region, making the fixed point vulnerable to
1159
+ nonlinear terms in the dynamic system. At last, when µ0 > 3, E′
1160
+ 2 is a source.
1161
+ Figure 6 shows phase portrait and phase space diagram about Standard. µ0 values are represented by the
1162
+ color bar at the right-hand side. Figure 6a refers to phase portrait, where topological types are also shown
1163
+ in the legend. An isolated initial coordinate (0.1, 0.50) marked as a source at the upper-left corner. Flip
1164
+ bifurcation occurs at (0.665, 0, 000). No limit circles were found in the ��ip bifurcation. The oblique black
1165
+ straight line, starting from (0.732, 0.000) to (0.689, 0.062), consisting of fixed points E′
1166
+ 3 that is enclosed by a
1167
+ thicker yellow cloak indicates that, along the axis, E′
1168
+ 3 is a saddle, with nonzero y values. This result seems
1169
+ to contradict to the previous one, saying that predator population is always zero. However, since our initial
1170
+ population is (x, y)=(0.1, 0.5), it does not lie in the above range. Therefore, the system with the chosen
1171
+ inter-species constants is not attracted by the saddle points along the oblique black line, confirming that
1172
+ with none-zero initial population of the predator and non-zero inter-species constants, the predator could
1173
+ appear, but only for a while. Afterwards, the predator dies out in the course of time, leaving the prey to be
1174
+ the only surviving species in the paradisaic. This observation may explain why the predator species may not
1175
+ survive long in some specific ecological system. Further, Figure 6b is phase space diagram for the prey. It
1176
+ is meaningless to discuss phase space diagram for the predator because there are only two points, (0.0, 0.0)
1177
+ and (0.5, −0.5), in this case.
1178
+ 12
1179
+
1180
+ (a)
1181
+ (b)
1182
+ Figure 2: Bifurcation diagram and Lyapunov exponents of Standard.
1183
+ 13
1184
+
1185
+ 1.0
1186
+ 0.8
1187
+ 0.6 -
1188
+ X
1189
+ 0.4
1190
+ 0.2
1191
+ 0.0
1192
+ 0.04
1193
+ 0.02
1194
+ 0.00
1195
+ 0.02
1196
+ 0.04
1197
+ 1.0
1198
+ 1.5
1199
+ 2.0
1200
+ 2.5
1201
+ 3.0
1202
+ 3.5
1203
+ 4.0
1204
+ uoLyapunov Exponents
1205
+ -2
1206
+ -6
1207
+ Equation
1208
+ Eckmann X
1209
+ EckmannY
1210
+ 1.0
1211
+ 1.5
1212
+ 2.0
1213
+ 2.5
1214
+ 3.0
1215
+ 3.5
1216
+ 4.0
1217
+ 0
1218
+ -2
1219
+ -4
1220
+ -6
1221
+ -8 -
1222
+ Equation
1223
+ Eckmann X
1224
+ 1.0
1225
+ 1.5
1226
+ 2.0
1227
+ 2.5
1228
+ 3.0
1229
+ 3.5
1230
+ 4.0
1231
+ μo(a)
1232
+ (b)
1233
+ (c)
1234
+ (d)
1235
+ (e)
1236
+ (f)
1237
+ Figure 3: Population vs. iteration of Standard.
1238
+ 14
1239
+
1240
+ 1.0
1241
+ 0.8
1242
+ 0.6
1243
+ μo = 3.945
1244
+ 0.4
1245
+ 0.2
1246
+ 0.0
1247
+ 0
1248
+ 25
1249
+ 50
1250
+ 75
1251
+ 100
1252
+ 125
1253
+ 150
1254
+ 175
1255
+ 200
1256
+ 0.5
1257
+ 0.4
1258
+ 0.3
1259
+ n
1260
+ 0.2
1261
+ 0.1
1262
+ 0.0
1263
+ 0
1264
+ 25
1265
+ 50
1266
+ 75
1267
+ 100
1268
+ 125
1269
+ 150
1270
+ 175
1271
+ 200
1272
+ n1.0
1273
+ 0.8
1274
+ 0.6
1275
+ μo = 2.700
1276
+ 0.4
1277
+ 0.2
1278
+ 0.0
1279
+ 0
1280
+ 25
1281
+ 50
1282
+ 75
1283
+ 100
1284
+ 125
1285
+ 150
1286
+ 175
1287
+ 200
1288
+ 0.5
1289
+ 0.4
1290
+ 0.3
1291
+ 0.1
1292
+ 0.0
1293
+ 25
1294
+ 50
1295
+ 75
1296
+ 100
1297
+ 125
1298
+ 150
1299
+ 175
1300
+ 200
1301
+ n1.0
1302
+ 0.8
1303
+ 0.6
1304
+ μo = 3.000
1305
+ 0.4
1306
+ 0.2
1307
+ 0.0
1308
+ 0
1309
+ 25
1310
+ 50
1311
+ 75
1312
+ 100
1313
+ 125
1314
+ 150
1315
+ 175
1316
+ 200
1317
+ 0.5
1318
+ 0.4
1319
+ 0.3
1320
+ 0.2
1321
+ 0.1
1322
+ 0.0
1323
+ 0
1324
+ 25
1325
+ 50
1326
+ 75
1327
+ 100
1328
+ 125
1329
+ 150
1330
+ 175
1331
+ 200
1332
+ n1.0
1333
+ 0.8
1334
+ 0.6
1335
+ 0.4
1336
+ Ho= 3.500
1337
+ 0.2
1338
+ 0.0
1339
+ 0
1340
+ 25
1341
+ 50
1342
+ 75
1343
+ 100
1344
+ 125
1345
+ 150
1346
+ 175
1347
+ 200
1348
+ 0.5
1349
+ 0.4
1350
+ 0.3
1351
+ 0.2
1352
+ 0.1
1353
+ 0.0
1354
+ 0
1355
+ 25
1356
+ 50
1357
+ 75
1358
+ 100
1359
+ 125
1360
+ 150
1361
+ 175
1362
+ 200
1363
+ n1.0
1364
+ 0.8
1365
+ 0.6
1366
+ μo = 3.700
1367
+ 0.4
1368
+ 0.2
1369
+ 0.0
1370
+ 0
1371
+ 25
1372
+ 50
1373
+ 75
1374
+ 100
1375
+ 125
1376
+ 150
1377
+ 175
1378
+ 200
1379
+ 0.5
1380
+ 0.4
1381
+ 0.3
1382
+ 0.2
1383
+ 0.1
1384
+ 0.0
1385
+ 0
1386
+ 25
1387
+ 50
1388
+ 75
1389
+ 100
1390
+ 125
1391
+ 150
1392
+ 175
1393
+ 200
1394
+ n1.0
1395
+ 0.8
1396
+ 0.6
1397
+ 0.4
1398
+ 0.2
1399
+ 0.0
1400
+ 0
1401
+ 25
1402
+ 50
1403
+ 75
1404
+ 100
1405
+ 125
1406
+ 150
1407
+ 175
1408
+ 200
1409
+ 0.5
1410
+ 0.4
1411
+ 0.3
1412
+ 0.2
1413
+ 0.1
1414
+ 0.0
1415
+ 25
1416
+ 50
1417
+ 75
1418
+ 100
1419
+ 125
1420
+ 150
1421
+ 175
1422
+ 200
1423
+ nFigure 4: Analysis on eigenvalues for the case of Standard. Eigenvalues described in Eq.(22) for fixed points
1424
+ E′
1425
+ 1 (Eq.(23b)), E′
1426
+ 2 (Eq.(23c)), and E′
1427
+ 3 (Eq.(23d)) are plotted in the upper row, middle row, and lower row,
1428
+ respectively. Types of topology are indicated with circles of various sizes. Color bar stands for different µ0.
1429
+ .
1430
+ Figure 5: Absolute values of eigenvalues vs. growth rate at fixed points for Standard. Prominent coordinates
1431
+ that help us understand stability and distinguish the topological type about a fixed point are recorded as
1432
+ follows. Upper middle panel: (1.244, 0.000), and (3, 75, 1, 00). Upper-right corner panel: (3.75, 1.00). E′
1433
+ 2 and
1434
+ E′
1435
+ 3 are both non-hyperbolic at µ0 = 1, 3, and 3.75.
1436
+ 15
1437
+
1438
+ 0.04
1439
+ 0.04
1440
+ 10.4
1441
+ 0.02
1442
+ 0.02
1443
+ 10.2
1444
+ Im(wo)
1445
+ Im(wi)
1446
+ + 00°0
1447
+ 0.00
1448
+ 0.02 -
1449
+ 0.02
1450
+ 9.8
1451
+ 0.04 -
1452
+ 0.04
1453
+ 9'6
1454
+ 2.10
1455
+ 2.15
1456
+ 2.20
1457
+ 2.25
1458
+ 2.30
1459
+ 2.35
1460
+ 2.40
1461
+ 10.4
1462
+ 10.2
1463
+ 10.0
1464
+ 9.8
1465
+ 9.6
1466
+ 2.10
1467
+ 2.15
1468
+ 2.20
1469
+ 2.25
1470
+ 2.30
1471
+ 2.35
1472
+ 2.40
1473
+ 0.04 -
1474
+ 0.04
1475
+ 1.00
1476
+ 0.02
1477
+ 0.02
1478
+ 0.75
1479
+ Im(wo)
1480
+ Im(wi)
1481
+ 0.00-
1482
+ 0.00
1483
+ 0.02 -
1484
+ 0.02
1485
+ 0.25
1486
+ 0.04
1487
+ 0.04
1488
+ 0.00
1489
+ 2.0
1490
+ -1.5
1491
+ 1.0
1492
+ 0.5
1493
+ 0.0
1494
+ 0.5
1495
+ 1.0
1496
+ 0.0
1497
+ 0.2
1498
+ 0.4
1499
+ 0.6
1500
+ 0.8
1501
+ 1.0
1502
+ 0.000.25
1503
+ 0.500.75
1504
+ 1.00
1505
+ 1.251.50
1506
+ 1.75
1507
+ 2.00
1508
+ 1.8
1509
+ 0.04
1510
+ 0.04
1511
+ 1.6
1512
+ 0.02
1513
+ 0.02
1514
+ Im(wo)
1515
+ Im(wi)
1516
+ 0.00 -
1517
+ 0.00
1518
+ 0.02 -
1519
+ 0.02
1520
+ 1.2
1521
+ 0.04
1522
+ 0.04
1523
+ 1.0 J
1524
+ 2.8
1525
+ 2.6
1526
+ 2.4
1527
+ 2.2
1528
+ 2.0
1529
+ -1.8
1530
+ 1.6
1531
+ 1.0
1532
+ 1.2
1533
+ 1.4
1534
+ 1.6
1535
+ 1.8
1536
+ 1.6
1537
+ 1.8
1538
+ 2.0
1539
+ 2.2
1540
+ 2.4
1541
+ 2.6
1542
+ 2.8
1543
+ Re(wo)
1544
+ 1°ml
1545
+ μo
1546
+ Re(wi)
1547
+ Type
1548
+ source
1549
+ non-hyperbolic
1550
+ sink
1551
+ O
1552
+ saddle1.8
1553
+ 10.4
1554
+ 1.0 -
1555
+ 1.6
1556
+ 0.8
1557
+ 10.2
1558
+ 0.6
1559
+ 1.4
1560
+ 0.4
1561
+ 1.2
1562
+ 9.8
1563
+ 0.2
1564
+ 9.6
1565
+ 1.0
1566
+ 0.0
1567
+ 1.0
1568
+ 1.5
1569
+ 2.0
1570
+ 2.5
1571
+ 3.0
1572
+ 3.5
1573
+ 4.0
1574
+ 1.0
1575
+ 1.5
1576
+ 2.0
1577
+ 2.5
1578
+ 3.0
1579
+ 3.5
1580
+ 4.0
1581
+ 1.0
1582
+ 1.5
1583
+ 2.0
1584
+ 2.5
1585
+ 3.0
1586
+ 3.5
1587
+ 4.0
1588
+ 2.40
1589
+ 2.00
1590
+ 2.8 -
1591
+ 1.75
1592
+ 2.35
1593
+ 2.6
1594
+ 1.50
1595
+ 2.30
1596
+ 1.25
1597
+ 2.4
1598
+ 1.00
1599
+ 2.2
1600
+ 0.75
1601
+ 2.20
1602
+ 2.0
1603
+ 0.50
1604
+ 2.15
1605
+ 0.25
1606
+ 1.8
1607
+ 2.10 -
1608
+ 0.00
1609
+ 1.6
1610
+ 1.0
1611
+ 1.5
1612
+ 2.0
1613
+ 2.5
1614
+ 3.0
1615
+ 3.5
1616
+ 4.0
1617
+ 1.0
1618
+ 1.5
1619
+ 2.0
1620
+ 2.5
1621
+ 3.0
1622
+ 3.5
1623
+ 4.0
1624
+ 1.0
1625
+ 1.5
1626
+ 2.0
1627
+ 2.5
1628
+ 3.0
1629
+ 3.5
1630
+ 4.0
1631
+ μo. Column for Ei
1632
+ μo. Column for E2
1633
+ μo. Column for E3(a)
1634
+ (b)
1635
+ Figure 6:
1636
+ Analysis on phase
1637
+ portrait and phase space dia-
1638
+ gram about Standard. Topolog-
1639
+ ical types of sink, source, sad-
1640
+ dle and non-hyperbole are repre-
1641
+ sented with different sizes from
1642
+ the smallest to the largest as
1643
+ shown in the legends.
1644
+ Oblique
1645
+ black line in Figure 6a indicates
1646
+ saddle fixed points, demonstrat-
1647
+ ing that the predator cannot sur-
1648
+ vive long in the ecological sys-
1649
+ tem. Figure 6b shows the phase
1650
+ space of x. Phase diagram of the
1651
+ predator is not shown here, be-
1652
+ cause it only contains two points
1653
+ (0.0, 0.0), and (0.5, −0.5), which
1654
+ makes the figure boring.
1655
+ 16
1656
+
1657
+ Type
1658
+ 0.5
1659
+ non-hyperbolic
1660
+ sink
1661
+ saddle
1662
+ O
1663
+ source
1664
+ 0.4
1665
+ y
1666
+ 0.2
1667
+ 0.1
1668
+ 0.0
1669
+ 0.0
1670
+ 0.2
1671
+ 0.4
1672
+ 0.6
1673
+ 0.8
1674
+ 1.0
1675
+ μo
1676
+ X0.6
1677
+ 0.4
1678
+ 0.2 -
1679
+ 0.0
1680
+ 0.4
1681
+ 0.6
1682
+ -0.8
1683
+ 1.0
1684
+ 0.0
1685
+ 0.2
1686
+ 0.4
1687
+ 0.6
1688
+ 0.8
1689
+ 1.0
1690
+ μo3.3
1691
+ Paraclete
1692
+ Figure 7a represents two sets of overlapping bifurcation diagrams: one is the Standard, the other with
1693
+ vorticella-shaped, which starts to appear after µ0 = 2.29.
1694
+ Between 2.29 < µ0 < 2.45, shaded regions
1695
+ appearing vertically with gaps are not chaos but transient states of population. At µ0 = 3.256, the vorticella-
1696
+ shaped has bifurcation that start to be chaotic, at which we would explain later that it should be classified
1697
+ as Neimark-Sacker bifurcation, and mingles together with the flip bifurcation of Standard after µ0 = 3.46, at
1698
+ which the four-cycles occurs.
1699
+ Figure 7b shows the Lyapunov exponents for Paraclete. For the same reason in Standard, Rosenstein
1700
+ algorithm did not show results in in this case, either. We may see that for overall trend of λx, algorithms
1701
+ of both Equation and Eckmann X have λx < 0 for µ0 < 3.0, whereas λx has both positive and negative
1702
+ values for µ0 > 3.0, inferring chaos. Eckmann Y only shows a small portion, not spectrum, because y = 0 for
1703
+ µ0 < 2.29 leads to failure on producing full spectrum of both λx and λy. Therefore, where we may see only
1704
+ some segment of λx after µ0 > 3.0 that almost overlaps with the curve of Eckmann X. Inconsistency also
1705
+ occurs at low growth rate in λy spectrum, for Equation shows stern-drooping tails while Eckmann X shows
1706
+ a raising-up one.
1707
+ Figure 8 studies the population in the course of time (iteration) at µ0 equal to 2.790 (stable population),
1708
+ 3.025 (2-cycle), 3.255 (at which Neimark-sacker bifurcation is on the way), 3.460 (4-cycle), 3.845 (3-cycle in
1709
+ Standard), and 3.945 (chaos region) in the successive order.
1710
+ Figure 9 studies topological types of fixed points. Plots of imaginary or real part of eigenvalues in Eq.(22)
1711
+ were evaluated at the fixed points E′
1712
+ 1 in Eq.(23b) (as shown in the upper row), E′
1713
+ 2 in Eq.(23c) (as shown in
1714
+ the middle row), and E′
1715
+ 3 in Eq.(23d) (as shown in the bottom row). Color-bar at the right-hand side stands
1716
+ for various growth rate µ0, while circles with four different sizes in the legend represent, from the smallest
1717
+ to the biggest, topological types of sink, source, saddle, and non-hyperbole. We may see that ω0 and ω1 at
1718
+ the fixed points E′
1719
+ 1 were pure real numbers with absolute values greater than 1, making the fixed point a
1720
+ source for all µ0. While ω0 and ω1 at the fixed points E′
1721
+ 2 were also pure real numbers, the absolute values
1722
+ vary across 1, making the fixed point E′
1723
+ 2 topological types of sink, source, and saddle, with only one possible
1724
+ non-hyperbole occurring at |ω0| = 1.
1725
+ Figure 10 shows absolute values of eigenvalues ω0 and ω1 on fixed points E′
1726
+ 1, E′
1727
+ 2 and E′
1728
+ 3. Topological
1729
+ types of fixed points may be double-checked more straightforwardly with the figure. The first column shows
1730
+ that E′
1731
+ 1 is a source because ω0 and ω1 are always greater than 1. The second column demonstrates that E′
1732
+ 2
1733
+ are a sink when µ0 < 2.141, and when 2.141 < µ0 < 3, E′
1734
+ 2 is a saddle. At last, when µ0 > 3, E′
1735
+ 2 is a source.
1736
+ As we look closely into the third column, it shows that E′
1737
+ 3 is non-hyperbolic at µ0 ≈ 2.137 for ω0 ̸= 1
1738
+ and ω1 = 1, which is vulnerable to nonlinear terms in the dynamic system. It explains why the transient
1739
+ state under that growth rate is not shown in Figure 7a. Also, bending points along curves plotted in the
1740
+ third-column figures demonstrate that transient states occur within 2.258 < µ0 < 2.475. More interestingly,
1741
+ the third column manifests that E′
1742
+ 3 represents Neimark-Sacker bifurcation at µ0 = 3.25636 because of the fol-
1743
+ lowing facts: first, ω0 and ω1 are complex conjugates with modulus 1, and second, as µ0 varies across 3.25636
1744
+ from smaller to larger value, topological type of E′
1745
+ 3 changes from a sink (stable) to a source (unstable)[19].
1746
+ Figure 11 shows phase portrait and phase space diagram about Paraclete. µ0 values are represented by
1747
+ the color bar at the right-hand side. Figure 11a refers to phase portrait, showing Neimark-Sacker bifurcation
1748
+ established at (0.352, 0.068) with µ0 ≈ 3.256 at the center of limit circles.
1749
+ Black straight lines indicate
1750
+ oblique axis consisting of E′
1751
+ 3, including sink and source, and horizontal axis composed of E′
1752
+ 2, including
1753
+ source and saddle, under different µ0. Topological types are also shown in the legend. Dots with larger µ0
1754
+ representing chaos spread outside around the limit circles. Figure 11b is phase space diagram for the prey
1755
+ centered at (0.352, 0) and Figure 11c refers to phase space diagram for the predator centered at (0, 0.068).
1756
+ Not surprisingly, the center of limit circles in Figure 11b has the same x value as that of Figure 11a. Similarly,
1757
+ same y value for the center of limit circles in Figure 11c and in Figure 11a.
1758
+ 17
1759
+
1760
+ (a)
1761
+ (b)
1762
+ Figure 7: Bifurcation diagram and Lyapunov exponents of Paraclete.
1763
+ 18
1764
+
1765
+ 1.0
1766
+ 0.8
1767
+ 0.6
1768
+ X
1769
+ 0.4 -
1770
+ 0.2
1771
+ 0.0
1772
+ 0.150
1773
+ 0.125
1774
+ 0.100
1775
+ >0.075
1776
+ 0.050
1777
+ 0.025
1778
+ 0.000
1779
+ 1.0
1780
+ 1.5
1781
+ 2.0
1782
+ 2.5
1783
+ 3.0
1784
+ 3.5
1785
+ 4.0
1786
+ uo0
1787
+ -2 -
1788
+ -4
1789
+ 6-
1790
+ Equation
1791
+ Eckmann X
1792
+ EckmannY
1793
+ -8
1794
+ 2
1795
+ -2
1796
+ -4 -
1797
+ -6于
1798
+ Equation
1799
+ Eckmann X
1800
+ -8
1801
+ Eckmann Y
1802
+ 1.0
1803
+ 1.5
1804
+ 2.0
1805
+ 2.5
1806
+ 3.0
1807
+ 3.5
1808
+ 4.0
1809
+ μo(a)
1810
+ (b)
1811
+ (c)
1812
+ (d)
1813
+ (e)
1814
+ (f)
1815
+ Figure 8: Population vs. iteration of Paraclete.
1816
+ 19
1817
+
1818
+ 1.0
1819
+ 0.8
1820
+ 0.6
1821
+ 0.4
1822
+ 0.2
1823
+ μo = 2.790
1824
+ 0.0
1825
+ 0
1826
+ 25
1827
+ 50
1828
+ 75
1829
+ 100
1830
+ 125
1831
+ 150
1832
+ 175
1833
+ 200
1834
+ 0.150
1835
+ 0.125
1836
+ 0.100
1837
+ 0.075
1838
+ 0.050
1839
+ 0.025
1840
+ 0.000 -
1841
+ 0.025
1842
+ 0.050
1843
+ 25
1844
+ 50
1845
+ 75
1846
+ 100
1847
+ 125
1848
+ 150
1849
+ 175
1850
+ 200
1851
+ n1.0
1852
+ 0.8
1853
+ 0.6
1854
+ 0.4
1855
+ 0.2
1856
+ μo = 3.025
1857
+ 0.0
1858
+ 0
1859
+ 25
1860
+ 50
1861
+ 75
1862
+ 100
1863
+ 125
1864
+ 150
1865
+ 175
1866
+ 200
1867
+ 0.150
1868
+ 0.125
1869
+ 0.100
1870
+ 0.075
1871
+ 0.050
1872
+ 0.025
1873
+ 0.000
1874
+ 0.025
1875
+ -0.050
1876
+ 0
1877
+ 25
1878
+ 50
1879
+ 75
1880
+ 100
1881
+ 125
1882
+ 150
1883
+ 175
1884
+ 200
1885
+ n1.0
1886
+ 0.8
1887
+ 0.6
1888
+ X
1889
+ 0.4
1890
+ 0.2
1891
+ μo = 3,255
1892
+ 0.0
1893
+ 0
1894
+ 25
1895
+ 50
1896
+ 100
1897
+ 125
1898
+ 150
1899
+ 175
1900
+ 200
1901
+ 0.150
1902
+ 0.125
1903
+ 0.100
1904
+ 0.075
1905
+ 0.050
1906
+ 0.025
1907
+ 0.000
1908
+ 0.025
1909
+ 0.050
1910
+ 0
1911
+ 25
1912
+ 50
1913
+ 75
1914
+ 100
1915
+ 125
1916
+ 150
1917
+ 175
1918
+ 200
1919
+ n1.0
1920
+ 0.8
1921
+ 0.6
1922
+ ux
1923
+ 0.4
1924
+ 0.2
1925
+ μo = 3.460
1926
+ 0.0
1927
+ 0
1928
+ 25
1929
+ 50
1930
+ 75
1931
+ 100
1932
+ 125
1933
+ 150
1934
+ 175
1935
+ 200
1936
+ 0.150
1937
+ 0.125
1938
+ 0.100
1939
+ 0.075
1940
+ 0.050
1941
+ 0.025
1942
+ 0.000
1943
+ -0.025
1944
+ -0.050
1945
+ 0
1946
+ 25
1947
+ 50
1948
+ 75
1949
+ 100
1950
+ 125
1951
+ 150
1952
+ 175
1953
+ 200
1954
+ n1.0
1955
+ 0.8
1956
+ 0.6
1957
+ 0.4
1958
+ 0.2
1959
+ 以o -:3.845.
1960
+ 0.0
1961
+ 0
1962
+ 25
1963
+ 50
1964
+ 75
1965
+ 100
1966
+ 125
1967
+ 150
1968
+ 175
1969
+ 200
1970
+ 0.150
1971
+ 0.125
1972
+ 0.100
1973
+ 0.075
1974
+ 0.050
1975
+ 0.025
1976
+ 0.000
1977
+ -0.025
1978
+ -0.050
1979
+ 0
1980
+ 25
1981
+ 50
1982
+ 75
1983
+ 100
1984
+ 125
1985
+ 150
1986
+ 175
1987
+ 200
1988
+ n1.0
1989
+ 0.8
1990
+ 0.6
1991
+ n
1992
+ X
1993
+ 0.4
1994
+ 0.2
1995
+ 3.945
1996
+ 0.0
1997
+ 0
1998
+ 25
1999
+ 50
2000
+ 75
2001
+ 100
2002
+ 125
2003
+ 150
2004
+ 175
2005
+ 200
2006
+ 0.150
2007
+ 0.125
2008
+ 0.100
2009
+ 0.075
2010
+ 0.050
2011
+ 0.025
2012
+ 0.000
2013
+ -0.025
2014
+ -0.050
2015
+ 0
2016
+ 25
2017
+ 50
2018
+ 75
2019
+ 100
2020
+ 125
2021
+ 150
2022
+ 175
2023
+ 200
2024
+ nFigure 9: Analysis on eigenvalues for the case of Paraclete. Legends have the same meaning described in
2025
+ Figure 4.
2026
+ Figure 10: Absolute values of eigenvalues vs. growth rate at fixed points for Paraclete. Important coordinates:
2027
+ Upper middle panel (2.14, 1.00). Upper-right corner panel (2.137, 1.000), (2.457, 0.440), and (3.256, 1.000).
2028
+ Lower-right corner panel (2.258, 0.000), (2.475, 0.427), and (3.256, 1.000).
2029
+ 20
2030
+
2031
+ 0.04
2032
+ 0.04
2033
+ 515.0
2034
+ 0.02
2035
+ 0.02
2036
+ 512.5
2037
+ Im(wo)
2038
+ Im(wi)
2039
+ 0.00
2040
+ 0.00
2041
+ 0.02 -
2042
+ 0.02
2043
+ 507.5
2044
+ 0.04 -
2045
+ 0.04
2046
+ 505.0
2047
+ 2.010
2048
+ 2.015
2049
+ 2.020
2050
+ 2.025
2051
+ 2.030
2052
+ 2.035
2053
+ 2.040
2054
+ -516
2055
+ -514
2056
+ -512
2057
+ 510
2058
+ 508
2059
+ -506
2060
+ 504
2061
+ 2.010
2062
+ 2.015
2063
+ 2.020
2064
+ 2.025
2065
+ 2.030
2066
+ 2.035
2067
+ 2.040
2068
+ 3
2069
+ 0.04 -
2070
+ 0.04
2071
+ 2.5
2072
+ 0.02
2073
+ 2.0 -
2074
+ 0.02
2075
+ Im(wo)
2076
+ Im(wi)
2077
+ +00'0
2078
+ 0.00
2079
+ 0.02 -
2080
+ 1.0
2081
+ 0.02
2082
+ 0.5
2083
+ 0.04
2084
+ 0.04
2085
+ EEEELEEF
2086
+ 0.0
2087
+ 2.0
2088
+ 1.5
2089
+ -1.0
2090
+ 0.5
2091
+ 0.0
2092
+ 0.5
2093
+ 1.0
2094
+ 0.0
2095
+ 0.5
2096
+ 1.0
2097
+ 1.5
2098
+ 2.0
2099
+ 2.5
2100
+ 0.000.250.500.751.00
2101
+ 1.251.501.752.00
2102
+ 2
2103
+ 1.25 于
2104
+ 0.00
2105
+ 1.50
2106
+ 1.00
2107
+ 0.25
2108
+ 0.50
2109
+ 1.25
2110
+ Im(wi)
2111
+ 0.50
2112
+ 0.75
2113
+ 1.00
2114
+ 0.75
2115
+ 0.25
2116
+ 1.25
2117
+ 0.50
2118
+ 0.00
2119
+ 0.8
2120
+ 0.6
2121
+ 0.4
2122
+ 0.2
2123
+ 0.0
2124
+ 0.2
2125
+ 0.4
2126
+ 0.4
2127
+ 0.6
2128
+ 0.8
2129
+ 1.0
2130
+ 1.2
2131
+ 1.4
2132
+ 1.6
2133
+ 0.0
2134
+ 0.2
2135
+ 0.4
2136
+ 0.6
2137
+ 0.8
2138
+ 1.0
2139
+ 1.2
2140
+ Re(wi)
2141
+ [wol
2142
+ μo
2143
+ Re(wo)
2144
+ Type
2145
+ source
2146
+ non-hyperbolic
2147
+ saddle
2148
+ sink516
2149
+ 2.5
2150
+ 1.6
2151
+ 514
2152
+ 1.4
2153
+ 2.0
2154
+ 512
2155
+ 1.2
2156
+ 1.5
2157
+ 1.0
2158
+ 1.0
2159
+ 508
2160
+ 0.8
2161
+ 506
2162
+ 0.5
2163
+ 0.6
2164
+ 504
2165
+ 0.0
2166
+ 0.4
2167
+ 1.0
2168
+ 1.5
2169
+ 2.0
2170
+ 2.5
2171
+ 3.0
2172
+ 3.5
2173
+ 4.0
2174
+ 1.0
2175
+ 1.5
2176
+ 2.0
2177
+ 2.5
2178
+ 3.0
2179
+ 3.5
2180
+ 4.0
2181
+ 1.0
2182
+ 1.5
2183
+ 2.0
2184
+ 2.5
2185
+ 3.0
2186
+ 3.5
2187
+ 4.0
2188
+ 2.040
2189
+ 2.00
2190
+ 1.2
2191
+ 1.75
2192
+ 2.035
2193
+ 1.50
2194
+ 1.0
2195
+ 2.030
2196
+ 1.25
2197
+ 0.8 -
2198
+ 1.00
2199
+ 0.6
2200
+ 0.75
2201
+ 2.020
2202
+ 0.4
2203
+ 0.50
2204
+ 2.015
2205
+ 0.2
2206
+ 0.25
2207
+ 2.010
2208
+ 0.00
2209
+ 0.0
2210
+ 1.0
2211
+ 1.5
2212
+ 2.0
2213
+ 2.5
2214
+ 3.0
2215
+ 3.5
2216
+ 4.0
2217
+ 1.0
2218
+ 1.5
2219
+ 2.0
2220
+ 2.5
2221
+ 3.0
2222
+ 3.5
2223
+ 4.0
2224
+ 1.0
2225
+ 1.5
2226
+ 2.0
2227
+ 2.5
2228
+ 3.0
2229
+ 3.5
2230
+ 4.0
2231
+ μo. Column for Ei
2232
+ μo. Column for E2
2233
+ μo. Column for E3(a)
2234
+ (b)
2235
+ (c)
2236
+ Figure 11:
2237
+ Analysis on phase
2238
+ portrait
2239
+ and
2240
+ phase
2241
+ space
2242
+ diagram
2243
+ about
2244
+ Paraclete.
2245
+ (11a)Phase
2246
+ portrait
2247
+ shows
2248
+ Neimark-Sacker bifurcation es-
2249
+ tablished at (0.352, 0.068) with
2250
+ µ0 ≈ 3.256 located at the center
2251
+ of limit circles.
2252
+ Oblique axis
2253
+ and horizontal axis consisting
2254
+ of E′
2255
+ 3
2256
+ and E′
2257
+ 2
2258
+ with different
2259
+ µ0, respectively.
2260
+ We may see
2261
+ from the legend that topological
2262
+ types of E′
2263
+ 3
2264
+ are mostly sink
2265
+ and source, while those of E′
2266
+ 2
2267
+ are mostly source and saddle.
2268
+ Phase portrait and phase space
2269
+ diagram for the prey have same
2270
+ x in (11b) for the center limit
2271
+ circle. Similarly, phase portrait
2272
+ and phase space diagram for the
2273
+ predator have same y in (11c)
2274
+ for the center limit circle.
2275
+ 21
2276
+
2277
+ Type
2278
+ non-hyperbolic
2279
+ sink
2280
+ saddle
2281
+ 0.14
2282
+ source
2283
+ 0.12
2284
+ 0.10
2285
+ 0.08-
2286
+ 0.06-
2287
+ 0.04 -
2288
+ 0.02
2289
+ 0.00
2290
+ 0.0
2291
+ 0.2
2292
+ 0.4
2293
+ 0.6
2294
+ 0.8
2295
+ 1.0
2296
+ μo0.6
2297
+ 0.4
2298
+ 0.2 -
2299
+ 0.0
2300
+ 0.4
2301
+ 0.6
2302
+ 0.8
2303
+ 1.0
2304
+ 0.0
2305
+ 0.2
2306
+ 0.4
2307
+ 0.6
2308
+ 0.8
2309
+ 1.0
2310
+ μo0.075
2311
+ 0.050
2312
+ 0.025
2313
+ 0.000 -
2314
+ 0.025
2315
+ 0.050
2316
+ 0.075
2317
+ 0.100
2318
+ 0.00
2319
+ 0.02
2320
+ 0.04
2321
+ 0.06
2322
+ 0.08
2323
+ 0.10
2324
+ 0.12
2325
+ 0.14
2326
+ V
2327
+ μo3.4
2328
+ Extinction
2329
+ Figure 12a shows the bifurcation diagram of Extinction. There is a flip bifurcation for x around µ0 ≈ 2.99;
2330
+ however, the 2-cycle collides at µ0 ≈ 3.165 and returns back to 1-cycle. Shaded regions between 3.165 < µ0 <
2331
+ 3.434 for x and 3.10 < µ0 < 3.343 for y do not refer to chaos but belong to transient states. Afterwards, the
2332
+ bifurcation diagram goes back to Normal for both x and y, and represent pleasant conditions of predictable
2333
+ values before x goes into 3-cycle at µ0 ≈ 3.828 as in Standard, where y drops to zero cliff-fallingly at
2334
+ µ0 ≈ 3.824, manifesting to extinction of the predator for the prey is around the 3-cycle state. Fortunately,
2335
+ there could be still few little chances for the predator to survive at (µ0, y) = (3.845, 0.219), (3.887, 0.226),
2336
+ and (3.897, 0.228), where we may see three isolated fixed points appear with a vertical tail of transient states.
2337
+ When the prey becomes fully chaotic, the predator population reduces back to zero dramatically again, and
2338
+ never has any further opportunity to rise back. This astonishing phenomenon could be the most profound
2339
+ finding in the study, which states that the prey in chaos generated by overpopulation of the predator would
2340
+ erase the entire predator species.
2341
+ Figure 12b shows Lyapunov exponents for Extinction that is similar to those in Figure 1b, except for the
2342
+ regions at 3.0 < µ0 < 3.18 and µ0 > 3.86, the former showing a bum by Equation, which is also the same
2343
+ region for the prey to be in 2-cycle, and the latter presenting chaos for x and extinction for y. Discrepancy
2344
+ appears for Eckmann Y that is different from the other when µ0 < 1.662, where it shows a decreasing tail
2345
+ while the other algorithms show an increasing trend. Unlike Figure 1b, whose results show that Eckmann
2346
+ X is always in between Rosenstein and Eckmann Y in the range of 1.5 < µ0 < 3.0, Figure 12b shows more
2347
+ intertwines at µ0 = 1.886 for λx, and at µ0 = 1.717 and µ0 = 1.891 for λy. Similar to Figure 1b, the four
2348
+ algorithms also divides into two groups of curves below µ0 = 1.717, with Rosenstein and Eckmann X going
2349
+ upward, together with Equation and Eckmann Y going downward.
2350
+ Figure 13 shows population iteration of Extinction. As we can see, flip bifurcation starts at µ0 = 3.000 as
2351
+ in Figure(13a), while in Figure(13b) the two fixed points collide, and after transient states (n > 200), they
2352
+ have tendency to merging into a single fixed point, as we explained earlier in Figure 12a on the characteristics
2353
+ about the shaded region between 3.165 < µ0 < 3.434 for x. We further demonstrate that at µ0 = 3.500 in
2354
+ Figure(13c), after transient(n > 175), bifurcation collapses to one. Furthermore, 3-cycle is opened in x at
2355
+ µ0 = 3.84, as indicated in Figure(13d), with extinction of y at the exactly the same moment. However, a
2356
+ sunlight of survival for y is shed on the window at µ0 = 3.845, as shown in Figure(13e), where the two species
2357
+ may still exist under predictable population. Finally, Figure 13f portends the predator extinction under
2358
+ chaos of the prey.
2359
+ Figure 14 studied topological types of fixed points.
2360
+ Plots of imaginary or real part of eigenvalues in
2361
+ Eq.(22) were evaluated also at the three fixed points E′
2362
+ 1, E′
2363
+ 2, and E′
2364
+ 3 as in Figure 4. We may see that ω0
2365
+ at the fixed points E′
2366
+ 1 is pure real numbers with absolute values greater than 1, whereas ω1 keeps the value
2367
+ −1000 for all µ0, making the fixed point a source (unstable) for all µ0. While ω0 < 1 and ω1 > 1 at the
2368
+ fixed points E′
2369
+ 2, the fixed point E′
2370
+ 2 has a topological type of saddle, with possible non-hyperboles occurring
2371
+ at |ω0| = 1 and |ω1| = 0.
2372
+ Stability of fixed points may also be examined in Figure 20. Figures at the first column shows that that
2373
+ E′
2374
+ 1 is a source, for both eigenvalues have absolute values greater than 1. In the second column, we see that
2375
+ E′
2376
+ 2 changes its stability from a sink to source when µ0 varies at 3, at which flip bifurcation occurs; meanwhile,
2377
+ E′
2378
+ 3 changes from source to sink.
2379
+ Figure 16 shows phase portrait and phase diagrams for Extinction. No limit circles are found in this
2380
+ particular case.
2381
+ 22
2382
+
2383
+ (a)
2384
+ (b)
2385
+ Figure 12: Bifurcation diagram and Lyapunov exponents of Extinction.
2386
+ 23
2387
+
2388
+ Logistic Map
2389
+ 1.0
2390
+ 0.8 -
2391
+ 0.6
2392
+ 0.4
2393
+ 0.2
2394
+ 0.0
2395
+ 0.20 -
2396
+ 0.15 -
2397
+ 0.10 -
2398
+ 0.05 -
2399
+ 0.00-
2400
+ 1.0
2401
+ 1.5
2402
+ 2.0
2403
+ 2.5
2404
+ 3.0
2405
+ 3.5
2406
+ 4.0
2407
+ μoLyapunovExponents
2408
+ 0
2409
+ -2
2410
+ -6-
2411
+ Equation
2412
+ Rosenstein
2413
+ Eckmann X
2414
+ Eckmann Y
2415
+ 8
2416
+ 0-
2417
+ -2-
2418
+ -4
2419
+ -6
2420
+ -8 +
2421
+ Equation
2422
+ -10 -
2423
+ Rosenstein
2424
+ Eckmann X
2425
+ EckmannY
2426
+ -12
2427
+ 1.0
2428
+ 1.5
2429
+ 2.0
2430
+ 2.5
2431
+ 3.0
2432
+ 3.5
2433
+ 4.0
2434
+ μo(a)
2435
+ (b)
2436
+ (c)
2437
+ (d)
2438
+ (e)
2439
+ (f)
2440
+ Figure 13: Population vs. iteration of Extinction.
2441
+ 24
2442
+
2443
+ 1.0 -
2444
+ 0.8 -
2445
+ 0.6
2446
+ n
2447
+ 0.4
2448
+ μo = 3.000
2449
+ 0.2
2450
+ 0.0
2451
+ 0
2452
+ 25
2453
+ 50
2454
+ 75
2455
+ 100
2456
+ 125
2457
+ 150
2458
+ 175
2459
+ 200
2460
+ 0.30
2461
+ 0.25 -
2462
+ 0.20
2463
+ 0.15
2464
+ 0.10 -
2465
+ 0.05
2466
+ 0.00
2467
+ 0.05
2468
+ 0
2469
+ 25
2470
+ 50
2471
+ 100
2472
+ 125
2473
+ 150
2474
+ 175
2475
+ 200
2476
+ n1.0 -
2477
+ 0.8 -
2478
+ 0.6
2479
+ u
2480
+ 0.4
2481
+ μo = 3.375
2482
+ 0.2
2483
+ 0.0
2484
+ 0
2485
+ 25
2486
+ 50
2487
+ 75
2488
+ 100
2489
+ 125
2490
+ 150
2491
+ 175
2492
+ 200
2493
+ 0.30
2494
+ 0.25 -
2495
+ 0.20
2496
+ 0.15
2497
+ 0.10 -
2498
+ 0.05
2499
+ 0.00
2500
+ 0.05
2501
+ 0
2502
+ 25
2503
+ 50
2504
+ 75
2505
+ 100
2506
+ 125
2507
+ 150
2508
+ 175
2509
+ 200
2510
+ n1.0 -
2511
+ 0.8 -
2512
+ 0.6
2513
+ n
2514
+ 0.4
2515
+ μo = 3.500
2516
+ 0.2
2517
+ 0.0
2518
+ 0
2519
+ 25
2520
+ 50
2521
+ 75
2522
+ 100
2523
+ 125
2524
+ 150
2525
+ 175
2526
+ 200
2527
+ 0.30
2528
+ 0.25 -
2529
+ 0.20
2530
+ 0.15
2531
+ 0.10 -
2532
+ 0.05
2533
+ 0.00
2534
+ 0.05
2535
+ 0
2536
+ 25
2537
+ 50
2538
+ 75
2539
+ 100
2540
+ 125
2541
+ 150
2542
+ 175
2543
+ 200
2544
+ n1.0
2545
+ 0.8 -
2546
+ 0.6
2547
+ 0.4
2548
+ μo = 3.840
2549
+ 0.2
2550
+ 0.0
2551
+ 0
2552
+ 25
2553
+ 50
2554
+ 75
2555
+ 100
2556
+ 125
2557
+ 150
2558
+ 175
2559
+ 200
2560
+ 0.30
2561
+ 0.25 -
2562
+ 0.20 -
2563
+ 0.15
2564
+ 0.10 -
2565
+ 0.05
2566
+ 0.00 -
2567
+ 0.05
2568
+ 0
2569
+ 25
2570
+ 50
2571
+ 100
2572
+ 125
2573
+ 150
2574
+ 175
2575
+ 200
2576
+ n1.0 -
2577
+ 0.8 -
2578
+ 0.6
2579
+ 0.4
2580
+ μo = 3.845
2581
+ 0.2
2582
+ 0.0
2583
+ 0
2584
+ 25
2585
+ 50
2586
+ 75
2587
+ 100
2588
+ 125
2589
+ 150
2590
+ 175
2591
+ 200
2592
+ 0.30
2593
+ 0.25 -
2594
+ 0.20
2595
+ 0.15
2596
+ 0.10 -
2597
+ 0.05
2598
+ 0.00
2599
+ 0.05
2600
+ 0
2601
+ 25
2602
+ 50
2603
+ 75
2604
+ 100
2605
+ 125
2606
+ 150
2607
+ 175
2608
+ 200
2609
+ n1.0 -
2610
+ 0.8 -
2611
+ 0.6
2612
+ C
2613
+ 0.4
2614
+ μo = 3.945
2615
+ 0.2
2616
+ 0.0
2617
+ 0
2618
+ 25
2619
+ 50
2620
+ 75
2621
+ 100
2622
+ 125
2623
+ 150
2624
+ 175
2625
+ 200
2626
+ 0.30
2627
+ 0.25 -
2628
+ 0.20
2629
+ 0.15
2630
+ 0.10 -
2631
+ 0.05
2632
+ 0.00 -
2633
+ 0.05
2634
+ 0
2635
+ 25
2636
+ 50
2637
+ 75
2638
+ 100
2639
+ 125
2640
+ 150
2641
+ 175
2642
+ 200
2643
+ nFigure 14: Analysis on eigenvalues for the case of Extinction. Legends have the same meaning described in
2644
+ Figure 4.
2645
+ Figure 15: Absolute values of eigenvalues vs. growth rate at fixed points for Extinction. From the figures at
2646
+ the first column, it is clearly shown that E′
2647
+ 1 is a source. Also, at µ0 = 3 where flip bifurcation occurs, E′
2648
+ 2
2649
+ changes its stability from a sink to source, whereas E′
2650
+ 3 from source to sink.
2651
+ 25
2652
+
2653
+ 0.04
2654
+ 0.04
2655
+ 1040-
2656
+ 0.02
2657
+ 0.02
2658
+ 1020
2659
+ Im(wo)
2660
+ Im(wi)
2661
+ 0.00
2662
+ 0.00
2663
+ 0.02 -
2664
+ 0.02
2665
+ 980 -
2666
+ 0.04
2667
+ 0.04
2668
+ 096
2669
+ 2.00102.00152.0020
2670
+ 2.00252.00302.00352.0040
2671
+ 1040
2672
+ 1020
2673
+ -1000
2674
+ 980
2675
+ -960
2676
+ 2.0010 2.0015 2.0020 2.00252.0030 2.00352.0040
2677
+ 3
2678
+ 1.5
2679
+ 0.04
2680
+ 0.04
2681
+ 0.02
2682
+ 0.02
2683
+ Im(wo)
2684
+ Im(wi)
2685
+ 1.0
2686
+ Iml
2687
+ 0.00-
2688
+ 0.00
2689
+ 0.02 -
2690
+ 0.02
2691
+ 0.5
2692
+ 0.04
2693
+ 0.04
2694
+ + 00
2695
+ 2.0
2696
+ 1.5
2697
+ 1.0
2698
+ 0.5
2699
+ 0.0
2700
+ 0.5
2701
+ 1.0
2702
+ 0.0
2703
+ 0.2
2704
+ 0.4
2705
+ 0.6
2706
+ 0.8
2707
+ 1.0
2708
+ 1.2
2709
+ 1.4
2710
+ 0.000.250.500.751.00
2711
+ 1.251.501.75
2712
+ 2.00
2713
+ 0.04
2714
+ 0.04
2715
+ 1.5
2716
+ 0.02
2717
+ 0.02
2718
+ Im(wo)
2719
+ Im(wi)
2720
+ 00°0
2721
+ 0.00
2722
+ 0.02 -
2723
+ 0.02
2724
+ 0.5
2725
+ 0.04
2726
+ 0.04
2727
+ 1.8-1.6-1.4
2728
+ -1.2
2729
+ -1.0
2730
+ 0.80.60.40.2
2731
+ 0.2
2732
+ 0.4
2733
+ 0.6
2734
+ 0.8
2735
+ 1.0
2736
+ 1.2
2737
+ 1.4
2738
+ 1.6
2739
+ 1.8
2740
+ 0.2
2741
+ 0.4
2742
+ 0.6
2743
+ 0.8
2744
+ 1.0
2745
+ 1.2
2746
+ 1.4
2747
+ 1.6
2748
+ 1.8
2749
+ Re(wo)
2750
+ Re(wi)
2751
+ [wol
2752
+ μo
2753
+ Type
2754
+ source
2755
+ non-hyperbolic
2756
+ sink
2757
+ O
2758
+ saddle1.8
2759
+ 1.4
2760
+ 1040
2761
+ 1.6
2762
+ 1.2
2763
+ 1.4
2764
+ 1020
2765
+ 1.0
2766
+ 1.2
2767
+ 0.8
2768
+ 1.0
2769
+ 0.6
2770
+ 0.8
2771
+ 980
2772
+ 0.6
2773
+ 0.4
2774
+ 0.4
2775
+ 0.2
2776
+ 960
2777
+ 0.2
2778
+ 0.0
2779
+ 1.0
2780
+ 1.5
2781
+ 2.0
2782
+ 2.5
2783
+ 3.0
2784
+ 3.5
2785
+ 4.0
2786
+ 1.0
2787
+ 1.5
2788
+ 2.0
2789
+ 2.5
2790
+ 3.0
2791
+ 3.5
2792
+ 4.0
2793
+ 1.0
2794
+ 1.5
2795
+ 2.0
2796
+ 2.5
2797
+ 3.0
2798
+ 3.5
2799
+ 4.0
2800
+ 1.8
2801
+ 2.0040
2802
+ 2.00
2803
+ 1.6
2804
+ 1.75
2805
+ 2.0035
2806
+ 1.4 J
2807
+ 1.50
2808
+ 2.0030
2809
+ 1.2
2810
+ 1.25
2811
+ 1.0
2812
+ 1.00
2813
+ 0.8
2814
+ 0.75
2815
+ 2.0020
2816
+ 0.6
2817
+ 0.50
2818
+ 2.0015
2819
+ 0.4
2820
+ 0.25
2821
+ 0.2
2822
+ 2.0010
2823
+ 0.00
2824
+ 1.0
2825
+ 1.5
2826
+ 2.0
2827
+ 2.5
2828
+ 3.0
2829
+ 3.5
2830
+ 4.0
2831
+ 1.0
2832
+ 1.5
2833
+ 2.0
2834
+ 2.5
2835
+ 3.0
2836
+ 3.5
2837
+ 4.0
2838
+ 1.0
2839
+ 1.5
2840
+ 2.0
2841
+ 2.5
2842
+ 3.0
2843
+ 3.5
2844
+ 4.0
2845
+ μo. Column for Ei
2846
+ μo. Column for E2
2847
+ μo. Column for Es(a)
2848
+ (b)
2849
+ (c)
2850
+ Figure 16:
2851
+ Analysis on phase
2852
+ portrait and phase space dia-
2853
+ gram about Extinction. No limit
2854
+ circles were found in this case.
2855
+ 26
2856
+
2857
+ Type
2858
+ 0.25
2859
+ non-hyperbolic
2860
+ sink
2861
+ O
2862
+ saddle
2863
+ source
2864
+ 0.15 -
2865
+ y
2866
+ 0.10 -
2867
+ 0.05
2868
+ 0.00
2869
+ 0.0
2870
+ 0.2
2871
+ 0.4
2872
+ 0.6
2873
+ 0.8
2874
+ 1.0
2875
+ μo0.6
2876
+ 0.4
2877
+ 0.2 -
2878
+ 0.0
2879
+ 0.4
2880
+ 0.6
2881
+ -0.8
2882
+ 1.0
2883
+ 0.0
2884
+ 0.2
2885
+ 0.4
2886
+ 0.6
2887
+ 0.8
2888
+ 1.0
2889
+ μo0.04
2890
+ 0.02
2891
+ 0.00
2892
+ 0.02
2893
+ -0.04 -
2894
+ -0.06
2895
+ -0.08
2896
+ 0.10
2897
+ 0.00
2898
+ 0.05
2899
+ 0.10
2900
+ 0.15
2901
+ 0.20
2902
+ μo
2903
+ y3.5
2904
+ Vorticella Strange
2905
+ The last bifurcation type in our study is Vorticella Strange, which means that bifurcation diagram looks
2906
+ like a vorticella, only with more complicated internal structures.
2907
+ Figure 17a shows bifurcation diagram.
2908
+ When µ0 < 2.0, x grows steadily without y. After presence of the predator, population of the prey starts to
2909
+ decrease. Both species show predictable population before µ0 = 3.025, at which we classify a Neimark-Sacker
2910
+ bifurcation as in Paraclete. Transient states occur between 3.025 < µ0 < 3.200, as indicated in the shaded
2911
+ region. Later, a 6-cycle appears at µ0 = 3.24, which is also confirmed in Figure 18b. The 6-cycle becomes
2912
+ 3-cycle at µ0 = 3.40, as shown in Figure 18c, followed by chaos at µ0 = 3.485, which is also demonstrated
2913
+ in Figure 18d. The system goes back to 6-cycle around µ0 = 3.540, as we may also confirm in Figure 18e.
2914
+ Afterwards, the system goes back to chaos, as shown in Figure 18f.
2915
+ Figure 17b shows Lyapunov spectrum of Voticella Strange. All four algorithms barely show positive spectra
2916
+ for both x and y before µ0 = 3.5. On the contrary, afterµ0 = 3.5, four algorithms show positive Lyapunov
2917
+ exponents, where the system falls into chaos. For λx, Eckmann Y shows a decreasing tail below µ0 < 1.5,
2918
+ inconsistent from the other algorithms. Besides Equation showing two valleys between 1.500 < µ0 < 2.304
2919
+ and 3.224 < µ0 < 3.463, the other three algorithms only provide flat spectra in the two regions.
2920
+ Figure 19 shows analysis on eigenvalues of Vorticella Strange. At the first row, we see that both eigenvalues
2921
+ have zero imaginary parts, with absolute real parts of both greater than 1 (see also first column in Figure
2922
+ 20). Thus, E′
2923
+ 1 is a source. Similar analysis may also be done on E′
2924
+ 2, as shown in the second row in Figure
2925
+ 19 as well as the second column in Figure 20. At µ0 = 2.0, it turns from a sink to a saddle, and it maintains
2926
+ as a saddle between 2.0 < µ0 < 3.0, after which it turns to a source. Finally, the third column in Figure
2927
+ 20 demonstrates that Neimark-Sacker bifurcation occurs at µ0 ≈ 3.025, with coordinates (0.341, 0.377), as
2928
+ shown in Figure 21a.
2929
+ Similar bifurcation diagram was found by Hu et al.[10], and was identified as the Hopf bifurcation.
2930
+ However, the criteria for Hopf bifurcation in the two-dimensional system includes that the two eigenvalues
2931
+ are purely conjugate imaginary pair with zero real part[42]. Since Figure 19 shows that ω1 has a non-zero
2932
+ real part, our Vorticella Strange cannot be a Hopf bifurcation.
2933
+ For the sake of integrity, phase portrait and phase space diagram of Vorticell Strange are also shown in
2934
+ Figure 21. Similar detailed meaning is discussed in the Section of Paraclete.
2935
+ 4
2936
+ Conclusions
2937
+ We successfully built up a discrete-time model of two-dimensional mapping that resembles features of dif-
2938
+ ferential Lotka-Volterra Equations. We studied the topological types of fixed points, and found out that
2939
+ fascinating feather-like structures were formed around limit circles pierced through by the axis of fixed points
2940
+ in the phase portraits and phase space diagrams under various growth rates with Neimark-Sacker bifurcation.
2941
+ We further divided our dynamical systems into five categories by different shapes of bifurcation diagrams:
2942
+ Normal, Standard, Paraclete, Extinction, and Vorticella Strange. In every case, we studied the stability and
2943
+ topological types of the fixed points by criteria discussed in Lamma 1. In addition to plot the population
2944
+ vs. iteration, we also calculated Lyapunov exponents both by eigenvalues of Jacobian of mapping functions,
2945
+ and by Rosenstein algorithm and Eckmann et al. algorithm. Discrepancies clearly showed that Lyapunov
2946
+ exponents calculated by time-series algorithms may be unreliable within the range of chaos and at low growth
2947
+ rates, as well as when the Lyapunov exponents change dramatically. Furthermore, our model not only re-
2948
+ gained the 1D logistic mapping of the prey under zero predator yet with non-zero initial predator population
2949
+ and with non-zero inter-species constants, but it also showed the normal competitiveness of the prey and
2950
+ the predator without chaos. The quintessence in the current research was that, besides the possibility for
2951
+ the prey and the predator to become chaotic altogether, it is also probable for the predator to go extinct at
2952
+ the chaotic state of the prey. In other words, human overpopulation would cause chaos in natural resources,
2953
+ ultimately in return erase the entire human race. Luckily, even under this difficult circumstance slim chance
2954
+ is still left upon us to continue our race under some specific growth rate, as we may see some isolated fixed
2955
+ points remain in the predator bifurcation diagram.
2956
+ Our model may inspire conjecture on other relationships between two physical quantities, because mathe-
2957
+ matically what we demonstrated was that one quantity may dramatically reduce to zero at the state of chaos
2958
+ 27
2959
+
2960
+ (a)
2961
+ (b)
2962
+ Figure 17: Bifurcation diagram and Lyapunov exponents of Vorticella Strange.
2963
+ 28
2964
+
2965
+ Logistic Map
2966
+ 1.0
2967
+ 0.8
2968
+ 0.6
2969
+ 0.4
2970
+ 0.2 -
2971
+ 0.0
2972
+ 1.0
2973
+ 0.8 -
2974
+ 0.6
2975
+ 0.4
2976
+ 0.2 -
2977
+ 0'0
2978
+ 1.0
2979
+ 1.5
2980
+ 2.0
2981
+ 2.5
2982
+ 3.0
2983
+ 3.5
2984
+ 4.0
2985
+ μoLyapunov Exponents
2986
+ 0-
2987
+ -2
2988
+ Equation
2989
+ 6
2990
+ Rosenstein
2991
+ Eckmann X
2992
+ Eckmann Y
2993
+ 2
2994
+ F9-
2995
+ Equation
2996
+ 8
2997
+ Rosenstein
2998
+ Eckmann X
2999
+ EckmannY
3000
+ 1.0
3001
+ 1.5
3002
+ 2.0
3003
+ 2.5
3004
+ 3.0
3005
+ 3.5
3006
+ 4.0
3007
+ uo(a)
3008
+ (b) fig:
3009
+ (c)
3010
+ (d)
3011
+ (e)
3012
+ (f)
3013
+ Figure 18: Population vs. iteration of Vorticella Strange.
3014
+ 29
3015
+
3016
+ 1.0 -
3017
+ μo = 3,025
3018
+ 0.8
3019
+ 0.6
3020
+ 0.4
3021
+ 0.2
3022
+ 0.0
3023
+ 50
3024
+ 75
3025
+ 100
3026
+ 125
3027
+ 150
3028
+ 175
3029
+ 200
3030
+ 1.0
3031
+ 0.8
3032
+ 0.6
3033
+ 0.4
3034
+ ..
3035
+ 0.2
3036
+ 0.0
3037
+ 0
3038
+ 25
3039
+ 50
3040
+ 75
3041
+ 100
3042
+ 125
3043
+ 150
3044
+ 175
3045
+ 200
3046
+ n1.0 -
3047
+ μo = 3.240
3048
+ 0.8
3049
+ 0.6
3050
+ 0.4
3051
+ 0.2
3052
+ 0.0
3053
+ 25
3054
+ 50
3055
+ 75
3056
+ 100
3057
+ 125
3058
+ 150
3059
+ 175
3060
+ 200
3061
+ 1.0
3062
+ 0.8
3063
+ 0.6
3064
+ 0.4
3065
+ 0.2
3066
+ 0.0
3067
+ 0
3068
+ 25
3069
+ 50
3070
+ 75
3071
+ 100
3072
+ 125
3073
+ 150
3074
+ 175
3075
+ 200
3076
+ n1.0 -
3077
+ μo = 3.400
3078
+ 0.8
3079
+ 0.6
3080
+ 0.4
3081
+ 0.2
3082
+ 0.0
3083
+ 25
3084
+ 50
3085
+ 75
3086
+ 100
3087
+ 125
3088
+ 150
3089
+ 175
3090
+ 200
3091
+ 1.0
3092
+ 0.8
3093
+ 0.6
3094
+ 0.4
3095
+ 0.2
3096
+ 0.0
3097
+ 0
3098
+ 25
3099
+ 50
3100
+ 75
3101
+ 100
3102
+ 125
3103
+ 150
3104
+ 175
3105
+ 200
3106
+ n1.0
3107
+ μo = 3.485
3108
+ 0.8
3109
+ 0.6
3110
+ 0.4
3111
+ 0.2
3112
+ 0.0
3113
+ 0
3114
+ 25
3115
+ 50
3116
+ 75
3117
+ 100
3118
+ 125
3119
+ 150
3120
+ 175
3121
+ 200
3122
+ 1.0
3123
+ 0.8
3124
+ 0.6
3125
+ 0.4
3126
+ 0.2
3127
+ 0.0
3128
+ 0
3129
+ 25
3130
+ 50
3131
+ 75
3132
+ 100
3133
+ 125
3134
+ 150
3135
+ 175
3136
+ 200
3137
+ n1.0
3138
+ μo = 3.540
3139
+ 0.8
3140
+ 0.6
3141
+ 0.4
3142
+ 0.2
3143
+ 0.0
3144
+ 0
3145
+ 25
3146
+ 50
3147
+ 75
3148
+ 100
3149
+ 125
3150
+ 150
3151
+ 175
3152
+ 200
3153
+ 1.0
3154
+ 0.8
3155
+ 0.6
3156
+ 0.4
3157
+ 0.2
3158
+ 0.0
3159
+ 0
3160
+ 25
3161
+ 50
3162
+ 75
3163
+ 100
3164
+ 125
3165
+ 150
3166
+ 175
3167
+ 200
3168
+ n1.0
3169
+ μo = 3.700
3170
+ 0.8
3171
+ 0.6
3172
+ 0.4
3173
+ 0.2
3174
+ 0.0
3175
+ 0
3176
+ 25
3177
+ 50
3178
+ 75
3179
+ 100
3180
+ 125
3181
+ 150
3182
+ 175
3183
+ 200
3184
+ 1.0
3185
+ 0.8
3186
+ 0.6
3187
+ 0.4
3188
+ 0.2
3189
+ 0.0
3190
+ 25
3191
+ 50
3192
+ 75
3193
+ 100
3194
+ 125
3195
+ 150
3196
+ 175
3197
+ 200
3198
+ nFigure 19: Analysis on eigenvalues for the case of Vorticella Strange.
3199
+ Legends have the same meaning
3200
+ described in Figure 4.
3201
+ .
3202
+ Figure 20: Absolute values of eigenvalues vs. growth rate at fixed points for Vorticella Strange. Impor-
3203
+ tant coordinates include: Upper middle panel (3.025, 1.935). Upper-right corner panel (2.299, 0.491), and
3204
+ (3.035, 1.000). Lower-left corner panel (2.069, 0.000), and (2.370, 0.490).
3205
+ 30
3206
+
3207
+ 48.5
3208
+ 0.04
3209
+ 0.04
3210
+ 48.4
3211
+ 0.02
3212
+ Im(wi)
3213
+ 0.02
3214
+ Im(wo)
3215
+ 0.00 -
3216
+ 0.00 +
3217
+ 0.02
3218
+ 0.02
3219
+ 48.2
3220
+ 0.04
3221
+ 0.04
3222
+ 2.02
3223
+ 2.03
3224
+ 2.04
3225
+ 2.05
3226
+ 2.06
3227
+ 2.07
3228
+ -48.50-48.45-48.40-48.35-48.30-48.2548.20-48.15
3229
+ 2.02
3230
+ 2.03
3231
+ 2.04
3232
+ 2.05
3233
+ 2.06
3234
+ 2.07
3235
+ 3
3236
+ 0.04
3237
+ 0.04
3238
+ 0.02
3239
+ 0.02
3240
+ 2
3241
+ Im(wo)
3242
+ Im(wi)
3243
+ ml
3244
+ 00°0
3245
+ +00'0
3246
+ 0.02
3247
+ 0.02
3248
+ 0.04
3249
+ 0.04
3250
+ 0+
3251
+ 2.0
3252
+ 1.5
3253
+ 1.0
3254
+ 0.5
3255
+ 0.0
3256
+ 0.5
3257
+ 1.0
3258
+ 0.0
3259
+ 0.5
3260
+ 1.0
3261
+ 1.5
3262
+ 2.0
3263
+ 2.5
3264
+ 0.000.250.50°0.75
3265
+ 1.00
3266
+ 1.25
3267
+ 1.501.75
3268
+ 1.25
3269
+ 0.00
3270
+ 1.50
3271
+ 1.00
3272
+ 0.25
3273
+ Im(wi)
3274
+ 0.50
3275
+ 1.25
3276
+ 0.50
3277
+ 0.75
3278
+ 0.25
3279
+ 1.00
3280
+ 0.75
3281
+ 0.00
3282
+ 1.25
3283
+ 0.50-
3284
+ 0.6
3285
+ 0.4
3286
+ 0.2
3287
+ 0.0
3288
+ 0.2
3289
+ 0.4
3290
+ 0.6
3291
+ 0.8
3292
+ 1.0
3293
+ 1.2
3294
+ 1.4
3295
+ 1.6
3296
+ 0.0
3297
+ 0.2
3298
+ 0.4
3299
+ 0.6
3300
+ 0.8
3301
+ 1.0
3302
+ 1.2
3303
+ 1.4
3304
+ Re(wo)
3305
+ Re(wi)
3306
+ [wol
3307
+ μo
3308
+ Type
3309
+ source
3310
+ non-hyperbolic
3311
+ saddle
3312
+ sink48.50
3313
+ 1.6
3314
+ 48.45
3315
+ 2.5
3316
+ 1.4
3317
+ 48.40
3318
+ 2.0
3319
+ 48.35
3320
+ 1.2
3321
+ 1.5
3322
+ 1.0
3323
+ 48.25
3324
+ 1.0
3325
+ 0.8
3326
+ 48.20
3327
+ 0.5
3328
+ 0.6
3329
+ 48.15
3330
+ 0.0
3331
+ 1.0
3332
+ 1.5
3333
+ 2.0
3334
+ 2.5
3335
+ 3.0
3336
+ 3.5
3337
+ 4.0
3338
+ 1.0
3339
+ 1.5
3340
+ 2.0
3341
+ 2.5
3342
+ 3.0
3343
+ 3.5
3344
+ 4.0
3345
+ 1.0
3346
+ 1.5
3347
+ 2.0
3348
+ 2.5
3349
+ 3.0
3350
+ 3.5
3351
+ 4.0
3352
+ 2.07
3353
+ 1.4
3354
+ 1.75
3355
+ 1.2
3356
+ 2.06
3357
+ 1.50
3358
+ 1.0
3359
+ 1.25 手
3360
+ 2.05
3361
+ 0.8
3362
+ [wol
3363
+ 1.00
3364
+ 2.04
3365
+ 0.6
3366
+ 0.75
3367
+ 0.50
3368
+ 0.4
3369
+ 2.03
3370
+ 0.25 手
3371
+ 0.2
3372
+ 2.02
3373
+ 0.00
3374
+ 0.0
3375
+ 1.0
3376
+ 1.5
3377
+ 2.0
3378
+ 2.5
3379
+ 3.0
3380
+ 3.5
3381
+ 4.0
3382
+ 1.0
3383
+ 1.5
3384
+ 2.0
3385
+ 2.5
3386
+ 3.0
3387
+ 3.5
3388
+ 4.0
3389
+ 1.0
3390
+ 1.5
3391
+ 2.0
3392
+ 2.5
3393
+ 3.0
3394
+ 3.5
3395
+ 4.0
3396
+ μo. Column for Ei
3397
+ μo. Column for E2
3398
+ μo. Column for E3(a)
3399
+ (b)
3400
+ (c)
3401
+ Figure 21:
3402
+ Analysis on phase
3403
+ portrait and phase space dia-
3404
+ gram about Vorticella Strange.
3405
+ (21a)Phase
3406
+ portrait
3407
+ shows
3408
+ Neimark-Sacker bifurcation es-
3409
+ tablished at (0.341, 0.377) with
3410
+ µ0 ≈ 3.025. See also caption in
3411
+ Figure 11.
3412
+ 31
3413
+
3414
+ Type
3415
+ 1.0
3416
+ non-hyperbolic
3417
+ sink
3418
+ O
3419
+ saddle
3420
+ source
3421
+ 0.8 -
3422
+ 0.6
3423
+ y
3424
+ 0.4
3425
+ 0.2
3426
+ 0.0
3427
+ 0.0
3428
+ 0.2
3429
+ 0.4
3430
+ 0.6
3431
+ 0.8
3432
+ 1.0
3433
+ μo
3434
+ X0.6
3435
+ 0.4 -
3436
+ 0.2
3437
+ 0.0
3438
+ 0.2
3439
+ 0.4
3440
+ 0.6
3441
+ 0.8
3442
+ 0.0
3443
+ 0.2
3444
+ 0.4
3445
+ 0.6
3446
+ 0.8
3447
+ 1.0
3448
+ μo0.4
3449
+ 0.2
3450
+ 0.0 -
3451
+ 0.2
3452
+ 0.4 -
3453
+ 0.6
3454
+ 0.0
3455
+ 0.2
3456
+ 0.4
3457
+ 0.6
3458
+ 0.8
3459
+ 1.0
3460
+ μo
3461
+ yof the other. Therefore, it could be highly possible that, for example, the superconducting state, which refers
3462
+ to the zero resistance, may be achieved with chaos of some physical quantity that has relationship between
3463
+ resistance in the form of simultaneous difference equations.
3464
+ 5
3465
+ Acknowledgment
3466
+ We thank Pui Ching Middle School in Macau PRC for the kindness to support this research project.
3467
+ References
3468
+ [1]
3469
+ Peter Roopnarine, Ecology and the Tragedy of the Commons, Sustainability 2013, 5(2), 749-773.
3470
+ [2]
3471
+ Ankit Kumar et al., A Computer-Based Simulation Showing Balance of the Population of Predator and
3472
+ Prey and the Effects of Human Intervention, 2021 IOP Conf. Ser.: Mater. Sci. Eng. 1031 012049
3473
+ [3]
3474
+ Cheng Sok Kin et al., Predicting Earth’s Carrying Capacity of Human Population as the Predator
3475
+ and the Natural Resources as the Prey in the Modified Lotka-Volterra Equations with Time-dependent
3476
+ Parameters, arXiv:1904.05002v2 [q-bio.PE]. Retrieved via https://doi.org/10.48550/arXiv.1904.
3477
+ 05002
3478
+ [4]
3479
+ K.A. Hasan and M. F. Hama, ”Complex Dynamics Behaviors of a Discrete Prey-Predator Model with
3480
+ Beddington-DeAngelis Functional Response”, Int. J. Contemp. Math. Sciences, Vol. 7, 2012, no. 45, 2179
3481
+ - 2195.
3482
+ [5]
3483
+ A George Maria Selvam et al, ”Bifurcation and Chaos Control for Prey Predator Model with Step Size
3484
+ in Discrete Time”, 2020 J. Phys.: Conf. Ser. 1543 012010.
3485
+ [6]
3486
+ Boshan Chen and Jiejie Chen, ”Bifurcation and Chaotic behavior of a discrete singular biological eco-
3487
+ nomic system.” Applied Mathematics and Computation, 219(2012) 2371-2386.
3488
+ [7]
3489
+ Yong Li et al, ”Flip and Neimark-Sacker Bifurcations of a Discrete Time Predator-Prey Model”, IEEE
3490
+ Access, Vol. 7, pp 123430-123435, 2019.
3491
+ [8]
3492
+ C. Wang and X. Li, J. Math. Ann. Appl., 422(2015) 920-939.
3493
+ [9]
3494
+ X.L. Liu and D.M. Xiau, Complex dynamic behaviors of a discrete-time predator-prey system, Chaos
3495
+ Solitons Fract., 32(2007)80-94.
3496
+ [10] Z. Hu, Z. Teng, and L. Zhang, Stability and bifurcation analysis of a discrete predator-prey model with
3497
+ nonmonotonic functional response, Nonlinear Anal. Real World Appl. 12(4)(2011)2356-2377.
3498
+ [11] Massimo Cencini, Fabio Cecconi, and Angelo Vulpiani, Chaos: From Simple Models To Complex Systems
3499
+ (Advances in Statistical Mechanics), Wspc; Illustrated edition (September 1, 2009)
3500
+ [12] J A Vano, J C Wildenberg, M B Anderson, J K Noel and J C Sprott, Chaos in low-dimensional
3501
+ Lotka–Volterra models of competition, Nonlinearity 19 (2006) 2391–2404.
3502
+ [13] Rubin H. Landau, Manuel J. P´aez, and Cristian C. Bordeianu, Computational Physics, 2015 WI-
3503
+ LEY VCH, pp. 356-357.
3504
+ [14] C.M. Evans and G.L. Findley, ”A new transformation for the Lotka-Volterra problem”, Journal of
3505
+ Mathematical Chemistry 25 (1999) 105-110.
3506
+ [15] Dunbar, S. R. (1983). Traveling wave solutions of diffusive Lotka-Volterra equations. Journal of Mathe-
3507
+ matical Biology, 17(1), 11-32.
3508
+ [16] Das, S. and Gupta, P. K. (2011). A mathematical model on fractional Lotka–Volterra equations. Journal
3509
+ of Theoretical Biology, 277(1), 1-6.
3510
+ 32
3511
+
3512
+ [17] T. Bessoir and A. Wolf, Chaos Simulations, Physics Academic Software, North Carolina State University,
3513
+ Raleigh, NC 27695-8202, USA.
3514
+ [18] Pelinovsky, E., Kurkin, A., Kurkina, O., Kokoulina, M., and Epifanova, A. (2020). Logistic equation
3515
+ and COVID-19. Chaos, Solitons & Fractals, 140, 110241.
3516
+ [19] A. Mareno, L. Q. English, ”Flip and Neimark–Sacker Bifurcations in a Coupled Logistic Map System”,
3517
+ Discrete Dynamics in Nature and Society, vol. 2020, Article ID 4103606, 14 pages, 2020. https://doi.
3518
+ org/10.1155/2020/4103606
3519
+ [20] Bo Li, Qizhi He and Ruoyu Chen,”Neimark–Sacker bifurcation and the generate cases of Kopel oligopoly
3520
+ model with different adjustment speed”, Advances in Difference Equations (2020) 2020:72, https:
3521
+ //doi.org/10.1186/s13662-020-02545-9.
3522
+ [21] Zeraoulia Elhadj and J. C. Sprott, ”The effect of modulating a parameter in the logistic map”, Chaos
3523
+ 18, 023119 (2008).
3524
+ [22] Andrey L. Shilnikov and Nikolai F. Rulkov, Origin of Chaos in a Two-Dimensional Map Modeling
3525
+ Spiking-Bursting Neural Activity, International Journal of Bifurcation and Chaos, Vol. 13, No. 11(2003),
3526
+ 3325-3340.
3527
+ [23] Waqas Ishaque, Qamar Din, Muhammad Taj and Muhammad Asad Iqbal,”Bifurcation and chaos control
3528
+ in a discrete-time predator–prey model with nonlinear saturated incidence rate and parasite interaction”,
3529
+ Advances in Difference Equations (2019) 2019:28, https://doi.org/10.1186/s13662-019-1973-z
3530
+ [24] Asifa Tassaddiq, Muhammad Sajjad Shabbir, Qamar Din and Humera Naaz, ”Discretization, Bifurcation
3531
+ and Control for a Class of Predator–Prey Interactions”, Fractal Fract. 2022, 6(1), 31; https://doi.or
3532
+ g/10.3390/fractalfract6010031
3533
+ [25] Abd-Elalim Elsadany, H.A. EL-Metwally, E.M. Elabbasy, and H.N. Agiza, Chaos and bifurcation of a
3534
+ nonlinear discrete prey-predator system, Computational Ecology and Software, 2012, 2(3): 169-198.
3535
+ [26] Michael P. Hassell, Hugh N. Comins & Robert M. Mayt, ”Spatial structure and chaos in insect population
3536
+ dynamics”, Nature volume 353, pages 255–258 (1991)
3537
+ [27] A. A. Berryman and J.A. Millstein, ”Are Ecological Systems Chaotic-And If Not, Why Not?”, Trends
3538
+ Ecol Evol. 1989 Jan;4(1):26-8. doi: 10.1016/0169-5347(89)90014-1.
3539
+ [28] M. T. Rosenstein, J. J. Collins, and C. J. De Luca, “A practical method for calculating largest Lyapunov
3540
+ exponents from small data sets,” Physica D: Nonlinear Phenomena, vol. 65, pp. 117–134, 1993.
3541
+ [29] J. P. Eckmann, S. O. Kamphorst, D. Ruelle, and S. Ciliberto, “Liapunov exponents from time series,”
3542
+ Physical Review A, vol. 34, no. 6, pp. 4971–4979, 1986.
3543
+ [30] A.J. Lotka, ”Contribution to the Theory of Periodic Reaction”, J. Phys, Chem. 14(3), 271–274, 1910.
3544
+ [31] V. Volterra, ”Variazioni e fluttuazioni del numero d’individui in specie animali conviventi”. Mem. Acad.
3545
+ Lincei Roma. 2: 31–113, 1926.
3546
+ [32] Lotka-Volterra Equation Wikipedia, https://en.wikipedia.org/wiki/Lotka%E2%80%93Volterra e
3547
+ quations
3548
+ [33] Immanuel M. Bonze, Lotka-Volterra Equation and Replicator Dynamics: A Two-Dimensional Classifi-
3549
+ cation, Biol. Cybern 48, 201-221, 1983. Eq 4 in our work has the same form as Eq 2 in this reference.
3550
+ [34] Steve H. Strogatz, Nonlinear Dynamics and Chaos, p.156, Addison Wesley, 2nd Ed.
3551
+ [35] Alan Wolf, Jack B. Swift, Harry L. Swinney and John A. Vastano, Determining Lyapunov Exponents
3552
+ from a Time Series, Physica 16D, 285-317, 1985.
3553
+ [36] Lorenzo Escot and Julio E. Sandubete Galan, ”A brief methodological note on chaos theory and its
3554
+ recent applications based on new computer resources”, Revista: ENERGEIA (ISSN: 1666-5732) Vol.
3555
+ VII, N´um. 1, 2020, pp 53-64.
3556
+ 33
3557
+
3558
+ [37] Sch¨olzel, Christopher. (2019, June 16). Nonlinear measures for dynamical systems (Version 0.5.2). Zen-
3559
+ odo. http://doi.org/10.5281/zenodo.3814723
3560
+ [38] Codes and animations may be retrieved via https://github.com/weishanlee/LotkaVolterraChaos
3561
+ [39] Stephen T. Thornton and Jerry B. Marrion, Classical Dynamics of Particles and Systems, 5th Ed., CH4,
3562
+ ISBN-10:0534408966
3563
+ [40] IGI Global https://www.igi-global.com/dictionary/flip-bifurcation/11262
3564
+ [41] Herbert Goldstein, Charles Poole, John Safko, Classical Mechanics, 3rd Ed, CH11, ISBN-10:0321188977.
3565
+ [42] J. Hale, and H Ko¸cak, Dynamics and Bifurcations. CH 11, Vol. 3, Berlin: Springer-Verlag (1991).
3566
+ ISBN-13: 9783540971412.
3567
+ 34
3568
+
XNFJT4oBgHgl3EQf5S05/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ZNFPT4oBgHgl3EQfuTUu/content/tmp_files/2301.13155v1.pdf.txt ADDED
@@ -0,0 +1,1417 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Published as a conference paper at ICLR 2023
2
+ ADVANCING RADIOGRAPH REPRESENTATION LEARN-
3
+ ING WITH MASKED RECORD MODELING
4
+ Hong-Yu Zhou1,2∗
5
+ Chenyu Lian1∗
6
+ Liansheng Wang1
7
+ Yizhou Yu2
8
+ 1School of Informatics, Xiamen University
9
+ 2Department of Computer Science, The University of Hong Kong
10
+ whuzhouhongyu@gmail.com, dopaminel@foxmail.com,
11
+ lswang@xmu.edu.cn, yizhouy@acm.org
12
+ ABSTRACT
13
+ Modern studies in radiograph representation learning (R2L) rely on either self-
14
+ supervision to encode invariant semantics or associated radiology reports to in-
15
+ corporate medical expertise, while the complementarity between them is barely
16
+ noticed. To explore this, we formulate the self- and report-completion as two com-
17
+ plementary objectives and present a unified framework based on masked record
18
+ modeling (MRM). In practice, MRM reconstructs masked image patches and
19
+ masked report tokens following a multi-task scheme to learn knowledge-enhanced
20
+ semantic representations. With MRM pre-training, we obtain pre-trained mod-
21
+ els that can be well transferred to various radiography tasks. Specifically, we
22
+ find that MRM offers superior performance in label-efficient fine-tuning. For in-
23
+ stance, MRM achieves 88.5% mean AUC on CheXpert using 1% labeled data,
24
+ outperforming previous R2L methods with 100% labels. On NIH ChestX-ray,
25
+ MRM outperforms the best performing counterpart by about 3% under small la-
26
+ beling ratios. Besides, MRM surpasses self- and report-supervised pre-training in
27
+ identifying the pneumonia type and the pneumothorax area, sometimes by large
28
+ margins. Code and models are available at https://github.com/RL4M/
29
+ MRM-pytorch.
30
+ 1
31
+ INTRODUCTION
32
+ Findings:
33
+ [MASK] cardiac, mediastinal and
34
+ hilar [MASK] are normal.
35
+ [MASK] [MASK] [MASK] normal.
36
+ lungs are [MASK] .
37
+
38
+
39
+ Inputs
40
+ Report
41
+ Radiograph
42
+ Paired
43
+ Representations
44
+ Findings:
45
+ the cardiac, mediastinal and
46
+ hilar contours are normal.
47
+ pulmonary vasculature is normal.
48
+ lungs are clear .
49
+ Outputs
50
+ Figure 1: Illustration.
51
+ MRM learns trans-
52
+ ferable radiograph representations via recon-
53
+ structing masked records, i.e., masked radio-
54
+ graph patches and masked reports tokens.
55
+ Radiograph representation learning (R2L) has been
56
+ among the core problems of medical image analysis.
57
+ Previously, downstream radiograph analysis tasks
58
+ counts on pre-trained models on ImageNet (Deng
59
+ et al., 2009) or large X-ray datasets (Wang et al.,
60
+ 2017; Irvin et al., 2019; Johnson et al., 2019; Bus-
61
+ tos et al., 2020) to alleviate the shortage of expert
62
+ labeling. The emergence of self-supervised repre-
63
+ sentation learning (Doersch et al., 2015; Agrawal
64
+ et al., 2015; Wang & Gupta, 2015) provides a choice
65
+ to conduct pre-training with negligible human inter-
66
+ vention by exploiting self-supervision. However, the
67
+ self-supervised paradigm ignores the introduction of
68
+ medical expertise (e.g., anatomy), reducing its trans-
69
+ ferability to downstream tasks with limited label in-
70
+ formation.
71
+ On the other hand, free-text radiology reports written
72
+ by experienced radiologists often contain rich do-
73
+ main knowledge. To leverage this, researchers developed automated rule-based labelers (Wang
74
+ et al., 2017; Irvin et al., 2019) to extract structured labels from unstructured texts. Nevertheless,
75
+ ∗Work done while visiting Xiamen University. First two authors contributed equally.
76
+ 1
77
+ arXiv:2301.13155v1 [cs.CV] 30 Jan 2023
78
+
79
+ Published as a conference paper at ICLR 2023
80
+ these labelers have several practical limitations. First, some procedures of the label extraction work-
81
+ flow, such as rulemaking and natural language processing, still require the intensive involvement of
82
+ experts and engineers. Besides, the developed labelers can hardly adapt to new scenarios due to the
83
+ fixed rules and lexicons.
84
+ Against this background, report-supervised R2L was proposed (Zhang et al., 2020) to acquire super-
85
+ vision from radiology reports. In practice, this paradigm leverages words and sentences in free-text
86
+ reports as supervision to guide deep neural networks to learn radiograph representations, outper-
87
+ forming the archetypical label- and self-supervised pre-training by observable margins in various
88
+ downstream tasks (Zhang et al., 2020; Zhou et al., 2022). The report-supervised R2L highlights
89
+ the importance of the incorporation of domain knowledge. This differs from the self-supervised
90
+ paradigm, which focuses on learning invariant semantic representations. Nonetheless, current stud-
91
+ ies view the self- and report-supervised R2L as separate, discrete choices, preventing their combina-
92
+ tions.
93
+ Driven by this analysis, we present a unified framework based on masked record modeling (MRM),
94
+ where the self- and report-completion tasks are modeled as two complementary objectives. Specif-
95
+ ically, masked image reconstruction integrates semantics into pre-trained models, while masked
96
+ report restoration facilitates the incorporation of medical expertise.
97
+ As a result, MRM learns
98
+ knowledge-enhanced semantic representations that generalize well. In practice, MRM masks ran-
99
+ dom patches and tokens from the input radiograph and associated radiology report with high mask-
100
+ ing ratios. Following a multi-task scheme, MRM asks the radiography pre-trained model to learn
101
+ visual representations that can not only reconstruct the missing patches but also restore the missing
102
+ tokens from the non-masked token embeddings along with mask tokens.
103
+ With MRM pre-training, we can train radiography models on MIMIC-CXR (Johnson et al., 2019)
104
+ with improved generalization performance. With a pre-trained ViT-B/16 model, we achieve 88.5%
105
+ mean AUC when fine-tuned on CheXpert (Irvin et al., 2019) with only 1% labels. This outperforms
106
+ all previous counterparts with 100% labeled data. On NIH ChestX-ray (Wang & Gupta, 2015),
107
+ MRM surpasses the report-supervised paradigm by about 3% when the labeling ratios1 are 1% and
108
+ 10%. On pneumonia identification tasks, MRM outperforms self- and report-supervised baselines,
109
+ sometimes by substantial margins. These observations help verify the effectiveness of MRM in
110
+ learning more transferable radiograph representations.
111
+ 2
112
+ RELATED WORK
113
+ 2.1
114
+ REPORT-SUPERVISED RADIOGRAPH REPRESENTATION LEARNING
115
+ Recently, report-supervised learning (Zhang et al., 2020; Liao et al., 2021; Huang et al., 2021; Zhou
116
+ et al., 2022; Boecking et al., 2022) emerges as a new R2L paradigm that automatically acquires
117
+ supervision from free-text radiology reports. Zhang et al. (2020) proposed ConVIRT to contrast the
118
+ radiograph features with latent embeddings of sentences in radiology reports. Liao et al. (2021) and
119
+ Huang et al. (2021) explored the alignment between local patches and words in the report. Zhou et al.
120
+ (2022) presented a Transformer-based R2L framework that conducts autoregressive report modeling
121
+ and study-report matching. Report-supervised R2L takes the advantage of label-supervised learning,
122
+ which is the incorporation of domain knowledge. Compared to the self-supervised paradigm, report-
123
+ supervised R2L lays no emphasis on learning semantically invariant representations. To address
124
+ the discrepancy between them, we formalize self- and report-completion as two complementary
125
+ objectives, based on which we propose to encode both semantics and medical expertise into latent
126
+ representations following a multi-task scheme.
127
+ 2.2
128
+ VISUAL REPRESENTATION LEARNING VIA IMAGE-LANGUAGE PRE-TRAINING
129
+ Learning visual representations from image-language pairs has achieved tremendous success in nat-
130
+ ural image tasks (Sariyildiz et al., 2020; Desai & Johnson, 2021; Radford et al., 2021; Mu et al.,
131
+ 2021; Li et al., 2021; Geng et al., 2022; Wang et al., 2022; Chen et al., 2022; Singh et al., 2022; Yu
132
+ et al., 2022; Dou et al., 2022; Arici et al., 2021; Kwon et al., 2022). Similar to ConVIRT (Zhang
133
+ 1The labeling ratio X% means that X% of the training set from a fully annotated downstream dataset are
134
+ used for supervised fine-tuning.
135
+ 2
136
+
137
+ Published as a conference paper at ICLR 2023
138
+ Tokenizer
139
+ …… There is no focal
140
+ consolidation, effusion,
141
+ or pneumothorax. …….
142
+ No free air below the
143
+ right hemidiaphragm is
144
+ seen. ……
145
+ Masked language modeling (MLM) loss
146
+ GAP
147
+ Duplication
148
+ Low-resolution input
149
+ …… There [MASK] no
150
+ [MASK] consolidation,
151
+ [MASK] , or [MASK]. …….
152
+ No [MASK] air [MASK]
153
+ the [MASK] [MASK] is
154
+ seen. ……
155
+ …… There is no focal
156
+ consolidation, effusion,
157
+ or pneumothorax. …….
158
+ No free air below the
159
+ right hemidiaphragm is
160
+ seen. ……
161
+ Paired
162
+ Rand. mask
163
+ (ratio = 50%)
164
+ Rand. mask
165
+ (ratio = 75%)
166
+ Image
167
+ encoder
168
+ +
169
+ Report
170
+ decoder
171
+ Image
172
+ decoder
173
+ Sub-sampling
174
+ Masked image modeling (MIM) loss
175
+ High-resolution output
176
+
177
+
178
+ Non-masked report token embed.
179
+ Non-masked image patch embed.
180
+ Non-masked hybrid token embed.
181
+ Mask token embed.
182
+ Input report
183
+ Masked report generation
184
+ Hybrid representations
185
+ Masked report restoration
186
+ Input radiograph
187
+ Masked LR image generation
188
+ Radiograph representations
189
+ Masked HR image restoration
190
+ Figure 2: OVERVIEW. During the pre-training stage, MRM requires the image encoder to provide
191
+ radiograph representations to simultaneously support the restoration of masked radiograph patches
192
+ and masked associated radiology report tokens. The masked language and image modeling losses
193
+ are only calculated on image and report tokens highlighted in pink . Embed., LR, and HR stand
194
+ for embeddings, low-resolution, and high-resolution, respectively.
195
+ et al., 2020), image-language contrast has been widely adopted to conduct pre-training (Radford
196
+ et al., 2021; Mu et al., 2021; Li et al., 2021; Yu et al., 2022; Dou et al., 2022; Gao et al., 2022).
197
+ Nowadays, efforts have been made to train a unified encoder for vision and language data (Geng
198
+ et al., 2022; Wang et al., 2022; Chen et al., 2022; Geng et al., 2022). Akin to our approach, SLIP (Mu
199
+ et al., 2021) combines SimCLR (Chen et al., 2020) and CLIP (Radford et al., 2021) to train a vi-
200
+ sion encoder using image-language pairs. However, SLIP only slightly outperforms SimCLR in
201
+ fine-tuning, while requiring large batch sizes and tens of millions of image-language pairs for pre-
202
+ training. In contrast, our MRM surpasses various self-supervised methodologies by large margins
203
+ and can be pre-trained using only hundreds of thousands of radiograph-report pairs, enabling effec-
204
+ tive medical visual representation learning with limited annotations and computing resources.
205
+ 3
206
+ MASKED RECORD MODELING
207
+ We propose MRM (i.e., Masked Record Modeling) to learn radiograph representations using record-
208
+ level supervision. As the name implies, MRM acquires supervision signals from both radiographs
209
+ and associated radiology reports. The motivation behind is to learn knowledge-enhanced semantic
210
+ latent representations by reconstructing masked radiograph patches and masked radiology report
211
+ tokens in medical records.
212
+ Fig. 2 presents an overview of MRM. We first apply random masking to each low-resolution radio-
213
+ graph and its associated radiology report (with different high masking ratios). Then, we forward
214
+ the obtained non-masked image patches to the image encoder to acquire non-masked image patch
215
+ embeddings. These embeddings serve two purposes: (i) assist non-masked report tokens to restore
216
+ the masked report tokens; (ii) restore the high-resolution masked radiograph patches. To achieve
217
+ the first goal, we add the globally averaged radiograph representation to each non-masked report
218
+ token embedding and pass the resulting hybrid representations to the report decoder for masked re-
219
+ port restoration. As for the second purpose, we conduct a novel patch restoration task to explicitly
220
+ encode more local details into radiograph representations by reconstructing high-resolution patches
221
+ from low-resolution inputs.
222
+ 3.1
223
+ REPORT COMPREHENSION
224
+ Masked report generation. In our scenario, each radiology report is associated with a radiograph.
225
+ To convert the free-text report into tokens, we use WordPiece (Wu et al., 2016) as the default to-
226
+ kenizer, whose vocabulary has approximately 30k tokens. After tokenization, we randomly mask
227
+ 3
228
+
229
+ 2CPublished as a conference paper at ICLR 2023
230
+ a number of report tokens with [MASK]. Compared to BERT (Devlin et al., 2018) that randomly
231
+ masks 15% tokens, we use a 50% probability of masking each token in the report. The insight
232
+ behind the use of a higher masking ratio is that we want the model to lean more upon the image
233
+ embeddings to finish the report-completion task.
234
+ Hybrid representations for storing multi-modal information. We then transform non-masked
235
+ report tokens into token embeddings using a simple lookup table2, which stores randomly initialized
236
+ embeddings of a fixed dictionary and size. In practice, we retrieve embeddings using indices. Then,
237
+ the global embedding of the associated radiograph is added to each non-masked token embedding.
238
+ The resulting non-masked hybrid embeddings are supposed to include the multi-modal information
239
+ from the radiograph and associated radiology report, which ought to be helpful for restoring the
240
+ masked tokens.
241
+ Masked report restoration. To reconstruct the masked tokens, we forward latent embeddings of
242
+ both hybrid tokens and mask tokens to the report decoder (a light-weight transformer model), where
243
+ fixed (i.e., unlearnable) positional embeddings are added to encode the position information. We
244
+ train the report decoder using the masked language modeling objective.
245
+ 3.2
246
+ RADIOGRAPH UNDERSTANDING
247
+ Masked image generation with low resolution. We propose to learn radiograph representations
248
+ by reconstructing high-resolution radiograph patches from low-resolution inputs. The motivation
249
+ behind is to encode more local information into latent embeddings via super-resolution imaging.
250
+ As shown in Fig. 2, we sub-sample each high-resolution radiograph by a factor of two to generate
251
+ a low-resolution input. Following He et al. (2022), we split low-resolution radiograph into non-
252
+ overlapping image patches, where 75% patches are randomly masked.
253
+ Radiograph representations. We add fixed unlearnable positional embeddings to linearly trans-
254
+ formed non-masked image patches.
255
+ Next, we forward the resulting patch embeddings to the
256
+ transformer-based image encoder, which produces non-masked image patch embeddings. Then, the
257
+ global average pooling (GAP) is applied to all non-masked embeddings, whereby a global feature
258
+ is obtained. Here, we hypothesize that the image-level information brought by the global feature
259
+ is helpful to the restoration of masked report tokens. Based on this hypothesis, we duplicate and
260
+ add the global feature to each non-masked report token embedding, producing the hybrid token
261
+ embeddings that encode the multi-modal information.
262
+ Masked image restoration with high resolution. Non-masked image and mask token represen-
263
+ tations with added positional embeddings are passed to the image decoder for the restoration of
264
+ masked radiograph patches. Specifically, the image decoder is required to restore a high-resolution
265
+ (2× the input resolution) patch from each input token via a shared fully-connected (FC) layer (across
266
+ all tokens). In practice, the proposed restoration procedure explicitly requires the learned image rep-
267
+ resentations to include more local details that often matter a lot in medical diagnosis.
268
+ 3.3
269
+ MULTI-TASK MODELING
270
+ Suppose each input radiograph consists of two set IM and IN . The masked set IM={x1, . . . , xh}
271
+ (ground truths) contains h high-resolution image patches that serve as reconstruction targets. The
272
+ non-masked set IN ={s1, . . . , sk} comprises k low-resolution patches that are treated as model in-
273
+ puts. Likewise, we denote the associated radiology report using the masked set RM={u1, . . . , up}
274
+ (ground truths) and the non-masked set RN ={v1, . . . , vq} (inputs). Here, x, s, u, and v stand for
275
+ the masked image patch, non-masked image patch, masked report token, and non-masked report
276
+ token, respectively. For model parameters, we use ΘE, ΘD, and ΘR to denote the parameters of the
277
+ image encoder, image decoder, and report decoder, respectively.
278
+ For the restoration of masked report tokens, we forward hybrid representations to the report decoder
279
+ and minimize the negative log-likelihood function. During the training stage, the objective function
280
+ 2https://pytorch.org/docs/stable/generated/torch.nn.Embedding.html.
281
+ 4
282
+
283
+ Published as a conference paper at ICLR 2023
284
+ LR (i.e., the MLM loss in Fig. 2) of the above optimization procedure can be summarized as follows:
285
+ LR(RM, RN , IN ) = −
286
+ p
287
+
288
+ i=1
289
+ log P (ui | v1:q, s1:k; ΘE, ΘR) ,
290
+ (1)
291
+ where P stands for the conditional probability. We ignore the mask tokens for simplicity.
292
+ Similarly, we can formalize the objective function of the high-resolution masked radiograph restora-
293
+ tion (cf. the MIM loss in Fig. 2) as follows:
294
+ LI(IM, IN ) = MSE (fΘD(fΘE(s1:k)), x1:h) .
295
+ (2)
296
+ In practice, we adopt the mean squared error (MSE) to measure the differences between the predicted
297
+ and ground-truth image patches with high resolution, where all pixel values are normalized to [0, 1].
298
+ The total multi-task training objective function (to be minimized) of the multi-modal restoration is
299
+ as follows:
300
+ L(RM, RN , IM, IN ) = LR(RM, RN , IN ) + λLI(IM, IN )
301
+ (3)
302
+ where λ is a hyper-parameter that controls the relative impacts of two objective functions. After
303
+ pre-training, we can transfer the weight parameters of the image encoder (i.e., ΘE) to various down-
304
+ stream tasks for fine-tuning.
305
+ 4
306
+ EXPERIMENTS
307
+ In this section, we mainly compare MRM against report- and self-supervised R2L methodologies on
308
+ 5 well-established public datasets. Average results are reported over three training runs.
309
+ 4.1
310
+ MIMIC-CXR FOR PRE-TRAINING
311
+ We conduct pre-training on MIMIC-CXR (Johnson et al., 2019), one of the largest X-ray datasets,
312
+ that contains more than 370,000 radiograph images from over 220,000 patient studies. Each radio-
313
+ graph is paired with one associated radiology report.
314
+ 4.2
315
+ DATASETS FOR FINE-TUNING
316
+ We validate the transferability of learned radiograph representations on X-ray based classification
317
+ and segmentation tasks via end-to-end fine-tuning. Specifically, we evaluate the pre-trained model
318
+ on 4 X-ray datasets in the classification tasks, which are NIH ChestX-ray (Wang et al., 2017),
319
+ CheXpert (Irvin et al., 2019), RSNA Pneumonia (Shih et al., 2019), and COVID-19 Image Data
320
+ Collection (Cohen et al., 2020). For the segmentation task, we fine-tune the pre-trained model on
321
+ SIIM-ACR Pneumothorax Segmentation.3
322
+ CheXpert introduces a multi-label classification problem on chest X-rays. We follow the official
323
+ guideline (Irvin et al., 2019) and report the model performance on 5 selected pathologies, i.e., at-
324
+ electasis, cardiomegaly, consolidation, edema, and pleural effusion. Considering the official test
325
+ set of CheXpert is not available to the public, we follow ConVIRT (Zhang et al., 2020) to regard
326
+ the official validation set as the test set. Meanwhile, we randomly sample 5,000 images from the
327
+ official training set to build the validation set. The training/validation/test split each constitutes
328
+ 218,414/5,000/234 images of the whole dataset.
329
+ RSNA Pneumonia defines a binary classification problem, where each chest radiograph is cat-
330
+ egorized as either pneumonia or normal.
331
+ We adopt the official data split, where the train-
332
+ ing/validation/test set comprises 25,184/1,500/3,000 images, respectively.
333
+ NIH ChestX-ray consists of about 112,120 frontal-view chest radiograph images, where a multi-
334
+ label classification problem on 14 chest pathologies is introduced. The training/validation/test split
335
+ each constitutes 70%/10%/20% of the whole dataset.
336
+ COVID-19 Image Data Collection is a relatively small dataset, which involves 900 chest radio-
337
+ graphs. We follow Zhou et al. (2022) to conduct fine-tuning on this small-scale dataset to investigate
338
+ 3https://www.kaggle.com/c/siim-acr-pneumothorax-segmentation.
339
+ 5
340
+
341
+ Published as a conference paper at ICLR 2023
342
+ Methods
343
+ Input
344
+ Size
345
+ Pre-train.
346
+ Data
347
+ CheXpert
348
+ RSNA Pneumonia
349
+ SIIM
350
+ 1%
351
+ 10%
352
+ 100%
353
+ 1%
354
+ 10%
355
+ 100%
356
+ 10%
357
+ 100%
358
+ Our MRM
359
+ 224
360
+ MI-CXR
361
+ 88.5± 0.7
362
+ 88.5± 0.6
363
+ 88.7± 0.3
364
+ 91.3± 0.6
365
+ 92.7± 0.4
366
+ 93.3± 0.4
367
+ 73.2± 0.5
368
+ 91.4± 0.3
369
+ CNN-based
370
+ ConVIRT
371
+ 224
372
+ CheXpert
373
+ 85.9
374
+ 86.8
375
+ 87.3
376
+ 77.4
377
+ 80.1
378
+ 81.3
379
+ 43.2
380
+ 59.9
381
+ GLoRIA
382
+ 224
383
+ CheXpert
384
+ 86.6
385
+ 87.8
386
+ 88.1
387
+ 86.1
388
+ 88.0
389
+ 88.6
390
+ 46.9
391
+ 63.4
392
+ ConVIRT
393
+ 224
394
+ MI-CXR
395
+ 87.0
396
+ 88.1
397
+ 88.1
398
+ 88.8
399
+ 91.5
400
+ 92.7
401
+ -
402
+ -
403
+ MedKLIP†
404
+ 224
405
+ MI-CXR
406
+ -
407
+ -
408
+ -
409
+ 87.3
410
+ 88.0
411
+ 89.3
412
+ 72.1
413
+ 79.4
414
+ BioViL
415
+ 480
416
+ PubMed +
417
+ MI-III/CXR
418
+ -
419
+ -
420
+ -
421
+ 88.1
422
+ 88.4
423
+ 89.1
424
+ -
425
+ -
426
+ Transformer-based
427
+ GLoRIA∗
428
+ 224
429
+ MI-CXR
430
+ 86.5± 0.8
431
+ 87.5± 0.6
432
+ 87.8± 0.5
433
+ 89.7± 0.8
434
+ 91.2± 0.5
435
+ 92.1± 0.3
436
+ 71.8± 0.7
437
+ 90.9± 0.4
438
+ REFERS
439
+ 224
440
+ MI-CXR
441
+ 87.2± 0.8
442
+ 88.1± 0.5
443
+ 88.2± 0.3
444
+ 89.4± 0.7
445
+ 91.6± 0.7
446
+ 92.7± 0.4
447
+ 72.1± 0.5
448
+ 89.7± 0.2
449
+ M3AE
450
+ 224
451
+ MI-CXR
452
+ 86.2± 0.6
453
+ 87.3± 0.6
454
+ 87.9± 0.4
455
+ 89.0± 0.5
456
+ 90.8± 0.6
457
+ 92.3± 0.3
458
+ 72.0± 0.7
459
+ 90.4± 0.3
460
+ MGCA†
461
+ 224
462
+ MI-CXR
463
+ 88.8
464
+ 89.1
465
+ 89.7
466
+ 89.1
467
+ 89.9
468
+ 90.8
469
+ 59.3
470
+ 64.2
471
+ Table 1: COMPARISONS ON CHEXPERT, RSNA PNEUMONIA, AND SIIM. We report AUC scores
472
+ of different labeling ratios when fine-tuning on CheXpert and RSNA Pneumonia. In compari-
473
+ son, dice scores are presented on SIIM. The best results are bolded. MI- stands for the MIMIC
474
+ dataset series. Note that ResNet-50 and ViT-B/16 are treated as the default backbones for CNN-
475
+ and Transformer-based methods, respectively. * denotes our implementation of GLoRIA using ViT-
476
+ B/16. Approaches with † leverage disease-level annotations for pre-training. Specifically, numbers
477
+ of MGCA on CheXpert and RSNA Pneumonia are linear classification results.
478
+ Labeling Ratios
479
+ Methods
480
+ Average
481
+ Atelectasis
482
+ Cardiomegaly
483
+ Consolidation
484
+ Edema
485
+ Effusion
486
+ Emphysema
487
+ Fibrosis
488
+ Hernia
489
+ Infiltration
490
+ Mass
491
+ Nodule
492
+ Pleural Thickening
493
+ Pneumonia
494
+ Pneumothorax
495
+ 1%
496
+ Our MRM
497
+ 79.4± 0.8
498
+ 78.8
499
+ 90.3
500
+ 80.0
501
+ 86.5
502
+ 86.9
503
+ 82.0
504
+ 71.9
505
+ 90.0
506
+ 67.2
507
+ 82.3
508
+ 69.6
509
+ 72.3
510
+ 69.6
511
+ 84.0
512
+ MedKLIP
513
+ 77.2
514
+ -
515
+ -
516
+ -
517
+ -
518
+ -
519
+ -
520
+ -
521
+ -
522
+ -
523
+ -
524
+ -
525
+ -
526
+ -
527
+ -
528
+ REFERS
529
+ 76.7
530
+ 77.5
531
+ 85.6
532
+ 78.6
533
+ 84.9
534
+ 85.4
535
+ 79.5
536
+ 72.3
537
+ 77.1
538
+ 67.5
539
+ 76.2
540
+ 66.5
541
+ 71.6
542
+ 69.3
543
+ 81.7
544
+ Model Genesis
545
+ 70.3
546
+ 72.1
547
+ 67.1
548
+ 75.8
549
+ 76.1
550
+ 80.6
551
+ 72.6
552
+ 64.8
553
+ 73.5
554
+ 65.7
555
+ 65.2
556
+ 62.2
557
+ 67.6
558
+ 64.8
559
+ 76.2
560
+ C2L
561
+ 71.1
562
+ 75.1
563
+ 67.1
564
+ 77.6
565
+ 75.1
566
+ 83.4
567
+ 71.5
568
+ 66.8
569
+ 70.0
570
+ 63.8
571
+ 70.1
572
+ 66.2
573
+ 68.1
574
+ 65.7
575
+ 74.4
576
+ Context Restoration
577
+ 67.8
578
+ 69.1
579
+ 64.4
580
+ 73.2
581
+ 73.8
582
+ 78.1
583
+ 70.0
584
+ 62.1
585
+ 70.2
586
+ 65.2
587
+ 62.4
588
+ 59.1
589
+ 65.0
590
+ 62.2
591
+ 73.8
592
+ TransVW
593
+ 71.3
594
+ 74.5
595
+ 68.9
596
+ 76.7
597
+ 79.8
598
+ 81.1
599
+ 67.9
600
+ 68.7
601
+ 68.2
602
+ 66.8
603
+ 66.5
604
+ 66.2
605
+ 68.5
606
+ 68.8
607
+ 75.0
608
+ ImageNet Pre-training
609
+ 69.8
610
+ 73.3
611
+ 69.6
612
+ 76.0
613
+ 81.7
614
+ 80.5
615
+ 67.1
616
+ 64.9
617
+ 64.8
618
+ 65.8
619
+ 67.0
620
+ 62.3
621
+ 65.7
622
+ 65.0
623
+ 74.0
624
+ 10%
625
+ Our MRM
626
+ 84.0± 0.5
627
+ 82.3
628
+ 90.9
629
+ 81.1
630
+ 89.0
631
+ 88.8
632
+ 92.2
633
+ 84.8
634
+ 94.0
635
+ 70.1
636
+ 86.6
637
+ 75.1
638
+ 78.6
639
+ 74.3
640
+ 88.4
641
+ MedKLIP
642
+ 78.9
643
+ -
644
+ -
645
+ -
646
+ -
647
+ -
648
+ -
649
+ -
650
+ -
651
+ -
652
+ -
653
+ -
654
+ -
655
+ -
656
+ -
657
+ REFERS
658
+ 80.9
659
+ 80.1
660
+ 89.8
661
+ 79.5
662
+ 87.8
663
+ 87.5
664
+ 88.2
665
+ 77.2
666
+ 86.1
667
+ 69.6
668
+ 82.0
669
+ 72.8
670
+ 74.2
671
+ 72.2
672
+ 85.6
673
+ Model Genesis
674
+ 76.0
675
+ 77.2
676
+ 72.8
677
+ 77.5
678
+ 85.7
679
+ 85.2
680
+ 81.0
681
+ 75.3
682
+ 78.0
683
+ 68.4
684
+ 73.1
685
+ 69.5
686
+ 72.2
687
+ 67.7
688
+ 80.4
689
+ C2L
690
+ 76.6
691
+ 78.0
692
+ 75.5
693
+ 77.5
694
+ 84.1
695
+ 85.7
696
+ 81.2
697
+ 73.7
698
+ 79.5
699
+ 67.4
700
+ 77.5
701
+ 71.7
702
+ 72.0
703
+ 67.3
704
+ 81.9
705
+ Context Restoration
706
+ 73.8
707
+ 75.5
708
+ 70.6
709
+ 77.1
710
+ 84.5
711
+ 84.2
712
+ 79.4
713
+ 73.1
714
+ 67.5
715
+ 68.1
716
+ 70.9
717
+ 66.9
718
+ 71.7
719
+ 65.2
720
+ 79.1
721
+ TransVW
722
+ 74.4
723
+ 76.5
724
+ 70.8
725
+ 77.6
726
+ 83.0
727
+ 84.8
728
+ 79.7
729
+ 69.9
730
+ 74.7
731
+ 68.5
732
+ 72.1
733
+ 68.3
734
+ 72.4
735
+ 63.2
736
+ 79.6
737
+ ImageNet Pre-training
738
+ 74.4
739
+ 74.2
740
+ 79.8
741
+ 75.9
742
+ 85.7
743
+ 83.2
744
+ 80.4
745
+ 72.1
746
+ 74.0
747
+ 64.1
748
+ 71.7
749
+ 65.6
750
+ 69.6
751
+ 66.2
752
+ 79.7
753
+ 100%
754
+ Our MRM
755
+ 85.9± 0.3
756
+ 84.2
757
+ 93.0
758
+ 82.2
759
+ 91.0
760
+ 89.6
761
+ 94.3
762
+ 86.7
763
+ 94.4
764
+ 71.8
765
+ 88.2
766
+ 78.5
767
+ 81.4
768
+ 77.3
769
+ 90.2
770
+ MedKLIP
771
+ 83.2
772
+ -
773
+ -
774
+ -
775
+ -
776
+ -
777
+ -
778
+ -
779
+ -
780
+ -
781
+ -
782
+ -
783
+ -
784
+ -
785
+ -
786
+ REFERS
787
+ 84.7
788
+ 83.0
789
+ 92.3
790
+ 82.1
791
+ 90.2
792
+ 88.7
793
+ 91.4
794
+ 83.9
795
+ 93.3
796
+ 74.1
797
+ 85.5
798
+ 76.7
799
+ 78.5
800
+ 77.0
801
+ 89.1
802
+ Model Genesis
803
+ 81.0
804
+ 78.8
805
+ 84.5
806
+ 79.2
807
+ 87.8
808
+ 86.6
809
+ 89.7
810
+ 81.0
811
+ 85.2
812
+ 71.1
813
+ 81.9
814
+ 73.2
815
+ 75.8
816
+ 73.0
817
+ 85.6
818
+ C2L
819
+ 82.2
820
+ 81.1
821
+ 90.2
822
+ 81.0
823
+ 88.1
824
+ 88.0
825
+ 88.3
826
+ 80.8
827
+ 86.8
828
+ 72.0
829
+ 82.7
830
+ 74.1
831
+ 76.2
832
+ 75.3
833
+ 85.9
834
+ Context Restoration
835
+ 78.7
836
+ 75.8
837
+ 82.9
838
+ 76.4
839
+ 86.6
840
+ 84.8
841
+ 88.2
842
+ 78.6
843
+ 83.0
844
+ 70.0
845
+ 79.6
846
+ 69.5
847
+ 73.2
848
+ 69.4
849
+ 84.0
850
+ TransVW
851
+ 81.7
852
+ 79.8
853
+ 85.0
854
+ 80.0
855
+ 88.2
856
+ 87.1
857
+ 90.1
858
+ 81.8
859
+ 85.9
860
+ 72.3
861
+ 82.6
862
+ 74.4
863
+ 76.6
864
+ 74.0
865
+ 86.1
866
+ ImageNet Pre-training
867
+ 80.0
868
+ 78.3
869
+ 89.3
870
+ 77.6
871
+ 87.9
872
+ 85.9
873
+ 87.4
874
+ 78.5
875
+ 88.8
876
+ 65.9
877
+ 79.9
878
+ 70.7
879
+ 74.5
880
+ 71.0
881
+ 84.7
882
+ Table 2: COMPARISONS ON NIH CHESTX-RAY. Besides self-supervised and transfer learning
883
+ baselines, we also present the performance of REFERS and MedKLIP (with competitive perfor-
884
+ mance on CheXpert, RSNA Pneumonia, and SIIM) as references. AUC scores are displayed. The
885
+ highest AUC scores in each labeling ratio are bolded.
886
+ the effectiveness of various pre-training methodologies when the amount of annotations is limited.
887
+ There are two tasks included. The first task requires the model to distinguish COVID-19 cases
888
+ from non-COVID-19 pneumonia cases, where the training/validation/test set comprises 356/54/99
889
+ radiographs, respectively. The second task is to distinguish viral pneumonia cases from bacterial
890
+ pneumonia ones, where the training/validation/test set contains 297/43/86 cases, respectively.
891
+ SIIM-ACR Pneumothorax Segmentation (SIIM) aims to facilitate the development of segmen-
892
+ tation models to identify pneumothorax disease in chest radiographs. SIIM contains over 120,000
893
+ frontal-view chest X-rays with precise manual segmentation of pneumothorax. We follow Huang
894
+ et al. (2021) to construct the training/validation/test split, where each constitutes 70%/15%/15% of
895
+ the whole dataset.
896
+ 6
897
+
898
+ Published as a conference paper at ICLR 2023
899
+ 4.3
900
+ BASELINES
901
+ 4.3.1
902
+ REPORT-SUPERVISED METHODOLOGIES
903
+ We first compare MRM against a range of pre-training approaches, which use radiology reports
904
+ as supervision to learn radiograph representations. There are 4 report-supervised approaches in-
905
+ volved in the baseline comparisons, which are ConVIRT (Zhang et al., 2020), GLoRIA (Huang
906
+ et al., 2021), BioViL (Boecking et al., 2022), and REFERS (Zhou et al., 2022). Specifically, Con-
907
+ VIRT (Zhang et al., 2020) proposed to learn medical visual representations by contrasting paired
908
+ radiographs and sentences from radiology reports. GLoRIA (Huang et al., 2021) improved ConVIRT
909
+ by contrasting radiograph sub-regions and words in the reports. BioViL (Boecking et al., 2022) and
910
+ REFERS (Zhou et al., 2022) incorporated masked language modeling loss into contrastive learn-
911
+ ing. Moreover, REFERS introduced a multi-view fusion attention to better align the representations
912
+ of each radiograph and its associated report. In addition, MGCA (Wang et al., 2023) and Med-
913
+ KLIP (Wu et al., 2023) were included as two recent baselines4. Apart from above baselines, we also
914
+ include M3AE (Geng et al., 2022), a recent masked multi-modal pre-training method aside from the
915
+ application to medical data, for comparison.
916
+ In experiments, we fine-tune pre-trained models of MRM and other report-supervised methods on
917
+ CheXpert (classification), RSNA Pneumonia (classification), and SIIM (segmentation).
918
+ 4.3.2
919
+ SELF-SUPERVISED AND TRANSFER LEARNING METHODS
920
+ Besides report-supervised approaches, we also include self-supervised and transfer learning ap-
921
+ proaches in our comparisons. Specifically, Context Restoration (Chen et al., 2019), Model Gen-
922
+ esis (Zhou et al., 2021), and TransVW (Haghighi et al., 2021) are based on predictive SSL, while
923
+ C2L (Zhou et al., 2020) was developed on top of contrastive learning. In addition, MRM is also
924
+ compared to ImageNet pre-training (Wang et al., 2017). In practice, we conduct the comparisons
925
+ with self-supervised and transfer learning approaches on NIH ChestX-ray and COVID-19 Image
926
+ Data Collection.
927
+ Methods
928
+ COVID-19 vs. Others
929
+ Viral vs. Bacterial
930
+ Our MRM
931
+ 85.8± 0.4
932
+ 91.5± 0.3
933
+ REFERS
934
+ 82.1
935
+ 80.4
936
+ Model Genesis
937
+ 76.0
938
+ 71.8
939
+ C2L
940
+ 77.8
941
+ 73.0
942
+ Context Restoration
943
+ 74.6
944
+ 69.8
945
+ TransVW
946
+ 76.1
947
+ 71.5
948
+ ImageNet Pre-training
949
+ 74.1
950
+ 70.3
951
+ Table 3: COMPARISONS ON COVID-
952
+ 19 IMAGE DATA COLLECTION.
953
+ The
954
+ best results are bolded.
955
+ Methods
956
+ 1%
957
+ 10%
958
+ 100%
959
+ Our MRM
960
+ 79.4
961
+ 84.0
962
+ 85.9
963
+ - Masked modeling & Super-resolution restoration
964
+ 69.9
965
+ 75.2
966
+ 80.3
967
+ - Masked report modeling (LR)
968
+ 74.7
969
+ 81.3
970
+ 85.1
971
+ - Masked radiograph modeling (LI)
972
+ 76.7
973
+ 82.2
974
+ 84.7
975
+ - Super-resolution restoration
976
+ 78.8
977
+ 83.7
978
+ 85.7
979
+ + Hybrid features for image restoration
980
+ 78.9
981
+ 83.6
982
+ 85.7
983
+ Table 4: ABLATIONS ON NIH CHESTX-RAY.
984
+ AUC scores of three different labeling ratios are
985
+ reported. The best results are bolded.
986
+ 4.4
987
+ RESULTS
988
+ 4.4.1
989
+ COMPARISONS WITH REPORT-SUPERVISED BASELINES
990
+ In Table 1, we present the comparative results with report-supervised methodologies on CheXpert,
991
+ RSNA Pneumonia, and SIIM (segmentation). Specifically, we investigate the performance when
992
+ fine-tuning with limited and full supervision. We provide reconstruction examples and segmentation
993
+ results in the appendix.
994
+ From Table 1, we observe no obvious performance gap between CNN- and Transformer-based
995
+ report-supervised pre-training methods. For instance, after implementing GLoRIA on MIMIC-CXR
996
+ with ViT-B/16, we observe performance drops and improvements on CheXpert and RSNA Pneumo-
997
+ nia, respectively. This contrast demonstrates that replacing CNN with Transformer may not bring
998
+ performance gains to report-supervised pre-training. Among all baselines, REFERS is the best per-
999
+ forming approach.
1000
+ Nonetheless, MRM consistently outperforms various baselines on all three datasets under different
1001
+ labeling ratios. Specifically, MRM maintains more advantages over previous pre-training method-
1002
+ 4MGCA (Wang et al., 2023) and MedKLIP (Wu et al., 2023) were released after the submission deadline of
1003
+ ICLR 2023. We added results in the camera ready for better comparisons.
1004
+ 7
1005
+
1006
+ Published as a conference paper at ICLR 2023
1007
+ Fusion
1008
+ 1%
1009
+ 10%
1010
+ 100%
1011
+ GAP
1012
+ 79.4
1013
+ 84.0
1014
+ 85.9
1015
+ GMP
1016
+ 77.2
1017
+ 83.8
1018
+ 86.0
1019
+ (a) Multi-modal fusion strategies
1020
+ PI
1021
+ 1%
1022
+ 10%
1023
+ 100%
1024
+ 75%
1025
+ 79.4
1026
+ 84.0
1027
+ 85.9
1028
+ 50%
1029
+ 78.8
1030
+ 84.4
1031
+ 86.1
1032
+ 0%
1033
+ 75.4
1034
+ 82.0
1035
+ 84.4
1036
+ (b) Masking ratios for radiographs
1037
+ λ
1038
+ 1%
1039
+ 10%
1040
+ 100%
1041
+ 1
1042
+ 79.4
1043
+ 84.0
1044
+ 85.9
1045
+ 2
1046
+ 78.6
1047
+ 83.5
1048
+ 85.4
1049
+ 0.5
1050
+ 79.0
1051
+ 83.7
1052
+ 85.9
1053
+ (c) Loss controlling factor λ
1054
+ Table 5: Ablation studies on choices of multi-modal fusion and hyper-parameters. GAP and GMP
1055
+ stand for global average and maximum pooling, respectively. Experiments are performed on NIH
1056
+ ChestX-ray under various labeling ratios. The best results are bolded.
1057
+ ologies when fine-tuning with limited annotations, which is quite meaningful for medical image
1058
+ analysis as large amounts of specialist annotations (from radiologists or clinicians) are usually hard
1059
+ to access. It is worth noting that MRM achieves 88.5% when using only 1% labeled data on CheX-
1060
+ pert, better than previous counterparts with 100% annotations.
1061
+ We see that M3AE generally performs worse than our MRM in all labeling ratios, especially under
1062
+ extremely limited data. The underperformance of M3AE may be attributed to the fact that it requires
1063
+ a large amount of multi-modal data to learn transferable joint representations for images and texts.
1064
+ 4.4.2
1065
+ COMPARISONS WITH SELF-SUPERVISED AND TRANSFER LEARNING BASELINES
1066
+ Table 2 presents the average and per-class classification results on NIH ChestX-ray. Compared to
1067
+ self-supervised learning baselines, MRM achieves large improvements in almost every chest pathol-
1068
+ ogy. On average, MRM outperforms C2L (Zhou et al., 2020) and TransVW (Haghighi et al., 2021),
1069
+ the best two self-supervised pre-training methodologies, by about 8% when the amount of available
1070
+ labeled data is extremely limited (i.e., the labeling ratio is 1%). Similarly, we also observe remark-
1071
+ able improvements when comparing MRM to ImageNet Pre-training (Wang et al., 2017). These
1072
+ phenomena demonstrate that the radiograph representations learned by MRM are more transferable
1073
+ than those from previous self-supervised and transfer learning methods.
1074
+ Compared to REFERS (i.e., the best performing report-supervised baseline in Table 1), MRM still
1075
+ provides notable improvements in most chest pathologies. Specifically, MRM is more advantageous
1076
+ when the amount of labeled data is limited. For instance, MRM surpasses REFERS by 2.7% and
1077
+ 3.1% on average when the labeling ratios are 1% and 10%, respectively. These comparisons again
1078
+ verify the effectiveness of MRM over previous report-supervised pre-training counterparts.
1079
+ We also investigate the impacts of pre-training on the real-world scenario with extremely limited
1080
+ specialist supervision. In Table 3, we compare the performance of a range of pre-training method-
1081
+ ologies on two binary classification tasks, which are distinguishing COVID-19 from non-COVID-19
1082
+ pneumonia, and differentiating between viral pneumonia and bacterial pneumonia. Again, MRM
1083
+ outperforms self-supervised, transfer learning, and report-supervised pre-training methodologies by
1084
+ substantial margins. Compared to REFERS, MRM brings nearly 4% and 11% improvements to
1085
+ two tasks, respectively, further enhancing the practicability of the diagnosis system trained with
1086
+ extremely limited supervision.
1087
+ 4.5
1088
+ ABLATION ANALYSIS
1089
+ Advantages over single-task pre-training paradigm. First of all, we remove the two masked mod-
1090
+ eling objectives and super-resolution restoration task, resulting in substantial performance drops.
1091
+ These results verify the necessity of using masked modeling and super-resolution restoration in
1092
+ MRM. After removing the masked report modeling objective, MRM only acquires supervision
1093
+ signals from self-supervision. Thus, the whole framework degenerates into a self-supervised pre-
1094
+ training methodology. From Table 4, we observe that removing LR leads to dramatic performance
1095
+ degradation in different labeling ratios. Moreover, we find that introducing the masked report mod-
1096
+ eling is greatly helpful to the fine-tuning performance with limited labeling resources (1% and
1097
+ 10%). For instance, adding LR brings about 5-percent improvements to MRM. Similarly, remov-
1098
+ ing the masked radiograph modeling also leads to notable performance drops in all labeling ratios.
1099
+ These results demonstrate the necessity of introducing multi-task objectives in masked modeling
1100
+ pre-training.
1101
+ 8
1102
+
1103
+ Published as a conference paper at ICLR 2023
1104
+ Is super-resolution restoration helpful? As Table 4 shows, the proposed super-resolution restora-
1105
+ tion provides consistent performance gains in different labeling ratios. The underlying reason may
1106
+ be that the low to high resolution restoration process helps preserve more local information into
1107
+ latent representations, which enhances the transferable ability to downstream tasks.
1108
+ Would it be beneficial to introduce multi-modal information to image restoration? We investi-
1109
+ gate this question by adding non-masked report token embeddings to image patch embeddings and
1110
+ passing the resulting hybrid features to the image decoder. As Table 4 shows, introducing multi-
1111
+ modal information to masked image restoration does not improve the fine-tuning performance. We
1112
+ leave the exploration of the reason behind to future work.
1113
+ Ablations on multi-modal fusion and hyper-parameters. In Table 5a, we present the experimental
1114
+ results of using different strategies for radiograph-report fusion. We find that global average pooling
1115
+ (GAP) outperforms global maximum pooling (GMP) by 2.2% when access to labeled data is quite
1116
+ limited while achieving comparable results as the labeling ratio increases. We also investigate the
1117
+ impact of applying different masking ratios to input radiographs (cf. Table 5b). Specifically, we find
1118
+ that a ratio of 75% performs the best on the extremely small labeling ratio (i.e., 1%), while a ratio
1119
+ of 50% achieves slightly better results when the labeling ratio becomes larger. In MRM, we set the
1120
+ default masking ratio for radiographs to 75% because this operation leads to fewer input patches,
1121
+ accelerating the pre-training process and reducing the memory cost. The insight behind applying a
1122
+ high masking ratio (i.e., 75%) is that it addresses the heavy spatial redundancy of radiographs. By
1123
+ applying a high masking ratio, we reduce the redundancy and create a surrogate task, requiring the
1124
+ model to understand the high-level semantics holistically. We also perform ablative experiments to
1125
+ investigate the influence of λ in Eq. 3, whose results are displayed in Table 5c. We see that λ = 1
1126
+ is an optimal choice, while a smaller λ value (i.e, 0.5) performs better than a larger value (i.e., 2.0),
1127
+ indicating that the MLM objective may play a more important role than the MIM objective during
1128
+ the pre-training stage.
1129
+ 4.6
1130
+ IMPLEMENTATION DETAILS.
1131
+ Our code is implemented using PyTorch 1.8.2 (Paszke et al., 2019).
1132
+ The pre-training experi-
1133
+ ments were conducted on 4 GeForce RTX 3080Ti GPUs, and the training time is about 2 days
1134
+ for 200 epochs, requiring 12GB memory from each GPU. The training batch size is 256. We use
1135
+ AdamW (Loshchilov & Hutter, 2017) as the default optimizer, where the initial learning rate is
1136
+ 1.5e−4, weight decay is 0.05, β1 is 0.9, and β2 is 0.95. The MSE and cross-entropy losses are used
1137
+ for masked image and language modeling, respectively. In practice, we set λ in Eq. 3 to 1.
1138
+ For fine-tuning on SIIM, we train the segmentation network on 4 GeForce RTX 3080Ti GPUs.
1139
+ AdamW is the default optimizer, where the initial learning rate is 2e−5, weight decay is 0.05, β1 is
1140
+ 0.9, and β2 is 0.999. For fine-tuning on other datasets, we train the classification network on a single
1141
+ GeForce RTX 3080Ti GPU, where the default optimizer is SGD with momentum 0.9. The training
1142
+ cost is a mix of focal and dice losses.
1143
+ For fine-tuning on CheXpert, RSNA Pneumonia, NIH ChestX-ray, and COVID-19 Image Data Col-
1144
+ lection, we adopt the cross-entropy loss. We search the best initial learning rate from 3e-2, 3e-3, and
1145
+ 5e-4 to get the best performance on validation set.
1146
+ For both the pre-training and the fine-tuning of image classification task, the network is ”warmed
1147
+ up” by increasing the learning rate linearly to the set value, and then learning rate is decreased using
1148
+ the cosine decay schedule.
1149
+ 5
1150
+ CONCLUSION
1151
+ We present masked record modeling (MRM) for radiograph representation learning. MRM for-
1152
+ malizes the radiograph understanding and radiology report comprehension as two complementary
1153
+ masked modeling objectives. With MRM pre-training, we achieve better results on well-established
1154
+ datasets. Specifically, MRM outperforms previous self- and report-supervised counterparts by large
1155
+ margins when the labeled data is extremely limited. These observations verify the effectiveness
1156
+ of MRM, and we hope they will enable our field to explore the use of multi-task supervision for
1157
+ learning more transferable visual representations.
1158
+ 9
1159
+
1160
+ Published as a conference paper at ICLR 2023
1161
+ REFERENCES
1162
+ Pulkit Agrawal, Joao Carreira, and Jitendra Malik. Learning to see by moving. In Proceedings of
1163
+ the IEEE International Conference on Computer Vision, pp. 37–45, 2015.
1164
+ Tarik Arici, Mehmet Saygin Seyfioglu, Tal Neiman, Yi Xu, Son Train, Trishul Chilimbi, Belinda
1165
+ Zeng, and Ismail Tutar. Mlim: Vision-and-language model pre-training with masked language
1166
+ and image modeling. arXiv preprint arXiv:2109.12178, 2021.
1167
+ Benedikt Boecking, Naoto Usuyama, Shruthi Bannur, Daniel C Castro, Anton Schwaighofer,
1168
+ Stephanie Hyland, Maria Wetscherek, Tristan Naumann, Aditya Nori, Javier Alvarez-Valle, et al.
1169
+ Making the most of text semantics to improve biomedical vision–language processing. arXiv
1170
+ preprint arXiv:2204.09817, 2022.
1171
+ Aurelia Bustos, Antonio Pertusa, Jose-Maria Salinas, and Maria de la Iglesia-Vay´a. Padchest: A
1172
+ large chest x-ray image dataset with multi-label annotated reports. Medical Image Analysis, 66:
1173
+ 101797, 2020.
1174
+ Liang Chen, Paul Bentley, Kensaku Mori, Kazunari Misawa, Michitaka Fujiwara, and Daniel Rueck-
1175
+ ert. Self-supervised learning for medical image analysis using image context restoration. Medical
1176
+ Image Analysis, 58:101539, 2019.
1177
+ Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. A simple framework for
1178
+ contrastive learning of visual representations. In International Conference on Machine Learning,
1179
+ pp. 1597–1607. PMLR, 2020.
1180
+ Xi Chen, Xiao Wang, Soravit Changpinyo, AJ Piergiovanni, Piotr Padlewski, Daniel Salz, Sebastian
1181
+ Goodman, Adam Grycner, Basil Mustafa, Lucas Beyer, et al. Pali: A jointly-scaled multilingual
1182
+ language-image model. arXiv preprint arXiv:2209.06794, 2022.
1183
+ Joseph Paul Cohen, Paul Morrison, Lan Dao, Karsten Roth, Tim Q Duong, and Marzyeh Ghas-
1184
+ semi. Covid-19 image data collection: Prospective predictions are the future. arXiv preprint
1185
+ arXiv:2006.11988, 2020.
1186
+ Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. ImageNet: A large-scale
1187
+ hierarchical image database. In Proceedings of the IEEE/CVF conference on Computer Vision
1188
+ and Pattern Recognition, pp. 248–255. Ieee, 2009.
1189
+ Karan Desai and Justin Johnson. Virtex: Learning visual representations from textual annotations.
1190
+ In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp.
1191
+ 11162–11173, 2021.
1192
+ Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pre-training of deep
1193
+ bidirectional transformers for language understanding. North American Chapter of the Associa-
1194
+ tion for Computational Linguistics, 2018.
1195
+ Carl Doersch, Abhinav Gupta, and Alexei A Efros. Unsupervised visual representation learning by
1196
+ context prediction. In Proceedings of the IEEE International Conference on Computer Vision, pp.
1197
+ 1422–1430, 2015.
1198
+ Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas
1199
+ Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, et al. An
1200
+ image is worth 16x16 words: Transformers for image recognition at scale.
1201
+ arXiv preprint
1202
+ arXiv:2010.11929, 2020.
1203
+ Zi-Yi Dou, Aishwarya Kamath, Zhe Gan, Pengchuan Zhang, Jianfeng Wang, Linjie Li, Zicheng Liu,
1204
+ Ce Liu, Yann LeCun, Nanyun Peng, et al. Coarse-to-fine vision-language pre-training with fusion
1205
+ in the backbone. arXiv preprint arXiv:2206.07643, 2022.
1206
+ Yuting Gao, Jinfeng Liu, Zihan Xu, Jun Zhang, Ke Li, and Chunhua Shen. Pyramidclip: Hierarchical
1207
+ feature alignment for vision-language model pretraining. arXiv preprint arXiv:2204.14095, 2022.
1208
+ Xinyang Geng, Hao Liu, Lisa Lee, Dale Schuurams, Sergey Levine, and Pieter Abbeel. Multimodal
1209
+ masked autoencoders learn transferable representations. arXiv preprint arXiv:2205.14204, 2022.
1210
+ 10
1211
+
1212
+ Published as a conference paper at ICLR 2023
1213
+ Fatemeh Haghighi, Mohammad Reza Hosseinzadeh Taher, Zongwei Zhou, Michael B Gotway, and
1214
+ Jianming Liang. Transferable visual words: Exploiting the semantics of anatomical patterns for
1215
+ self-supervised learning. IEEE Transactions on Medical Imaging, 40(10):2857–2868, 2021.
1216
+ Kaiming He, Xinlei Chen, Saining Xie, Yanghao Li, Piotr Doll´ar, and Ross Girshick. Masked au-
1217
+ toencoders are scalable vision learners. In Proceedings of the IEEE/CVF Conference on Computer
1218
+ Vision and Pattern Recognition, pp. 16000–16009, 2022.
1219
+ Shih-Cheng Huang, Liyue Shen, Matthew P Lungren, and Serena Yeung. Gloria: A multimodal
1220
+ global-local representation learning framework for label-efficient medical image recognition. In
1221
+ Proceedings of the IEEE International Conference on Computer Vision, pp. 3942–3951, 2021.
1222
+ Jeremy Irvin, Pranav Rajpurkar, Michael Ko, Yifan Yu, Silviana Ciurea-Ilcus, Chris Chute, Henrik
1223
+ Marklund, Behzad Haghgoo, Robyn Ball, Katie Shpanskaya, et al.
1224
+ Chexpert: A large chest
1225
+ radiograph dataset with uncertainty labels and expert comparison. In Proceedings of the AAAI
1226
+ Conference on Artificial Intelligence, volume 33, pp. 590–597, 2019.
1227
+ Alistair EW Johnson, Tom J Pollard, Nathaniel R Greenbaum, Matthew P Lungren, Chih-ying Deng,
1228
+ Yifan Peng, Zhiyong Lu, Roger G Mark, Seth J Berkowitz, and Steven Horng. Mimic-cxr-jpg, a
1229
+ large publicly available database of labeled chest radiographs. arXiv preprint arXiv:1901.07042,
1230
+ 2019.
1231
+ Gukyeong Kwon, Zhaowei Cai, Avinash Ravichandran, Erhan Bas, Rahul Bhotika, and Stefano
1232
+ Soatto. Masked vision and language modeling for multi-modal representation learning. arXiv
1233
+ preprint arXiv:2208.02131, 2022.
1234
+ Yangguang Li, Feng Liang, Lichen Zhao, Yufeng Cui, Wanli Ouyang, Jing Shao, Fengwei Yu,
1235
+ and Junjie Yan. Supervision exists everywhere: A data efficient contrastive language-image pre-
1236
+ training paradigm. In International Conference on Learning Representations, 2021.
1237
+ Ruizhi Liao, Daniel Moyer, Miriam Cha, Keegan Quigley, Seth Berkowitz, Steven Horng, Polina
1238
+ Golland, and William M Wells. Multimodal representation learning via maximization of local
1239
+ mutual information. In International Conference on Medical Image Computing and Computer-
1240
+ Assisted Intervention, pp. 273–283. Springer, 2021.
1241
+ Ilya Loshchilov and Frank Hutter.
1242
+ Decoupled weight decay regularization.
1243
+ arXiv preprint
1244
+ arXiv:1711.05101, 2017.
1245
+ Norman Mu, Alexander Kirillov, David Wagner, and Saining Xie. Slip: Self-supervision meets
1246
+ language-image pre-training. arXiv preprint arXiv:2112.12750, 2021.
1247
+ Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor
1248
+ Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al.
1249
+ Pytorch: An imperative style,
1250
+ high-performance deep learning library. Advances in Neural Information Processing Systems, 32:
1251
+ 8026–8037, 2019.
1252
+ Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal,
1253
+ Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al. Learning transferable visual
1254
+ models from natural language supervision. In International Conference on Machine Learning,
1255
+ pp. 8748–8763. PMLR, 2021.
1256
+ Mert Bulent Sariyildiz, Julien Perez, and Diane Larlus. Learning visual representations with caption
1257
+ annotations. In European Conference on Computer Vision, pp. 153–170. Springer, 2020.
1258
+ George Shih, Carol C Wu, Safwan S Halabi, Marc D Kohli, Luciano M Prevedello, Tessa S Cook,
1259
+ Arjun Sharma, Judith K Amorosa, Veronica Arteaga, Maya Galperin-Aizenberg, et al. Augment-
1260
+ ing the national institutes of health chest radiograph dataset with expert annotations of possible
1261
+ pneumonia. Radiology. Artificial intelligence, 1(1), 2019.
1262
+ Amanpreet Singh, Ronghang Hu, Vedanuj Goswami, Guillaume Couairon, Wojciech Galuba, Mar-
1263
+ cus Rohrbach, and Douwe Kiela. Flava: A foundational language and vision alignment model.
1264
+ In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp.
1265
+ 15638–15650, 2022.
1266
+ 11
1267
+
1268
+ Published as a conference paper at ICLR 2023
1269
+ Fuying Wang, Yuyin Zhou, Shujun Wang, Varut Vardhanabhuti, and Lequan Yu. Multi-granularity
1270
+ cross-modal alignment for generalized medical visual representation learning. In Advances in
1271
+ Neural Information Processing Systems, 2023.
1272
+ Wenhui Wang, Hangbo Bao, Li Dong, Johan Bjorck, Zhiliang Peng, Qiang Liu, Kriti Aggarwal,
1273
+ Owais Khan Mohammed, Saksham Singhal, Subhojit Som, et al. Image as a foreign language:
1274
+ Beit pretraining for all vision and vision-language tasks. arXiv preprint arXiv:2208.10442, 2022.
1275
+ Xiaolong Wang and Abhinav Gupta. Unsupervised learning of visual representations using videos.
1276
+ In Proceedings of the IEEE International Conference on Computer Vision, pp. 2794–2802, 2015.
1277
+ Xiaosong Wang, Yifan Peng, Le Lu, Zhiyong Lu, Mohammadhadi Bagheri, and Ronald M Sum-
1278
+ mers. Chestx-ray8: Hospital-scale chest x-ray database and benchmarks on weakly-supervised
1279
+ classification and localization of common thorax diseases. In Proceedings of the IEEE/CVF con-
1280
+ ference on Computer Vision and Pattern Recognition, pp. 2097–2106, 2017.
1281
+ Chaoyi Wu, Xiaoman Zhang, Ya Zhang, Yanfeng Wang, and Weidi Xie. Medklip: Medical knowl-
1282
+ edge enhanced language-image pre-training. medRxiv, pp. 2023–01, 2023.
1283
+ Yonghui Wu, Mike Schuster, Zhifeng Chen, Quoc V Le, Mohammad Norouzi, Wolfgang Macherey,
1284
+ Maxim Krikun, Yuan Cao, Qin Gao, Klaus Macherey, et al. Google’s neural machine trans-
1285
+ lation system: Bridging the gap between human and machine translation.
1286
+ arXiv preprint
1287
+ arXiv:1609.08144, 2016.
1288
+ Jiahui Yu, Zirui Wang, Vijay Vasudevan, Legg Yeung, Mojtaba Seyedhosseini, and Yonghui
1289
+ Wu.
1290
+ Coca:
1291
+ Contrastive captioners are image-text foundation models.
1292
+ arXiv preprint
1293
+ arXiv:2205.01917, 2022.
1294
+ Yuhao Zhang, Hang Jiang, Yasuhide Miura, Christopher D Manning, and Curtis P Langlotz. Con-
1295
+ trastive learning of medical visual representations from paired images and text. arXiv preprint
1296
+ arXiv:2010.00747, 2020.
1297
+ Hong-Yu Zhou, Shuang Yu, Cheng Bian, Yifan Hu, Kai Ma, and Yefeng Zheng. Comparing to
1298
+ learn: Surpassing imagenet pretraining on radiographs by comparing image representations. In
1299
+ International Conference on Medical Image Computing and Computer-Assisted Intervention, pp.
1300
+ 398–407. Springer, 2020.
1301
+ Hong-Yu Zhou, Xiaoyu Chen, Yinghao Zhang, Ruibang Luo, Liansheng Wang, and Yizhou Yu.
1302
+ Generalized radiograph representation learning via cross-supervision between images and free-
1303
+ text radiology reports. Nature Machine Intelligence, 4(1):32–40, 2022.
1304
+ Zongwei Zhou, Vatsal Sodha, Jiaxuan Pang, Michael B Gotway, and Jianming Liang.
1305
+ Models
1306
+ genesis. Medical Image Analysis, 67:101840, 2021.
1307
+ 12
1308
+
1309
+ Published as a conference paper at ICLR 2023
1310
+ A
1311
+ APPENDIX
1312
+ A.1
1313
+ DISCUSSION: DIFFERENCES FROM MASKED VISION-AND-LANGUAGE PRE-TRAINING
1314
+ BESIDES MEDICAL DATA
1315
+ To our knowledge, M3AE (Geng et al., 2022), MLIM (Arici et al., 2021), and MaskVLM (Kwon
1316
+ et al., 2022) are three recent efforts that are most closely related to ours, all of which use masked
1317
+ modeling for vision and language pre-training. In the following, we clarify the differences between
1318
+ our MRM and these approaches from two perspectives: motivation and implementation.
1319
+ Motivation. M3AE (Geng et al., 2022) and MLIM (Arici et al., 2021) aim to learn joint image-
1320
+ text representations. MaskVLM (Kwon et al., 2022) is developed for improving vision+language
1321
+ tasks, such as image-text retrieval, visual question answering, and natural language for visual rea-
1322
+ soning. These characteristics differ from our methodology, which aims to learn a representation for
1323
+ radiographs only for disease diagnosis even though both radiographs and reports are used during
1324
+ training.
1325
+ Implementation. As aforementioned, M3AE (Geng et al., 2022) and MLIM (Arici et al., 2021)
1326
+ implement unified multi-modal transformers that take imaging and textual as inputs. As a result,
1327
+ they require much more pre-training data, which is often an order of magnitude larger than ours.
1328
+ This is not practical and applicable in the medical field, where access to the data is quite limited.
1329
+ MaskVLM (Kwon et al., 2022) applies masked modeling and contrastive learning to image-text
1330
+ pairs, where a binary matching task is employed to tell whether an image and a text are aligned or
1331
+ not. Besides, MaskVLM builds cross-modality encoders to incorporate multi-modal information. In
1332
+ contrast, our MRM is much simpler. MRM uses masking modeling as the only training objective,
1333
+ and a simple GAP-addition workflow is proposed for fusing multi-modal information.
1334
+ A.2
1335
+ CONFIGURATIONS OF NETWORKS
1336
+ The image encoder a ViT-like encoder (Dosovitskiy et al., 2020) that includes a patch embedding
1337
+ layer followed by twelve transformer blocks. The architecture of the image decoder is very similar
1338
+ to that of the encoder. The decoder architecture consists of a decoder embedding layer, four trans-
1339
+ former blocks, and one fully-connected layer to predict masked patches. The numbers of attention
1340
+ heads in the image encoder and decoder are twelve and six, respectively. We add a 2D sin-cos posi-
1341
+ tional embedding to input patches. The report decoder is a light-weight transformer that includes an
1342
+ embedding layer and six transformer blocks, followed by a one-layer fully-connected predictor. The
1343
+ number of attention heads in the report decoder is six. We adopt a learnable positional embedding
1344
+ in the report decoder.
1345
+ A.3
1346
+ RECONSTRUCTION ANALYSIS
1347
+ Fig. 3 presents example results on MIMIC-CXR. We find that even with high masking ratios, MRM
1348
+ can still produce satisfactory reconstructions, though some details are missing. Specifically, the re-
1349
+ constructed reports are surprisingly close to the ground truths, which we attribute to the introduction
1350
+ of hybrid multi-modal representations. For instance, MRM can tell the position of rib fractures based
1351
+ on the radiograph input. Besides, we obtain some interesting mistakes. In the first example, MRM
1352
+ recognizes the clips over the left lung as calcifications (potentially in nipple shadow). This observa-
1353
+ tion again shows that the report reconstructions rely on the image input as the clips are masked in
1354
+ the input radiograph.
1355
+ A.4
1356
+ SEGMENTATION ANALYSIS
1357
+ In this section, we visualize the segmentation results of GLoRIA (Huang et al., 2021),
1358
+ REFERS (Zhou et al., 2022), and our MRM.
1359
+ 13
1360
+
1361
+ Published as a conference paper at ICLR 2023
1362
+ [CLS] final [MASK] [MASK] [MASK] chest [MASK] pa and [MASK] ) indication : ___f with [MASK] onset [MASK] // [MASK] for infection [MASK] : [MASK] [MASK] [MASK]
1363
+ [MASK] [MASK] [MASK] none . [MASK] : [MASK] is [MASK] focal [MASK] [MASK] pleural [MASK] or pneumothorax [MASK] [MASK] [MASK] [MASK] that [MASK] likely
1364
+ represent nipple shadows . [MASK] [MASK] silhouette [MASK] [MASK] . [MASK] [MASK] over the left [MASK] , potentially [MASK] [MASK] [MASK] . the [MASK] upper
1365
+ abdomen [MASK] [MASK] . [MASK] [MASK] of [MASK] [MASK] left sixth [MASK] seventh [MASK] are [MASK] [MASK] [MASK] : no acute cardiopulmonary process .
1366
+ [CLS] final report examination : chest ( pa and lat ) indication : ___f with new onset confusion // eval for infection technique : chest pa and lateral comparison :
1367
+ none . findings : there is no focal consolidation , pleural effusion or pneumothorax . bilateral nodular opacities that most likely represent nipple shadows . the
1368
+ cardiomediastinal silhouette is normal . calcifications project over the left lung , potentially a nipple shadow . the imaged upper abdomen is unremarkable . healed
1369
+ fractures of the posterior left sixth and seventh ribs are noted . impression : no acute cardiopulmonary process .
1370
+ [CLS] final report examination : chest ( pa and lat ) indication : ___f with new onset ascites // eval for infection technique : chest pa and lateral comparison :
1371
+ none . findings : there is no focal consolidation , pleural effusion or pneumothorax . bilateral nodular opacities that most likely represent nipple shadows . the
1372
+ cardiomediastinal silhouette is normal . clips project over the left lung , potentially within the breast . the imaged upper abdomen is unremarkable . chronic
1373
+ deformity of the posterior left sixth and seventh ribs are noted . impression : no acute cardiopulmonary process .
1374
+ [CLS] [MASK] report [MASK] [MASK] [MASK] ( [MASK] [MASK] lat ) [MASK] : [MASK] [MASK] [MASK] with shortness [MASK] [MASK] [MASK] : [MASK] [MASK] and [MASK]
1375
+ comparison : [MASK] findings : [MASK] cardiac , mediastinal and hilar [MASK] are normal . [MASK] [MASK] [MASK] normal. lungs are [MASK] . [MASK] pleural [MASK]
1376
+ [MASK] pneumothorax [MASK] [MASK] . multiple clips [MASK] again seen [MASK] [MASK] the left [MASK] . remote [MASK] - sided rib fractures are also re - [MASK] .
1377
+ impression : [MASK] [MASK] cardiopulmonary abnormality .
1378
+ [CLS] final report examination : chest ( pa and lat ) indication : history : ___f with shortness of breath technique : chest pa and lateral comparison : ___ findings :
1379
+ the cardiac , mediastinal and hilar contours are normal . pulmonary vasculature is normal . lungs are clear . no pleural effusion or pneumothorax is present .
1380
+ multiple clips are again seen projecting over the left axilla . remote left- sided rib fractures are also re - demonstrated . impression : no acute cardiopulmonary
1381
+ abnormality .
1382
+ [CLS] final report examination : chest ( pa and lat ) indication : history : ___f with shortness of breath technique : chest pa and lateral comparison : ___ findings :
1383
+ the cardiac , mediastinal and hilar contours are normal . pulmonary vasculature is normal . lungs are clear . no pleural effusion or pneumothorax is present .
1384
+ multiple clips are again seen projecting over the left breast . remote left - sided rib fractures are also re - demonstrated . impression : no acute cardiopulmonary
1385
+ abnormality .
1386
+ Inputs
1387
+ Recons.
1388
+ GT
1389
+ Inputs
1390
+ Recons.
1391
+ GT
1392
+ Figure 3: Example results on MIMIC-CXR. For each triplet, we show the masked radiograph and
1393
+ report (Inputs), our MRM reconstruction (Recons.), and the ground truth (GT). The masking ra-
1394
+ tios are 75% (radiograph) and 50% (report). Predicted and corresponding ground truth words are
1395
+ highlighted in pink and green , respectively.
1396
+ 14
1397
+
1398
+ OPublished as a conference paper at ICLR 2023
1399
+ Radiograph
1400
+ GLoRIA*
1401
+ REFERS
1402
+ Our MRM
1403
+ GT
1404
+ 15
1405
+
1406
+ ECGVPublished as a conference paper at ICLR 2023
1407
+ Radiograph
1408
+ GLoRIA*
1409
+ REFERS
1410
+ Our MRM
1411
+ GT
1412
+ Figure 4: Segmentation results of MRM, GLoRIA, and REFERS. GT stands for the ground truth
1413
+ masks. * means the GLoRIA implementation is based on ViT-B/16, the same backbone as used in
1414
+ REFERS and MRM.
1415
+ 16
1416
+
1417
+ LPORTABLE
ZNFPT4oBgHgl3EQfuTUu/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
dNE2T4oBgHgl3EQfGAZK/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cce2f09557831c7c7528f8851e454deb26cc55fe58246d25a8cfab55db3f21a3
3
+ size 122001
hNAzT4oBgHgl3EQfMvs5/content/tmp_files/2301.01136v1.pdf.txt ADDED
@@ -0,0 +1,2030 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Optimal control problem for Stokes system: Asymptotic
2
+ analysis via unfolding method in a perforated domain
3
+ Swati Garg and Bidhan Chandra Sardar∗
4
+ Department of Mathematics
5
+ Indian Institute of Technology Ropar
6
+ Rupnagar-140001, Punjab, India
7
+ swati.19maz0006@iitrpr.ac.in, swatigargmks@gmail.com
8
+ bcsardar@iitrpr.ac.in, bcsardar31@gmail.com
9
+ January 4, 2023
10
+ Abstract
11
+ This article’s subject matter is the study of the asymptotic analysis of the optimal
12
+ control problem (OCP) constrained by the stationary Stokes equations in a periodi-
13
+ cally perforated domain. We subject the interior region of it with distributive controls.
14
+ The Stokes operator considered involves the oscillating coefficients for the state equa-
15
+ tions. We characterize the optimal control and, upon employing the method of periodic
16
+ unfolding, establish the convergence of the solutions of the considered OCP to the solu-
17
+ tions of the limit OCP governed by stationary Stokes equations over a non-perforated
18
+ domain. The convergence of the cost functional is also established.
19
+ Keywords: Stokes equations, Homogenization, Optimal control, Perforated domain, Un-
20
+ folding operator
21
+ 1
22
+ Introduction
23
+ In this article, we consider the optimal control problem (OCP) governed by generalized
24
+ stationary Stokes equations in a periodically perforated domain O∗
25
+ ε (see Section 2, on the
26
+ domain description). The size of holes in the perforated domain is of the same order as
27
+ that of the period, and the holes are allowed to intersect the boundary of the domain. The
28
+ control is applied in the interior region of the domain, and we wish to study the asymptotic
29
+ AMS subject classifications: 35B27, 35B40, 35Q93, 49J20, 76D07
30
+ ∗Corresponding author
31
+ 1
32
+ arXiv:2301.01136v1 [math.OC] 3 Jan 2023
33
+
34
+ analysis (homogenization) of an interior OCP subject to the constrained stationary Stokes
35
+ equations with oscillating coefficients.
36
+ One can find several works in the literature regarding the homogenization of Stokes
37
+ equations over a perforated domain. Using the multiple-scale expansion method, the au-
38
+ thors in [16] studied the homogenization of Stokes equations in a porous medium with the
39
+ Dirichlet boundary condition on the boundary of the holes. They obtained the Darcy’s law
40
+ as the limit law in the homogenized medium.
41
+ In [9], the authors considered the Stokes
42
+ system in a periodically perforated domain with non-homogeneous slip boundary conditions
43
+ depending upon some parameter γ. Upon employing the Tartar’s method of oscillating test
44
+ functions they obtained under homogenization, the limit laws, viz., Darcy’s law ( for γ < 1),
45
+ Brinkmann’s law (for γ = 1), and Stokes’s type law (for γ > 1). In [25], the author studied
46
+ a similar problem using the method of periodic unfolding in perforated domains by [10].
47
+ Further, the type of behavior as seen in [9] was already observed in [12] by the authors while
48
+ studying the homogeneous Fourier boundary conditions for the two-dimensional Stokes equa-
49
+ tion. Likewise, in [1, 2], the author examined the Stokes equation in a perforated domain
50
+ with holes of size much smaller than the small positive parameter ε, wherein they considered
51
+ the boundary conditions on the holes to be of the Dirichlet type in [1] and the slip type
52
+ in [2]. The domain geometry, more specifically, the size of the holes, determines the kind of
53
+ limit law in these works. Also, the author in [6] employed the Γ− convergence techniques to
54
+ get comparable results.
55
+ A few works concern the homogenization of the OCPs governed by the elliptic systems
56
+ over the periodically perforated domains with different kinds of boundary conditions on the
57
+ boundary of holes (of the size of the same order as that of the period). In this regard, with
58
+ the use of different techiniques, viz., H0− convergence in [18], two-sclae convergence in [23],
59
+ and unfolding methods in [7,21], the homogenized OCPs were thus obtained over the non-
60
+ perforated domains. Further, in context to the Stokes system, the authors in [22] studied
61
+ the homogenization of the OCPs subject to the Stokes equations with Dirichlet boundary
62
+ conditions on the boundary of holes, where the size of the holes is of the same order as that of
63
+ the period. Here, the authors could obtain the homogenized system, pertaining only to the
64
+ case when the set of admissible controls was unconstrained. For more literature concerning
65
+ the homogenization of optimal control problems in perforated domains, the reader is reffered
66
+ to [13–15,19,24] and the references therein.
67
+ The present article introduces an interior OCP subject to the generalized stationary
68
+ Stokes equations in a periodically perforated domain O∗
69
+ ε. On the boundary of holes that
70
+ do not intersect the outer boundary, the homogeneous Neumann boundary condition is
71
+ prescribed, while on the rest part of the boundary, the homogeneous Dirichlet boundary
72
+ condition is prescribed. The underlying objective of this article is to study the homogeniza-
73
+ tion of this OCP. More specifically, we consider the minimization of the L2−cost functional
74
+ (3.1), which is subject to the constrained generalized stationary Stokes equations (3.2).
75
+ The Stokes equations are generalized in the sense that we consider a second-order elliptic
76
+ linear differential operator in divergence form with oscillating coefficients, i.e., − div (Aε∇),
77
+ first studied for the fixed domain in [4, Chapter 1], instead of the classical Laplacian operator.
78
+ 2
79
+
80
+ Here, the action of the scalar operator − div (Aε∇) is defined in a ”diagonal” manner on any
81
+ vector u = (u1, . . . , un), with components u1, . . . , un in the H1 Sobolev space. That is, for
82
+ 1 ≤ i ≤ n, we have (− div (Aε∇u))i = − div (Aε∇ui). The main difficulty observed during
83
+ the homogenization was identifying the limit pressure terms appearing in the state and the
84
+ adjoint systems, which we overcame by introducing suitable corrector functions that solved
85
+ some cell problems. We thus obtained the limit OCP associated with the stationary Stokes
86
+ equation in a non-perforated domain.
87
+ The layout of this article is as follows: In the next section, we introduce the periodically
88
+ perforated domain O∗
89
+ ε along with the notations that will be useful in the sequel. Section
90
+ 3 is devoted to a detailed description of the considered OCP and the derivation of the
91
+ optimality condition, followed by the characterization of the optimal control. In Section 4,
92
+ we derive a priori estimates of the solutions to the considered OCP and its corresponding
93
+ adjoint problem. In Section 5, we recall the definition of the method of periodic unfolding
94
+ in perforated domains (see, [8,11]) and a few of its properties. Section 6, refers to the limit
95
+ (homogenized) OCP. Finally, we derive the main convergence results in Section 7.
96
+ 2
97
+ Domain description and Notation
98
+ 2.1
99
+ Domain description
100
+ Let {b1, ..., bn} be a basis of Rn (n ≥ 2), and W be the associated reference cell defined as
101
+ W =
102
+
103
+ w ∈ Rn | w =
104
+ n
105
+
106
+ i=1
107
+ wibi, (w1, . . . , wn) ∈ (0, 1)n
108
+
109
+ .
110
+ Let us denote O, W, and W ∗ = W\Y by an open bounded subset of Rn, a compact subset
111
+ of W, and the perforated reference cell, respectively. It is assumed that the boundary of Y
112
+ is Lipschitz continuous and has a finite number of connected components.
113
+ Also, let ε > 0 be a sequence that converges to zero and set
114
+ T =
115
+
116
+ ζ ∈ Rn | ζ =
117
+ n
118
+
119
+ i=1
120
+ zibi, (z1, . . . , zn) ∈ Zn
121
+
122
+ ,
123
+ Zε = {ζ ∈ T | ε(ζ + W) ⊂ O} .
124
+ We take into account the perforated domain O∗
125
+ ε (see Figure 1) given by O∗
126
+ ε = O\Yε, where
127
+ Yε = ∪ζ∈T ε(ζ + Y ). Now, let us denote �
128
+ Oε as the interior of the largest union of ε(ζ + W)
129
+ cells such that ε(ζ + W) ⊂ O, while Λε ⊂ O as containing the parts from ε(ζ + W) cells
130
+ intersecting the boundary ∂O. More precisely, we write Λε = O\ �
131
+ Oε, where
132
+
133
+ Oε = interior
134
+
135
+ ∪ζ∈Zε ε(ζ + W)
136
+
137
+ .
138
+ The associated perforated domains are defined as
139
+
140
+ O∗
141
+ ε = ˆOε\Yε,
142
+ ˆΛ∗
143
+ ε = O∗
144
+ ε\ �
145
+ O∗
146
+ ε.
147
+ 3
148
+
149
+ Figure 1:
150
+ The Perforated domain O∗
151
+ ε and the reference cell W.
152
+ Also, we denote the boundary of the perforated domain O∗
153
+ ε as
154
+ ∂O∗
155
+ ε = Γε
156
+ 1 ∪ Γε
157
+ 0,
158
+ where Γε
159
+ 1 = ∂ �
160
+ Oε ∩ ∂Yε and Γε
161
+ 0 = ∂O∗
162
+ ε\Γε
163
+ 1,
164
+ which means that Γε
165
+ 1 denotes the boundary of set of holes contained in �
166
+ Oε.
167
+ In Figure 1, �
168
+ O∗
169
+ ε and ˆΛ∗
170
+ ε respectively represent the dark perforated part and the remaining
171
+ part of the perforated domain O∗
172
+ ε. While, Γε
173
+ 1 and Γε
174
+ 0 respectively represent the boundary
175
+ of holes contained in �
176
+ O∗
177
+ ε and the boundary of holes contained in ˆΛ∗
178
+ ε along with the outer
179
+ boundary ∂O. In the following, we introduce a few notations that we shall use throughout
180
+ this article.
181
+ 2.2
182
+ Notation
183
+ • Aε(x) = A( x
184
+ ε) a.e. in O, for all ε > 0.
185
+ • vε = (vε1, . . . , vεn), for any bold symbol vector function vε.
186
+ • v = (v1, . . . , vn), for any bold symbol vector function v.
187
+ • ηε denotes the outward normal unit vector to Γε
188
+ 1.
189
+ • η denotes the outward normal unit vector to ∂O.
190
+ • M t denotes the transpose of any matrix M.
191
+ • �ψ is the zero extension of any function ψ outside O∗
192
+ ε to the whole of O.
193
+ • �ψ = (�
194
+ ψ1, · · · , �
195
+ ψn), for any vector function ψ.
196
+ • |F| is the Lebesgue measure of the measurable set F.
197
+ 4
198
+
199
+ M• Θ = |W ∗|
200
+ |W| , the proportion of the perforated reference cell W ∗ in the reference cell W.
201
+ • MW ∗(φ) is the mean value of φ on the perforated reference cell W ∗.
202
+ • MW ∗(φ) = (MW ∗(φ1), · · · , MW ∗(φn)), for vector function φ.
203
+ • {D → R}, the set of all real valued functions defined on domain D.
204
+ • D(Ω), is the space of infinitely many times differentiable functions with compact sup-
205
+ port in Ω, for any open set Ω ∈ Rn.
206
+ 3
207
+ Problem description and Optimality condition
208
+ Let us consider the following OCP associated with Stokes system:
209
+ inf
210
+ θε∈(L2(O∗ε))n
211
+
212
+ Jε(θε) = 1
213
+ 2
214
+
215
+ O∗ε
216
+ |uε(θε) − ud|2 + τ
217
+ 2
218
+
219
+ O∗ε
220
+ |θε|2
221
+
222
+ ,
223
+ (3.1)
224
+ subject to
225
+
226
+
227
+ ��
228
+
229
+
230
+
231
+
232
+
233
+
234
+ − div (Aε∇uε) + ∇pε
235
+ = θε
236
+ in O∗
237
+ ε,
238
+ div(uε)
239
+ = 0
240
+ in O∗
241
+ ε,
242
+ ηε · Aε∇uε − pεηε
243
+ = 0
244
+ on Γε
245
+ 1,
246
+
247
+ = 0
248
+ on Γε
249
+ 0,
250
+ (3.2)
251
+ where the desired state ud = (ud1, . . . , udn) is defined on the space (L2(O))n, θε is a control
252
+ function defined on the space (L2(O∗
253
+ ε))n and τ > 0 is a given regularization parameter. Here,
254
+ the matrix Aε(x) = A( x
255
+ ε), where A(x) = (aij(x))1≤i,j≤n defined on the space (L∞(O))n×n
256
+ is assumed to obey the uniform ellipticity condition: there exist real constants m1, m2 > 0
257
+ such that m1||λ||2 ≤ �n
258
+ i,j=1 aij(x)λiλj ≤ m2||λ||2 for all λ ∈ Rn, which is endowed with
259
+ an Eucledian norm denoted by || · ||. Also, we understand the action of scalar boundary
260
+ operator ηε · Aε∇ on the vector uε|Γε
261
+ 1 in a ”diagonal” manner: (ηε · Aε∇uε)i = ηε · Aε∇uεi,
262
+ for 1 ≤ i ≤ n.
263
+ We introduce the function space (H1
264
+ Γε
265
+ 0(O∗
266
+ ε))n := {φ ∈ (H1(O∗
267
+ ε))n | φ|Γε
268
+ 0 = 0}. This is a
269
+ Banach space endowed with the norm
270
+ ||φ||(H1
271
+ Γε
272
+ 0(O∗ε))n := ||∇φ||(L2(O∗ε))n×n,
273
+ ∀φ ∈ (H1
274
+ Γε
275
+ 0(O∗
276
+ ε))n.
277
+ Definition 2.1. We say a pair (uε, pε) ∈ (H1
278
+ Γε
279
+ 0(O∗
280
+ ε))n × L2(O∗
281
+ ε) is a weak solution to (3.2)
282
+ if, for all φ ∈ (H1
283
+ Γε
284
+ 0(O∗
285
+ ε))n,
286
+
287
+ O∗ε
288
+ Aε∇uε : ∇φ dx −
289
+
290
+ O∗ε
291
+ pε div(φ) dx =
292
+
293
+ O∗ε
294
+ θε · φ dx,
295
+ (3.3)
296
+ 5
297
+
298
+ and, for all w ∈ L2(O∗
299
+ ε),
300
+
301
+ O∗ε
302
+ div(uε) w dx = 0.
303
+ (3.4)
304
+ Here, (: ) and (·) represent the summation of the component-wise multiplication of the
305
+ matrix entries and the usual scalar product of vectors, respectively.
306
+ The existence of a
307
+ unique weak solution (uε(θε), pε) ∈ (H1
308
+ Γε
309
+ 0(O∗
310
+ ε))n × L2(O∗
311
+ ε) of the system (3.2) follows anal-
312
+ ogous to [5, Theorem IV.7.1]. Also, for each ε > 0, there exists a unique solution to the
313
+ problem (3.1) that can be proved along the same lines as in [20, Chapter 2, Theorem 1.2].
314
+ We call the optimal solution to (3.1) by the triplet (uε, pε, θε), with uε, pε, and θε as optimal
315
+ state, pressure, and control, respectively.
316
+ Optimality Condition: The optimality condition is given by J′
317
+ ε(θ) · (θ − θε) ≥ 0, for all
318
+ θ ∈ (L2(O∗
319
+ ε))n (see, [20, Chapter 2, Page 48]). One can obtain the further simplification of
320
+ this condition as
321
+
322
+ O∗ε(vε + τ θε) · (θ − θε) ≥ 0, for all θ ∈ (L2(O∗
323
+ ε))n (see, [20, Chapter 2]),
324
+ where the pair (vε, qε) is the solution to the following adjoint problem:
325
+
326
+
327
+
328
+
329
+
330
+
331
+
332
+
333
+
334
+ − div
335
+
336
+ At
337
+ ε∇vε
338
+
339
+ + ∇qε
340
+ = uε − ud
341
+ in O∗
342
+ ε,
343
+ div(vε)
344
+ = 0
345
+ in O∗
346
+ ε,
347
+ ηε · At
348
+ ε∇vε − qεηε
349
+ = 0
350
+ on Γε
351
+ 1,
352
+
353
+ = 0
354
+ on Γε
355
+ 0.
356
+ (3.5)
357
+ We call vε and qε, the adjoint state and pressure, respectively. The existence of unique weak
358
+ solution (vε, qε) to (3.5) can now be proved in a way similar to that of system (3.2).
359
+ The following theorem characterizes the optimal control, the proof of which follows analogous
360
+ to standard procedure laid in [20, Chapter 2, Theorem 1.4].
361
+ Theorem 3.1. Let
362
+
363
+ uε, pε, θε
364
+
365
+ be the optimal solution of the problem (3.1) and (vε, qε)
366
+ solves (3.5), then the optimal control is characterized by
367
+ θε = −1
368
+ τ vε a.e. in O∗
369
+ ε.
370
+ (3.6)
371
+ Conversely, suppose that a triplet (ˇuε, ˇpε, ˇθε) ∈
372
+
373
+ H1
374
+ Γε
375
+ 0(O∗
376
+ ε)
377
+ �n
378
+ × L2(O∗
379
+ ε) × (L2(O∗
380
+ ε))n and a
381
+ pair (ˇvε, ˇqε) ∈
382
+
383
+ H1
384
+ Γε
385
+ 0(O∗
386
+ ε)
387
+ �n
388
+ × L2(O∗
389
+ ε) solves the following system:
390
+
391
+
392
+
393
+
394
+
395
+
396
+
397
+
398
+
399
+
400
+
401
+
402
+
403
+
404
+
405
+
406
+
407
+
408
+
409
+
410
+
411
+
412
+
413
+ − div (Aε∇ˇuε) + ∇ˇpε = −1
414
+ τ ˇvε
415
+ in O∗
416
+ ε,
417
+ − div
418
+
419
+ At
420
+ ε∇ˇvε
421
+
422
+ + ∇ˇqε = ˇuε − ud
423
+ in O∗
424
+ ε,
425
+ div(ˇuε) = 0, div(ˇvε) = 0
426
+ in O∗
427
+ ε,
428
+ ηε · Aε∇ˇuε − ˇpεηε = 0
429
+ on Γε
430
+ 1,
431
+ ηε · At
432
+ ε∇ˇvε − ˇqεηε = 0
433
+ on Γε
434
+ 1,
435
+ ˇvε = 0, ˇuε = 0
436
+ on Γε
437
+ 0.
438
+ 6
439
+
440
+ Then the triplet (ˇuε, ˇpε, − 1
441
+ τ ˇvε) is the optimal solution of (3.1).
442
+ 4
443
+ A priori estimates
444
+ This section concerns the derivation of estimates for the optimal solution to the problem
445
+ (3.1) and the associated solution to the adjoint problem (3.5). These estimates are uniform
446
+ and independent of the parameter ε. Towards attaining this aim, we first evoke the following
447
+ two lemmas:
448
+ Lemma 4.1 (Lemma A.4, [3]). There exists a constant C ∈ R+, independent of ε, such
449
+ that
450
+ ||v||L2(O∗ε)n ≤ C||∇v||(L2(O∗ε))n×n,
451
+ ∀ v ∈ (H1
452
+ Γε
453
+ 0(O∗
454
+ ε))n.
455
+ Lemma 4.2 (Lemma 5.1, [12]). For each ε > 0 and qε ∈ L2(O∗
456
+ ε), there exists gε ∈
457
+ (H1
458
+ Γε
459
+ 0(O∗
460
+ ε))n and a constant C ∈ R+, independent of ε, such that
461
+ div(gε) = qε and ||∇gε||(L2(O∗ε))n×n ≤ C(O) ||qε||L2(O∗ε).
462
+ (4.1)
463
+ Theorem 4.3. For each ε > 0, let
464
+
465
+ uε, pε, θε
466
+
467
+ be the optimal solution of the problem (3.1)
468
+ and (vε, qε) solves the corresponding adjoint problem (3.5). Then, one has θε ∈ (H1
469
+ Γε
470
+ 0(O∗
471
+ ε))n
472
+ and there exists a constant C ∈ R+, independent of ε such that
473
+ ��¯θε
474
+ ��
475
+ (L2(O∗ε))n ≤ C,
476
+ (4.2)
477
+ ∥¯uε∥(H1
478
+ Γε
479
+ 0(O∗ε))n ≤ C,
480
+ (4.3)
481
+ ∥¯vε∥(H1
482
+ Γε
483
+ 0(O∗ε))n ≤ C,
484
+ (4.4)
485
+ ∥¯pε∥L2(O∗ε) ≤ C,
486
+ (4.5)
487
+ ∥¯qε∥L2(O∗ε) ≤ C.
488
+ (4.6)
489
+ Proof. Let uε(0) denotes the solution to (3.2) corresponding to θε = 0. In view of Lemma
490
+ 4.1, one can show that ∥uε(0)∥(L2(O∗ε))n ≤ 0, i.e., uε(0) = 0 in (L2(O∗
491
+ ε))n. Using this and
492
+ the optimality of solution (uε, pε, θε) to problem (3.1), we have
493
+ ∥uε(θ) − ud∥2
494
+ (L2(O∗ε))n + τ∥θε∥2
495
+ (L2(O∗ε))n ≤ ∥uε(0) − ud∥2
496
+ (L2(O∗ε))n ≤ C,
497
+ which gives estimate (4.2). Now, let us take uε as a test function in (3.3). Considering
498
+ (4.2) and the uniform ellipticity condition of matrix Aε, one obtains upon applying the
499
+ Cauchy-Schwarz inequality along with the Lemma 4.1, the following:
500
+ m1∥∇uε∥2
501
+ (L2(O∗ε))n×n ≤
502
+
503
+ O∗ε
504
+ Aε∇uε : ∇uε dx ≤ C ∥θε∥(L2(O∗ε))n∥∇uε∥(L2(O∗ε))n×n,
505
+ from which estimate (4.3) follows.
506
+ 7
507
+
508
+ Owing to Lemma 4.2, for given pε ∈ L2(O∗
509
+ ε), there exists gε ∈ (H1
510
+ Γε
511
+ 0(O∗
512
+ ε))n satisying div(gε) =
513
+ pε. Corresponding to θε, taking v = gε in (3.3), we get
514
+ ∥pε∥2
515
+ L2(O∗ε) =
516
+
517
+ O∗ε
518
+ Aε∇uε : ∇gε dx −
519
+
520
+ O∗ε
521
+ θε · gε dx.
522
+ (4.7)
523
+ In view of (4.1), (4.2) and (4.3), and the uniform ellipticity condition of the matrix Aε,
524
+ one obtains from (4.7) upon employing the Cauchy-Schwarz inequality and Lemma 4.1, the
525
+ following:
526
+ ∥pε∥2
527
+ L2(O∗ε) ≤
528
+
529
+ m2∥∇uε∥(L2(O∗ε))n×n + C∥θε∥(L2(O∗ε))n
530
+
531
+ ∥∇gε∥(L2(O∗ε))n×n,
532
+ which gives the estimate (4.5). Likewise, one can easily obtain the estimates (4.4) and (4.6)
533
+ following the above discussion. Finally, from (3.6), we obtain that θε ∈ (H1
534
+ Γε
535
+ 0(O∗
536
+ ε))n.
537
+ 5
538
+ The method of periodic unfolding for perforated do-
539
+ mains
540
+ We evokes the definition of the periodic unfolding operator and few of its properties as
541
+ stated in [8,11]. Given x ∈ Rn, we denote the greatest integer and the fractional parts of x
542
+ respectively by [x]W and {x}W. That is, [x]W = �n
543
+ j=1 kjbj be the unique integer combination
544
+ of periods and {x}W = x − [x]W. In particular, we have for ε > 0,
545
+ x = ε
546
+ ��x
547
+ ε
548
+
549
+ W +
550
+ �x
551
+ ε
552
+
553
+ W
554
+
555
+ ,
556
+ ∀ x ∈ Rn.
557
+ Definition 5.1. The unfolding operator T ∗
558
+ ε : {O∗
559
+ ε → R} → {O × W ∗ → R} is defined as
560
+ T ∗
561
+ ε (u) (x, y) =
562
+
563
+ u
564
+
565
+ ε
566
+ � x1
567
+ ε
568
+
569
+ W + εy
570
+
571
+ a.e.
572
+ for (x, y) ∈ �
573
+ Oε × W ∗,
574
+ 0
575
+ a.e.
576
+ for (x, y) ∈ Λε × W ∗.
577
+ Also, for any domain D ⊇ O∗
578
+ ε and vector u = (u1, · · · , un) ∈ ({D → R})n, we define its
579
+ unfolding by
580
+ T ∗
581
+ ε (u) := (T ∗
582
+ ε (u1), · · · , T ∗
583
+ ε (un)).
584
+ Proposition 5.2. In the following there are the properties of the unfolding operator:
585
+ (i) T ∗
586
+ ε is linear and continuous from L2(O∗
587
+ ε) to L2(O × W ∗).
588
+ (ii) Let u, v ∈ L2(O∗
589
+ ε). Then T ∗
590
+ ε (uv) = T ∗
591
+ ε (u) T ∗
592
+ ε (v) .
593
+ (iii)
594
+ Let u ∈ L2 (O) . Then T ∗
595
+ ε (u) → u strongly in L2 (O × W ∗) .
596
+ (iv)
597
+ Let u ∈ L1 (O∗
598
+ ε) . Then
599
+
600
+
601
+ O∗ε
602
+ u(x) dx =
603
+
604
+ O∗ε
605
+ u(x) dx −
606
+
607
+ ˆΛ∗ε
608
+ u(x) dx =
609
+ 1
610
+ |W ∗|
611
+
612
+ O×W ∗ T ∗
613
+ ε (u)(x, y) dxdy.
614
+ 8
615
+
616
+ (v)
617
+ For each ε > 0, let {uε} ∈ L2 (O) and uε → u strongly in L2 (O) .
618
+ Then T ∗
619
+ ε (uε) → u strongly in L2 (O × W ∗) .
620
+ (vi) Let v ∈ L2 (W ∗) be a W-periodic function and vε(x) = v
621
+ � x
622
+ ε
623
+
624
+ . Then,
625
+ T ∗
626
+ ε (vε) (x, y) =
627
+
628
+ v(y)
629
+ a.e. for (x, y) ∈ �
630
+ Oε × W ∗,
631
+ 0
632
+ a.e. for (x, y) ∈ Λε × W ∗.
633
+ (vii) Let fε ∈ L2 (O∗
634
+ ε) be uniformly bounded. Then, there exists f ∈ L2(O × W ∗) such that
635
+ T ∗
636
+ ε (fε) ⇀ f weakly in L2(O × W ∗), and
637
+ �fε ⇀
638
+ 1
639
+ |W|
640
+
641
+ W ∗ f(·, y) dy weakly in L2(O).
642
+ Proposition 5.3. Let O ⊂ Rn be bounded with Lipschitz boundary. Let fε ∈ H1(O∗
643
+ ε) be
644
+ such that fε = 0 on ∂O ∩ ∂O∗
645
+ ε and satisfy,
646
+ ∥∇fε∥(L2(O∗ε))n ≤ C§.
647
+ Then, there exists f ∈ H1
648
+ 0(O) and �f ∈ L2 �
649
+ O; H1
650
+ per (W ∗)
651
+
652
+ with MW ∗( �f) = 0, such that up to
653
+ a subsequence,
654
+
655
+ T ∗
656
+ ε (∇fε) ⇀ ∇f + ∇y �f
657
+ weakly in (L2 (O × W ∗))n ,
658
+ T ∗
659
+ ε (fε) → f
660
+ strongly in L2 (O; H1 (W ∗)) .
661
+ 6
662
+ Limit optimal control problem
663
+ This section presents the limit (homogenized) system corresponding to the problem (3.1),
664
+ which we considered in the beginning.
665
+ Let us consider the function space
666
+
667
+ H1
668
+ 0(O)
669
+ �n :=
670
+
671
+ ϕ ∈ (H1(O))n | ϕ|∂O = 0
672
+
673
+ ,
674
+ which is a Hilbert space for the norm
675
+ ∥ϕ∥(H1
676
+ 0(O))n := ∥∇ϕ∥(L2(O))n×n
677
+ ∀ ϕ ∈ (H1
678
+ 0(O))n.
679
+ We now consider the limit OCP associated with the Stokes system
680
+ inf
681
+ θ∈(L2(O))n
682
+
683
+ J(θ) = Θ
684
+ 2
685
+
686
+ O
687
+ |u − ud|2 dx + τΘ
688
+ 2
689
+
690
+ O
691
+ |θ|2 dx
692
+
693
+ ,
694
+ (6.1)
695
+ §The symbol C represents a generic constant that is positive and independent of ε.
696
+ 9
697
+
698
+ subject to
699
+
700
+
701
+
702
+
703
+
704
+
705
+
706
+
707
+
708
+
709
+ n
710
+
711
+ j,α,β=1
712
+
713
+ ∂xα
714
+
715
+ bαβ
716
+ ij
717
+ ∂uj
718
+ ∂xβ
719
+
720
+ + ∇p
721
+ = θ
722
+ in O,
723
+ div (u)
724
+ = 0
725
+ in O,
726
+ u
727
+ = 0
728
+ on ∂O,
729
+ (6.2)
730
+ where the tensor B = (bαβ
731
+ ij ) = (bαβ
732
+ ij )1≤i,j,α,β≤n is constant, elliptic, and for 1 ≤ i, j, α, β ≤ n,
733
+ is given by
734
+ bαβ
735
+ ij = aαβ
736
+ ij −
737
+ 1
738
+ |W ∗|
739
+
740
+ W ∗ A(y)∇y
741
+
742
+ P β
743
+ j − χβ
744
+ j
745
+
746
+ : ∇yχα
747
+ i dy,
748
+ with aαβ
749
+ ij =
750
+ 1
751
+ |W ∗|
752
+
753
+ W ∗ A(y)∇y
754
+
755
+ P β
756
+ j − χβ
757
+ j
758
+
759
+ : ∇yP α
760
+ i dy as the entries of the constant tensor A0,
761
+ P β
762
+ j = P β
763
+ j (y) = (0, . . . , yj, . . . , 0) with yj at the β-th position, and for 1 ≤ j, β ≤ n, the
764
+ correctors (χβ
765
+ j , Πβ
766
+ j ) ∈ (H1(W ∗))n × L2(W ∗) solves the cell problem
767
+
768
+
769
+
770
+
771
+
772
+
773
+
774
+
775
+
776
+
777
+
778
+
779
+
780
+
781
+
782
+
783
+
784
+
785
+
786
+ − divy
787
+
788
+ A(y)∇y(P β
789
+ j − χβ
790
+ j )
791
+
792
+ + ∇yΠβ
793
+ j
794
+ = 0
795
+ in W ∗,
796
+ η · A(y)∇y(P β
797
+ j − χβ
798
+ j ) − Πβ
799
+ j η
800
+ = 0
801
+ on ∂W ∗\∂W,
802
+ divy(P β
803
+ j − χβ
804
+ j )
805
+ = 0
806
+ in W ∗,
807
+ (χβ
808
+ j , Πβ
809
+ j )
810
+ W ∗- periodic,
811
+ MW ∗(χβ
812
+ j )
813
+ = 0.
814
+ (6.3)
815
+ The existence of this unique pair (u, p) ∈ (H1
816
+ 0(O))n × L2(O) can be found in [4, Chapter
817
+ 1]. Further, the problem (6.1) is a standard one and there exists a unique weak solution to
818
+ it, one can follow the arguments introduced in [20, Chapter 2, Theorem 1.2]. We call the
819
+ triplet (u, p, θ) ∈ (H1
820
+ 0(O))n × L2(O) × (L2(O))n, the optimal solution to (6.1), with u, p,
821
+ and θ as the optimal state, pressure, and control, respectively.
822
+ Now, we introduce the limit adjoint system associated with (6.2): Find a pair (v, q) ∈
823
+ (H1
824
+ 0(O))n × L2(O) which solves the system
825
+
826
+
827
+
828
+
829
+
830
+
831
+ n
832
+
833
+ i,α,β=1
834
+
835
+ ∂xβ
836
+
837
+ bβα
838
+ ji
839
+ ∂vi
840
+ ∂xα
841
+
842
+ + ∇q
843
+ = u − ud
844
+ in O,
845
+ div (v)
846
+ = 0
847
+ in O,
848
+ (6.4)
849
+ where the tensor Bt = (bβα
850
+ ji ) = (bβα
851
+ ji )1≤i,j,α,β≤n is constant, elliptic, and for 1 ≤ i, j, α, β ≤ n,
852
+ is given by
853
+ bβα
854
+ ji = aβα
855
+ ji −
856
+ 1
857
+ |W ∗|
858
+
859
+ W ∗ At(y)∇y
860
+
861
+ P β
862
+ j − Hβ
863
+ j
864
+
865
+ : ∇yHα
866
+ i dy,
867
+ with aβα
868
+ ji =
869
+ 1
870
+ |W ∗|
871
+
872
+ W ∗ At(y)∇y
873
+
874
+ P β
875
+ j − Hβ
876
+ j
877
+
878
+ : ∇yP α
879
+ i dy as the entries of the constant tensor
880
+ At
881
+ 0. Also, for 1 ≤ j, β ≤ n, the correctors (Hβ
882
+ j , Zβ
883
+ j ) ∈ (H1(W ∗))n × L2(W ∗) solves the cell
884
+ 10
885
+
886
+ problem
887
+
888
+
889
+
890
+
891
+
892
+
893
+
894
+
895
+
896
+
897
+
898
+
899
+
900
+
901
+
902
+
903
+
904
+
905
+
906
+ − divy
907
+
908
+ At(y)∇y(P β
909
+ j − Hβ
910
+ j )
911
+
912
+ + ∇yZβ
913
+ j
914
+ = 0
915
+ in W ∗,
916
+ η · At(y)∇y(P β
917
+ j − Hβ
918
+ j ) − Zβ
919
+ j η
920
+ = 0
921
+ on ∂W ∗\∂W,
922
+ divy(P β
923
+ j − Hβ
924
+ j )
925
+ = 0
926
+ in W ∗,
927
+ (Hβ
928
+ j , Zβ
929
+ j )
930
+ W ∗- periodic,
931
+ MW ∗(Hβ
932
+ j )
933
+ = 0.
934
+ (6.5)
935
+ In the following, we state a result similar to Theorem 3.1 that characterizes the optimal
936
+ control θ in terms of the adjoint state v and the proof of which follows analogous to the
937
+ standard procedure laid in [20, Chapter 2, Theorem 1.4].
938
+ Theorem 6.1. Let
939
+
940
+ u, p, θ
941
+
942
+ be the optimal solution to (6.1) and (v, q) be the corresponding
943
+ adjoint solution to (6.4), then the optimal control is characterized by
944
+ θ = −1
945
+ τ v a.e. in O.
946
+ (6.6)
947
+ Conversely, suppose that a triplet
948
+ (ˇu, ˇp, ˇθ) ∈ (H1
949
+ 0(O))n × L2(O) × (L2(O))n and a pair
950
+ (ˇv, ˇq) ∈ (H1
951
+ 0(O))n × L2(O), respectively, satisfy the following systems:
952
+
953
+
954
+
955
+
956
+
957
+
958
+ n
959
+
960
+ j,α,β=1
961
+
962
+ ∂xα
963
+
964
+ bαβ
965
+ ij
966
+ ∂ˇuj
967
+ ∂xβ
968
+
969
+ + ∇ˇp
970
+ = − 1
971
+ τ ˇv
972
+ in O,
973
+ div (ˇu)
974
+ = 0
975
+ in O,
976
+ and
977
+
978
+
979
+
980
+
981
+
982
+
983
+ n
984
+
985
+ i,α,β=1
986
+
987
+ ∂xβ
988
+
989
+ bβα
990
+ ji
991
+ ∂ˇvi
992
+ ∂xα
993
+
994
+ + ∇ˇq
995
+ = ˇu − ud
996
+ in O,
997
+ div (ˇv)
998
+ = 0
999
+ in O.
1000
+ Then, the triplet
1001
+ �ˇu, ˇp, − 1
1002
+ τ ˇv
1003
+
1004
+ is the optimal solution to (6.1).
1005
+ 7
1006
+ Convergence results
1007
+ We present here the key findings on the convergence analysis of the optimal solutions to the
1008
+ problem (3.1) and its corresponding adjoint system (3.5) by using the method of periodic
1009
+ unfolding for perforated domains described in Section 5.
1010
+ Theorem 7.1. For given ε > 0, let the triplets (uε, pε, θε) and (u, p, θ), respectively, be the
1011
+ 11
1012
+
1013
+ optimal solutions of the problems (3.1) and (6.1). Then
1014
+ T ∗
1015
+ ε (Aε) → A
1016
+ strongly in (L2(O × W ∗))n×n,
1017
+ (7.1a)
1018
+
1019
+ θε ⇀ Θ θ
1020
+ weakly in
1021
+
1022
+ L2 (O)
1023
+ �n ,
1024
+ (7.1b)
1025
+
1026
+ uε ⇀ Θ u
1027
+ weakly in (H1
1028
+ 0(O))n,
1029
+ (7.1c)
1030
+
1031
+ vε ⇀ Θ v
1032
+ weakly in (H1
1033
+ 0(O))n,
1034
+ (7.1d)
1035
+ �pε ⇀ Θ
1036
+ n A0∇u: I + Θ p
1037
+ weakly in L2(O),
1038
+ (7.1e)
1039
+ �qε ⇀ Θ
1040
+ n At
1041
+ 0∇v: I + Θ q
1042
+ weakly in L2(O),
1043
+ (7.1f)
1044
+ where A0 is a tensor as defined in Section 6, I is the n × n identity matrix, θ is characterized
1045
+ through (6.6) and the pairs (vε, qε) and (v, q) solve respectively the systems (3.5) and (6.4).
1046
+ Moreover,
1047
+ lim
1048
+ ε→0 Jε(θε) = J(θ).
1049
+ (7.2)
1050
+ Proof. First, upon using Proposition 5.2 (vi) on the entries of the matrix Aε, we obtain (7.1a)
1051
+ under the passage of limit ε → 0. Similarly, one can prove the convergence for the matrix
1052
+ At
1053
+ ε under unfolding. Next, in view of Theorem 4.3 and the fact that the triplet (uε, pε, θε)
1054
+ is an optimal solution to problem (3.1), one gets uniform estimates for the sequences {θε},
1055
+ {uε}, {pε}, {v��}, and {qε} in the spaces (L2 (O∗
1056
+ ε))n, (H1
1057
+ Γε
1058
+ 0(O∗
1059
+ ε))n, L2 (O∗
1060
+ ε), (H1
1061
+ Γε
1062
+ 0(O∗
1063
+ ε))n, and
1064
+ L2 (O∗
1065
+ ε), respectively.
1066
+ Using the uniform estimate of the sequence {θε} in the space (L2 (O∗
1067
+ ε))n and Proposition
1068
+ 5.2 (i), we have the sequence {T ∗
1069
+ ε (θε)} to be uniformly bounded in the space (L2 (O × W ∗))n.
1070
+ Thus, by weak compactness, there exists a subsequence not relabelled and a function ˆθ in
1071
+ (L2 (O × W ∗))n, such that
1072
+ T ∗
1073
+ ε (θε) ⇀ ˆθ
1074
+ weakly in
1075
+
1076
+ L2 (O × W ∗)
1077
+ �n .
1078
+ (7.3)
1079
+ Now, using Proposition 5.2 (vii) in (7.3) gives
1080
+
1081
+ θε ⇀
1082
+ 1
1083
+ |W|
1084
+
1085
+ W ∗
1086
+ ˆθ(x, y) dy = Θ θ0
1087
+ weakly in
1088
+
1089
+ L2 (O)
1090
+ �n ,
1091
+ (7.4)
1092
+ where, θ0 = MW ∗(ˆθ).
1093
+ Employing Proposition 5.2 (i), we have the uniform boundedness of the sequences {T ε(uε)},
1094
+ {T ε(∇uε)}, and {T ε(pε)} in the respective spaces (L2(O; H1 (W ∗)))n, (L2(O × W ∗))n×n,
1095
+ and L2(O × W ∗). Further, upon employing Proposition 5.3 and Proposition 5.2 (vii), there
1096
+ exist subsequences not relabelled and functions ˆu with MW ∗(ˆu) = 0, u0, and ˆp in spaces
1097
+ 12
1098
+
1099
+ (L2(O; H1
1100
+ per (W ∗)))n, (H1
1101
+ 0(O))n, and L2(O × W ∗), respectively, such that
1102
+ T ∗
1103
+ ε (uε) → u0
1104
+ strongly in (L2(O; H1 (W ∗)))n,
1105
+ (7.5a)
1106
+ T ∗
1107
+ ε (∇uε) ⇀ ∇u0 + ∇y ˆu
1108
+ weakly in (L2(O × W ∗))n×n,
1109
+ (7.5b)
1110
+
1111
+ uε ⇀ Θ u0
1112
+ weakly in (H1
1113
+ 0(O))n,
1114
+ (7.5c)
1115
+ T ∗
1116
+ ε (pε) ⇀ ˆp
1117
+ weakly in L2(O × W ∗),
1118
+ (7.5d)
1119
+ �pε ⇀ Θ MW ∗(ˆp)
1120
+ weakly in L2(O).
1121
+ (7.5e)
1122
+ Likewise, for the associated adjoint counterparts, viz., vε, and qε , one obtains that there
1123
+ exist subsequences not relabelled and functions ˆv with MW ∗(ˆv) = 0, v0, and ˆq in spaces
1124
+ (L2(O; H1
1125
+ per (W ∗)))n, (H1
1126
+ 0(O))n, and L2(O × W ∗), respectively, such that
1127
+ T ∗
1128
+ ε (vε) → v0
1129
+ strongly in (L2(O; H1 (W ∗)))n,
1130
+ (7.6a)
1131
+ T ∗
1132
+ ε (∇vε) ⇀ ∇v0 + ∇yˆv
1133
+ weakly in (L2(O × W ∗))n×n,
1134
+ (7.6b)
1135
+
1136
+ vε ⇀ Θ v0
1137
+ weakly in (H1
1138
+ 0(O))n,
1139
+ (7.6c)
1140
+ T ∗
1141
+ ε (qε) ⇀ ˆq
1142
+ weakly in L2(O × W ∗),
1143
+ (7.6d)
1144
+ �qε ⇀ MW ∗(ˆq)
1145
+ weakly in L2(O).
1146
+ (7.6e)
1147
+ The identification of the limit functions ˆu, ˆv, ˆp, ˆq, MW ∗(ˆp) and MW ∗(ˆq) is carried out in
1148
+ subsequent steps.
1149
+ Step 1: (Claim): For all ϕ ∈ (H1
1150
+ 0(O))n, ψ ∈
1151
+
1152
+ L2 �
1153
+ O; H1
1154
+ per (W ∗)
1155
+ ��n , and w ∈ L2(O), we
1156
+ claim that the ordered quadruplet (u0, ˆu, ˆp, θ0) ∈ (H1
1157
+ 0(O))n ×(L2(O; H1
1158
+ per (W ∗)))n ×L2(O×
1159
+ W ∗) × (L2(O))n is a unique solution to the following limit system:
1160
+
1161
+
1162
+
1163
+
1164
+
1165
+
1166
+
1167
+
1168
+
1169
+
1170
+
1171
+
1172
+
1173
+
1174
+
1175
+
1176
+
1177
+
1178
+
1179
+ 1
1180
+ |W|
1181
+
1182
+ O×W ∗ A(y) (∇u0 + ∇y�u(x, y)) : (∇ϕ + ∇yψ) dx dy
1183
+ − 1
1184
+ |W|
1185
+
1186
+ O×W ∗ ˆp(x, y) (div(ϕ) + divy(ψ)) dx dy = Θ
1187
+
1188
+ O
1189
+ θ0 · ϕ dx,
1190
+ and,
1191
+
1192
+ O
1193
+ div(u0) w dx = 0,
1194
+ (7.7)
1195
+ and the ordered triplet (v0, ˆv, ˆq) ∈ (H1
1196
+ 0(O))n×(L2(O; H1
1197
+ per (W ∗)))n×L2(O×W ∗) is a unique
1198
+ solution to the following limit adjoint system:
1199
+
1200
+
1201
+
1202
+
1203
+
1204
+
1205
+
1206
+
1207
+
1208
+
1209
+
1210
+
1211
+
1212
+
1213
+
1214
+
1215
+
1216
+
1217
+
1218
+ 1
1219
+ |W|
1220
+
1221
+ O×W ∗ At(y) (∇v0 + ∇y�v(x, y)) : (∇ϕ + ∇yψ) dx dy
1222
+ − 1
1223
+ |W|
1224
+
1225
+ O×W ∗ ˆq(x, y) (div(ϕ) + divy(ψ)) dx dy = Θ
1226
+
1227
+ O
1228
+ (u0 − ud) · ϕ dx,
1229
+ and,
1230
+
1231
+ O
1232
+ div(v0) w dx = 0.
1233
+ (7.8)
1234
+ 13
1235
+
1236
+ Proof of the Claim: Towards the proof of (7.7), let us consider a test function ϕ ∈ (D(O))n
1237
+ in (3.3) and use properties (i), (ii), and (iv) of Proposition 5.2 to get
1238
+ 1
1239
+ |W|
1240
+
1241
+ O×W ∗ T ∗
1242
+ ε (Aε) T ∗
1243
+ ε (∇uε): T ∗
1244
+ ε (∇ϕ) dx dy +
1245
+
1246
+ ˆΛ∗ε
1247
+ Aε∇uε : ∇ϕ dx −
1248
+
1249
+ ˆΛ∗ε
1250
+ pε div(ϕ) dx
1251
+
1252
+ 1
1253
+ |W|
1254
+
1255
+ O×W ∗ T ∗
1256
+ ε (pε) T ∗
1257
+ ε (div(ϕ)) dx dy =
1258
+ 1
1259
+ |W|
1260
+
1261
+ O×W ∗ T ∗
1262
+ ε (θε) · T ∗
1263
+ ε (φε) dx dy +
1264
+
1265
+ ˆΛ∗ε
1266
+ θε · ϕ dx.
1267
+ (7.9)
1268
+ Using Proposition 5.2 (iii), the fact that limε→0 |ˆΛ∗
1269
+ ε| = 0, and convergences (7.3), (7.1a),
1270
+ (7.5b), (7.5d), we have under the passage of limit ε → 0 in (7.9)
1271
+ 1
1272
+ |W|
1273
+
1274
+ O×W ∗ A(y) (∇u0 + ∇y�u(x, y)) : ∇ϕ dx dy
1275
+ − 1
1276
+ |W|
1277
+
1278
+ O×W ∗ ˆp(x, y) div(ϕ) dx dy = Θ
1279
+
1280
+ O
1281
+ θ0 · ϕ dx,
1282
+ (7.10)
1283
+ which remains valid for every ϕ ∈ (H1
1284
+ 0(O))n, by density.
1285
+ Now, consider the function φε(x) = εφ(x)ξ( x
1286
+ ε), where φ ∈ D(O) and ξ ∈ (H1
1287
+ per(W ∗))n.
1288
+ Employing properties (ii), (iii), and (vi) of Proposition 5.2, one can easily obtain
1289
+ T ∗
1290
+ ε (φε) (x, y) → 0
1291
+ strongly in (L2(O × W ∗))n,
1292
+ (7.11a)
1293
+ T ∗
1294
+ ε (∇φε) (x, y) → φ(x)∇yξ(y)
1295
+ strongly in (L2(O × W ∗))n×n.
1296
+ (7.11b)
1297
+ Let us use the test function φε in (3.3) and employ properties (i), (ii), and (iv) of Proposition
1298
+ 5.2 to get
1299
+ 1
1300
+ |W|
1301
+
1302
+ O×W ∗ T ∗
1303
+ ε (Aε) T ∗
1304
+ ε (∇uε): T ∗
1305
+ ε (∇φε) dx dy +
1306
+
1307
+ ˆΛ∗ε
1308
+ Aε∇uε : ∇φε dx −
1309
+
1310
+ ˆΛ∗ε
1311
+ pε div(φε) dx
1312
+ − 1
1313
+ |W|
1314
+
1315
+ O×W ∗ T ∗
1316
+ ε (pε) T ∗
1317
+ ε (div(φε)) dx dy =
1318
+ 1
1319
+ |W|
1320
+
1321
+ O×W ∗ T ∗
1322
+ ε (θε) · T ∗
1323
+ ε (φε) dx dy +
1324
+
1325
+ ˆΛ∗ε
1326
+ θε · φε dx.
1327
+ (7.12)
1328
+ In (7.12), the absolute value of each integral over ˆΛ∗
1329
+ ε is bounded above with a bound of
1330
+ order ε|ˆΛ∗
1331
+ ε| or |ˆΛ∗
1332
+ ε|. This with the fact that limε→0 |ˆΛ∗
1333
+ ε| = 0, and convergences (7.3), (7.1a),
1334
+ (7.5b), (7.5d), and (7.11), gives under the passage of limit ε → 0
1335
+ 1
1336
+ |W|
1337
+
1338
+ O×W ∗ A(y) (∇u0 + ∇y�u(x, y)) : ∇yψ dx dy −
1339
+ 1
1340
+ |W|
1341
+
1342
+ O×W ∗ ˆp(x, y) divy(ψ) dx dy = 0,
1343
+ (7.13)
1344
+ which remains valid for every φ ξ = ψ ∈ (L2(O; H1
1345
+ per(W ∗)))n, by density.
1346
+ Further, for all w ∈ L2(O), we have
1347
+
1348
+ O∗ε
1349
+ div(uε)w dx = 0.
1350
+ (7.14)
1351
+ 14
1352
+
1353
+ Now, upon applying unfolding on (7.14) and using properties (i), (ii), and (iii) of Proposition
1354
+ 5.2 along with convergence (7.5b), we get under the passage of limit ε → 0
1355
+ 1
1356
+ |W|
1357
+
1358
+ O×W ∗ (div(u0) + divy(ˆu)) w dx dy = 0,
1359
+ which eventually gives upon using the fact that ˆu is W ∗− periodic, for all w ∈ L2(O):
1360
+
1361
+ O
1362
+ div(u0)w dx = 0.
1363
+ (7.15)
1364
+ Finally, upon adding (7.10) with (7.13) and considering (7.15), we establish (7.7). Likewise,
1365
+ one can easily establish (7.8). This settles the proof of the claim.
1366
+ Step 2: First, we are going to identify the limit functions ˆu, ˆv, ˆp, and ˆq. Next, using these
1367
+ identifications, we will identify MW ∗(ˆp) and MW ∗(ˆq).
1368
+ Identification of ˆu, ˆv, ˆp, ˆq: Taking sucessively ϕ ≡ 0 and ψ ≡ 0 in (7.7), yields
1369
+
1370
+
1371
+
1372
+
1373
+
1374
+
1375
+
1376
+
1377
+
1378
+
1379
+
1380
+
1381
+
1382
+
1383
+
1384
+ − divy(A(y)∇y�u(x, y)) + ∇y�p(x, y) = divy(A(y))∇u0(x)
1385
+ in O × W ∗,
1386
+ − divx
1387
+ ��
1388
+ W ∗ A(y)(∇u0(x) + ∇y�u(x, y))dy
1389
+
1390
+ + ∇�p(x, y) = |W ∗| θ0
1391
+ in O,
1392
+ div(u0) = 0
1393
+ in O,
1394
+ �u(x, ·)
1395
+ is W ∗ − periodic.
1396
+ (7.16)
1397
+ In the first line of (7.16), we have the y-independence of ∇u0(x) and the linearity of opera-
1398
+ tors, viz., divergence and gradient, which suggests �u(x, y) and �p(x, y) to be of the following
1399
+ form (see, for e.g., [17, Page 15]):
1400
+
1401
+
1402
+
1403
+
1404
+
1405
+
1406
+
1407
+
1408
+
1409
+
1410
+
1411
+ �u(x, y) = −
1412
+ n
1413
+
1414
+ j,β=1
1415
+ χβ
1416
+ j (y)∂u0j
1417
+ ∂xβ
1418
+ + u1(x),
1419
+ �p(x, y) =
1420
+ n
1421
+
1422
+ j,β=1
1423
+ Πβ
1424
+ j (y)∂u0j
1425
+ ∂xβ
1426
+ + p0(x).
1427
+ (7.17)
1428
+ where the ordered pair (u1, p0) ∈ (H1(O))n × L2(O), and for 1 ≤ j, β ≤ n, the pair (χβ
1429
+ j , Πβ
1430
+ j )
1431
+ satisfy the cell problem (6.3). Likewise we obtain for the corresponding adjoint weak formu-
1432
+ lation (7.8):
1433
+
1434
+
1435
+
1436
+
1437
+
1438
+
1439
+
1440
+
1441
+
1442
+
1443
+
1444
+
1445
+
1446
+
1447
+
1448
+ − divy(A(y)∇y�v(x, y)) + ∇y�q(x, y) = divy(A(y))∇v0(x)
1449
+ in O × W ∗,
1450
+ − divx
1451
+ ��
1452
+ W ∗ A(y)(∇v0(x) + ∇y�v(x, y))dy
1453
+
1454
+ + ∇�q(x, y) = |W ∗| (u0 − ud)
1455
+ in O,
1456
+ div(v0) = 0
1457
+ in O,
1458
+ �v(x, ·)
1459
+ is W ∗ − periodic,
1460
+ (7.18)
1461
+ 15
1462
+
1463
+ and,
1464
+
1465
+
1466
+
1467
+
1468
+
1469
+
1470
+
1471
+
1472
+
1473
+
1474
+
1475
+ �v(x, y) = −
1476
+ n
1477
+
1478
+ j,β=1
1479
+
1480
+ j (y)∂v0j
1481
+ ∂xβ
1482
+ + v1(x),
1483
+ �q(x, y) =
1484
+ n
1485
+
1486
+ j,β=1
1487
+
1488
+ j (y)∂v0j
1489
+ ∂xβ
1490
+ + q0(x),
1491
+ (7.19)
1492
+ where the ordered pair (v1, q0) ∈ (H1(O))n ×L2(O), and for 1 ≤ j, β ≤ n, the pair (Hβ
1493
+ j , Zβ
1494
+ j )
1495
+ satisfy the cell problem (6.5).
1496
+ Identification of MW ∗(ˆp) and MW ∗(ˆq):
1497
+ Choosing the test function y = (y1, . . . , yn) in
1498
+ the weak formulation of (6.3), we get
1499
+ n
1500
+
1501
+ i,l,k,α=1
1502
+
1503
+ W ∗ alk
1504
+
1505
+ ∂yk
1506
+
1507
+ P β
1508
+ j − χβ
1509
+ j
1510
+
1511
+ · ∂P α
1512
+ i
1513
+ ∂yl
1514
+ ∂yi
1515
+ ∂yα
1516
+ dy = n
1517
+
1518
+ W ∗ Πβ
1519
+ j dy.
1520
+ (7.20)
1521
+ In view of (7.5e), (7.17), and (7.20), we observe that
1522
+ MW ∗(ˆp) =
1523
+ 1
1524
+ |W ∗|
1525
+ n
1526
+
1527
+ i,j,l,k,α,β=1
1528
+
1529
+ W ∗ alk
1530
+
1531
+ ∂yk
1532
+
1533
+ P β
1534
+ j − χβ
1535
+ j
1536
+
1537
+ · ∂P α
1538
+ i
1539
+ ∂yl
1540
+ ∂yi
1541
+ ∂yα
1542
+ ∂u0j
1543
+ ∂xβ
1544
+ dy + p0,
1545
+ which upon using the definition of aαβ
1546
+ ij , gives
1547
+ MW ∗(ˆp) =
1548
+ n
1549
+
1550
+ i,j,α,β=1
1551
+ aαβ
1552
+ ij
1553
+ ∂u0j
1554
+ ∂xβ
1555
+ ∂yi
1556
+ ∂yα
1557
+ + p0.
1558
+ (7.21)
1559
+ Also, we re-write the equation (7.21) to get the identification of MW ∗(ˆp) as
1560
+ MW ∗(ˆp) = A0∇u0 : I + p0.
1561
+ (7.22)
1562
+ Likewise, one can obtain the identification of MW ∗(ˆq) as
1563
+ MW ∗(ˆq) = At
1564
+ 0∇v0 : I + q0.
1565
+ (7.23)
1566
+ Thus, from (7.5e) and (7.22); (7.6e) and (7.23), we have the following weak convergences:
1567
+ �pε ⇀ Θ
1568
+ n A0∇u0 : I + Θ p0
1569
+ weakly in L2(O),
1570
+ (7.24a)
1571
+ �qε ⇀ Θ
1572
+ n At
1573
+ 0∇v0 : I + Θ q0
1574
+ weakly in L2(O).
1575
+ (7.24b)
1576
+ Step 3: (Claim): The pairs (u0, p0) and (v0, q0) solve the systems (6.2) and (6.4), respec-
1577
+ tively.
1578
+ Proof of the Claim: We now prove that the pair (u0, p0) solves the system (6.2). The proof
1579
+ 16
1580
+
1581
+ that the pair (v0, q0) solves the system (6.4) follows analogously. Substituting the values of
1582
+ �u(x, y) and �p(x, y) from expression (7.17) into equation (7.10), we get
1583
+ 1
1584
+ |W|
1585
+ n
1586
+
1587
+ l,k=1
1588
+
1589
+ O×W ∗ alk
1590
+
1591
+ ∂u0
1592
+ ∂xk
1593
+
1594
+ n
1595
+
1596
+ j,β=1
1597
+ ∂χβ
1598
+ j
1599
+ ∂yk
1600
+ ∂u0j
1601
+ ∂xβ
1602
+
1603
+ ∂ϕ
1604
+ ∂xl
1605
+ dx dy −
1606
+ 1
1607
+ |W|
1608
+ n
1609
+
1610
+ j,β=1
1611
+
1612
+ O×W ∗ Πβ
1613
+ j
1614
+ ∂u0j
1615
+ ∂xβ
1616
+ div(ϕ) dx dy
1617
+ −Θ
1618
+
1619
+ O
1620
+ p0 div(ϕ) dx = Θ
1621
+
1622
+ O
1623
+ θ0 · ϕ dx.
1624
+ (7.25)
1625
+ With P β
1626
+ j = (0, . . . , yj, . . . , 0), we can express the terms ∂u0
1627
+ ∂xk , ∂ϕ
1628
+ ∂xl, and div(ϕ) as
1629
+ ∂u0
1630
+ ∂xk
1631
+ =
1632
+ n
1633
+
1634
+ j,β=1
1635
+ ∂P β
1636
+ j
1637
+ ∂yk
1638
+ ∂u0j
1639
+ ∂xβ
1640
+ ,
1641
+ ∂ϕ
1642
+ ∂xl
1643
+ =
1644
+ n
1645
+
1646
+ i,α=1
1647
+ ∂P α
1648
+ i
1649
+ ∂yl
1650
+ ∂ϕi
1651
+ ∂xα
1652
+ ,
1653
+ div(ϕ) =
1654
+ n
1655
+
1656
+ i,α=1
1657
+ divy(P α
1658
+ i ) ∂ϕi
1659
+ ∂xα
1660
+ .
1661
+ Substituting these expressions in (7.25), we obtain
1662
+ n
1663
+
1664
+ i,j,α,β=1
1665
+
1666
+ O
1667
+
1668
+ 1
1669
+ |W ∗|
1670
+ n
1671
+
1672
+ l,k=1
1673
+
1674
+ W ∗ alk
1675
+
1676
+ ∂yk
1677
+
1678
+ P β
1679
+ j − χβ
1680
+ j
1681
+ � ∂P α
1682
+ i
1683
+ ∂yl
1684
+ dy
1685
+
1686
+ ∂u0j
1687
+ ∂xβ
1688
+ ∂ϕi
1689
+ ∂xα
1690
+ dx
1691
+
1692
+ n
1693
+
1694
+ i,j,α,β=1
1695
+
1696
+ O
1697
+
1698
+ 1
1699
+ |W ∗|
1700
+
1701
+ W ∗ Πβ
1702
+ j divy(P α
1703
+ i ) dy
1704
+ � ∂u0j
1705
+ ∂xβ
1706
+ ∂ϕi
1707
+ ∂xα
1708
+ dx −
1709
+
1710
+ O
1711
+ p0 div(ϕ) dx =
1712
+
1713
+ O
1714
+ θ0 · ϕ dx.
1715
+ (7.26)
1716
+ Now, choosing the test function χα
1717
+ i in the weak formulation of (6.3), we get upon using
1718
+ the fact that divy(χα
1719
+ i ) = divy(P α
1720
+ i ) = δiα, where δ denotes the Kronecker delta function, the
1721
+ following:
1722
+
1723
+ W ∗ A(y)∇y
1724
+
1725
+ P β
1726
+ j − χβ
1727
+ j
1728
+
1729
+ : ∇yχα
1730
+ i dy =
1731
+
1732
+ W ∗ Πβ
1733
+ j δiα dy.
1734
+ (7.27)
1735
+ Further, substituting (7.27) in (7.26), we obtain
1736
+ n
1737
+
1738
+ i,j,α,β=1
1739
+
1740
+ O
1741
+
1742
+ 1
1743
+ |W ∗|
1744
+ n
1745
+
1746
+ l,k=1
1747
+
1748
+ W ∗ alk
1749
+
1750
+ ∂yk
1751
+
1752
+ P β
1753
+ j − χβ
1754
+ j
1755
+ � ∂
1756
+ ∂yl
1757
+ (P α
1758
+ i − χα
1759
+ i ) dy
1760
+
1761
+ ∂u0j
1762
+ ∂xβ
1763
+ ∂ϕi
1764
+ ∂xα
1765
+ dx
1766
+
1767
+
1768
+ O
1769
+ p0 div(ϕ) dx =
1770
+
1771
+ O
1772
+ θ0 · ϕ dx.
1773
+ (7.28)
1774
+ Also, we can write equation (7.28) as
1775
+ n
1776
+
1777
+ i,j,α,β=1
1778
+
1779
+ O
1780
+ bαβ
1781
+ ij
1782
+ ∂u0j
1783
+ ∂xβ
1784
+ ∂ϕi
1785
+ ∂xα
1786
+ dx −
1787
+
1788
+ O
1789
+ p0 div(ϕ) dx =
1790
+
1791
+ O
1792
+ θ0 · ϕ dx,
1793
+ (7.29)
1794
+ 17
1795
+
1796
+ which holds true for all ϕ ∈ (H1
1797
+ 0(O))n. Also, from equation (7.15), we have
1798
+
1799
+ O div(u)w dx =
1800
+ 0, for every w ∈ L2(O). This together with equation (7.29) implies that, for θ = θ0, the
1801
+ pair (u0, p0) ∈ (H1
1802
+ 0(O))n × L2(O) satisfies the variational formulation of the system (6.2).
1803
+ Therefore, we obtain the optimality system for the minimization problem (6.1). Also, in
1804
+ view of Theorem 6.1, we conclude that the triplet (u0, p0, θ0) is indeed an optimal solution to
1805
+ the problem (6.1). Finally, upon considering the optimal solution’s uniqueness, we establish
1806
+ that the subsequent pair of triplets are equal:
1807
+ (u, p, θ) = (u0, p0, θ0).
1808
+ (7.30)
1809
+ Hence, upon comparing (7.5c), (7.6c), (7.24a), (7.24b), and (7.4) with (7.30), we obtain
1810
+ convergences (7.1c), (7.1d), (7.1e), (7.1f), and (7.1b), respectively.
1811
+ Step 4: Now, we will furnish the proof of the energy convergence for the L2−cost functional.
1812
+ Choosing the test function (uε − ud) in the weak formulation of system (3.5), we get under
1813
+ unfolding upon passing ε → 0
1814
+ lim
1815
+ ε→0
1816
+
1817
+ O∗ε
1818
+ |uε − ud|2 dx =
1819
+ 1
1820
+ |W| lim
1821
+ ε→0
1822
+
1823
+ O×W ∗ T ∗
1824
+ ε (At
1825
+ ε) T ∗
1826
+ ε (∇vε): T ∗
1827
+ ε (∇(uε − ud)) dx dy
1828
+ +
1829
+ 1
1830
+ |W| lim
1831
+ ε→0
1832
+
1833
+ O×W ∗ T ∗
1834
+ ε (qε) T ∗
1835
+ ε (div(ud)) dx dy,
1836
+ which gives in view of (7.30), Proposition 5.2 (iii) and convergences (7.6a), (7.5b), and (7.6d)
1837
+ lim
1838
+ ε→0
1839
+
1840
+ O∗ε
1841
+ |uε − ud|2 dx =
1842
+ 1
1843
+ |W|
1844
+
1845
+ O×W ∗ At(y) (∇v + ∇y�v(x, y)) : ∇y(u − ud) dx dy
1846
+ +
1847
+ 1
1848
+ |W|
1849
+
1850
+ O×W ∗ ˆq(x, y) div(ud) dx dy.
1851
+ (7.31)
1852
+ Also, using (7.19) in (7.31) alongwith (7.30), we have upon simplification
1853
+ lim
1854
+ ε→0
1855
+
1856
+ O∗ε
1857
+ |uε − ud|2 dx = Θ
1858
+
1859
+ n
1860
+
1861
+ i,j,α,β=1
1862
+
1863
+ O
1864
+ bβα
1865
+ ji
1866
+ ∂vi
1867
+ ∂xα
1868
+ ∂(u − ud)j
1869
+ ∂xβ
1870
+ dx −
1871
+
1872
+ O
1873
+ q div(u − ud) dx
1874
+
1875
+ .
1876
+ (7.32)
1877
+ Now, using the test function (u − ud) in the weak formulation of system (6.4), we get the
1878
+ following upon comparing with the right hand side of equation (7.32)
1879
+ lim
1880
+ ε→0
1881
+
1882
+ O∗ε
1883
+ |uε − ud|2 dx = Θ
1884
+
1885
+ O
1886
+ |u − ud|2 dx.
1887
+ (7.33)
1888
+ Furthermore, in view of (3.6), (7.6a), and (7.30), we get under unfolding upon the passage
1889
+ 18
1890
+
1891
+ of limit ε → 0
1892
+ lim
1893
+ ε→0
1894
+ τ
1895
+ 2
1896
+
1897
+ O∗ε
1898
+ |θε|2 dx = lim
1899
+ ε→0
1900
+ 1
1901
+ 2|W|
1902
+
1903
+ O×W ∗ |T ∗
1904
+ ε (θε)|2 dx dy
1905
+ = lim
1906
+ ε→0
1907
+ 1
1908
+ 2τ|W|
1909
+
1910
+ O×W ∗ |T ∗
1911
+ ε (vε)|2 dx dy
1912
+ =
1913
+ 1
1914
+ 2τ|W|
1915
+
1916
+ O×W ∗ |v|2 dx dy.
1917
+ (7.34)
1918
+ Also, since v is independent of y and comparing the right hand side of (7.34) with (6.6), we
1919
+ get
1920
+ lim
1921
+ ε→0
1922
+ τ
1923
+ 2
1924
+
1925
+ O∗ε
1926
+ |θε|2 dx = Θτ
1927
+ 2
1928
+
1929
+ O
1930
+ |θ|2 dx.
1931
+ (7.35)
1932
+ Thus, from equations (7.33) and (7.35), we get (7.2).
1933
+ This completes the proof of Theorem 7.1.
1934
+ 8
1935
+ Conclusions
1936
+ We have addressed the limiting behavior of an interior OCP corresponding to Stokes equa-
1937
+ tions in an nD (n ≥ 2)
1938
+ periodically perforated domain
1939
+ O∗
1940
+ ε via the technique of periodic
1941
+ unfolding in perforated domains (see, [8, 11]). We employed the Neumann boundary con-
1942
+ dition on the part of the boundary of the perforated domain. Firstly, we characterized the
1943
+ optimal control in terms of the adjoint state. Secondly, we deduced the apriori optimal
1944
+ bounds for control, state, pressure, and their associated adjoint state and pressure functions.
1945
+ Thereafter, the limiting analysis for the considered OCP is carried out upon employing the
1946
+ periodic unfolding method in perforated domains. We observed the convergence between the
1947
+ optimal solution to the problem (3.1) posed on the perforated domain O∗
1948
+ ε and the optimal
1949
+ solution to that of the limit problem (6.1) governed by stationary Stokes equation posed on
1950
+ a non-perforated domain O. Finally, we established the convergence of energy corresponding
1951
+ to L2−cost functional.
1952
+ 9
1953
+ Acknowledgments
1954
+ The first author would like to thank the Ministry of Education, Government of India for
1955
+ Prime Minister’s Research Fellowship (PMRF-2900953). The second author would like to
1956
+ thank the support from Science & Engineering Research Board (SERB) (SRG/2019/000997),
1957
+ Government of India.
1958
+ 19
1959
+
1960
+ References
1961
+ [1] G. Allaire, Homog´en´eisation des ´equations de Stokes dans un domaine perfor´e de petits
1962
+ trous r´epartis p´eriodiquement, C. R. Acad. Sci. Paris S´er. I Math. 309 (1989), no. 11,
1963
+ 741–746.
1964
+ [2]
1965
+ , Homogenization of the Navier-Stokes equations with a slip boundary condition,
1966
+ Comm. Pure Appl. Math. 44 (1991), no. 6, 605–641.
1967
+ [3] G. Allaire and F. Murat, Homogenization of the Neumann problem with nonisolated
1968
+ holes, Asymptotic Anal. 7 (1993), no. 2, 81–95, With an appendix written jointly with
1969
+ A. K. Nandakumar.
1970
+ [4] A. Bensoussan, J.-L. Lions, and G. Papanicolaou, Asymptotic analysis for periodic struc-
1971
+ tures, Studies in Mathematics and its Applications, vol. 5, North-Holland Publishing
1972
+ Co., Amsterdam-New York, 1978.
1973
+ [5] F. Boyer and P. Fabrie, Mathematical tools for the study of the incompressible Navier-
1974
+ Stokes equations and related models, Applied Mathematical Sciences, vol. 183, Springer,
1975
+ New York, 2013.
1976
+ [6] A. Brillard, Asymptotic analysis of incompressible and viscous fluid flow through porous
1977
+ media. Brinkman’s law via epi-convergence methods, Ann. Fac. Sci. Toulouse Math. (5)
1978
+ 8 (1986/87), no. 2, 225–252.
1979
+ [7] B. Cabarrubias, Homogenization of optimal control problems in perforated domains via
1980
+ periodic unfolding method, Appl. Anal. 95 (2016), no. 11, 2517–2534.
1981
+ [8] D. Cioranescu, A. Damlamian, P. Donato, G. Griso, and R. Zaki, The periodic unfolding
1982
+ method in domains with holes, SIAM J. Math. Anal. 44 (2012), no. 2, 718–760.
1983
+ [9] D. Cioranescu, P. Donato, and H. I. Ene, Homogenization of the Stokes problem with
1984
+ non-homogeneous slip boundary conditions, Math. Methods Appl. Sci. 19 (1996), no. 11,
1985
+ 857–881.
1986
+ [10] D. Cioranescu, P. Donato, and R. Zaki, Periodic unfolding and Robin problems in per-
1987
+ forated domains, C. R. Math. Acad. Sci. Paris 342 (2006), no. 7, 469–474.
1988
+ [11]
1989
+ , The periodic unfolding method in perforated domains, Port. Math. (N.S.) 63
1990
+ (2006), no. 4, 467–496.
1991
+ [12] C. Conca, On the application of the homogenization theory to a class of problems arising
1992
+ in fluid mechanics, J. Math. Pures Appl. (9) 64 (1985), no. 1, 31–75.
1993
+ [13] C. Conca, P. Donato, E. C. Jose, and I. Mishra, Asymptotic analysis of optimal controls
1994
+ of a semilinear problem in a perforated domain, J. Ramanujan Math. Soc. 31 (2016),
1995
+ no. 3, 265–305.
1996
+ 20
1997
+
1998
+ [14] J. I. Diaz, A. V. Podolskiy, and T. A. Shaposhnikova, On the convergence of controls
1999
+ and cost functionals in some optimal control heterogeneous problems when the homog-
2000
+ enization process gives rise to some strange terms, J. Math. Anal. Appl. 506 (2022),
2001
+ no. 1, Paper No. 125559, 13.
2002
+ [15]
2003
+ , On the homogenization of an optimal control problem in a domain perforated
2004
+ by holes of critical size and arbitrary shape, Dokl. Math. 105 (2022), no. 1, 6–13.
2005
+ [16] H. I. Ene and E. S´anchez-Palencia,
2006
+ ´Equations et ph´enom`enes de surface pour
2007
+ l′´ecoulement dans un mod`ele de milieu poreux, J. M´ecanique 14 (1975), 73–108.
2008
+ [17] S. Gu, Homogenization of Stokes Systems with Periodic Coefficients, ProQuest LLC,
2009
+ Ann Arbor, MI, 2016, Thesis (Ph.D.)–University of Kentucky.
2010
+ [18] S. Kesavan and J. Saint Jean Paulin, Homogenization of an optimal control problem,
2011
+ SIAM J. Control Optim. 35 (1997), no. 5, 1557–1573.
2012
+ [19]
2013
+ , Optimal control on perforated domains, Journal of Mathematical Analysis and
2014
+ Applications 229 (1999), no. 2, 563–586.
2015
+ [20] J.-L. Lions, Optimal control of systems governed by partial differential equations, Die
2016
+ Grundlehren der mathematischen Wissenschaften, Band 170, Springer-Verlag, New
2017
+ York-Berlin, 1971.
2018
+ [21] I. Mishra, Homogenization of boundary optimal control problem, Electron. J. Differential
2019
+ Equations 12 (2022), 1– 23.
2020
+ [22] T. Muthukumar and A. K. Nandakumaran, Darcy-type law associated to an optimal
2021
+ control problem, Electron. J. Differential Equations (2008), No. 16, 12.
2022
+ [23]
2023
+ , Homogenization of low-cost control problems on perforated domains, J. Math.
2024
+ Anal. Appl. 351 (2009), no. 1, 29–42.
2025
+ [24] J. Saint Jean Paulin and H. Zoubairi, Optimal control and “strange term” for a Stokes
2026
+ problem in perforated domains, Port. Math. (N.S.) 59 (2002), no. 2, 161–178.
2027
+ [25] R. Zaki, Homogenization of a Stokes problem in a porous medium by the periodic un-
2028
+ folding method, Asymptot. Anal. 79 (2012), no. 3-4, 229–250.
2029
+ 21
2030
+
hNAzT4oBgHgl3EQfMvs5/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff